The document discusses digital literacy and how to safely read and comprehend hypertexts. It covers two objectives: identifying the characteristics of security alerts and tips found online, and practicing reading strategies to safely use computers and the internet. The class activity involves pre-reading exercises to understand two text genres - security alerts and tips. Students learn to identify subjects, publishers, and intended audiences. They also discuss vocabulary and when to use "should" for advice. The goal is to help each other safely use technology through sharing security information online.
The document discusses email security issues and methods for improving email security. It covers topics like email viruses, email filtering, web email vulnerabilities, the Reaper exploit, and email encryption using PGP. Viruses can spread through email attachments and scripts. Email filtering uses attachment filters, virus filters, and spam filters to block threats. Web email can unintentionally reveal personal information in the URL. PGP provides strong encryption for email confidentiality and authentication using public/private key cryptography.
Malware comes in many forms but is generally defined as software designed to harm computers or networks. Common types of malware include computer viruses, worms, Trojan horses, ransomware, spyware, and adware. Ransomware encrypts victim's files and demands payment for decryption, while spyware stealthily collects user information. Phishing involves masquerading as a trusted entity to steal login credentials via malicious links or attachments. Proprietary software licenses restrict use and modification of source code, unlike open-source software which provides access to source code.
This document discusses different types of computer viruses:
- File infector viruses add virus code to program files, infecting other files when the infected program is executed.
- Boot sector viruses infect the boot sector of disks, infecting the system every time the disk is booted.
- Executable file viruses infect executable files and spread to other files when those files are run.
- Macro viruses infect files containing macros, spreading through applications that use macros.
- Worms replicate themselves, eventually overtaking computer resources.
- Trojan horses appear as benign programs but secretly damage systems.
- Rootkits allow remote control of infected computers by hiding their presence.
- Rogue antivirus software,
This document discusses various topics relating to computer security, ethics, and privacy. It covers types of computer security risks like viruses, worms, and Trojan horses. It also discusses techniques for safeguarding against internet and network attacks, unauthorized access and use, hardware theft and vandalism, and software theft. Some key safeguarding techniques mentioned are using antivirus software, firewalls, strong passwords, access controls, and biometric authentication.
This document provides guidance on securing passwords and protecting against password risks. It discusses best practices for creating strong passwords, using passwords safely, changing passwords regularly, and recovering passwords. It also covers risks of password exposure like phishing and malware, and precautions to take like keeping devices and shared computers secure. The overall message is the importance of password security to protect online accounts and information.
Swiss-belhotel Security Scare Workshop May 3, 2018Craig Rispin
This document discusses cybersecurity and provides tips for improving online security. It recommends always keeping software updated, using unique and long passwords, and enabling multi-factor authentication. Users are instructed to download the LastPass app to store passwords securely, set up a virtual private network, and take a quiz on cybersecurity topics. The goal is to educate people on basic cybersecurity practices to better protect their online accounts and information.
The document proposes a solution called Crypto-Book that aims to make encrypting Facebook messages easy through asymmetric public-key encryption. Crypto-Book allows users to generate keys with one click, publish their public key on their profile, and look up others' keys to encrypt messages before sending them on Facebook. It includes a desktop app to decrypt encrypted messages received on Facebook without requiring decryption directly on the platform. The goal is to provide privacy and security for Facebook messages while maintaining usability through an integrated, cross-platform system.
This document discusses protecting information on your computer through computer security tools like security software and operating system firewalls. It also mentions PC Magazine reviews of these types of programs. The document indicates the next lesson will cover what to do if your identity is stolen.
The document discusses email security issues and methods for improving email security. It covers topics like email viruses, email filtering, web email vulnerabilities, the Reaper exploit, and email encryption using PGP. Viruses can spread through email attachments and scripts. Email filtering uses attachment filters, virus filters, and spam filters to block threats. Web email can unintentionally reveal personal information in the URL. PGP provides strong encryption for email confidentiality and authentication using public/private key cryptography.
