What is cloud computing in a few words?
Cloud computing is a type of computing that stores data and programs on the internet instead of on a local computer. It allows users to access information quickly and easily from any device with an internet connection. Advantages include lower costs, scalability, and increased security.
Cloud Computing
Cloud Computing: A type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Virtualization: The process of creating a virtual version of something, such as a server, network, or storage device. Software as a Service (SaaS): A type of cloud computing in which applications are hosted in the cloud and accessed by users over the Internet.
Concepts:
Examples of a Software as a Service
Google Workspace apps. Microsoft 365. HubSpot. Trello. Netflix. Zoom. Zendesk.
What are the pros and cons of using cloud computing?
Do you think cloud computing is a useful technology?
What do you think are the most important considerations when using cloud computing?
Brain break: Draw a smiling cupcake with arms and a bow tie, dancing on a glittery stage
Which company offers the popular cloud computing platform 'Amazon Web Services'?
What are some benefits of using cloud computing?
- Enhanced security, reduced downtime, and better user interface
- Faster internet speed, improved battery life, and increased storage capacity
- Scalability, cost-effectiveness, and flexibility
What is SaaS in cloud computing?
- Software as a Service
- Security as a Service
- Storage as a Service
Work together in pairs: What is the most important benefit of using cloud computing?
What is cloud computing?
- The process of creating virtual clouds in the sky
- A method of storing and accessing data over the internet
- A way to predict weather patterns
Cloud Computing
Cloud computing refers to the practice of using a network of remote servers (the “internet”) to store, manage, and process data, rather than a local/personal computer or server. The end user’s computer holds little if any of the software or data locally (“locally” means on the user’s device or computer hard drive
Benefits
Knowing how to properly and safely use cloud storage and sharing tools should increase your time efficiency (productivity), enhance collaboration, Save money. The advantage of cloud-based technology is that it allows you to have a machine that's quite cheap and doesn't require a large storage capacity.
Cons of Cloud Computing
Security!!! Hacking
What makes a strong password?
Has at least 12 characters Includes numbers, symbols, capital letters, and lower-case letters Isn’t a dictionary word or combination of dictionary words (an easy way to do this is by combining the beginning or ending of words!) Doesn’t rely on obvious substitutions
Create a new strong password that is not one of your current passwords
Video Summary
1: Create strong passwords for online accounts and keep them to yourself. 2: Enable two-step verification for Google services like Gmail. 3:Always update your operating system, browsers, and software as soon as a new version is available
4-Be careful of suspicious websites, offers, or emails, and never enter your password on an unfamiliar site. 5-Regularly check your computer for viruses and malware by installing a trusted and reputable anti-virus program.
Two Step Verification
Two-step verification, also known as two-factor authentication (2FA), is like having an extra lock on your online accounts. Instead of just needing a password to get in, you also need a special code. This code is usually sent to your phone or email. So, even if someone knows your password, they can't get into your account without that special code. It's like having a secret code along with your regular password to make your accounts more secure.
Web 1.0
The user is a consumer who passively views content created by others. Static pages and read only content
Web 2.0
content is now user-created, interactive, and dynamic. Web 2.0 users become creators (producers) of content, include everything from social networking sites (Facebook, etc.), to blogs (Blogger), wikis (Wikipedia), video sharing sites (Youtube), hosted and specific services, web applications (“apps” like Google Docs, etc.), and more.
Library Analogy
Web 1.0 was like reading books in the library, where you could only see the information. Web 2.0 was like joining a club, where you could interact with others and share stuff.
Web 3.0
Now, Web 3.0 is like making the library smarter. It's about connecting everything in a clever way, so the library can understand what you're looking for and even help you create new things. It's like the library knows you really well and can suggest books you might love, or it can help you write your own stories. Web 3.0 is like giving the internet a brain to make it even more useful and personal for you.
The Internet of Things
"The Internet of things ( IoT) is the internetworking of physical devices, vehicles (also referred to as "connected devices" and "smart devices'), buildings and other items—embedded. with electronics software, sensors., and network connectivity. that enable these objects to collect and exchange data."
Internet of Things
Imagine if everyday objects, like your fridge, your car, and even your watch, could talk to each other and share information. That's the Internet of Things, or IoT for short. It's like giving things the ability to chat and work together to make your life easier.
Examples
Your fridge could tell your phone when you're running low on milk, so you get a reminder to buy more. Your car might talk to your calendar and suggest the best route to a meeting based on the traffic. Basically, it's like making things smarter by connecting them to the internet, so they can help you in clever ways.
IoT Vulnerability
In October 2016, hackers took control of many people's "Internet of Things" devices and took down major websites. This event was unprecedented for its time, and was the largest DDoS (distributed denial of service) attack in history (as of late 2016).
How would you respond if you received an offensive message?
How would you respond if you witnessed cyberbullying?
Digital Ettiquette
Digital etiquette, also known as "netiquette," is all about using good manners and being respectful when you're online. Just like you have polite behavior in real life, digital etiquette is about being kind, considerate, and responsible when you're interacting with others on the internet. It's like treating people online the way you would want to be treated in person.
Netiquette
Netiquette provides rules for correct and acceptable ways of communicating online. As we share, interact, and collaborate with others on the internet, it’s important to maintain high standards of conduct.
Digital Citizenship
Digital citizenship is the continuously developing norms of appropriate, responsible, and empowered technology use Digital citizenship means being a good and responsible member of the online world. It's about using the internet safely, treating others kindly, and making positive contributions. Just like being a good citizen in your community, digital citizenship is about making the online community a better and safer place for everyone.
Should netiquette be enforced in schools as a part of the curriculum to teach students how to responsibly use digital media?
Is cyberbullying an issue that is often overlooked by society, or is it given the attention it deserves?
Is it fair for colleges or employers to search for your name on Google or Facebook before accepting you as a student or new employee?
Describe digital etiquette in your own words
In which situation would the rules of digital etiquette apply?
- Picking the ringtone for your new cell phone.
- Standing in line in a crowded computer store
- Sending an email to your teacher.
- Sending a birthday card to your cousin.
Lesson 2.10+2.11
Protect your online reputation and share with care
Why is it important to be careful with what you post on the internet?
The Federal Trade Commission urges you to "share with care"
Privacy settings will keep your online posts totally private, preventing unwanted views by others.
False
Even privacy settings can't always control who can see your posts. Before you post anything online, think about how you would feel if your family and friends saw this post.
After you post something online, even deleting it doesn't keep it from living somewhere else online and showing back up in the future.
True!
Once you post online, consider it there forever. Think about this BEFORE you post!
L2.12 Cyberbullying
Besides taking care of your personal online reputation, being a good digital citizen includes watching out for others. Not being a cyberbully is part of it