Dear friends,
Some lesson notes are ready in PowerPoint format on https://www.teacherspayteachers.com/Store/Educators-Center website.
They are especially suitable for Grades 4 through High School levels.
Dear friends,
Some lesson notes are ready in PowerPoint format on https://www.teacherspayteachers.com/Store/Educators-Center website.
They are especially suitable for Grades 4 through High School levels.
NECO Booklet - JS3 Third Term
NECO Booklet - JS3 Second Term
NECO Booklet - JS3 First Term
NECO Booklet - JS2 Third Term
NECO Booklet - JS2 Second Term
NECO Booklet - JS2 First Term
NECO Booklet - JS1 Third Term
NECO Booklet - JS1 Second Term
NECO Booklet - JS1 First Term
Dear Friends,
This lesson is all about "The Digital Divide".
👉👉👉 ICT Online Lesson - The Digital Divide 👈👈👈
LEARNING OBJECTIVES
By the end of the lesson, students should be able to:👇👇👇
Data Security Summary
Data is very important.
Data security is an indispensable reality for us either private or company/organization.
Technical and administrative measures;
a) To prevent the unlawful access to personal data,
b) To prevent the unlawful processing of personal data,
c) To ensure the protection of personal data
Dear Friends,
This lesson is all about "Internet".
👉👉👉 ICT Online Lesson - Internet 👈👈👈
LEARNING OBJECTIVES
By the end of the lesson, students should be able to:👇👇👇
Backing Up Personal Data
In cases where personal data is damaged, destroyed, stolen, or lost for any reason, data controllers must take action as soon as possible by using the backed-up data.
👇👇👇
Information Technology Systems Procurement, Development, and Maintenance
The needs for the procurement, development, or improvement of existing systems should be determined by the data controller and security requirements should be considered.
👇👇👇
Dear friends,
This video is all about "Storage Devices and Media" in chapter 3 for the IGCSE class.
I hope you will be improved your knowledge.
You can watch from youtube with this link below.
👉👉👉>> IGCSE ICT Storage Devices & Media <<👈👈👈
Storage of Personal Data in the Cloud
The storage of personal data in the cloud causes the data controller, who is obliged to protect it according to the law, prevent unlawful processing and access, and leave his own information technology system network. At the same time, this situation brings some risks, as it causes personal data to be processed by cloud storage service providers.
👇👇👇
19th week-Safety and Security-1
Providing security of places that containing personal data
If personal data is stored on paper media or on devices located in the territory of the data controllers, physical security measures must be taken against threats such as theft or loss of these devices and papers. Likewise, it is important to protect the physical environments containing personal data against external risks (fire, flood, etc.) with appropriate methods and to control the entry/exit to these environments.
👇👇👇Click Read more
18th week-The systems life cycle-2
Monitoring Personal Data Security
The systems of data controllers are mostly exposed to both internal and external attacks, cybercrime or malicious software, and despite various symptoms, this situation cannot be noticed for a long time and it may be late for intervention.
👇👇👇 Click
TECHNICAL MEASURES RELATED TO PERSONAL DATA SECURITY
Ensuring Cyber Security
The view that complete security can be achieved with the use of a single cyber security product to ensure personal data security is not always true. Because threats are expanding their spheres of influence by changing their size and nature day by day.
👇👇👇Click Read more
Python can operate with numbers using the usual mathematical operators, and some special operators, too.
👇👇👇Click Read more
HARDWARE–THE SYSTEM UNITS 1
Management of Relations with Data Processors
Some data controllers receive services from data processors to meet their information technology needs. Data controllers should make sure that the data processors provide at least as much security as their own personal data while receiving services. Because data processors are also responsible for ensuring the security of personal data, together with the data controller.
👇👇👇Click Read more
INTRODUCTION TO COMPUTERS 2
CLEAN OUT THE DUST
10 Steps to Cyber Security
👇👇👇Click Read more
INTRODUCTION TO COMPUTERS 1
DETAILS
What is a Computer?
