Vocabulary: These words will help you understand this lesson.
|
|
|
- Carmel Dennis
- 9 years ago
- Views:
Transcription
1 Internet Activities Vocabulary: These words will help you understand this lesson. Word/Term computer Internet chat room Definition Materials Needed: pen or pencil access to computer / Internet electronic device that executes the instructions in a program the Internet, sometimes called the Net, is a worldwide system of computer networks that allows users to send and receive information from other computers an area online where you can chat with other members in real time Journal Entry Do you have access to a computer on a regular basis? What would you use the computer for if you did? Do you have Internet capabilities? How much time have you spent on the Internet? In your journal write your thoughts about your knowledge or lack of knowledge of computers and Internet usage. Get off to a Good Start If you have daily access to the Internet answer the Official SAT Question of the Day at Do this daily. Create a free account. Also get in the habit of doing the New York Times Test Prep Question of the Day at 123
2 Computer 101 When you get to college many students will have their own computer. Many will have used the computer and the Internet on a daily basis. You will have access to a computer at college even if you don t have your own. Most likely you can obtain access to a computer in the college library and/or a computer lab. With a little practice you can catch up easily. You will have many experts to help you. They will not be your professors, but your fellow students. Computers are showing up everywhere you look, and even in places you can t see. Computers check out your groceries, run your I-Pod, dispense money at the ATM, control the way your car runs. They re everywhere! For the New Internet User A computer is an electronic device that executes the instructions in a program. The computer accepts data (input), processes data, produces output, and stores the results. The computer does this with tremendous speed, reliability (except for human error), and stores huge amounts of data (information). Word processing is the most used computer application. There are many word processing programs. Probably one of the best known programs is Microsoft. Computers have replaced the typewriter. One of the best features is that documents can be revised and corrected before they are ever printed. You will most likely use a computer in whatever career you end up in. So learn how to use a computer if you don t already know how. Your Assignment is to Learn about the Computer Many Internet sites offer information on computer basics and some even offer tutorials. By just writing computer basics on the Internet space you will have a variety of sites from which to choose. One tutorial program is called Jan s Illustrated Computer Literacy 101: Computer Basics, It is free and easy to use. Log onto one free tutorial site and explore the unknown. Language Arts Unit 5 Option: Preparing for College 124
3 For the Experienced Internet User Internet SCAVENGER HUNT Find the information on the Internet for the following questions. 1. In the United States what state is the most eastern state? 2. Who said, Give me liberty or give me death and when was it said? 3. What famous painter cut off his ear? 4. What is the origin of the song Ring Around the Rosie? 5. Name two wonders of the ancient world. 6. Name two wonders of the modern world. 7. What is the longest man-made structure in the world? 125
4 8. How tall is the Matterhorn? 9. What is the state bird of Virginia? 10. Who was the 19 th president of the United States? 11. Name the seven dwarfs. 12. What is the most venomous creature on earth and where does it live? 13. Who was the first woman in space? 14. What is the current weather in Mexico City? 15. What is today s main news story? Language Arts Unit 5 Option: Preparing for College 126
5 16. Find the following information for any 2 colleges. a. Can you apply online? How difficult is the application to fill out? b. Does it give information of the variety of students enrolled? How diverse is the college? c. Can you take a virtual tour? (If so take the tour.) d. What impressed you most about the college from the online information? Name of College: a. a. Name of College: b. b. c. c. d. d. For All Internet Users Internet-Related Safety Unfortunately the Internet has become a tool of people who do not always have good intentions. The key is to learn danger signs and protect yourself online. MySpace.com, AOL, Facebook, Hoverspot, and Tagged are online networks that allow users to visit using text, sound, and images for everyone to see. There are millions of users. A series of questions including name, birthday, birthplace, best physical feature, are among the many types of data creating a profile. Most profiles include a photo. Often more personal data is given such as body type, education level, cell phone numbers, and even addresses. None or all the information may be accurate. These online networks allow users to chat with friends and strangers. Users of the sites can browse for members using the profile criteria given. One of the dangers of these online chat rooms is that the information you post becomes accessible to people you don t even know. Some profiles contain just enough information that a resourceful user can contact you. Posting your first name, school mascot, and sports team gives another user enough information to physically find you at school. 127
