This video focuses on date protection. We look at how to migrate …
This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.
Data is always priceless
Three topics: -Data migration -Data backup -Data disposal
Steps taken to protect computer networks. We cover permissions, user policies (especially …
Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security.
Links from Video: -The System Administrator Song http://youtu.be/OpGN3oT1thA
Our 6 video in the Information Security series (part of Introduction to …
Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.
Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.
Video 7 of our information security series (part of Introduction to Computers) …
Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.
Links from Video: -AVG by Grisoft: http://free.avg.com/us-en/homepage -AVAST: http://www.avast.com -ClamWin: http://www.clamwin.com/ -Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download
Our last video in the Information Security lesson covers my favorite topic, …
Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing.
I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy.
View the attached files to see a project for a Information Technology …
View the attached files to see a project for a Information Technology Fundamentals class. You will find: Lesson PlanChecklist for StudentsExample of Finished Project Feel free to change and custimize the lesson plan to better fit your classroom and students.
View the attached files to see a project for a Information Technology …
View the attached files to see a project for a Information Technology Fundamentals class. You will find: Lesson PlanChecklist for StudentsExample of Finished Project Feel free to change and custimize the lesson plan to better fit your classroom and students.
Deb Baker created this after consulting with faculty, librarians, and colleagues from …
Deb Baker created this after consulting with faculty, librarians, and colleagues from around the country. The idea was to create a practical tool for assessing information literacy that anyone could use, was easy to norm, and focused on what students could do and where research instruction could be improved to increase students' information literacy. This rubric can help improve student success and information literacy learning outcomes in research assignments for any course. Used early in the semester it can serve as a diagnostic tool for supporting student researchers in developing the skills and habits of mind needed to successfully find and use information to answer a question, support a thesis, or solve a problem. Students could even use it to self-assess.
Savoir transcrire les différentes étapes de résolution d'un problème sous forme d'algorithme, …
Savoir transcrire les différentes étapes de résolution d'un problème sous forme d'algorithme, de façon structurée et indépendante de toute contrainte matérielle ou logicielle
Today we’re going to talk about controllers. Controllers are incredibly important in …
Today we’re going to talk about controllers. Controllers are incredibly important in the gaming experience because they are how we communicate actions within a game and often play a significant role in why we like or dislike certain games. And over the years they have seen some huge improvements mostly brought on by the creation of more complex and immersive video games. Controller design is so important in fact that some of the largest game console manufacturers spend hundreds of millions of dollars each cycle trying to update and refine their designs. But interestingly, the same can’t quite be said for one of the biggest gaming platforms right now - so we’ll talk about that too.
Students will be introduced to the 4 basic functions that computers perform …
Students will be introduced to the 4 basic functions that computers perform and begin to think about the advantages that computers have over humans in taking in input, processing data, and providing output. Students will be asked to identify how humans interface with computers using input and output devices and then invent a new input/output prototype of their choosing.
Students encounter people who are computer scientists, and they learn definitions of …
Students encounter people who are computer scientists, and they learn definitions of computer science. Students learn the difference between input and output devices, and they creatively invent a new device that combines input and output.
¿Cómo podemos hacer más atractivos nuestros documentos digitales? Bueno, mediante las herramientas …
¿Cómo podemos hacer más atractivos nuestros documentos digitales? Bueno, mediante las herramientas de interactividad que nos brinda Adobe Indesgin, podemos transformar nuestros documentos. Esta lección, invita a realizar un breve recorrido para lograr documentos más amenos y con interacción.
Today we’re going to take our first baby steps from hardware into …
Today we’re going to take our first baby steps from hardware into software! Using that CPU we built last episode we’re going to run some instructions and walk you through how a program operates on the machine level. We'll show you how different programs can be used to perform different tasks, and how software can unlock new capabilities that aren't built into the hardware. This episode, like the last is pretty complicated, but don’t worry - as we move forward into programming the idea of opcodes, addresses, and registers at this machine level will be abstracted away like many of the concepts in this series.
When tragedy strikes, how do people avoid bearing all of the costs …
When tragedy strikes, how do people avoid bearing all of the costs of their loss? Learn more in the February 2017 issue of Page One Economics: Focus on Finance.
So you may have heard of Moore's Law and while it isn't …
So you may have heard of Moore's Law and while it isn't truly a law it has pretty closely estimated a trend we've seen in the advancement of computing technologies. Moore's Law states that we'll see approximately a 2x increase in transistors in the same space every two years, and while this may not be true for much longer, it has dictated the advancements we've seen since the introduction of transistors in the mid 1950s. So today we're going to talk about those improvements in hardware that made this possible - starting with the third generation of computing and integrated circuits (or ICs) and printed circuit boards (or PCBs). But as these technologies advanced a newer manufacturing process would bring us to the nanoscale manufacturing we have today - photolithography.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.