Malware comes in many forms but is generally defined as software designed to harm computers or networks. Common types of malware include computer viruses, worms, Trojan horses, ransomware, spyware, and adware. Ransomware encrypts victim's files and demands payment for decryption, while spyware stealthily collects user information. Phishing involves masquerading as a trusted entity to steal login credentials via malicious links or attachments. Proprietary software licenses restrict use and modification of source code, unlike open-source software which provides access to source code.
This document discusses different types of computer viruses:
- File infector viruses add virus code to program files, infecting other files when the infected program is executed.
- Boot sector viruses infect the boot sector of disks, infecting the system every time the disk is booted.
- Executable file viruses infect executable files and spread to other files when those files are run.
- Macro viruses infect files containing macros, spreading through applications that use macros.
- Worms replicate themselves, eventually overtaking computer resources.
- Trojan horses appear as benign programs but secretly damage systems.
- Rootkits allow remote control of infected computers by hiding their presence.
- Rogue antivirus software,
This document discusses various topics relating to computer security, ethics, and privacy. It covers types of computer security risks like viruses, worms, and Trojan horses. It also discusses techniques for safeguarding against internet and network attacks, unauthorized access and use, hardware theft and vandalism, and software theft. Some key safeguarding techniques mentioned are using antivirus software, firewalls, strong passwords, access controls, and biometric authentication.
This document provides guidance on securing passwords and protecting against password risks. It discusses best practices for creating strong passwords, using passwords safely, changing passwords regularly, and recovering passwords. It also covers risks of password exposure like phishing and malware, and precautions to take like keeping devices and shared computers secure. The overall message is the importance of password security to protect online accounts and information.
Swiss-belhotel Security Scare Workshop May 3, 2018Craig Rispin
This document discusses cybersecurity and provides tips for improving online security. It recommends always keeping software updated, using unique and long passwords, and enabling multi-factor authentication. Users are instructed to download the LastPass app to store passwords securely, set up a virtual private network, and take a quiz on cybersecurity topics. The goal is to educate people on basic cybersecurity practices to better protect their online accounts and information.
The document proposes a solution called Crypto-Book that aims to make encrypting Facebook messages easy through asymmetric public-key encryption. Crypto-Book allows users to generate keys with one click, publish their public key on their profile, and look up others' keys to encrypt messages before sending them on Facebook. It includes a desktop app to decrypt encrypted messages received on Facebook without requiring decryption directly on the platform. The goal is to provide privacy and security for Facebook messages while maintaining usability through an integrated, cross-platform system.
This document discusses protecting information on your computer through computer security tools like security software and operating system firewalls. It also mentions PC Magazine reviews of these types of programs. The document indicates the next lesson will cover what to do if your identity is stolen.
The Crossing Educational Center is an alternative education program that partners with several public school corporations. It aims to help struggling students become contributing members of society through faith-based education and relationships. The center focuses on academics based on Indiana standards using computer software, as well as character development, leadership, and careers. It has small class sizes and a graduation rate of over 80%. The document outlines the center's goals, curriculum, structure, expectations for students, and effectiveness based on student outcomes. It also discusses additional programming and next steps for school and community partnerships.
1. Euro melemah terhadap dolar AS setelah data lelang obligasi Italia yang lebih lemah dari perkiraan. Sterling rebound setelah penurunan tajam baru-baru ini. Yen menguat karena penolakan partai oposisi terhadap kandidat kepala bank sentral Jepang.
2. Data penjualan ritel AS naik 1,1% pada Februari, menandakan konsumen AS tetap kuat. Bursa Asia melemah akibat aksi ambil untung set
This lesson plan discusses cyber security threats and how to prevent them. It begins with introducing objectives like identifying cyber threats, learning how to minimize virus attacks, and explaining practices to quarantine threats. The teacher then defines key terms like malware, Trojan horses, worms, denial of service attacks, and phishing. Students watch a video on cyber threats and complete a graphic organizer to understand threats like malware, phishing, passwords attacks, and how to prevent them through practices such as unique passwords and updates. Finally, students make informative posters about cyber threats and prevention and present their work to the class.
