Monday 30 November 2015

E-safety

E-Safety

Top Ten E-Safety Tips:
 1. Always think of your personal safety first when using ICT or your mobile phone. Remember it is easy for      anyone to lie about who they are online, so you can never really be sure about who you are talking to.
 2. Do not give out any personal information about yourself online to people you do not know. This includes        your full name, address, street name, postcode, or school name. Only ever give out your location as              Walsall.
3. Never give your contact number to anyone who you don’t know.
 4. It’s a good idea to use a nickname rather than your real name.
 5. Don’t meet people that you have only spoken to online. If you do decide to meet up with anyone in real        life then make sure you take a trusted adult with you and meet in a public place at a busy time.
 6. Never give out pictures online or over a mobile unless you know the person in real life. It is easy for              people to take your pictures and alter them, send them on, or even pretend to be you with them.
 7. Always use private settings whenever you are setting up a social networking page or an Instant                      Messenger (IM) account. This is so people who you don’t want to see your profile can’t.
 8. Anything you post or upload to the internet is there forever so be very careful what you put online.
9. Never go onto webcam with people you don’t know in real life. Webcam images can be recorded and         copied and also shared with other people.
10. If you receive any messages or pictures that worry or upset you talk to an adult you trust. You may also         report it online.

Monday 16 November 2015

Computer security threats

Computer Security Threats
THREAT #1: VIRUS
  A virus is a piece of software that can infect a computer without the permission or knowledge of the user. A virus can only spread when it is transmitted by a user over a network or the Internet, or through removable media such as CDs or memory sticks.
 Danger level: High
Prevalence: Extremely High
 Worst case damage
Some viruses delete files, reformat the hard disk or cause other damage. Others only replicate themselves and may present text, video, or audio messages.
 Prevention, detection and removal:  
Antivirus software detects and eliminates known viruses.

THREAT #2: SPAM
 SPAM is electronic junk email. The amount of spam has now reached 90 billion messages a day. Email addresses are collected from chat rooms, websites, newsgroups.
Danger level: Low
Prevalence: Extremely High
Worst case damage:
Spam can clog a personal mailbox, overload mail servers and impact network performance. Perhaps the real danger of spam is not so much in being a recipient of it as inadvertently becoming a transmitter of it. Spammers frequently take control of computers and use them to distribute spam. Once a user’s computer is compromised, their personal information may also be illegally acquired.
Prevention, detection and removal:
User systems may use spam filters to screen out email messages with suspect titles or from suspect persons, as well email messages from blocked senders.
THREAT #3: SPOOFING
  Spoofing is an attack in which a person or program masquerades as another. A common tactic is to spoof a URL or website.
Danger level: High
Prevalence: Extremely High
 Worst case damage:
Once personal information is acquired, spoofers may use a person’s details to make transactions or create fake accounts in a victim’s name. They can ruin the victims’ credit rating or even deny the victims access to their own accounts.
 Prevention, detection and removal:
As spoofing rely on tricking users rather than advanced technology, the best way to handle these threats is through vigilance. Don’t open emails from unknown sources or click on links embedded in suspect messages.

 THREAT #4: BLENDED THREAT
 A blended threat is a threat that combines different malicious components, such as a worm, a Trojan horse and a virus. In this way, a blended threat uses multiple techniques to attack  itself.
 Danger level: Extremely high
Prevalence: Medium
 Worst case damage:
See respective entries for worm, Trojan horse and virus.
 Prevention, detection and removal:
See respective entries for worm, Trojan horse and virus.

THREAT #5: WORM
computer worm is a self-replicating, malicious software program. Unlike a virus, it does not need to attach itself to an existing program or require user intervention to spread. It uses a network to send copies of itself to other computers on the network.
 Danger level: Very High
Prevalence: Moderate
 Worst case damage:
Worms can cause two types of damage:
  1. Damage to the network
  2. Payload 
Prevention, detection and removal:
Since worms spread by exploiting vulnerabilities in operating systems, computers should be kept current with the latest security updates from operating system vendors.
To prevent infection, users need to be wary of opening unexpected emails and should not run attached files or programs.

Monday 9 November 2015

Digital Citizen Ship

Digital Citizen Ship

Electronic buying and selling of goods. Technology users need to understand that a large share of market economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller needs to be aware of the issues associated with it.

