Using a Computer Network

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
INTERNET SAFETY FOR STUDENTS
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 6. Using Networks 1 Network Hardware - Hub Hub - A hub is used when you have.
Information Systems By Trino Aguiniga.
ICT BADGE CUBS Stage 2 Stage 3
Unit 11 - Computer Networks Assignment B: Design a Computer Network
© Folens 2008 Transfer of data in ICT systems Using ICT networks.
Computer Networks IGCSE ICT Section 4.
Duties of a system administrator. A system administrator's responsibilities typically include:
Computer Ethics.
Joseph Pettaway ED505. What is Digital Citizenship? Concepts that aids individuals in learning and understanding how to use technology appropriately.
Working for a hospital at home (Teleworking). Teleworking Home working or teleworking for hospitals staff is the process where they work from home using.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Computer Networks S3 Prepared by May Lau
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
STAY SAFE!! Don’t fall for the same old tricks !!.
DIGITAL CITIZENSHIP PROJECT Susan Abernathy. THINGS TO REMEMBER DURING THE UPCOMING YEAR!
Are You a Good Digital Citizen? By Abby Buchanan Image from Microsoft Clip Art.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Student Technology Code of Ethics
Essential Components: Acceptable Use Policy Presenter: John Mendes.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Ethics. Ethics are the principles and standards we use to decide how to act.
Teacher Rooming Equipment Rules / Expectations Login / Passwords Technical Issues Homework Printing.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
WELCOME WORD PROCESSING I
Transferring data.  Most commercial computer users need to allow their employees to share data.  It also needs more than one employee to access the.
Communications & Networks National 4 & 5 Computing Science.
Digital Citizenship By Teneka Cannon. . Digital Etiquette also known as Netiquette Definition: a basic set of rule everyone should follow to make Internet.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.
Networks. Learning Objectives: By the end of this lesson you should be able to:
NETWORKING COMPONENTS lLTEC 4550 JGuadalupe. HUB -THIS IS A HARDWARE DEVICE THAT IS USED TO NETWORK MULTIPLE COMPUTERS TOGETHER. IT IS A CENTRAL CONNECTION.
Introduction to Networking. What is a Network? Discuss in groups.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to Networking.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Chapter 1 : Computer Networks. Lecture 1. Introduction to computer networks: Network definition : A network is a collection of computers and other devices.
Clark County School District
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
Server Machines By Brett Gunder COSC 101.
Transfer of data in ICT systems
Networks 1 Key Revision Points.
Internet Safety.
Browsing and Searching the Web
Technology Guidelines for Students
Local Area and Wide Area Networks
How And The Internet Work
Digital Citizenship By: John Beverly.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Local Area and Wide Area Networks
Operating Systems Security
Technology Guidelines for Students
HOW DO I KEEP MY COMPUTER SAFE?
Communications & Computer Networks Resource Notes - Introduction
Follow safety rules so that YOU: Avoid getting HURT.
Unit 4 IT Security Kerris Davies.
What is Information Security?
I will… only people I know or my teacher has approved of.
Operating Systems Tasks 04/04/2019.
Staying safe online Use privacy settings Dangers – identity theft, appearing rude/angry, Think before you share pictures or personal information Use.
CHAPTER 1 Information Technology, The Internet, And You.
Woodland Hills School District
Operating Systems Tasks 05/08/2019.
Principles of Information Technology
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Using a Computer Network From Valeriya Rudnik, 2016

Networks are groups of computers, software and hardware that are all connected to help the users work together

They are typically found in businesses, schools and colleges, Internet cafes and libraries. 

A network connects computers by using cabling systems, special software and devices that handle the flow of data. A network allows users to share files and resources, such as printers, as well as send email to each other.

So, as with any other shared resource, it is important to be responsible and think about other users. There are a number of things to keep In mind when using a computer network, such as: • Do not share computer passwords. • Do not overuse resources such as online connection time or printers, • Use it only to help you with your studies.

• • Do not use it for anything illegal, unethical or dishonest e. g • • Do not use it for anything illegal, unethical or dishonest e.g. bullying other students or damaging equipment. • Do not copy other people's work - either other students' or online information. This is called plagiarism and has serious consequences especially concerning copyrighted material. Remember information on the Internet may not always be copyrighted, but it is there to give you the facts and ideas for your own piece of writing and NOT to be copied and pasted into a new document.

• Do not install any software without permission • Do not install any software without permission. • Be aware of computer viruses and try to protect the network from them by following security procedures.

Do you use a computer network? Do you stick to the rules?