Magnetic Coaster Planning

Slides:



Advertisements
Similar presentations
Viruses & Spyware A Module of the CYC Course – Computer Security
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Section 6 Theory Software Copyright, Viruses and Hacking.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Homework #2 John Bach IST 110 Section 031 JMB6824 9/15/2012.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Internet Safety Internet Safety LPM
Safety and Security issues of using ICT Alys brooks.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,
Internet safety By Suman Nazir
W elcome to our Presentation. Presentation Topic Virus.
Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
E-SAFETY PARENT’S WORKSHOP THURSDAY 5 TH MAY. PASSIVE NO EXCUSES! We can’t be PASSIVE - being unaware or ill-informed is not an excuse!
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
bitdefender virus protection
Security Risks Todays Lesson Security Risks Security Precautions
Creative ICT – Year 8 Lesson 2 What is a logo?.
Creative ICT – Year 8 Lesson 3 Design a logo.
Year 8 Creative ICT Design Journal
Managing Windows Security
Hacking Computer crime and cyber security.
Finishing and Presenting Logo
Customise & Explain your game
Malware and Computer Maintenance
Misuses of ICT Malpractice and crime © Folens 2008.
MALWARE Autumn Mattis.
Year 8 ICT Internet Security
magnetic coaster designing
3.6 Fundamentals of cyber security
Logo Design (Formatting and Effects)
Unit 4 IT Security.
Creative ICT – Year 8 Lesson 8 Mug Review & Planning.
How to use the internet safely and How to protect my personal data?
Big Picture Consider this How many online threats might you be faced with a day?
Instructor Materials Chapter 7 Network Security
Year 8 ICT Internet Security
How to use the internet safely and How to protect my personal data?
Lecture 8. Cyber Security, Ethics and Trust
COMPUTER VIRUSES Computer Technology.
Cyber Security By: Pratik Gandhi.
Antivirus Support Phone Number + 1-(844) One Step IT Solutions December 6, 2017
Games Programming in Scratch
Computer Technology Notes 5
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
Internet Safety Vocabulary
Lab 7 – Defeating MALWARE
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Magnetic Coaster Planning Creative ICT – Year 8 Lesson 6 Magnetic Coaster Planning

Upload your Design Journal so far Starter Go to: Learncoombedean / ICT / Year 8 / Creative ICT / Lesson 5/ Upload your Design Journal so far

Today’s Lesson Learning Objectives: Select information from the mindmap that can be used on the coasters Plan designs for a magnetic coaster with different audience and purpose Excellence Can design two coaster designs showing details of advertising for a venue performance and the release of an album or single for the artist Developing Can plan 2 coaster designs with some suitable information Secure Can plan 2 coaster designs using selected information Foundation Can design a coaster with suitable audience and purpose

Your Task Magnetic Coaster Planning Design magnetic coaster to promote your band/artist You need to produce 2 different designs and choose which one to make Purpose of designs 1. For a fan of artist (Pictures and information of where the band/artist are performing) 2. Advertising new album/single release You will need to open your mindmap on your band/artist for the information you have researched.

Fireworks – New file 800 x 800 pix Today’s Task 1 Create the design for the first Magnetic Coaster advertising a concert. Facts for my Magnetic Coaster – Decide on what facts you will use for your 1st design by using the mindmap e.g. Venue they are playing Date of the performance Time of the performance Website to purchase tickets Images of the band/artist Logo Fireworks – New file 800 x 800 pix

For a fan of artist Example Fridge Magnet 1 Venue they are playing Date of the performance Time of the performance Website to purchase tickets Images of the band/artist Logo

Magnetic Coaster Design 2 Today’s Task 2 Magnetic Coaster Design 2 Create the design for the first Magnetic Coaster advertising the release of an album/single Name of your single/album Date of release Names of songs Where to order the album from Fireworks – New file 800 x 800 pix Level x - Description

Example Fridge Magnet 2 Advertising new album release Name of your single/album Date of release Names of songs Where to order the album from Logo

Has this happened to any of your family or friends? Plenary Computer viruses are malicious small software programs (often called malware) that are designed to spread from one computer to another and to interfere with computer operation. A virus might change or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk Has this happened to any of your family or friends?

How do you know if your computer is infected? If your computer is behaving oddly, such as making strange sounds or closing down suddenly, these are symptoms of infection.

What could you do to prevent infected? Blocks pop ups Scans for new viruses Filters your emails for spam Looks after your passwords Can limit access of family and other users. Tracks and warns the users of trusted websites. Restricts adware. Firewalls to limit the data entering through a network