Computer Department

1st prep

2017/2018

Internet - Cyber bullying-Risks- Protection

(Internet)

Network:
Two or more computers are connected together to share (Data-resources-communicating & reducing costs)
Internet:
Millions of computers are connected together ,it’s the largest network worldwide
WWW:
World wide web the easiest & global way to exchange information through web pages
web browser:
A software helps to navigate & browse the internet

Protocol:

It is the certain rules for communication and speech, as for computers on the internet, they need to define rules for communication rules.

The most used protocols on the internet:

1- TCP/ IP protocol

This protocol is used in connecting computer sets to the internet .It consists of two important protocols:

*TCP.
TCP (Transmission Control Protocol) which is responsible for validating data transformed from a set to another.
*IP

IP (Internet Protocol), which is responsible for transforming data from a set to another.
2- FTP
FTP (File Transfer Protocol), which is responsible for transforming data from and to the internet

Website

It is a webpage or more, connected to each other with a certain name. They are stored on the web server. The website has an address on the internet known as URL (Uniform Resource Locator). This website can be visited through a computer set or a mobile phone.

URL:
(Uniform resource locator) it’s a unique address of the website you want to visit on the internet for example:

Webpage:
It’s an electronic document commonly written by a language called Hyper text markup language(HTML)

Webpage components :
(text –images-animation –videos -sound –hyperlink)

Home page:
The first & main page of the website ,through it you can navigate all the site

Hyperlink
It is an image or text, connected to a URL, when clicking it, you go to the URL .It can be in the same page or on another page or even another site

Download files
Transferring a file from the internet to the computer (eg. Downloading a song)
Upload files
Transferring a file from the computer to the internet (eg. uploading your profile picture in facebook)

Web servers:
Huge computers are hosting data you can access through the internet it called server as it provides services to other computer programs (and their users) through a network or internet

Internet services:

Searching:
Searching engines are the most popular sites in using .They are used in searching for (information-images-news-books) .Google is the most famous searching engine .It has a huge data base of sites

Chat:
A place on the internet in which a group of people can exchange messages ,pictures & sounds ,at the same time
Social media:
Through this service the social news is spread among the users. They also publish ideas and opinions.

Online shopping service

This service is available on some sites, making buying and selling available online

E-mail:
Electronic mail – a service allow you to exchange messages & files.

(Cyber Bullying & Risks you face through the internet)

Objectives:

1- Learn what cyber bullying is and become familiar with different forms it can take

2-Know the cyber bullies’ places of attack

3-know other risks that you may face through the internet

4-Learn safety tips for youth

What’s cyber bullying?
Cyber bullying is bullying that takes place using electronic technology tools, such as the Internet and cell phones, to annoy and repeatedly hurt, harass, or embarrass someone else

Forms of cyber bullying:
Contempt
To comment in a way that reduces others respecting
Stalking
Annoying a person or a group by engaging in their on-line activities in a bad way through sending them messages or comments frequently
Threats
Sending messages that carry threat or intimidation to one or more person
Exclusion
Disregarding or ignoring one or more persons through electronic media
Flaming
Post aggressive & insulting words in a fighting using electronic media

CYBERBULLIES’ PLACES OF ATTACK

Electronic technology includes: Cell phones, computers, and any other devices with access to the internet which you can:

q  Through instant messages ,mails or any interactive sites , can be in a form of: Text ,photos, videos & sound)

q  Blog

q  Play online games

q  Enter chat rooms

q  Social network site like : (Facebook, Instagram, Twitter)

Risks you may face while using the internet

q  Phishing
To pretend that you are another person to obtain personal or financial data over the Internet

q  Spam
Unwanted mail messages appear in a way of advertisements or news , contain viruses or immoral contents
Viruses
a program or piece of code that is loaded onto your computer without your knowledge and can damage your data
Hacking
An unauthorized access to your data

Protection

To be safe:

§  Do not engage/ or make contact with people you do not know.

§  Never arrange to meet anyone you have only communicated with online.

§  Print out and save the threatening messages to be evidence

§  Tell your ( parents/teacher) about anything that makes you feel uncomfortable

§  Don’t react: responding to the bully only makes it worse

§  Limit the number of sites you use to reduce your exposure to online risk.

§  Do NOT allow other programs to access your Facebook account (like games)

§  Use Anti-virus Software (Anti-virus software helps block mal-ware, viruses, and Trojans designed to steel personal information)

§  Never do random chat. Only chat with family and friends

§  Don’t open strange emails

§  Beware “free” downloads and Do not download files from sites unless they are well known and respected (ask your parents if you are not sure)

§  Don’t share family photos or videos without permission

§  Don’t give out your password, even to your best friend.

§  Look at your privacy settings on computer and do not give out information about yourself.

Security and operating system

1)  Activate the firewall

It work by filtering out unauthorized or potentially dangerous types of data from the Internet, while still allowing other (good) data to reach your computer.

2) Windows Update

Updates are made to improve functioning and provide security against new threats

3)  Activate the antispyware Software (Microsoft Windows Defender)

Windows Defender is the antispyware application included with Windows to protect you from spyware.

Protect Your Info

•  Don’t post phone #

•  Don’t post address

•  Avoid status updates with time and place references

•  Don’t use Places

•  Set all privacy settings to “Friends Only”

Use Strong P@ssw0rds

- Do NOT use any personal info in your password like: your name, your birthday, phone number or address

- Use uppercase letters, numbers, and symbols

- Make passwords at least 8 characters long

Class work1

Write the scientific term:
1- World wide web the easiest & global way to exchange information through web pages ( )
2-the file Transfer Protocol.which is responsible for transforming data from and to the internet ( )

3- The Transmission Control Protocol which is responsible for validating data transformed from a set to another.( )

4- Huge computers are hosting data you can access through the internet it provides services to other computer programs (and their users) through a network or internet
( )
5-(Uniform resource locator) it’s a unique address of the website you want to visit on the internet ( )
6- Transferring a file from the computer to the internet (eg. uploading your profile picture in facebook) ( )

Class work2

Write the scientific term:
2- through some sites on the internet you can buy & sell anything ( )
3- bullying that takes place using electronic technology tools ( )
4- To comment in a way that reduces others respecting ( )
5 -Disregarding or ignoring one or more persons through electronic media ( )
6- To pretend that you are another person to obtain personal or financial data over the ( )
7- Unwanted mail messages appear in a way of advertisements or news , contain viruses or immoral contents ( )

H.w

Complete:


1- FTP is an abbreviation for …………………………….. & it used for ……………………………..
2-TCP is an abbreviation for …………………………….. & it used for ……………………………..
3-Download is ………...... While uploading is …………………………..
4-Web page components are
(……………….,……………….,………………….. ,……………………, …………………,……………………..)
5-Hyperlink can be a text or graphic used to
(…………………….or ……………………or…………………or…………………………or……………………)
6- The forms of cyber bullying are (……………………………,……………………,…………………..,…………………..,…………………..)
7-The internet services are
(………………,…………………,………………..,……………….,……………..,…………………..,…………………………..,…………………..)
8- Cyber bully’s attack take place through electronic tools & it can be through (blogs , ………………. ,…………….. or ……………………)
9- write four actions you do to protect yourself from cyber bullying
(………………………………………………………………………….,
…………………………………………………………………………..,
………………………………………………………………………….)

1