Updating search results...

Search Resources

91 Results

View
Selected filters:
  • digital-literacy
Information Security (06:01): Introduction
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Simply put, this is one of my most favorite topics when it comes to talking about computers. In this video we layout the order of this lesson, as well as give basic definitions of:
•Machine-Level Security
•Network Security
•Internet Security
•Social Engineering

Subject:
Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
Information Security (06:02): Physical Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access to it. If a bad guy can get their hands on the computer assume they will be able to gain access to all data contained within.

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
Information Security (06:03): Authentication
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are

There are three forms of authentication
•Something you know
•Something you have
•Something about you

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
Information Security (06:04): Protecting Your Data
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.

Data is always priceless

Three topics:
-Data migration
-Data backup
-Data disposal

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Date Added:
10/10/2017
Information Security (06:05): Network Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security.

Links from Video:
-The System Administrator Song http://youtu.be/OpGN3oT1thA

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
Information Security (06:06): Internet Security
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.

Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
Information Security (06:07): Malware
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.

Links from Video:
-AVG by Grisoft: http://free.avg.com/us-en/homepage
-AVAST: http://www.avast.com
-ClamWin: http://www.clamwin.com/
-Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
Information Security (06:08): Social Engineering
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing.

I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy.

Links from Video:
•Internet Storm Center: https://isc.sans.edu/
•SNORT: https://www.snort.org/
•Security Now: http://twit.tv/sn
•Internet Crime Complaint Center: http://www.ic3.gov/default.aspx
•Hak5: http://hak5.org/
•Facecrooks (facebook.com/Facecrooks)

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
The Internet (04:01): Networks 101
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

The first video in the Internet series of videos supporting the Introduction to Computers and BCIS series.

In this video we talk about what is a computer network and how that relates to the Internet. We also talk about some of the basic types of network hardware we need to make a network as well as the difference between a LAN and WAN.

If you have no background in networking this is the video to start with before you go any further into the Internet series.

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
The Internet (04:02): Internet Basics
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

We love our definitions and in this video we define what the Internet is. We take a quick look at how the Internet got its start. Finally we look at how to get on the Internet, how to pick the right ISP and check to see how fast you are surfing.

Links from video:
http://www.speedtest.net/
http://speedtest.comcast.net/

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
The Internet (04:03): Technologies of the Internet
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Get ready to Geek out. In this video we take a look under the hood of the Internet. We see what technologies run the Internet and more importantly how the make our lives easier.

Topics we cover include :
*TCP/IP
*HTTP & HTTPS
*FTP
*SMTP
*POP3
*Telnet

Links from Video:
FileZilla https://filezilla-project.org/
CuteFTP: http://www.cuteftp.com/
SmartFTP; http://www.smartftp.com/
Cyberduck: http://cyberduck.io/?l=en
Mozilla Thunderbird: http://www.mozilla.org/en-US/thunderbird/
Star Wars ASCII: http://youtu.be/Dgwyo6JNTDA

Subject:
Business and Information Technology
Career and Technical Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
The Internet (04:04): The World Wide Web Part 1
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Because the World Wide Web is such an important part of the Internet it gets a two part video. In this part we look at the history of the World Wide Web, as well as what the web is, and Hypertext Transport Protocol (HTTP).

In part we examine:
*Uniform Resource Locator (URL)
*Dynamic Name Server (DNS)
*Hypertext Markup Language (HTML)

Subject:
Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
The Internet (04:04): The World Wide Web Part 2
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

We continue our look at the World Wide Web. in the previous video we looked the history of the web, as well as what Hypertext Transport Protocol (HTTP) was.

In this video we complete our look at the WWW and cover:
*Uniform Resource Locator (URL)
*Dynamic Name Server (DNS)
*Hypertext Markup Language (HTML)

Subject:
Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
The Internet (04:05): Cloud Computing
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

The final video in our series on the Internet. In this one we look at what is cloud computing as well as some example of how cloud computing makes your life so much cooler.

We also present our top website to check out.

Links from the video:
-w3schools http://www.w3schools.com/
-HostGator http://www.hostgator.com/
-Bitly https://bitly.com/
-Google URL Shortener http://goo.gl/
-The IT Crowd - Series 3 - Episode 4: The Internet -http://youtu.be/iDbyYGrswtg
-Paul Soares Jr. https://www.youtube.com/user/paulsoaresjr

Subject:
Education
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
10/10/2017
Movies Made Easy with Technology
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Motivated by the need to integrate curricular needs in K-5 classrooms and as a result of technology budget cuts, Pleasanton Elementary School students use a variety of free software applications to produce digital media projects that address reading, writing, collaboration and technology skills. In this way, learning becomes more meaningful and relevant for students.Using free programs and Apple software included on their computers, students choose to produce a life story, poem, tutorial or personal narrative in iMovie. In this video, students collaborate with one another and explain how they have created their movies. Final projects are then uploaded into students' digital portfolios.

Subject:
Education
Material Type:
Lesson Plan
Teaching/Learning Strategy
Provider:
Teaching Channel
Provider Set:
Teaching Channel
Date Added:
10/10/2017
Real-World Lesson: Designing a Video Game
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Using continual feedback and a problem solving process, high school computer programming students design educational video games for a class of fifth grade students. Their programming teacher, Ben Chun, leads students through a process that begins with interviewing the students and involves constant feedback and revision to ultimately create a video game that is both fun and educational. Striving to model a real world situation as closely as possible, Mr. Chun requires students to interview both students and the teacher regarding learning objectives and standards, interests and video games they are already playing to create a design that is personalized and appropriate for students. As they go through the week long process, students work in teams of three to brainstorm ideas and assign roles involving programming, art and project management. All students are involved in the actual design process and end up producing games that are both responsive to students needs and engaging. At one point during the design process, the fifth grade class visited the school to provide feedback for prototypes so that final refinement and improvements could be made.

Subject:
Education
Material Type:
Lesson Plan
Teaching/Learning Strategy
Provider:
Teaching Channel
Provider Set:
Teaching Channel
Date Added:
10/10/2017
Record the World in Video Production Classes
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Through Jim Sill's three TV and video classes, high school students learn a variety of video production skills. In the Introduction to Video Production class, students work on cross-curricular projects. They learn how to use equipment, write and edit scripts, and collaborate to produce videos. In the TV broadcasting class, students produce a news show that is watched across the school. In the Advanced Video Production class, students work with companies and non-profits in the community to produce videos. Through all of Jim's classes, students learn real-world skills as they collaborate to create innovative videos.

Subject:
Business and Information Technology
Career and Technical Education
Fine Arts
Material Type:
Lesson Plan
Teaching/Learning Strategy
Provider:
Teaching Channel
Provider Set:
Teaching Channel
Date Added:
10/10/2017
Roller Coaster Physics: STEM in Action
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Fifth graders in Donna Migdol's class work collaboratively to create a roller coaster with the longest ride so that a marble can get to end of the roller coaster without falling off. The class begins by "chiming," talking about their design ideas and building off of each other's thoughts. After discussing their plans, students construct individual sketches of their roller coasters. The groups then come together to discuss their ideas, construct group sketches, and make computer simulations of their roller coasters. After coming up with solid plans for their roller coasters, the groups construct their roller coasters using a variety of materials, testing and redesigning as necessary.

Subject:
Career and Technical Education
Technology and Engineering
Material Type:
Lesson Plan
Teaching/Learning Strategy
Provider:
Teaching Channel
Provider Set:
Teaching Channel
Date Added:
10/10/2017