The document outlines a lesson plan on cyber security threats. It discusses four main types of cyber threats: malware, denial of service attacks, phishing, and password attacks. Malware includes viruses, worms, ransomware and spyware. Denial of service attacks flood networks to disrupt access. Phishing uses fake communications to trick users into providing sensitive information. Password attacks gain unauthorized access through weak, stolen or guessed passwords. The lesson teaches students to identify these threats, understand how they work, and learn tips to prevent damage, like using strong unique passwords, backups, updates and two-factor authentication. Students will watch a video, answer questions in groups, and make informative posters about cyber threats and protections.
This presentation is in English; the announcement (beneath) & talk were in Dutch (NL)
OpenTechTalks | Ethisch hacken met Kali
Overheden, bedrijven en particulieren worden steeds kwetsbaarder voor aanvallen van black hat hackers, criminelen die de lekken in computers uitbuiten voor geldgewin of louter om schade te veroorzaken. Daartegenover staan de white hat hackers: zij testen computersystemen op fouten en dichten de lekken voordat malafide hackers inbreken. Tijl Deneut (UGent/Howest) geeft een overzicht van welke vormen van cybercriminalteit er bestaan en hoe je je ertegen kunt wapenen. De focus ligt op Kali Linux, een besturingssysteem dat honderden beveiligings- en testprogramma's bundelt. Volgende vragen komen aan bod: hoe installeer je Kali Linux? Hoe kun je in een veilige omgeving testen? Is ethisch hacken eigenlijk wel legaal? Algemene IT-kennis is aangewezen. Achteraf drinken we een glas in het café van Vooruit.
This document provides an overview of a security and privacy project that explores various topics related to computer security. It includes 6 objectives that discuss cybercrime, malware, computer security practices, safe computing practices, computer security and privacy laws, and related careers. For each objective, there are instructions to complete articles that define key terms and threats. Questions are provided to research for each article. The overall project aims to help students learn about security and privacy issues and how to protect themselves.
Commonwealth of Learning cybersecurity training for teachers | 2022KharimMchatta
I had the privilege of receiving an invitation from the Commonwealth of Learning to conduct a training session targeted at their members, predominantly comprised of educators and lecturers. The training was meticulously designed to raise awareness within the education sector, focusing on imparting knowledge about cybersecurity measures that both educators and their students can adopt for their protection. Through this engagement, the aim was to equip participants with the necessary insights to navigate potential online risks and ensure a secure digital environment conducive to effective teaching and learning.
The document provides information about cybersecurity awareness and discusses various cyber threats such as computer viruses, social engineering attacks, and preventive measures. The objective is to educate university students on cybersecurity issues. It defines important terms like cyber crime and cyber security. It describes common cyber attacks like ransomware, phishing and social media attacks. It also discusses computer viruses, social engineering techniques, and provides tips to create strong passwords and protect personal information online. The document emphasizes that education and awareness are important to prevent cyber crimes.
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. There have been three stages of internet development:
Web 1.0 featured static, read-only web pages with little user interaction. Web 2.0 became more interactive with user-generated content and social media. Web 3.0 aims to be a semantic web driven by data and artificial intelligence. Technology convergence combines different media types into single devices like smartphones. Popular social media platforms allow users to connect and share content globally. Various security threats also emerged with increased internet usage.
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. The main uses of ICT are for obtaining and sharing information, education, accessing services, and raising social awareness. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, with Web 1.0 being read-only, Web 2.0 allowing user interaction and user-generated content, and Web 3.0 being data-driven. It also covers topics such as social media, technology convergence in smartphones, and cybersecurity issues like email spam, phishing, and computer viruses.
