Learn how to evaluate medical information as a non-medical expert using information …
Learn how to evaluate medical information as a non-medical expert using information literacy principles such as currency, noting research questions and methods and verifying claims with multiple sources.
Simply put, this is one of my most favorite topics when it …
Simply put, this is one of my most favorite topics when it comes to talking about computers. In this video we layout the order of this lesson, as well as give basic definitions of: •Machine-Level Security •Network Security •Internet Security •Social Engineering
The act of physically protecting the computers. The first rule of any …
The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access to it. If a bad guy can get their hands on the computer assume they will be able to gain access to all data contained within.
Our third video in our Information Security series (part of the Introduction …
Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are
There are three forms of authentication •Something you know •Something you have •Something about you
This video focuses on date protection. We look at how to migrate …
This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.
Data is always priceless
Three topics: -Data migration -Data backup -Data disposal
Steps taken to protect computer networks. We cover permissions, user policies (especially …
Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security.
Links from Video: -The System Administrator Song http://youtu.be/OpGN3oT1thA
Our 6 video in the Information Security series (part of Introduction to …
Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.
Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.
Video 7 of our information security series (part of Introduction to Computers) …
Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.
Links from Video: -AVG by Grisoft: http://free.avg.com/us-en/homepage -AVAST: http://www.avast.com -ClamWin: http://www.clamwin.com/ -Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download
Our last video in the Information Security lesson covers my favorite topic, …
Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing.
I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy.
View the attached files to see a project for a Information Technology …
View the attached files to see a project for a Information Technology Fundamentals class. You will find: Lesson PlanChecklist for StudentsExample of Finished Project Feel free to change and custimize the lesson plan to better fit your classroom and students.
View the attached files to see a project for a Information Technology …
View the attached files to see a project for a Information Technology Fundamentals class. You will find: Lesson PlanChecklist for StudentsExample of Finished Project Feel free to change and custimize the lesson plan to better fit your classroom and students.
Deb Baker created this after consulting with faculty, librarians, and colleagues from …
Deb Baker created this after consulting with faculty, librarians, and colleagues from around the country. The idea was to create a practical tool for assessing information literacy that anyone could use, was easy to norm, and focused on what students could do and where research instruction could be improved to increase students' information literacy. This rubric can help improve student success and information literacy learning outcomes in research assignments for any course. Used early in the semester it can serve as a diagnostic tool for supporting student researchers in developing the skills and habits of mind needed to successfully find and use information to answer a question, support a thesis, or solve a problem. Students could even use it to self-assess.
Savoir transcrire les différentes étapes de résolution d'un problème sous forme d'algorithme, …
Savoir transcrire les différentes étapes de résolution d'un problème sous forme d'algorithme, de façon structurée et indépendante de toute contrainte matérielle ou logicielle
Students will be introduced to the 4 basic functions that computers perform …
Students will be introduced to the 4 basic functions that computers perform and begin to think about the advantages that computers have over humans in taking in input, processing data, and providing output. Students will be asked to identify how humans interface with computers using input and output devices and then invent a new input/output prototype of their choosing.
Students encounter people who are computer scientists, and they learn definitions of …
Students encounter people who are computer scientists, and they learn definitions of computer science. Students learn the difference between input and output devices, and they creatively invent a new device that combines input and output.
¿Cómo podemos hacer más atractivos nuestros documentos digitales? Bueno, mediante las herramientas …
¿Cómo podemos hacer más atractivos nuestros documentos digitales? Bueno, mediante las herramientas de interactividad que nos brinda Adobe Indesgin, podemos transformar nuestros documentos. Esta lección, invita a realizar un breve recorrido para lograr documentos más amenos y con interacción.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.