Monday, January 15, 2007

Work for 9W

Go to google and use the define:keyword operator to research meanings for the following computer security related terms.

To do this type the word define, followed by a colon, followed by the word which you are looking for.:

Define:hacker

NOTE: There are no spaces on either side of the colon!

You will get a list of dictionary definitions of the word or phrase. Copy and a definition for each word/phrase in the following list into a word doc entitled

“Computer security”

Hacker
Virus
Trojan
Spyware
Scumware
Malware
Exploit
Spam
Adware
Firewall
Phishing
DDOS (distributed denial of service)
Zombie
Botnet

What advice would you give someone to make sure that they minimised the risk from these different threats?




Work for 10 B and C 15th January

Use text books (on window ledge by printer) and web resources:
www.Ictgcse.com
www.Teach-ict.com

… to review the following sections.

Hardware: Input and output

Use google and the define:keyword operator that we used to research security terms, work out what the following devices do. Group them into input devices (send info TO the computer) and output devices (get info FROM the computer)

Concept keyboard
Plotter
Graphics tablet
LED
Touchpad
Actuator
Scanner
LCD monitor
OMR reader
Touch screen
printer
Webcam
MICR reader
Speaker
Microphone
Joystick
Projector
Mouse
Thermistor
MIDI
Bar code reader


Databases review:

Define the following:
Database
Table
Record
Field
Data
information

Use chapter 31 from text books:
How big would 1 record of the table which you have just planned be?


Look at chpt 32: Questionnaires / data capture forms (DCF)

Design a DCF to collect membership details for the table which you have planned.


Work for 9T to follow

About Me

The one problem that I find as an ICT teacher is that all these kids get in the way of my interaction with the computers