This document provides information about information and communication technology (ICT), the evolution of the World Wide Web, and trends in ICT. It discusses how ICT deals with communication technologies to locate, save, send, and edit information. It describes the development of the World Wide Web from static Web 1.0 pages to dynamic and interactive Web 2.0 pages that enable increased user participation. Current trends in ICT highlighted include convergence of technologies, social media, mobile technologies, and assistive media. The document also covers online safety, security, internet threats like malware, and tips to stay safe online.
The document provides information on advanced techniques using Microsoft Word, including mail merge. Mail merge allows a user to create documents and combine them with another document or data file, commonly used when sending out materials to multiple recipients. Other techniques discussed include formatting text using bold, italics and other options; correcting spelling and grammar; and saving documents electronically on a computer's hard drive. Advanced functions in Word help users efficiently compose, edit, format and print complex documents.
This document provides information about information and communication technology (ICT), the evolution of the World Wide Web, and trends in ICT. It discusses how ICT deals with communication technologies to locate, save, send, and edit information. It describes the development of the World Wide Web from static Web 1.0 pages to dynamic and interactive Web 2.0 pages that enable increased user participation. Current trends in ICT highlighted include convergence of technologies, social media, mobile technologies, and assistive media. The document also covers online safety, security, internet threats like malware, and tips to stay safe online.
This document provides information about information and communication technology (ICT), the evolution of the World Wide Web, and trends in ICT. It discusses how ICT deals with communication technologies to locate, save, send, and edit information. It describes the development of the World Wide Web from static Web 1.0 pages to dynamic and interactive Web 2.0 pages that enable increased user participation. Current trends in ICT highlighted include convergence of technologies, social media, mobile technologies, and assistive media. The document also covers online safety, security, internet threats like malware, and tips to stay safe online.
The document provides information on advanced techniques using Microsoft Word, including mail merge. Mail merge allows a user to create documents and combine them with another document or data file, commonly used when sending out materials to multiple recipients. Other techniques discussed include formatting text using bold, italics and other options; correcting spelling and grammar; and saving documents electronically on a computer's hard drive. Advanced functions in Word help users efficiently compose, edit, format and print complex documents.
The Crossing Educational Center is an alternative education program that partners with several public school corporations. It aims to help struggling students become contributing members of society through faith-based education and relationships. The center focuses on academics based on Indiana standards using computer software, as well as character development, leadership, and careers. It has small class sizes and a graduation rate of over 80%. The document outlines the center's goals, curriculum, structure, expectations for students, and effectiveness based on student outcomes. It also discusses additional programming and next steps for school and community partnerships.
1. Euro melemah terhadap dolar AS setelah data lelang obligasi Italia yang lebih lemah dari perkiraan. Sterling rebound setelah penurunan tajam baru-baru ini. Yen menguat karena penolakan partai oposisi terhadap kandidat kepala bank sentral Jepang.
2. Data penjualan ritel AS naik 1,1% pada Februari, menandakan konsumen AS tetap kuat. Bursa Asia melemah akibat aksi ambil untung set
This lesson plan discusses cyber security threats and how to prevent them. It begins with introducing objectives like identifying cyber threats, learning how to minimize virus attacks, and explaining practices to quarantine threats. The teacher then defines key terms like malware, Trojan horses, worms, denial of service attacks, and phishing. Students watch a video on cyber threats and complete a graphic organizer to understand threats like malware, phishing, passwords attacks, and how to prevent them through practices such as unique passwords and updates. Finally, students make informative posters about cyber threats and prevention and present their work to the class.
The document outlines a lesson plan on cyber security threats. It discusses four main types of cyber threats: malware, denial of service attacks, phishing, and password attacks. Malware includes viruses, worms, ransomware and spyware. Denial of service attacks flood networks to disrupt access. Phishing uses fake communications to trick users into providing sensitive information. Password attacks gain unauthorized access through weak, stolen or guessed passwords. The lesson teaches students to identify these threats, understand how they work, and learn tips to prevent damage, like using strong unique passwords, backups, updates and two-factor authentication. Students will watch a video, answer questions in groups, and make informative posters about cyber threats and protections.
