Monday 30 November 2015

E-safety

E-Safety

Top Ten E-Safety Tips:
 1. Always think of your personal safety first when using ICT or your mobile phone. Remember it is easy for      anyone to lie about who they are online, so you can never really be sure about who you are talking to.
 2. Do not give out any personal information about yourself online to people you do not know. This includes        your full name, address, street name, postcode, or school name. Only ever give out your location as              Walsall.
3. Never give your contact number to anyone who you don’t know.
 4. It’s a good idea to use a nickname rather than your real name.
 5. Don’t meet people that you have only spoken to online. If you do decide to meet up with anyone in real        life then make sure you take a trusted adult with you and meet in a public place at a busy time.
 6. Never give out pictures online or over a mobile unless you know the person in real life. It is easy for              people to take your pictures and alter them, send them on, or even pretend to be you with them.
 7. Always use private settings whenever you are setting up a social networking page or an Instant                      Messenger (IM) account. This is so people who you don’t want to see your profile can’t.
 8. Anything you post or upload to the internet is there forever so be very careful what you put online.
9. Never go onto webcam with people you don’t know in real life. Webcam images can be recorded and         copied and also shared with other people.
10. If you receive any messages or pictures that worry or upset you talk to an adult you trust. You may also         report it online.

Monday 16 November 2015

Computer security threats

Computer Security Threats
THREAT #1: VIRUS
  A virus is a piece of software that can infect a computer without the permission or knowledge of the user. A virus can only spread when it is transmitted by a user over a network or the Internet, or through removable media such as CDs or memory sticks.
 Danger level: High
Prevalence: Extremely High
 Worst case damage
Some viruses delete files, reformat the hard disk or cause other damage. Others only replicate themselves and may present text, video, or audio messages.
 Prevention, detection and removal:  
Antivirus software detects and eliminates known viruses.

THREAT #2: SPAM
 SPAM is electronic junk email. The amount of spam has now reached 90 billion messages a day. Email addresses are collected from chat rooms, websites, newsgroups.
Danger level: Low
Prevalence: Extremely High
Worst case damage:
Spam can clog a personal mailbox, overload mail servers and impact network performance. Perhaps the real danger of spam is not so much in being a recipient of it as inadvertently becoming a transmitter of it. Spammers frequently take control of computers and use them to distribute spam. Once a user’s computer is compromised, their personal information may also be illegally acquired.
Prevention, detection and removal:
User systems may use spam filters to screen out email messages with suspect titles or from suspect persons, as well email messages from blocked senders.
THREAT #3: SPOOFING
  Spoofing is an attack in which a person or program masquerades as another. A common tactic is to spoof a URL or website.
Danger level: High
Prevalence: Extremely High
 Worst case damage:
Once personal information is acquired, spoofers may use a person’s details to make transactions or create fake accounts in a victim’s name. They can ruin the victims’ credit rating or even deny the victims access to their own accounts.
 Prevention, detection and removal:
As spoofing rely on tricking users rather than advanced technology, the best way to handle these threats is through vigilance. Don’t open emails from unknown sources or click on links embedded in suspect messages.

 THREAT #4: BLENDED THREAT
 A blended threat is a threat that combines different malicious components, such as a worm, a Trojan horse and a virus. In this way, a blended threat uses multiple techniques to attack  itself.
 Danger level: Extremely high
Prevalence: Medium
 Worst case damage:
See respective entries for worm, Trojan horse and virus.
 Prevention, detection and removal:
See respective entries for worm, Trojan horse and virus.

THREAT #5: WORM
computer worm is a self-replicating, malicious software program. Unlike a virus, it does not need to attach itself to an existing program or require user intervention to spread. It uses a network to send copies of itself to other computers on the network.
 Danger level: Very High
Prevalence: Moderate
 Worst case damage:
Worms can cause two types of damage:
  1. Damage to the network
  2. Payload 
Prevention, detection and removal:
Since worms spread by exploiting vulnerabilities in operating systems, computers should be kept current with the latest security updates from operating system vendors.
To prevent infection, users need to be wary of opening unexpected emails and should not run attached files or programs.

