Chapter 3 Introduction to Computing Chapter 3 Structures in Computing William Johnson Julia Benson-Slaughter

Slides:



Advertisements
Similar presentations
SOCIAL NETWORKING Keith Watson, CISSP-ISSAP, CISA Information Assurance Research Engineer, CERIAS SECURITY AND PRIVACY.
Advertisements

Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Developed by Technology Services 1:1 Laptop Initiative
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
TOPIC LEARNING BTEC Level 3 Unit 28 Websites L01- All students will understand the web architecture and components which allow the internet and websites.
Internet safety! By: Liam, Brilee, Dinny, Shalisha.
Cloud Computing Brandon Hixon Jonathan Moore. Cloud Computing Brandon Hixon What is Cloud Computing? How does it work? Jonathan Moore What are the key.
Fall 2014 student background survey results. 2. Which section are you in? ValuePercentCount Day48.8%21 Evening51.2%22 Total43.
Cloud Computing PRESENTED BY- Rajat Dixit (rd2392)
Lecture 16 Secure Social Networking. Overview What is Social Networking? The Good, the Bad and the Ugly How to protect yourself How to protect your children.
Andrew Schroeder Networking Aspects of Cloud Computing.
IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 7/2/ Facebook is the most popular social.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
INTRODUCTION TO CLOUD COMPUTING Cs 595 Lecture 5 2/11/2015.
(c) the7sisters.co.uk A Revision of staying safe on the Internet Internet Safety.
Internet Safety Safely Navigating Uncharted Waters.
Tang Hall Primary School E - Safety Support for parents.
The Cloud Or cloud computing… or the end of executive headaches… CS1501.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
For more notes and topics visit:
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Creating an Online Professional Presence Using Social Media.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
$ocial Media and Networking. 44% of Milwaukee Area home buyers used social networking websites. Among those 18 to 24, 74% used social networking sites,
Cloud Computing. What is it? Cloud computing is the concept of where a large number of computers are connected to a large storage computer, where each.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
New Summary Report - 29 August 2015 Survey: CIS 275 background survey.
Social Media. Topics 1. Inclusion Means Everywhere 2. What is Social Media? 3. Facebook 4. Twitter 5. Youtube 6. Instagram 7. Linked In 8. Staying Safe.
Cloud computing.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Stonegate Elementary Media Lab
Strata IT Training Chapter 16 Green Networking. Green Servers Power Management –Power off monitor settings –Automatic server shutdown policy Rack mounted.
Niagara Framework in the Clouds Scott Boehm. … what the heck does that mean??
By Nicole Rowland. What is Cloud Computing?  Cloud computing means that infrastructure, applications, and business processes can be delivered to you.
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
Mary Ellen Davidson Internet Safety. What is it? For Kids! For Parents For Educators Works Cited.
SERVER I SLIDE: 3. SERVER I Topic for tomorrow: Chapter 3: Configuring Hyper-V ■■ Objective 3.1: Create and configure virtual machine settings (Group.
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
Internet Safety. CONTENTS Staying Safe Online I. Social Networking II. Cyberbullying III. Solutions and Strategies III.
The Social Network Revolution 2015
New Summary Report – 2 February 2016 Survey: CIS 275 background survey.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
WIDESCREEN PRESENTATION Tips and tools for creating and presenting wide format slides.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
KS2 E-Safety assembly How to be smart and keep safe online.
DIGITAL SAFETY City of Edinburgh Council Digital Learning Team.
WHAT IS CLOUD COMPUTING? Pierce County Library System.
Web 2.0: Concepts and Applications 6 Linking Data.
Clouding with Microsoft Azure
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Unit 3 Virtualization.
Creating your online identity
11. Looking Ahead.
Social Media Security: Understanding how to keep yourself safe.
Digital Safety City of Edinburgh Council Digital Learning Team.
Cloud Computing Cloud computing: (the Internet represents the Cloud).
What is Cloud Computing - How cloud computing help your Business?
Andrew McCombs March 10th, 2011
Session II Cloud Introduction Session II
Social Media Solutions for SHRM Affiliates
E-safety and what you need to know!
Cloud Computing for the Home & Office
Emerging technologies-
Cloud Computing: Concepts
Done by:Thikra abdullah
Presentation transcript:

