This is the website you will use today with the worksheet that I handed out.
http://www97.intel.com/en/TheJourneyInside/ExploreTheCurriculum/EC_IntroductionToComputers/ICLesson1/
Monday, August 31, 2009
Thursday, August 20, 2009
Wednesday, August 19, 2009
August 19, 2009
Today we are going to discuss badly designed websites.
Start here: http://www.multcolib.org/homework/webeval.html
Tuesday, August 18, 2009
Internet Vocabulary
You will need to have these defined. Copy and paste them into a Word Document and then put the definitions that you find from the internet on them. BEFORE YOU PUT ANY DEFINITION - ASK THE TEACHER. You can help each other. Here is a hint on Copy and Paste: Ctrl + C is copy, once you have a text highlighted, and then ctrl + v is paste once you have clicked on where you want the text. Ask me for help, if someone next to you has it going, get them to help you too.
Telecommunications
Internet
Electronic mail
World wide web
Browser
Search engine
Netiquette
Download
Upload
Modem
Uniform resource Locator
Hypertext transfer protocol
Address bar
File transfer protocol
Message boards
Blogs
Wiki
Instant message
Friday, August 7, 2009
GRD: Safety Vocabulary Words
Look the following words up using www.Dictionary.com. Put them on a Microsoft Word document and email it to me at covcoarts@blogspot.com.
• Cybercrime
• Hacker
• Cyberextortionist
• Cyberterrorist
• Virus
• Worm
• Trogan horse
• Antivirus program
• Virus signature
• Quarantine
• Denial of servie attack
• Back door
• Spoofing
• Firewall
• Unauthorized access
• User name
• Password
• Hardware theft
• Hardware vandalism
• Software threat
• Piracy
• License agreement
• Information threat
• Encryption
• Digital signature
• Power surge
• Surge protector
• Backup
• Restore
• Computer ethics
• Intellectual property rights
• Copyright
• Code of condut
• Acceptable use policy
• Information privacy
• Cookies
• Spyware
• Adware
• Spam
• Computer forensics
• Identity theft
• Web filtering software
• Ergonomic
• Computer addiction
• phishing
• Cybercrime
• Hacker
• Cyberextortionist
• Cyberterrorist
• Virus
• Worm
• Trogan horse
• Antivirus program
• Virus signature
• Quarantine
• Denial of servie attack
• Back door
• Spoofing
• Firewall
• Unauthorized access
• User name
• Password
• Hardware theft
• Hardware vandalism
• Software threat
• Piracy
• License agreement
• Information threat
• Encryption
• Digital signature
• Power surge
• Surge protector
• Backup
• Restore
• Computer ethics
• Intellectual property rights
• Copyright
• Code of condut
• Acceptable use policy
• Information privacy
• Cookies
• Spyware
• Adware
• Spam
• Computer forensics
• Identity theft
• Web filtering software
• Ergonomic
• Computer addiction
• phishing
Thursday, August 6, 2009
Graphic Design and Art: 8/7/09 BW
Here is what you need to do today: get an email!
Go to Gmail.com and sign up for an email It should be...
Your first and last name, with a . or a _ only.
I don't want nicknames, or lots of numbers.
Let me know if you have a problem getting it set up.
If you are sharing a computer, just take turns.
When you get signed up, sign in and then send an email to me (covcoarts@blogspot.com) with your full first and last name as the subject. For the Body of the email, put which school you are from and what grade. Also, add me in your contact list.
Go to Gmail.com and sign up for an email It should be...
Your first and last name, with a . or a _ only.
I don't want nicknames, or lots of numbers.
Let me know if you have a problem getting it set up.
If you are sharing a computer, just take turns.
When you get signed up, sign in and then send an email to me (covcoarts@blogspot.com) with your full first and last name as the subject. For the Body of the email, put which school you are from and what grade. Also, add me in your contact list.
Subscribe to:
Comments (Atom)