Monday 9 November 2015

Digital Citizen Ship

Digital Citizen Ship

Electronic buying and selling of goods. Technology users need to understand that a large share of market economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller needs to be aware of the issues associated with it.

Nine Elements of Digital CitizenShip:

  1. Digital access: This is perhaps one of the most fundamental blocks to being a digital citizen. However, due to social status, location, and other disabilities.Recently, schools have been becoming more connected with the internet, often offering computers, and other forms of access. This can be offered through kiosks, community centers, and open labs. This most often is associated with the digital divide and factors associated with such.
  2. Digital commerce: This is the ability for users to recognize that much of the economy is regulated online. It also deals with the understanding of the dangers and benefits of online buying, using credit cards online, and so forth. As with the advantages and legal activities- there is also dangerous activities such as illegal downloads, gambling, drug deals, pornography, plagiarism, and so forth.
  3. Digital communication: This element deals with understanding the variety of online communication mediums such as email, instant messaging, Facebook messenger, the variety of apps, and so forth. There is a standard of etiquette associated with each medium.
  4. Digital Literacy: This deals with the understanding of how to use various digital devices. For example, how to properly search for something on a search engine versus a database. How to use various online logs. Oftentimes many educational institutions will help form an individual’s digital literacy.
  5. Digital etiquette: As discussed in the third element, digital communication, this is the expectation that various mediums require a variety of etiquette. Certain mediums demand more appropriate behavior and language than others.
  6. Digital law: This is where enforcement occurs for illegal downloads, plagiarizing, hacking, creating viruses, sending spams, identity theft, cyberbullying, and so forth.
  7. Digital rights and responsibilities: This is the set of rights digital citizens have such as privacy, speech, and so forth.
  8. Digital health: Digital citizens must be aware of the physical stress placed on their bodies by internet usage. They must be aware to not become overly dependent on the internet causing eye strain, headaches, stress problems, and so on.
  9. Digital security: This simply means that citizens must take measures to be safe by practicing using difficult passwords, virus protection, backing up data, and so forth

Monday 2 November 2015

Cyber Safety

Cyber Safety
Cyber safety is safe and responsible use of information and communication technologies (ICT).NetSafe's apporach to cybersafety is founded on:Maintaining a positive apporach about the many benefitsbrought by technologies.Encouraging the public to identify the risks associated with ICT.


Tips for Cyber Safety:

1. Spend time having fun with your parents online and helping them understand technology!
2. Never post your personal information, such as a cell phone number, home number, home address, or your location on any social networking site or through mobile apps like Snapchat or Instagram.
3. Never meet in person with anyone you first “met” on the internet. If someone asks to meet you, tell your parents or guardian right away. Some people may not be who they say they are.
4. Check with your parents before you post pictures of yourself or others online. Do not post inappropriate pictures of anyone.
5. Never respond to mean or rude texts, messages, and e-mails. Delete any unwanted messages. You may need to delete friends who continuously bother you or post things that are not appropriate.
6. NEVER share your password with anyone, including your best friend. The only people who should know your password are your parents or guardian.
7. If you wouldn’t say something to another person’s face, don’t text it or post it online.
8. Do not download or install software or anything on your computer or cell phone before checking with your parents or guardian.
9. Use the privacy settings of social networking sites.
10. If anything makes you feel uncomfortable online, while gaming or when using your cell phone, talk with your parents or guardian right away.

Monday 26 October 2015

Dignity Day

DIGNITY DAY!
Global Dignity is an independent, non-political organization. Their project is the universal right of every human being to lead a dignified life. The organization was established in 2006 by Crown Prince Haakon of Norway, John Hope Bryant and Pekka Himanen.
The organization is working towards dignity for people creating a global conversation about dignity, promoting dignity-based leadership discussing the issue of dignity with young people. An annual Dignity Day on October 20 was arranged for the first time in 2008. School classes are invited to discuss Dignity - what it means to them and their relationship with other people. Per 2011 schools in more than 40 countries had participated in the project.
How did we celebrated Dignity Day?
From many days teachers were saying us to draw some art works on dignity day.We made some posters and drawings on the dignity day and on dignity day it was presentated infront of everyone.It was 3rd of October,2015 when there was a special assembly held.We all were like why they are having assembly.The school was decorated with dignity posters and art works.Then i got to know that our school is gong to celebrate dignity day.First of all some students did speech on dignity day.One by one all the junior staff came on stage and they were rewarded with such a beautiful gift which was a cupcake and certificate.Everyone did soo much hooting.At the end everyone clapped for A'level girls because they were the ones who organized the dignity day and made cupcakes.After the break a competition was held in which we have to write a essay and speech.Two of my class fellows came 3rd in Urdu and English speech.We enjoyed alot. 