Nine Elements of Digital CitizenShip:

  1. Digital access: This is perhaps one of the most fundamental blocks to being a digital citizen. However, due to social status, location, and other disabilities.Recently, schools have been becoming more connected with the internet, often offering computers, and other forms of access. This can be offered through kiosks, community centers, and open labs. This most often is associated with the digital divide and factors associated with such.
  2. Digital commerce: This is the ability for users to recognize that much of the economy is regulated online. It also deals with the understanding of the dangers and benefits of online buying, using credit cards online, and so forth. As with the advantages and legal activities- there is also dangerous activities such as illegal downloads, gambling, drug deals, pornography, plagiarism, and so forth.
  3. Digital communication: This element deals with understanding the variety of online communication mediums such as email, instant messaging, Facebook messenger, the variety of apps, and so forth. There is a standard of etiquette associated with each medium.
  4. Digital Literacy: This deals with the understanding of how to use various digital devices. For example, how to properly search for something on a search engine versus a database. How to use various online logs. Oftentimes many educational institutions will help form an individual’s digital literacy.
  5. Digital etiquette: As discussed in the third element, digital communication, this is the expectation that various mediums require a variety of etiquette. Certain mediums demand more appropriate behavior and language than others.
  6. Digital law: This is where enforcement occurs for illegal downloads, plagiarizing, hacking, creating viruses, sending spams, identity theft, cyberbullying, and so forth.
  7. Digital rights and responsibilities: This is the set of rights digital citizens have such as privacy, speech, and so forth.
  8. Digital health: Digital citizens must be aware of the physical stress placed on their bodies by internet usage. They must be aware to not become overly dependent on the internet causing eye strain, headaches, stress problems, and so on.
  9. Digital security: This simply means that citizens must take measures to be safe by practicing using difficult passwords, virus protection, backing up data, and so forth

Monday 2 November 2015

Cyber Safety

Cyber Safety
Cyber safety is safe and responsible use of information and communication technologies (ICT).NetSafe's apporach to cybersafety is founded on:Maintaining a positive apporach about the many benefitsbrought by technologies.Encouraging the public to identify the risks associated with ICT.


Tips for Cyber Safety:

1. Spend time having fun with your parents online and helping them understand technology!
2. Never post your personal information, such as a cell phone number, home number, home address, or your location on any social networking site or through mobile apps like Snapchat or Instagram.
3. Never meet in person with anyone you first “met” on the internet. If someone asks to meet you, tell your parents or guardian right away. Some people may not be who they say they are.
4. Check with your parents before you post pictures of yourself or others online. Do not post inappropriate pictures of anyone.
5. Never respond to mean or rude texts, messages, and e-mails. Delete any unwanted messages. You may need to delete friends who continuously bother you or post things that are not appropriate.
6. NEVER share your password with anyone, including your best friend. The only people who should know your password are your parents or guardian.
7. If you wouldn’t say something to another person’s face, don’t text it or post it online.
8. Do not download or install software or anything on your computer or cell phone before checking with your parents or guardian.
9. Use the privacy settings of social networking sites.
10. If anything makes you feel uncomfortable online, while gaming or when using your cell phone, talk with your parents or guardian right away.

Monday 26 October 2015

Dignity Day

DIGNITY DAY!
Global Dignity is an independent, non-political organization. Their project is the universal right of every human being to lead a dignified life. The organization was established in 2006 by Crown Prince Haakon of Norway, John Hope Bryant and Pekka Himanen.
The organization is working towards dignity for people creating a global conversation about dignity, promoting dignity-based leadership discussing the issue of dignity with young people. An annual Dignity Day on October 20 was arranged for the first time in 2008. School classes are invited to discuss Dignity - what it means to them and their relationship with other people. Per 2011 schools in more than 40 countries had participated in the project.
How did we celebrated Dignity Day?
From many days teachers were saying us to draw some art works on dignity day.We made some posters and drawings on the dignity day and on dignity day it was presentated infront of everyone.It was 3rd of October,2015 when there was a special assembly held.We all were like why they are having assembly.The school was decorated with dignity posters and art works.Then i got to know that our school is gong to celebrate dignity day.First of all some students did speech on dignity day.One by one all the junior staff came on stage and they were rewarded with such a beautiful gift which was a cupcake and certificate.Everyone did soo much hooting.At the end everyone clapped for A'level girls because they were the ones who organized the dignity day and made cupcakes.After the break a competition was held in which we have to write a essay and speech.Two of my class fellows came 3rd in Urdu and English speech.We enjoyed alot. 

