Our first lesson in our FREE Introduction to Computers/ Business Computers Information …
Our first lesson in our FREE Introduction to Computers/ Business Computers Information Systems (BCIS) course.
This video will introduce new students to this series and what they can expect. Our first lesson in our FREE Introduction to Computers/ Business Computers Information Systems (BCIS) course.
This video will introduce new students to this series and what they can expect. Our first lesson in our FREE Introduction to Computers/ Business Computers Information Systems (BCIS) course.
This video will introduce new students to this series and what they can expect.
Our second video in the free Introduction to Computer series. This video …
Our second video in the free Introduction to Computer series. This video defines and examines what digital literacy means. We also look at why it is important.
Our third video defines the term digital. We also explain what binary …
Our third video defines the term digital. We also explain what binary is and show the viewer how to count in binary and do conversions from our every day base 10 numbering system to binary.
The fourth and final video in our Lesson 1 Digital World series …
The fourth and final video in our Lesson 1 Digital World series looks at what exactly is a computer. We take a quick look at the history of the PC, the general components of a computer and answer the question "what kind of computer should I buy."
Our next lesson series, will focus on computer hardware.
Links from video: http://lifehacker.com/ http://www.thinkgeek.com/ http://www.techguylabs.com/ http://www.digitalliteracy.gov/
This is the software and IT systems that support transactions over networks. …
This is the software and IT systems that support transactions over networks. We look at: E-Commerce Hosts, Digital Money and Online Advertising.
This is out last video in the Introduction to Computers, BCIS, BIM series. We thank you for watching and look forward to seeing you in our next course.
Links from Video: •What is Bitcoin? http://youtu.be/Gc2en3nHxA4 •Please Subscribe http://www.pleasesubscribefilm.com/ •http://www.storenvy.com/ •http://www.cafepress.com/
Simply put, this is one of my most favorite topics when it …
Simply put, this is one of my most favorite topics when it comes to talking about computers. In this video we layout the order of this lesson, as well as give basic definitions of: •Machine-Level Security •Network Security •Internet Security •Social Engineering
The act of physically protecting the computers. The first rule of any …
The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access to it. If a bad guy can get their hands on the computer assume they will be able to gain access to all data contained within.
Our third video in our Information Security series (part of the Introduction …
Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are
There are three forms of authentication •Something you know •Something you have •Something about you
This video focuses on date protection. We look at how to migrate …
This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.
Data is always priceless
Three topics: -Data migration -Data backup -Data disposal
Steps taken to protect computer networks. We cover permissions, user policies (especially …
Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security.
Links from Video: -The System Administrator Song http://youtu.be/OpGN3oT1thA
Our 6 video in the Information Security series (part of Introduction to …
Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.
Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.
Video 7 of our information security series (part of Introduction to Computers) …
Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.
Links from Video: -AVG by Grisoft: http://free.avg.com/us-en/homepage -AVAST: http://www.avast.com -ClamWin: http://www.clamwin.com/ -Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download
Our last video in the Information Security lesson covers my favorite topic, …
Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing.
I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy.
The first video in the Internet series of videos supporting the Introduction …
The first video in the Internet series of videos supporting the Introduction to Computers and BCIS series.
In this video we talk about what is a computer network and how that relates to the Internet. We also talk about some of the basic types of network hardware we need to make a network as well as the difference between a LAN and WAN.
If you have no background in networking this is the video to start with before you go any further into the Internet series.
We love our definitions and in this video we define what the …
We love our definitions and in this video we define what the Internet is. We take a quick look at how the Internet got its start. Finally we look at how to get on the Internet, how to pick the right ISP and check to see how fast you are surfing.
Links from video: http://www.speedtest.net/ http://speedtest.comcast.net/
Get ready to Geek out. In this video we take a look …
Get ready to Geek out. In this video we take a look under the hood of the Internet. We see what technologies run the Internet and more importantly how the make our lives easier.
Topics we cover include : *TCP/IP *HTTP & HTTPS *FTP *SMTP *POP3 *Telnet
Links from Video: FileZilla https://filezilla-project.org/ CuteFTP: http://www.cuteftp.com/ SmartFTP; http://www.smartftp.com/ Cyberduck: http://cyberduck.io/?l=en Mozilla Thunderbird: http://www.mozilla.org/en-US/thunderbird/ Star Wars ASCII: http://youtu.be/Dgwyo6JNTDA
Because the World Wide Web is such an important part of the …
Because the World Wide Web is such an important part of the Internet it gets a two part video. In this part we look at the history of the World Wide Web, as well as what the web is, and Hypertext Transport Protocol (HTTP).
In part we examine: *Uniform Resource Locator (URL) *Dynamic Name Server (DNS) *Hypertext Markup Language (HTML)
We continue our look at the World Wide Web. in the previous …
We continue our look at the World Wide Web. in the previous video we looked the history of the web, as well as what Hypertext Transport Protocol (HTTP) was.
In this video we complete our look at the WWW and cover: *Uniform Resource Locator (URL) *Dynamic Name Server (DNS) *Hypertext Markup Language (HTML)
The final video in our series on the Internet. In this one …
The final video in our series on the Internet. In this one we look at what is cloud computing as well as some example of how cloud computing makes your life so much cooler.
We also present our top website to check out.
Links from the video: -w3schools http://www.w3schools.com/ -HostGator http://www.hostgator.com/ -Bitly https://bitly.com/ -Google URL Shortener http://goo.gl/ -The IT Crowd - Series 3 - Episode 4: The Internet -http://youtu.be/iDbyYGrswtg -Paul Soares Jr. https://www.youtube.com/user/paulsoaresjr
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.