6 Posting personal information can be dangerous in itself. Engaging in conversation with people you don t already know can create new dangers. By not giving a name, online chatters allow predators to alter their profile to interest you. You may believe you are talking to young person only to find your new friend is actually a middle aged man. In chat rooms use a nickname that is different from your screen name. If needed you can exit without having someone track you down via . It is possible to set up private chat rooms where you invite only certain people to enter to chat. Posting Is Forever Anything you post online can be edited and can be saved while ing. Any user can save, keep or distribute photos or text from a Web page. This means that suggestive photos, photos depicting drug use, gang signs, threats against others or language indicating criminal behavior are all potentially permanent collector s items for classmates, friends, enemies, parents, total strangers, and law officials. Predators are constantly searching for personal information online, and there are many different sites where they can find it. Identity Theft Sharing too much personal information online, such as full name and birth date, may allow a criminal to steal a user s identity. Never give out your social security number to someone who requests it. One strategy to steal your identity is to distribute spam that prompts you to send personal information such as your social security number to obtain a (false) benefit. Another way is by creating phony websites to get users to enter account numbers or passwords. BEWARE! The IFCC (Internet Fraud Complaint Center) report provides a lengthy list of rules for dealing with the various types of fraud that may be encountered on the Internet. A frequently repeated warning in the report concerns giving out personal information via the Internet -- the general rule is DON T DO IT. Before giving information or money, thoroughly check out the individual or company. The IFCC received almost 50,000 complaints last year and referred nearly 34,000 for possible investigation by law-enforcement agencies. Language Arts Unit 5 Option: Preparing for College 128
7 Other Problems is relatively private, but hackers can still gain access and add you to their spam lists. Spam blockers can keep your mailbox relatively free of spam. If you don t recognize the sender of a document, delete it without opening it. A virus may be sent to disrupt your computer. Virus protection software is a must. If you ever get involved in a chat room conversation that makes you uncomfortable or afraid for any reason, exit, and tell someone immediately so they can report the incident. The form for reporting this type of incident is called a CyberTipline The Internet has a world of possibilities. Some are good and some are bad. The Good Access to museums and libraries all over the world Instant access to the latest news and events Instant access to friends, family and business associates Shop from home Consumer information Trivial knowledge Entertainment music, books, movies The Bad SPAM Viruses and bad software that find its way into computers Deceptive marketing Online stalking of people, especially children Easy access to pornography Can be a time-waster 129
8 17. Self Assessment of Your Internet Capabilities. a. What do you know? b. What do you need to find out? End of Language Arts Unit 5 Option: Preparing for College 130
Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
Affirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
Related KidsHealth Links
Grades 6 to 8 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Social Media and Cyber Safety
Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant [email protected] Social Media and Cyber Safety Our instructor today
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
FIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
Safety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:
Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.
Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4
Guideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
Sibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
Identity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
Email Security. 01-15-09 Fort Mac
Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
To learn more about social networking, see the handout titled Know Social Networking.
Know facebook Objectives Identify different social networks Identify common features of a social network Understand social networking etiquette Sign up for a Facebook account Create a profile in Facebook
Online Safety How to Protect Yourself and Your Family
Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing
Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.
Common ID Theft TACTICS. HOW DOES IT HAPPEN? Identity What should I do if I m a Protection PROTECT YOURSELF: OLD-FASHIONED STEALING: Criminals steal your wallet or purse. > Never leave your wallet or purse
Youth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5
i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5 Scope of curriculum i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction
Internet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
Social Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
Standard 9: The student will identify and explain consumer fraud and identity theft.