HOW COMPUTERS WORK
TYPES OF COMPUTERS
THE HISTORY OF COMPUTERS
Reducing personal data as much as possible
Personal data should be correct and up to date when necessary, must be kept as required for the purpose they are processed.
However, in particular the data responsible for a long time, the data responsible for collecting a large amount of personal data, a part of these personal data is not correctly accurate with time and it can become data that has not served any purpose.
👇👇👇Click Read more
Determination of Data Security Policies and Procedures
The preparation of a good policy regarding personal data security will ensure that the risks in this context can be determined in advance and that measures will be taken consistently.
Correct and consistent policies and procedures to be determined regarding personal data security should be integrated into the work and operation of the data controller. When the policies and procedures cannot be prepared in a good and timely manner by the data controllers, when the problematic areas cannot be determined or when the existing security measures cannot be used, the personal data security level cannot be adequately provided.
👇👇👇Click Read more
Training of Employees or Data Owners
It is very important that employees or data owners know something about cybersecurity and responds to the attack.
Employees and data owners are required to receive training on "issues such as data not being disclosed or shared unlawfully".
👇👇👇Click Read more
Determination of existing risks and threats
In order to ensure the security of personal data, it is first necessary to determine what all personal data is processed by the data controller. The possibility of realization of the risks that may arise regarding the protection of this data and the losses to be caused in case of realization should be determined accurately and appropriate measures should be taken.
While determining these risks;
👇👇👇
Introduction to Data Security
Dear friends,
According to researches, professional courses, and experiences of real life, we learned how data is very important.
Sometimes the deletion, loss, or corruption of some information makes us very uncomfortable. And if you think that this information is used by unwanted people, this can turn into a bigger problem.
Data security is an indispensable reality for us either private or company/organization. For this reason, therefore it means the more careful we are, the safer we are.
Let's start with some information.
👇👇👇
How to make a simple 3D animation on Windows 10?
We are using many applications online such as Microsoft Edge for internet searching, Outlook for electronic mails (e-mails), etc.
How many Microsoft products do you know we use daily or periodically?
You can see the Microsoft products below.
Source: Microsoft Products
👇👇👇👇👇👇👇 Click Read more
CLASSIFICATION OF COMPUTERS
We are using many applications online such as Google Chrome for internet searching, Gmail for electronic mails (e-mails) etc.
How many of the Google products do you know which we use daily or periodically?
You can see the Google products below.
Source: Google Products
👇👇👇👇👇👇👇
Python is a Calculator
I can hear you say, "All programming languages can calculate". But python does it in easy syntax.
5 plus 7 is 12, 13 times 15 is 195, 1 divided by 5 is 0.2. Easy. Repeating or periodic numbers are printed in a longer format. Let's try minus 2 divided by 3. In math theory, when 2 is divided by 3, the digit 3 repeats forever after the decimal point.
👇👇👇Click Read more
Dear friends,
This post includes quiz about computer science. If you like to learn and have fun, just click the quiz link below.
👉👉👉👉👉 quiz 👈👈👈👈👈
Dear friends,
This post includes quiz about inventions. If you like to learn and have fun, just click the quiz link below.
👉👉👉👉👉 quiz 👈👈👈👈👈
17th week-The systems life cycle-1
👇👇👇Click Read more
Hello World!
If you downloaded and installed Python software on your computer, it means you are ready to learn.
Lets start to type codes and small programs.
First one is Hello world!
To display any text as message or information on the screen, you can just type the print function with the following signs and texts as below.
print("Hello world!")
Then under this code, you will see the text as below.
Hello world!
What is programming?
At a basic level, a computer program is a recipe of instructions that tells your computer what to do.
When you write a program, you create a step by step recipe of what needs to be done to complete a task and when your computer executes the program it reads what you wrote and follows your instructions to the letter.
The recipe is written in a code called programming language. Programming languages are actually similar to human spoken languages since they have a syntax and semantics.
Why Python?