Chapter 3 Introduction to Computing Chapter 3 Structures in Computing William Johnson Julia Benson-Slaughter

Chapter 3 Chapter 3 Structures in Computing This chapter covers computer networks. The various sizes and configurations are examined and we explore where they are used. Next, we discuss the Internet and its various aspects. The basics of the Internet, how it moves information, and how it has changed our everyday life. Then we discuss the Cloud. This topic reveals how the Cloud is structured, what factors are related to using it, and future possibilities Lastly, we explore the new world of Socialnomics in computing.

Chapter 3 Structures in Computing: Cloud Data Storage and Organization Computer Processing Services for Business Services for Individuals Security and Encryption CloudInternetNetworksSocial-nomics

Chapter 3 Structures in Computing: Cloud Google Docs Microsoft One Drive Apple iCloud Box DropBox JustCloud Many, Many, Others CloudInternetNetworksSocial-nomics

Chapter 3 Structures in Computing: Cloud Scalable Computer Resources  Virtualized Server Machines  Online (cloud) Data Analytics Lower Cost of Ownership Highest Reliability = Highest $ Cost Types:  Software as a Service (SAAS)  Platform as a Service (PAAS)  Infrastructure as a Service (IAAS) CloudInternetNetworksSocial-nomics

Chapter 3 Structures in Computing: Cloud Scalable Computer Resources  Virtualized Server Machines  Online (cloud) Data Analytics Lower Cost of Ownership Highest Reliability = Highest $ Cost Types:  Software as a Service (SAAS)  Platform as a Service (PAAS)  Infrastructure as a Service (IAAS) CloudInternetNetworksSocial-nomics

Chapter 3 Structures in Computing: Cloud Platforms: Security with Cloud Services: bJchttps:// bJchttps:// CloudInternetNetworksSocial-nomics

Chapter 3 Structures in Computing: Social-nomics What is it?  All forms of social media. Integration to marketing, healthcare, safety, etc. 7 Deadly Sins of Social Networking: sins-of-social-networking-security.html Social-nomicsInternetCloudNetworks

Chapter 3 Structures in Computing: Social-nomics Networking  Facebook, Google+, Linkedin, Twitter Content Sharing  Pinterest, Facebook, Box, Google Docs, Snap-Chat, Tumblr, One Drive, iCloud Location-based Services  foursquare, Google Latitude, Facebook, Gowalla Social-nomicsInternetCloudNetworks

Chapter 3 Structures in Computing: Social-nomics Content Sharing Privacy: Before you post, ask the following:  Will this post/picture cause a problem for me?  Can I say this in front of my mother? Divide your Friends into groups, lists, or circles  Limit the number of people that see it Share public information with the public Share inner thoughts and personal feelings with close friends. Social-nomicsInternetCloudNetworks

Chapter 3 Structures in Computing: Social-nomics Networking Privacy: Do not Friend or Connect with people that you have not met in person or know well Reject Friend requests and Connections Having a lot of Friends works against you  Facebook may ask you to identify your Friends Limit your visibility on services Social-nomicsInternetCloudNetworks

Chapter 3 Structures in Computing: Social-nomics Location and Privacy and Safety: Limit your check-in information to friends only Never check in at your home, school, work Avoid public lists for a location Do not let friends “check you in” Review all posts you are “tagged in” Social-nomicsInternetCloudNetworks

Chapter 3 Structures in Computing: Social-nomics General Safety Tips: Some sites will allow only a defined community of users (members only/registered users) to access posted content, while others allow anyone to view postings Consider restricting access to your personal page of information that you post (e.g., limit access to your family, friends, your team, a club, etc.). Don’t post your full name, Social Security number, address, phone number, school name, exact age, etc. Your screen name should make you anonymous; don’t use obvious information in your screen name such as your age, hometown, pet name, or part of your real name Social-nomicsInternetCloudNetworks

Chapter 3 Resources tm tm node_map.gif node_map.gif