Updating search results...

Business and Information Technology

2341 affiliated resources

Search Resources

View
Selected filters:
Information Literacy in Action: Evaluating Medical Information
Unrestricted Use
CC BY
Rating
0.0 stars

Learn how to evaluate medical information as a non-medical expert using information literacy principles such as currency, noting research questions and methods and verifying claims with multiple sources.

Subject:
Applied Science
English Language Arts
Health, Medicine and Nursing
Information Science
Reading Informational Text
Material Type:
Activity/Lab
Interactive
Lesson
Reading
Author:
Marla Lobley
Date Added:
07/22/2020
Information Security (06:01): Introduction
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Simply put, this is one of my most favorite topics when it comes to talking about computers. In this video we layout the order of this lesson, as well as give basic definitions of:
•Machine-Level Security
•Network Security
•Internet Security
•Social Engineering

Subject:
Applied Science
Computer Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:02): Physical Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access to it. If a bad guy can get their hands on the computer assume they will be able to gain access to all data contained within.

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:03): Authentication
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are

There are three forms of authentication
•Something you know
•Something you have
•Something about you

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:04): Protecting Your Data
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.

Data is always priceless

Three topics:
-Data migration
-Data backup
-Data disposal

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Date Added:
09/26/2014
Information Security (06:05): Network Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security.

Links from Video:
-The System Administrator Song http://youtu.be/OpGN3oT1thA

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:06): Internet Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.

Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:07): Malware
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.

Links from Video:
-AVG by Grisoft: http://free.avg.com/us-en/homepage
-AVAST: http://www.avast.com
-ClamWin: http://www.clamwin.com/
-Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Security (06:08): Social Engineering
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing.

I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy.

Links from Video:
•Internet Storm Center: https://isc.sans.edu/
•SNORT: https://www.snort.org/
•Security Now: http://twit.tv/sn
•Internet Crime Complaint Center: http://www.ic3.gov/default.aspx
•Hak5: http://hak5.org/
•Facecrooks (facebook.com/Facecrooks)

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Information Technology Fundamentals - Creating Tabs and Changing the Page Color
Unrestricted Use
CC BY
Rating
0.0 stars

View the attached files to see a project for a Information Technology Fundamentals class. You will find: Lesson PlanChecklist for StudentsExample of Finished Project Feel free to change and custimize the lesson plan to better fit your classroom and students. 

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Hunter Vanness
Date Added:
08/03/2020
Information Technology Fundamentals - Creating Tabs and Changing the Page Color
Unrestricted Use
CC BY
Rating
0.0 stars

View the attached files to see a project for a Information Technology Fundamentals class. You will find: Lesson PlanChecklist for StudentsExample of Finished Project Feel free to change and custimize the lesson plan to better fit your classroom and students. 

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Hunter Vanness
Date Added:
08/03/2020
Information literacy rubric
Unrestricted Use
CC BY
Rating
0.0 stars

Deb Baker created this after consulting with faculty, librarians, and colleagues from around the country. The idea was to create a practical tool for assessing information literacy that anyone could use, was easy to norm, and focused on what students could do and where research instruction could be improved to increase students' information literacy. This rubric can help improve student success and information literacy learning outcomes in research assignments for any course. Used early in the semester it can serve as a diagnostic tool for supporting student researchers in developing the skills and habits of mind needed to successfully find and use information to answer a question, support a thesis, or solve a problem. Students could even use it to self-assess.

Cover photo by Glenn Carstens-Peters on Unsplash

Subject:
Applied Science
Composition and Rhetoric
Education
English Language Arts
Higher Education
Information Science
Material Type:
Assessment
Teaching/Learning Strategy
Author:
Deb Baker
Date Added:
11/18/2020
Initiation en algorithmique
Unrestricted Use
CC BY
Rating
0.0 stars

Savoir transcrire les différentes étapes de résolution d'un problème sous forme d'algorithme, de façon structurée et indépendante de toute contrainte matérielle ou logicielle

Subject:
Computer Science
Material Type:
Lesson
Author:
Aicha ER-RAFYG
Date Added:
12/14/2021
Input and Output
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will be introduced to the 4 basic functions that computers perform and begin to think about the advantages that computers have over humans in taking in input, processing data, and providing output. Students will be asked to identify how humans interface with computers using input and output devices and then invent a new input/output prototype of their choosing.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Author:
NYC Computer Science for All
Date Added:
03/30/2021
Input and output
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students encounter people who are computer scientists, and they learn definitions of computer science.
Students learn the difference between input and output devices, and they creatively invent a new device that combines input and output.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Author:
NYC Computer Science for All
Date Added:
04/02/2021
Insertar Objetos de Estado (Adobe Indesign)
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

¿Cómo podemos hacer más atractivos nuestros documentos digitales? Bueno, mediante las herramientas de interactividad que nos brinda Adobe Indesgin, podemos transformar nuestros documentos. Esta lección, invita a realizar un breve recorrido para lograr documentos más amenos y con interacción.

Subject:
Computer Science
Graphic Design
Material Type:
Activity/Lab
Author:
Wider Santos
Date Added:
07/20/2024