Study

Digitalising the personal learning development

  •   0%
  •  0     0     0

  • Give example of wireless connection
    satellites, cellphone, wifi etc
  • Each ______ has a unique IP address
    server
  • These are the set requirements to complete your project
    Initial conditions
  • What is phishing?
    Spending Saturday at the lake catching fish
    Swimming in the river with the fish
    Playing online games with friends
    Pretending to be someone else online to get personal informa
  • Tge project life method consists of two phases
    the planning/design phase and the production/construction phase
  • It explains why the project is needed
    Project Justification or Justification
  • Can two different types of computers connect to each other via the internet? Ex- plain your answer.
    Yes, obviously. The only condition is for each one of them to have a different IP address.
  • What is malware?
    A type of virus that can harm your computer or device
    A type of protective software
    A type of online chatroom
    A special outfit to wear ito a party for Uncle Mal
  • This is a very important part of a personal computer (PC). It powers all the other devices.
    Power source
  • It is a software designed to detect, block, delete and, if possible, prevent malicious operations on a computer.
    Antivirus
  • Impersonating a well-known company with the intention to deceive people.
    Phishing
  • It's a printed curcuit board
    Motherboard
  • Two basic elements of a computer
    hardware and software
  • Computer that uses a router to access the internet
    Client
  • Why do you think the RAM and microprocessor are embedded on the motherboard?
    Because these components may break down and need to be replaced. This also allows for them to be expanded.
  • give examples of wired connection
    fibre optics, copper, etc
  • When you apple theoretical and practical knowledge to create objects and systems you are applying the.....
    Project lifecycle method
  • It is requested when a specific problem occurs that requires a technical solution.
    Technical repot
  • small segment of a larger message
    Packets / Date Packets
  • What is cyber safety?
    Protecting yourself from online harm
    Protecting yourself from sunburn
    Protecting yourself from physical harm
    Protecting yourself from natural disasters
  • What is cyberbullying?
    Being scared of using technology
    Pushing a computer over and then laughing at it
    Using technology to harm or harass someone
    Sharing funny memes with your friends
  • What does IP Address stands for
    Internet Protocol Address
  • Files stored on a server
    Web pages
  • what are the types of connection
    wired and wireless
  • This works by protecting the computer from unwanted external intrusions.
    Firewalls
  • Organisation that provides services for accessing the internet
    ISP (Internet Service Provider)
  • The large of connected computers around the world that allows people to share information and communicate with each other.
    The internet
  • It is the computer’s main memory. It is where the data you’re currently using is stored.
    RAM
  • This part of the report describes the object, element or structure that will be made to solve the problem
    Descriptive report
  • Software manufacturers, in an effort to keep their products updated, regularly publish patches that correct security errors that have been detected
    Software updates
  • Taking provocative photos of yourself and sending the pictures to someone you trust.
    Sexting
  • Remote (online, by mobile phone) harassment of peers. The stalker and the victim are usually around the same age.
    Cyberbullying
  • Advertising a product or service by sending unsolicited messages.
    Spam