Monday 19 October 2015

History of Titanic

History Of Titanic

 Titanic was a British passenger liner that sank in the North Atlantic Ocean in the early morning of 15 April 1912 after colliding with an iceberg during her madian vouage from Southampton, UK, to New York City, US. The sinking resulted in the loss of more than 1,500 passengers and crew, making it one of the deadliest commercial peacetime maritime disasters in modern history. The RMS Titanic, the largest ship afloat at the time it entered service, was the second of three Olymic class ocean liner operated by the White Star Line, and was built by the Harland and Wolff shipyard in Belfast with Thomas Andrews as her naval architect. Andrews was among those lost in the sinking. On her maiden voyage, she carried 2,224 passengers and crew.
RMS Titanic 3.jpg

BACK GROUND

The name Titanic was derived from Greek mythology and meant gigantic. Built in Belfast, Ireland, in the United Kingdom of Great Britain and Ireland (as it then was), the Titanic was the second of the three Olympic-class ocean liners—the first was the RMS Olympic and the third was the HMHS Britannic.They were by far the largest vessels of the British shipping company White Star Line's fleet, which comprised 29 steamers and tenders in 1912.The three ships had their genesis in a discussion in mid-1907 between the White Star Line's chairman, J. Bruce Ismay, and the American financier J. P. Morgan, who controlled the White Star Line's parent corporation, the International Mercantile Marine Co (IMM).
The White Star Line faced a growing challenge from its main rivals Cunard, which had just launched the Lusitania and the Mauretania—the fastest passenger ships then in service—and the German lines Hamburg America and Norddeutscher Lloyd. Ismay preferred to compete on size rather than speed and proposed to commission a new class of liners that would be bigger than anything that had gone before as well as being the last word in comfort and luxury.The company sought an upgrade in their fleet primarily in response to the Cunard giants but also to replace their oldest pair of passenger ships still in service, being the SS Teutonic of 1889 and SS Majestic of 1890. Teutonic was replaced by Olympic while Majesticwas replaced by TitanicMajestic would be brought back into her old spot on White Star's New York service after Titanic's loss.
The ships were constructed by the Belfast shipbuilders Harland and Wolff, who had a long-established relationship with the White Star Line dating back to 1867.Harland and Wolff were given a great deal of latitude in designing ships for the White Star Line; the usual approach was for the latter to sketch out a general concept which the former would take away and turn into a ship design. Cost considerations were relatively low on the agenda and Harland and Wolff was authorised to spend what it needed on the ships, plus a five percent profit margin.In the case of the Olympic-class ships, a cost of £3 million for the first two ships was agreed plus "extras to contract" and the usual five percent fee.[10]

Monday 12 October 2015

Teacher's day

Teachers' Day!

In many countries, Teachers' Day is a special day for the appreciation of teachers, and may include celebrations to honour them for their special contributions in a particular field area, or the community in general. The date on which Teachers' Day is celebrated varies from country to country. Teachers' days in different countries are distinct from World Teachers' Day, which is celebrated on 5 October.

A QUOTE FOR ALL THE TEACHERS:

A TEACHER
Takes a Hand,
Opens a Mind,and
Touches a Heart

HOW WE CELEBRATED TEACHERS' DAY:

On 5th,Oct,2015 it was teachers' day.We celebrated teachers' day in our school.It was our assembly on which teachers were given a mug on which it was written, "HAPPY TEACHERS' DAY".the teachers were also awarded with certificates.All the students gave teachers' day card to teachers.The school was decorated in such a beautiful way that everyones eyes were opened.The school was decorated with cards,banners and etc.Students also did speeches and read poems.When all the teachers got awards in the end our principle got the mug and certificate.All the students shouted and clapped a loud.In the end they flew banner up in the sky.It was a memorable assembly.