This presentation is in English; the announcement (beneath) & talk were in Dutch (NL)
OpenTechTalks | Ethisch hacken met Kali
Overheden, bedrijven en particulieren worden steeds kwetsbaarder voor aanvallen van black hat hackers, criminelen die de lekken in computers uitbuiten voor geldgewin of louter om schade te veroorzaken. Daartegenover staan de white hat hackers: zij testen computersystemen op fouten en dichten de lekken voordat malafide hackers inbreken. Tijl Deneut (UGent/Howest) geeft een overzicht van welke vormen van cybercriminalteit er bestaan en hoe je je ertegen kunt wapenen. De focus ligt op Kali Linux, een besturingssysteem dat honderden beveiligings- en testprogramma's bundelt. Volgende vragen komen aan bod: hoe installeer je Kali Linux? Hoe kun je in een veilige omgeving testen? Is ethisch hacken eigenlijk wel legaal? Algemene IT-kennis is aangewezen. Achteraf drinken we een glas in het café van Vooruit.
This document provides an overview of a security and privacy project that explores various topics related to computer security. It includes 6 objectives that discuss cybercrime, malware, computer security practices, safe computing practices, computer security and privacy laws, and related careers. For each objective, there are instructions to complete articles that define key terms and threats. Questions are provided to research for each article. The overall project aims to help students learn about security and privacy issues and how to protect themselves.
Commonwealth of Learning cybersecurity training for teachers | 2022KharimMchatta
I had the privilege of receiving an invitation from the Commonwealth of Learning to conduct a training session targeted at their members, predominantly comprised of educators and lecturers. The training was meticulously designed to raise awareness within the education sector, focusing on imparting knowledge about cybersecurity measures that both educators and their students can adopt for their protection. Through this engagement, the aim was to equip participants with the necessary insights to navigate potential online risks and ensure a secure digital environment conducive to effective teaching and learning.
The document provides information about cybersecurity awareness and discusses various cyber threats such as computer viruses, social engineering attacks, and preventive measures. The objective is to educate university students on cybersecurity issues. It defines important terms like cyber crime and cyber security. It describes common cyber attacks like ransomware, phishing and social media attacks. It also discusses computer viruses, social engineering techniques, and provides tips to create strong passwords and protect personal information online. The document emphasizes that education and awareness are important to prevent cyber crimes.
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. There have been three stages of internet development:
Web 1.0 featured static, read-only web pages with little user interaction. Web 2.0 became more interactive with user-generated content and social media. Web 3.0 aims to be a semantic web driven by data and artificial intelligence. Technology convergence combines different media types into single devices like smartphones. Popular social media platforms allow users to connect and share content globally. Various security threats also emerged with increased internet usage.
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. The main uses of ICT are for obtaining and sharing information, education, accessing services, and raising social awareness. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, with Web 1.0 being read-only, Web 2.0 allowing user interaction and user-generated content, and Web 3.0 being data-driven. It also covers topics such as social media, technology convergence in smartphones, and cybersecurity issues like email spam, phishing, and computer viruses.
This document provides information about information and communication technology (ICT), the evolution of the World Wide Web, and trends in ICT. It discusses how ICT deals with communication technologies to locate, save, send, and edit information. It describes the development of the World Wide Web from static Web 1.0 pages to dynamic and interactive Web 2.0 pages that enable increased user participation. Current trends in ICT highlighted include convergence of technologies, social media, mobile technologies, and assistive media. The document also covers online safety, security, internet threats like malware, and tips to stay safe online.