TEACHER GUIDE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Priority Academic Student Skills Personal Financial
SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
Share Aware Lesson 2 - Lucy
Share Aware Lesson 2 - Lucy Class Key Stage 2 Time 40 mins Date October 2015 Learning Objectives Learning Outcomes Key Vocabulary Resources We are learning about online safety and how to access available
Related KidsHealth Links. Discussion Questions
Grades 6 to 8 Personal Health Series Online Safety and Cyberbullying KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible
How to Prevent It What to Do If You Are a Victim
How to Prevent It What to Do If You Are a Victim www.tn.gov/consumer www.tn.gov/safety Tennessee Division of Consumer Affairs Identity theft happens when someone steals your personal information and uses
Cambridge ESOL Certificates in Skills for Life Speaking and Listening Mode Level 1 Past Paper 6
Cambridge ESOL Certificates in Skills for Life Speaking and Listening Mode Level 1 Past Paper 6 Please note: With the exception of the task cards in Phases 1b and 2b, this sample test frame will be used
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
Class 2: Manage Your Digital Footprint. Student Handbook
Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal
Internet basics 2.2 Staying safe online. Beginner s guide to. Basics
Basics Beginner s guide to Internet basics 2.2 Staying safe online Use this document with the glossary A helper should take you through this guide This activity will help you register safely online and
i-safe K 12 CURRICULUM SCOPE 06-07
i-safe K 12 CURRICULUM SCOPE 06-07 GRADES K 4 Scope and sequence i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction that best suits
Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)
Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter
Protection from Fraud and Identity Theft
Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...
2012 NCSA / McAfee Online Safety Survey
2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security
Activities for Protecting Your Identity and Computer for Middle and High School Students
Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be
Standard 9: The student will identify and explain consumer fraud and identity theft.
TEACHER GUIDE 9.1 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Consumer Fraud Priority Academic Student Skills Personal Financial
Cybersecurity Protecting Yourself, Your Business, Your Clients
Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric
Staying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
PROTECTING YOUR DIGITAL LIFE
PROTECTING YOUR DIGITAL LIFE Table of Contents What is a Digital Life?... 1 Missing: Five Years of Photos... 2 Are Your Files Safe?... 3 Everyday Risks... 4 Real People, Real Loss... 5 Forgot to Back Up?
ONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
When you are prompted to enroll, you will be asked to enter a Security Phrase and select/answer three different Challenge Questions.
IMPORTANT SECURITY INFORMATION We take your online security seriously. Your online banking site contains a security feature called Enhanced Authentication. Everyone will be required to enroll in Enhanced
platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential
Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.
Beware! Identity Theft
STUDENT MODULE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Imagine getting a letter from the Internal
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating
Common Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
Case study: What the? Online scams and identity theft
Case study: What the? Online scams and identity theft Theme The internet and mobile technologies are a source of scams and identity theft. Key learning/subject areas Cross curricula. Duration One to two
Protect Your Personal Information
Protect Your Personal Information Table of Contents Credit vs. Debit. 3 Tips to Keep Your Information Safe... 3 Shop Safely Online... 4 What to Do About Fraud.. 6 It s a scary world. It seems like every
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
The Basics of Building Credit Answer Guides
The Basics of Building Credit Answer Guides The answers below correspond to the exercises in The Basics of Building Credit. The correct ones are bolded for convenience, with detailed explanations where
TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus
Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some
By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail
By Shanthi Balraj Ambigapathy Pandian Mohammed Zin Nordin Sumetha Nagalingam Julina Ismail Introduction New Media Landscape New Media Culture Contributes to New Meanings, Messages, Norms, Values, Interactions
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
(EMC) ELECTRONICALLY MEDIATED COMMUNICATION. Communication sent via a channel such as a cell phone or the Internet (versus face-to-face).
ELECTRONICALLY MEDIATED COMMUNICATION (EMC) Communication sent via a channel such as a cell phone or the Internet (versus face-to-face). Examples of EMC Cell phones Computerconferencing Discussion boards
Beware! Consumer Fraud
STUDENT MODULE 9.1 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Consumer Fraud Alfredo s mom is at the door to meet him when
2014 Teen Internet Safety Survey. Conducted by The Futures Company
2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online
Frequently Asked Questions
Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous
Online Security Tips
Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized
Introduction to Computer Security
Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security