I Found
guidance
friendship
discipline
and 
love
everything in one person,
and that is you,
HAPPY TEACHER'S DAY!

Monday 28 September 2015

Eid 2k15

EID-UL-ADHA


Eid al-Adha,also called the Feast of Sacrifice or Bakra Eid. It is the second Eid of two religious holidays celebrated by Muslims worldwide each year. It honors the willingness of Ibrahim to sacrifice his son, as an act of submission to God's command.


Qurbani Cattle in Pakistan.
At Eid al-Adha, we Muslims make a special effort to pray at a mosque.I wore  new clothes, visited my family members and friends and I symbolically sacrificed various kinds of animals  in an act known as qurbani. This represents the animal that Ibrahim sacrificed in the place of his son.
Eid Day1:
I woke up at 8:00.I got ready and went to see the quarbani of the animals.Afterwards my mother cooked goat chops with rice and gravey as guest were going to arrive.I got Eiddi from my fellow guests and realitives.The day was well spent
Eid Day2:
On the second day of the Eid we went to Gujranwala with my cousins.We enjoyed alot there.There we spent our day at my Khala's house.It was a good day indeed.
Eid Day3:
After having breakfast at Khala's house we turned back to our home in Gujranwala.At night we did Barbeque with our family friends.We enjoyed alot and had lots of fun.THEN at night we came back to Lahore

Monday 21 September 2015

Smart phones blessing or curse

The invention of smart phone is astonishing. It has all the features that you have dreamed about. You can call, play games, compute your personal data, and do your office works with this handed device. People are now very fond of this device. Everybody wants to be a proud owner of smart phone. It has so many advantages that people cannot think modern life without it. It has some disadvantages too.

Smart Phone Blessing or Curse 




Blessings:

  • Smart phones have the ability to browse full websites with large amount of data and it will appear the same way as it is in the desktop browser.
  • Smart phone also has a GPS which can be used to locate places that are new to you. When traveling to unknown places it is a good idea to have a GPS to help you find the place you’re looking for.
  • Smart phones have applications that can help you create and edit Microsoft office documents.
  • When it comes to messaging, a smart phone will send messages and also emails. A smart phone can synchronize your personal and most likely your professional email account.      



Curse:

  • Smart phones are not durable especially when not taken good care of. For example it can malfunction easily when they come into contact with water.
  • It is very expensive to buy compared to other phones.
  •  Many of the applications which need to be on the smartphone, need to be mastered to avoid confusion when operating it.
  •  It can only work efficiently where there is accessible internet connection when it comes to browsing . Smart phones cannot be used to store large amount of data due to their storage memory.

Monday 14 September 2015

Advantages and Disadvantages of smartphones


The Internet is so far one of the greatest inventions of all time. The Internet has made it possible for us to do lots of things. People can shop in online stores like eBay, communicate with family and friends via Skype or Facebook, watch the latest videos on YouTube, blog and make money from it, and so much more.

Here are some advantages and disadvantages of Internet!!!

Advantages of Internet:
  • The Internet has made it easy for people to communicate with others because it is cheap and convenient. The only costs incurred are those paid to the Internet service provider.
  • The Internet is swamped with information about anything and everything. There are multiple search engines that have made it easier for Internet users to find information.
  • Thanks to the Internet, sharing information is fast and seamless. If you want to tell your 30 friends about your latest promotion, you can do so in an instant.  
Disadvantages of Internet:
  • Spamming is the sending of unwanted and useless emails to random people. These emails obstruct the recipient needlessly. They are illegal and can cause frustration because they make it hard for people to access their email accounts.
  • Virus,Trojan and Other Malware are malicious programs that plague the Internet time and again. They attack a computer with the sole intent of causing harm. They can make the computer malfunction or even this can be very costly especially if you lose important data.
  • The fact that the Internet has become a market place has also seen a rise in fraud cases. Credit/debit card details are particularly vulnerable. This calls for extreme caution when transacting online. Make sure to use a reliable payment processor instead of sending your details directly to an individual or business.