Educator Technology Application Standards by TEA - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Educator Technology Application Standards by TEA

Description:

PowerPoint Presentation – PowerPoint PPT presentation

Number of Views:240
Avg rating:3.0/5.0
Slides: 17
Provided by: Darle82
Category:

less

Transcript and Presenter's Notes

Title: Educator Technology Application Standards by TEA


1
(No Transcript)
2
Educator Technology Application Standards by TEA
  • Target II Weaving the Web
  • Activity
  • Review Educator Technology Application
    Standards handout.

1
3
Internet Explorer
  • Address bar
  • The address bar is where the URL (Uniform
    Resource Locator) is displayed. You can click on
    the address bar and type the URL to a site that
    you would like to go to. Additionally, you can
    click the down arrow on the right side of the
    address bar and click on one of the sites you
    previously typed and it will quickly take you to
    the site.

2
4
Internet Explorer
  • Standard Buttons Toolbar

Home Returns you to the page designated
as your homepage.
Refresh Refreshes the page needed if page
does not load correctly.
Opens list of saved web pages
3
5
Search Techniques
Boolean Searching
  • Boolean logic consist of three logical
    operators OR AND
    NOT
  • Examples
  • college OR university In this search, we will
    retrieve records in which AT LEAST one of the
    search terms is present.
  • poverty AND crime In this search, we retrieve
    records in which BOTH of the search terms are
    present.
  • cats NOT dogs In this search, we retrieve
    records in which ONLY ONE of the terms (cats) is
    present.


4
6
Search Techniques
  • When searching for several names linked together,
    use a comma to separate them. Ex William
    Clinton, President


5
7
Search Techniques
  • Use quotation marks when doing a phrase search.
    This tells the engine that the words should stay
    together.
  • Ex acceptable use policy


6
8
Search Techniques
  • Use hyphens when searching for words that must
    appear within one word of each other. Ex
    cable-networks


7
9
Search Techniques
  • Use brackets to find words that appear within 100
    words of each other.
  • Ex bus safety

8
10
Search Techniques
  • Use a plus sign () to find two or more words
    that must be in the document together.
  • Ex Bus Schedule Septa


9
11
Search Techniques
  • Trainer Minimize PPT, switch to Internet view
    at this time


10
12
Security Websites
  • Hoaxes
  • Usually an email that gets mailed in chain
    letter fashion describing some devastating,
    highly unlikely type of virus. Hoaxes are
    detectable as having no file attachment, no
    reference to a third party who can validate the
    claim, and by the general tone of the message.


11
13
Security Websites
  • Spyware
  • 1. Gathers information about a user (navigating
    the web)
  • 2. Tracks surfing habits to build marketing
    profiles
  • 3. Tracking information is often included in
    "free downloads" from the Web license agreement,
    internet habits will be transmitted (users
    rarely read agreements)
  • 4. Spyware has caused public concern about
    privacy on the Internet


12
14
Security Websites
  • adware
  • 1. Many advertising banners displayed on the
    internet include code that delivers the ads (pop
    ups/ bar that appears)
  • 2. Justification recover programming development
    cost user cost
  • 3. Criticism tracking of a user's personal
    information selling to 3rd parties usually
    without the user's authorization or knowledge
  • 4. adware has prompted an outcry from computer
    security, privacy advocates Electronic Privacy
    Information Center


13
15
Security Websites
  • Trojan Horse
  • A type of computer virus disguised as a
    program. The scenario usually happens like this
    a user may download a program from the Net
    because they think it may be of some use but
    once the program is opened (or run), it releases
    a virus that erases their hard drive or wreaks
    havoc on their system. A popular Trojan horse
    virus came in the form of an e-mail attachment of
    a file called "AOL4FREE.COM," and the "I Love
    You" virus is another example.


14
16
Working with Websites
  • Part V - Assignment


Trainer Exit PowerPoint presentation
15
Write a Comment
User Comments (0)
About PowerShow.com