Monday 19 October 2015

History of Titanic

History Of Titanic

 Titanic was a British passenger liner that sank in the North Atlantic Ocean in the early morning of 15 April 1912 after colliding with an iceberg during her madian vouage from Southampton, UK, to New York City, US. The sinking resulted in the loss of more than 1,500 passengers and crew, making it one of the deadliest commercial peacetime maritime disasters in modern history. The RMS Titanic, the largest ship afloat at the time it entered service, was the second of three Olymic class ocean liner operated by the White Star Line, and was built by the Harland and Wolff shipyard in Belfast with Thomas Andrews as her naval architect. Andrews was among those lost in the sinking. On her maiden voyage, she carried 2,224 passengers and crew.
RMS Titanic 3.jpg

BACK GROUND

The name Titanic was derived from Greek mythology and meant gigantic. Built in Belfast, Ireland, in the United Kingdom of Great Britain and Ireland (as it then was), the Titanic was the second of the three Olympic-class ocean liners—the first was the RMS Olympic and the third was the HMHS Britannic.They were by far the largest vessels of the British shipping company White Star Line's fleet, which comprised 29 steamers and tenders in 1912.The three ships had their genesis in a discussion in mid-1907 between the White Star Line's chairman, J. Bruce Ismay, and the American financier J. P. Morgan, who controlled the White Star Line's parent corporation, the International Mercantile Marine Co (IMM).
The White Star Line faced a growing challenge from its main rivals Cunard, which had just launched the Lusitania and the Mauretania—the fastest passenger ships then in service—and the German lines Hamburg America and Norddeutscher Lloyd. Ismay preferred to compete on size rather than speed and proposed to commission a new class of liners that would be bigger than anything that had gone before as well as being the last word in comfort and luxury.The company sought an upgrade in their fleet primarily in response to the Cunard giants but also to replace their oldest pair of passenger ships still in service, being the SS Teutonic of 1889 and SS Majestic of 1890. Teutonic was replaced by Olympic while Majesticwas replaced by TitanicMajestic would be brought back into her old spot on White Star's New York service after Titanic's loss.
The ships were constructed by the Belfast shipbuilders Harland and Wolff, who had a long-established relationship with the White Star Line dating back to 1867.Harland and Wolff were given a great deal of latitude in designing ships for the White Star Line; the usual approach was for the latter to sketch out a general concept which the former would take away and turn into a ship design. Cost considerations were relatively low on the agenda and Harland and Wolff was authorised to spend what it needed on the ships, plus a five percent profit margin.In the case of the Olympic-class ships, a cost of £3 million for the first two ships was agreed plus "extras to contract" and the usual five percent fee.[10]

Monday 12 October 2015

Teacher's day

Teachers' Day!

In many countries, Teachers' Day is a special day for the appreciation of teachers, and may include celebrations to honour them for their special contributions in a particular field area, or the community in general. The date on which Teachers' Day is celebrated varies from country to country. Teachers' days in different countries are distinct from World Teachers' Day, which is celebrated on 5 October.

A QUOTE FOR ALL THE TEACHERS:

A TEACHER
Takes a Hand,
Opens a Mind,and
Touches a Heart

HOW WE CELEBRATED TEACHERS' DAY:

On 5th,Oct,2015 it was teachers' day.We celebrated teachers' day in our school.It was our assembly on which teachers were given a mug on which it was written, "HAPPY TEACHERS' DAY".the teachers were also awarded with certificates.All the students gave teachers' day card to teachers.The school was decorated in such a beautiful way that everyones eyes were opened.The school was decorated with cards,banners and etc.Students also did speeches and read poems.When all the teachers got awards in the end our principle got the mug and certificate.All the students shouted and clapped a loud.In the end they flew banner up in the sky.It was a memorable assembly.

I Found
guidance
friendship
discipline
and 
love
everything in one person,
and that is you,
HAPPY TEACHER'S DAY!