The document provides information on advanced techniques using Microsoft Word, including mail merge. Mail merge allows a user to create documents and combine them with another document or data file, commonly used when sending out materials to multiple recipients. Other techniques discussed include formatting text using bold, italics and other options; correcting spelling and grammar; and saving documents electronically on a computer's hard drive. Advanced functions in Word help users efficiently compose, edit, format and print complex documents.
This document provides information about information and communication technology (ICT), the evolution of the World Wide Web, and trends in ICT. It discusses how ICT deals with communication technologies to locate, save, send, and edit information. It describes the development of the World Wide Web from static Web 1.0 pages to dynamic and interactive Web 2.0 pages that enable increased user participation. Current trends in ICT highlighted include convergence of technologies, social media, mobile technologies, and assistive media. The document also covers online safety, security, internet threats like malware, and tips to stay safe online.
This document provides information about information and communication technology (ICT), the evolution of the World Wide Web, and trends in ICT. It discusses how ICT deals with communication technologies to locate, save, send, and edit information. It describes the development of the World Wide Web from static Web 1.0 pages to dynamic and interactive Web 2.0 pages that enable increased user participation. Current trends in ICT highlighted include convergence of technologies, social media, mobile technologies, and assistive media. The document also covers online safety, security, internet threats like malware, and tips to stay safe online.
The document provides information on advanced techniques using Microsoft Word, including mail merge. Mail merge allows a user to create documents and combine them with another document or data file, commonly used when sending out materials to multiple recipients. Other techniques discussed include formatting text using bold, italics and other options; correcting spelling and grammar; and saving documents electronically on a computer's hard drive. Advanced functions in Word help users efficiently compose, edit, format and print complex documents.
This document provides information about information and communication technology (ICT), the evolution of the World Wide Web, and trends in ICT. It discusses how ICT deals with communication technologies to locate, save, send, and edit information. It describes the development of the World Wide Web from static Web 1.0 pages to dynamic and interactive Web 2.0 pages that enable increased user participation. Current trends in ICT highlighted include convergence of technologies, social media, mobile technologies, and assistive media. The document also covers online safety, security, internet threats like malware, and tips to stay safe online.
The document provides information on advanced techniques using Microsoft Word, including mail merge. Mail merge allows a user to create documents and combine them with another document or data file, commonly used when sending out materials to multiple recipients. Other techniques discussed include formatting text using bold, italics and other options; correcting spelling and grammar; and saving documents electronically on a computer's hard drive. Advanced functions in Word help users efficiently compose, edit, format and print complex documents.
This document provides information about information and communication technology (ICT), the evolution of the World Wide Web, and trends in ICT. It discusses how ICT deals with communication technologies to locate, save, send, and edit information. It describes the development of the World Wide Web from static Web 1.0 pages to dynamic and interactive Web 2.0 pages that enable increased user participation. Current trends in ICT highlighted include convergence of technologies, social media, mobile technologies, and assistive media. The document also covers online safety, security, internet threats like malware, and tips to stay safe online.
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
ICT refers to information and communication technologies and includes any devices or applications used for communication like radio, TV, and computers. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses current technologies like social media, technology convergence, and security measures like firewalls and antivirus software. Common issues related to ICT like email spam, phishing, and computer viruses are also explained.
This document is a summary of a webinar on cyber security and digital safety. It discusses various types of hackers, defines cyber crimes, and covers topics like social media security, mental health and cyber security, and how to protect websites from hacking. It provides scopes in the cyber security field and lists some dedicated cyber security companies in Nepal. The webinar aims to educate normal users on filing the cyber space safely.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Physiology and chemistry of skin and pigmentation, hairs, scalp, lips and nail, Cleansing cream, Lotions, Face powders, Face packs, Lipsticks, Bath products, soaps and baby product,
Preparation and standardization of the following : Tonic, Bleaches, Dentifrices and Mouth washes & Tooth Pastes, Cosmetics for Nails.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
1. DIGITAL LITERACY
How can I read and understand hypertexts? (Part 4)
3rd level – Brazillian Medium School – General Education Teacher: Gisele F. L. Domith
2. WHAT WILL WE DO TODAY?
Working on the reading and comprehension of two important text
genres used on virtual context
Our objectives:
• Identify and recognize the genres by its characteristics and
singularities;
• read the information and produce meaning from the texts, trying to
guess how they are produced, how they circulate, the author´s
intension, etc.;
• work on the genre comprehension process to improve our abilities to
use virtual data, computers and the web in a safe way and;
• practice some reading strategies: pre-reading, skimming, scanning,
post-reading;
• Review and practice the usage of should.