There are a few reasons. First of all, programming in Python usually feels similar to using a human language. This is because Python makes it easy to express what we want to do with syntax that's easy to read and write.
Secondly, Python makes it easy to express the fundamental concepts of programming like data structures and algorithms with easy to read syntax. This makes Python a great language to use to learn programming.
The other reason is to pick that Python is super popular in the IT industry, making it one of the most common programming languages used today.
You can use Python to calculate statistics, run your e-commerce site, process images, interact with web services, and do a whole host of other tasks.
Python is perfect for automation. It lets you automate everyday tasks by writing simple scripts that are easy to understand and easy to maintain. That's why Python is the language of choice for lots of people working in IT support, system administration, and web development.
History of Python
Its first version was released by Guido van Rossum back in 1991. Since then, the community that develops it has grown and the language has advanced a lot. Whenever there's a significant change to the semantics or syntax of the language, a new major version is released. In 2000, Python 2 was released. In 2008, we got Python 3. Python 3.7 came out in 2018.
Which Operating Systems?
Python is available for download on a wide variety of operating systems, like Windows, Linux, and Mac OS.
Source: Crash Course on Python in Google IT Automation with Python Professional Certificate
Installation of Python
We are suggesting to download Python from their original website.
https://www.python.org/downloads/
Yeay, this Kahoot Game is a challenge about third part of TYPES AND COMPONENTS OF COMPUTER SYSTEMS of IGCSE ICT lesson.
I hope you will be learned with playing on quiz game.
Click the game link, enter your Nickname, click OK, go button. That's it. Start the quiz
Hi, this Kahoot Game is also about second part of TYPES AND COMPONENTS OF COMPUTER SYSTEMS of IGCSE ICT lesson.
Just click 👉👉👉👉👉 here 👈👈👈👈👈
I hope you will be learned with playing on quiz game.
Click the game link, enter your Nickname, click OK, go button. That's it. Start the quiz.
Dear friends, this Kahoot Game is all about TYPES AND COMPONENTS OF COMPUTER SYSTEMS of IGCSE ICT lesson.
Just click 👉👉👉👉👉 here 👈👈👈👈👈
I hope you will be learned with playing on quiz game.
Click the game link, enter your Nickname, click OK, go button. That's it. Start the quiz.
16th week-ICT applications 6.10-6.13-6.14-6.15-6.16
15th week-ICT Applications 6.9, 6.11, 6.12
Dear friends,
This video is all about "IGCSE ICT Types and components of computer systems (Revision)" for the IGCSE class.
I hope you will be improved your knowledge.
You can watch from YouTube with this link below.
👉👉👉 IGCSE ICT Types and components of computer systems (Revision) 👈👈👈
14th week-ICT Applications 6.5,6.6,6.7,6.8
Let's install the "Git" software on Ubuntu OS.
After running the terminal, just type in it apt-get install git
Apt is the command we use in Ubuntu's package manager and the install option will let us install something. We're getting an error that says permission denied.
We should use to install the other command.
sudo apt install git
Sudo which stands for super user do. We're authorized to install software.
"Firmware" is software that's permanently stored on a computer component. Did you think of the BIOS? Yeah.
The "BIOS" helps startup the hardware on your computer and also helps load up your operating system.
Dear friends,
This lesson is all about the Computer Career Opportunities.
Dear friends,
We are starting to share online lesson records. You can find under "ICT - Online Lessons".
This lesson is all about Computer Viruses.
Dear visitors,
We have done our first free webinar about the first part of the CISCO Networking Essentials on Saturday, 20th of March, 2021. That was like a summarize of Chapter1.
You can watch from youtube with this link below.
👉👉👉>> CISCO Networking Essentials <<👈👈👈
We are thinking to do new free webinars about different topics. Please don't hesitate to ask and request from us. In the next few days, we will display a new google form to select the topic for the new webinar.
I hope you like it. Please don't forget to subscribe with your email account from the right side of the website. (Just "Submit" your email address)
13th week-Communication applications-3