Measures to protect files from unauthorised access and modification Your name and surname Communication Skills ICT Skills Welsh Language.

Slides:



Advertisements
Similar presentations
IT KEY SKILLS LEVEL 1 Evidence required for: A poster or Word document.
Advertisements

Business Planning using Spreasheets-2 1 BP-2: Good Spreadsheet Practice  There is always the temptation to rush in and start entering data.  However.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Discussion (20 points) and Final Assignment (200 points)
Lesson 6 – Part 6 Word Lesson 6 presentation prepared by Michele Smith – North Buncombe High School, Weaverville, NC. Content from Microsoft Office Word.
A guide for postgraduate students Presenter Alison Baker - Trainer, Information Technology Services File Management using Windows 7.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
UNIT 1 OCR EVIDENCE You are required to build Powerpoint presentations as Awareness Guides for new staff and pupils arriving in school. They are intended.
Module 1 Dictionary skills Part 1
A01 - Safe Working Practices - Safety Patrol UK Safety Patrol UK are an organisation that travels to businesses to give presentations and advice on using.
Key Skills: Introduction Presented by Bill Haining.
McGraw-Hill/Irwin © 2009 The McGraw-Hill Companies, All Rights Reserved.
DynEd Courseware How to use the program Skills Center, Room 801.
What kinds of documents can you create with Word 2007?
ONLINE DATA STORAGE & DOCUMENTS Lesson 3. Lesson 3 – Online documents In this lesson we will be covering:  Online documents  Compression and expansion.
Plenty of help in U:\IT\OCR\Example of Report A01.pdf.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
REDUNDANT SLIDES , syncing & calendar syncing 1.
Website on Computer Security By: Brittany Freeman.
Installing the SAFARIODBC.EXE For use with Excel May 3, 2002.
Level 2 IT Users Qualification – Unit 1 Improving Productivity
IT Security for Users By Matthew Moody.
Level 2 IT Users Qualification – Unit 1 Improving Productivity Jordan Girling.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Brought To You By: Mrs. Swanson and Ms. Faase.  (n.) This is a website that includes the collaboration of work from many different authors. A wiki site.
Decide What Your Subject Will Be. Go to
Unit - R Create a folder In your ICT folder and Name it as R002_Skills_for_business. 2. Your folder structure should look like this R002_Skills_for_business.
Keys to success on the Gateway: A checklist  Demonstrate that you understand the writing task  Address and develop all parts of the writing task  Organize.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
Using Your RSD STUDENT First Step: Change your password At the computer:  Log in like you usually do  Then, press Ctrl + Alt +
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Small Business Resource Power Point Series The Importance of GOOD SALES COPY on a Website.
K A R A Creations ARLIARLI Topic: Why facebook can be dangerous!!
1 ADVANCED MICROSOFT WORD Lesson 14 – Editing in Workgroups Microsoft Office 2003: Advanced.
6TH GRADE English Program 1. COURSE GOALS Mastery of essential writing and language skills Mastery of essential writing and language skills Integrate.
Go to your school’s web locker site Your user name is the first letter of your first name, the first four letters of.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Organizing your work…  Make sure you are saving all work to the H: drive (student account) and your class folder.  Properly label all resources, documents,
What is the HSPA???. HSPA - Overview The HSPA is the High School Proficiency Assessment that is given to juniors in New Jersey’s public schools. States.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
Planning Regular words Keep it short Get active Proofreading Hidden verbs Presentation Assessments Clear English Proofreading Tips.
How to Teach English Language Learners Tips and Strategies
How to create a SharePoint site MICROSOFT OFFICE SHAREPOINT DESIGNER.
Programming Errors. Errors of different types Syntax errors – easiest to fix, found by compiler or interpreter Semantic errors – logic errors, found by.
This poster has been designed to act as a customisable template. You do not have to use this template but it might be a useful starting point. The poster.
Barbie Simmons 3 rd Grade Science Environment Persuasive Letter to the Principal.
Module 1 How to learn English
GUESSING GAME: NET WORK a learner  to learn to make a list mother tongue (N) to learn by heart so as to = in order to (Exp) a piece to come across to.
Word 2007 ® Business and Personal Communication What kinds of documents can you create with Word 2007? 1.____________ _ Business Report.
U1 NAME: GROUP: TEACHER: UNIT 1 : TASK 1 STANDARD WAYS OF WORKING.
CAN YOU GUESS THE PASSWORD You and your teacher are going to work through a program with 5 different passwords. And you need to try and guess them. You.
St. Mary’s Catholic School, Mayville Mrs. Kaiser, Technology Teacher.
Writing in English Academic Writing.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
10 Commandments of FRQ writing in AP Psychology. 10 Commandments of AP Psychology FRQ Writing 10 Simple Rules that will help.
Worst Spelling Mistakes You Should Never Do
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
Testing and delivery Web design principles. Web development is software development.
Improving Productivity Using IT
Targets.
Computer Information Technology
Ian Ramsey C of E School GCSE ICT Smart working Software choices.
Encryption and Hacking
Encryption and Hacking
Writing.
Microsoft Word 2010 Lesson 6 – Part 6
English Writing I Course Description and Syllabus
Presentation transcript:

Measures to protect files from unauthorised access and modification Your name and surname Communication Skills ICT Skills Welsh Language

Setting a password to open a file There are measures to prevent people from opening up your work. In MS Office you can password protect your document so people can’t open it without knowing the password. This would stop people getting into the document and seeing its contents. Method: TOOLS>OPTIONS>SECURITY: You need to put in a password. You will be prompted to re-enter so that the system is sure you have the correct password and didn’t make a typing error. When you try to open the file it will prompt you for the password. If you don’t know it the file can’t be opened.

Setting a password to modify a file In the same way, you can set a password to prevent a file from being modified or changed. The file can be opened but the file is read only and data can’t be altered. This prevents people from changing important documents. Only people with the password can change the content or “MODIFY” the file. Method: TOOLS>OPTIONS>SECURITY: A wrong password will stop you being able to alter or modify the file.

Password protecting the contents of documents Why is password protecting your user area a good idea? Why is it important to password protect folders and files?

Choosing a strong password What advice would you give to a new band member about how to make a strong password, ie. One which can’t be easily guessed or hacked into? You must give at least four bullet points of advice and answer in clear sentences. You could give advice in English and Welsh Error check your work by proof reading and doing a spell check.

Welsh Dimension: give the advice for NAME, PASSWORD, CONNECT in Welsh. Dim Problem if you use Google Translate: Which of these words mean which? CYSTYLLTWCH, CYFRINAIR, ENW?

Useful web sites ict/databases/6datasecurityrev1.shtmlhttp:// ict/databases/6datasecurityrev1.shtml #hahahttp:// #haha These are good on general security and security of files. Do some research to find useful information.