3. OUR CLASS
• Topic and theme presentation/ warm up;
• reading activity;
• text comprehension work;
• vocabulary study;
• remembering “should” usage;
• discussing security on the web;
• homework
5. PRE-READING PROCESS
1. Observe the extracts of the text in a quickly
way and try to guess their subject(s). Do they all
present the same theme?
SECURITY.
2. How could you get your answer?
PREVIOUS KNOWLEDGE, COGNATES, TEXT
LAYOUT, SOCIAL PRACTICE, ETC.
6. 3. Where can you find these texts?
USING THE COMPUTER, ON THE INTERNET.
4. Now read the text quickly (skim) and mark the
best option(s) about the text subject.
The texts present information about security on…
( ) online magazine ( ) online store
( ) web ( ) newspaper
( ) computer system ( ) anti-virus
( ) game ( ) cell phone
7. Now, what about define the texts subjects, their
place of publication, sender and receiver?
1
Subject: security on the computer
Place of publication: Computer screen
Sender: Computer System Receiver: Computer user
8. 2
Subject: security on the computer
Place of publication: Computer screen
Sender: Computer System Receiver: Computer user
9. 3
Subject: security to play the game Tibia
Place of publication: Tibia page
Sender: Tibia team Receiver: Tibia player
10. 4
Subject: security on the internet/Facebook
Place of publication: Facebook scurity page
Sender: Facebook team Receiver: Facebook user
11. IDENTIFYING THE TEXTS GENRE
1. The text 1 and 2 present similar structures.
What are their characteristics?
• Form/text type: alert;
• sent to the computer user;
• brief text;
• one or more indirect or direct requests;
• demand an answer/position from the receiver
stopping the computer task;
• options to choise by clicking/answering the
alert.
12. 2. What about the texts 3 and 4? What they
present that is similar?
• Form: guidelines for safe usage;
• available on the internet sites;
• detailed descriptions and explanations;
• imperative verb forms;
• text organized in topics;
• offer the receivers some security tips or hints;
• not obligation to the users.
13. THE TEXT GENRES
1 and 2 3 and 4
Textual genre Textual genre
alert Informational Interaction
a virtual alert sign
Main textual type Main textual type
Exposition Exposition
Order/Procedure Instructional/Procedure
14. Deep into the text genre
comprehension – Texts 1 and 2
1. When do we receive those texts? Why?
2. What are the objectives of the text sender with
those security massages?
3. What do you think is expected to us when we
receive the texts?
4. How can we interact with this text genre? What
is the sender strategy to make us interact?
5. Could you say some other examples of similar
text genres ?
15. Deep into the text genre
comprehension – Texts 3 and 4
1. How can we access these text genres? Can them be sent to
us sometime ?
2. What probably are the text senders’ objectives with those
security texts? Do you think is possible to consider that the
site team also wants to protect themselves? Why?
3. What do the texts propose to the receivers in order to be
safe? Is there some strategy in the text?
4. What do you think is expected to us when we read the
texts?
5. How can we interact with this text genre?
6. Could you say some other examples of similar text genres?
16. SCANNING A TEXT GENRE
Deep into the vocabulary comprehension
Read this extract from Tibia page:
“Once the installation FILE has been downloaded Tibia is ready to be installed
on your computer. Installing Tibia is easy. Simply start the installation file. The
Tibia SETUP WIZARD will lead you through the installation process. Once more
you will be asked to read and to confirm our service agreement. Also, you will
be asked which DIRECTORY you would like to install the Tibia FOLDER to, what
name you would like the Tibia FOLDER to have, and whether or not you would
like to have Tibia icons on the DESKTOP and/or QUICKSTART BAR.[…] As it is
possible to FAKE the sender of an email, it can happen that you receive an
email that has Tibia or CipSoft as sender which was not sent by us. Such emails
usually contain links or attachments and are designed in a way to look like an
official email from us. Do not simply click on links in such emails. To make sure
that you are entering the official website, we strongly recommend you
manually type www.tibia.com. […]… a HACKER can already spy out data from
your computer if you visit a website with an old BROWSER. Ideally, all
programs on your computer should be updated to the latest available version”.
Text 3
17. Are you familiar with these words?
( )FILE ( ) BROWSER
( ) SETUP WIZARD ( ) DIRECTORY
( ) FOLDER ( ) DESKTOP
( ) QUICKSTART BAR ( ) HACKER
( ) FAKE ( ) UPDATE
Relate them to the groups:
1. Threats 2. Document storage
3. To access/find software 3. Internet
4. Installation 4. Software
18. If you want to play Tibia in safe, you
SHOULD...
( ) Open e-mails from Tibia, especially with
attachments;
( ) do not click on links in suspect emails;
( ) verify the suspect e-mails entering the
official website manually typing the game
address;
( ) always use the same web browser;
( ) update all programs on the computer.
19. Remembering something about
SHOULD…
To have a safe access to your email you should
have a password.
You shouldn’t click on suspect links.
Should I use the same browser without updates?
20. Some interesting discursive effects
Compare these sentences.
“You SHOULD only run programs from publishers
you trust.” – text 1
“Add a mobile number to your account […] Pick a
security question for your Facebook account. […]
Become a fan of the Facebook security page”. –
text 4
Advice forms (should) ≠ Imperative forms
22. Scan the text and find the information:
• The problem:
• The problem comes from:
• The consequence to the system:
• The receiver option to solve the problem:
• Is there other possibility to the receiver?
Which one?
23. Could you find other ways to safe
usage of the computer and internet?
Read the other two texts, number 1 and 3 to search
for information on data and system security. Which
other actions should we do to be safe on the net?
Do you know other texts with that information?
Show us them!
24. Helping each other to use computers
and internet in a safer way
Avoiding some security alerts. Safe surfing net.
• What SHOULD we do to protect our data and computer?
Scan the texts for information and write some advice.
Let’s organize a campaign to help people to safe use the
computer and internet da. What about create a blog?
Tip: USE SHOULD + THE TEXTS INFORMATION
25. Some ideas from the read text genres
• We shouldn’t open suspect e-mails from
companies, specially with attachments;
• We shoudn’t click on links in suspect emails;
• We should verify the suspect e-mails entering
the official website manually typing the game
address;
• We shouldn’t use the same web browser;
• We should update all programs on the
computer.
26. Just for finishing…
Today we:
• Read two different text genres: security
alerts/warns and the security tips/hints;
• worked on the text genre comprehension;
• studied internet and computer vocabulary;
• remembered “should” usage;
• discussed about security on the web.
27. References
CipSoft. [1996] (2012) Tibia. A massively multiplayer online
role-playing game. On line game. Available on:
<http://www.tibia.com/gameguides/?subtopic=manual§io
n=guilds> Access: 02/08/2012 (TEXT 3).
COSTA, M. B. (2010) Globetrekker. São Paulo: Macmillan. 2nd ed.
Book 3. 194p.
Facebook. (2012) Facebook Security Tips. Online page.
Available on: < http://www.facebook.com/security>
Access: 02/08/2012 (TEXT 4).
Microsoft Windows (2012) Security warns. Personal computer
images (TEXTS 1 and 2).