Curipod placeholder

Com Lit L2

Profile picture of tawun.jg


Updated 3 months ago

1. Word cloud
120 seconds
What is cloud computing in a few words?
2. Slide
60 seconds
Cloud computing is a type of computing that stores data and programs on the internet instead of on a local computer. It allows users to access information quickly and easily from any device with an internet connection. Advantages include lower costs, scalability, and increased security.
Cloud Computing
3. Slide
60 seconds
Cloud Computing: A type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Virtualization: The process of creating a virtual version of something, such as a server, network, or storage device. Software as a Service (SaaS): A type of cloud computing in which applications are hosted in the cloud and accessed by users over the Internet.
4. Slide
60 seconds
Examples of a Software as a Service
Google Workspace apps. Microsoft 365. HubSpot. Trello. Netflix. Zoom. Zendesk.
5. Slide
60 seconds
6. Open question
300 seconds
What are the pros and cons of using cloud computing?
7. Open question
300 seconds
Do you think cloud computing is a useful technology?
8. Open question
300 seconds
What do you think are the most important considerations when using cloud computing?
9. Drawings
450 seconds
Brain break: Draw a smiling cupcake with arms and a bow tie, dancing on a glittery stage
10. Poll
60 seconds
Which company offers the popular cloud computing platform 'Amazon Web Services'?
  • Google
  • Microsoft
  • Amazon
11. Poll
60 seconds
What are some benefits of using cloud computing?
  • Enhanced security, reduced downtime, and better user interface
  • Faster internet speed, improved battery life, and increased storage capacity
  • Scalability, cost-effectiveness, and flexibility
12. Poll
60 seconds
What is SaaS in cloud computing?
  • Software as a Service
  • Security as a Service
  • Storage as a Service
13. Open question
180 seconds
Work together in pairs: What is the most important benefit of using cloud computing?
14. Poll
20 seconds
What is cloud computing?
  • The process of creating virtual clouds in the sky
  • A method of storing and accessing data over the internet
  • A way to predict weather patterns
15. Slide
60 seconds
Cloud Computing
Cloud computing refers to the practice of using a network of remote servers (the “internet”) to store, manage, and process data, rather than a local/personal computer or server. The end user’s computer holds little if any of the software or data locally (“locally” means on the user’s device or computer hard drive
16. Slide
60 seconds
Knowing how to properly and safely use cloud storage and sharing tools should increase your time efficiency (productivity), enhance collaboration, Save money. The advantage of cloud-based technology is that it allows you to have a machine that's quite cheap and doesn't require a large storage capacity.
17. Slide
60 seconds
Cons of Cloud Computing
Security!!! Hacking
18. Slide
60 seconds
What makes a strong password?
Has at least 12 characters Includes numbers, symbols, capital letters, and lower-case letters Isn’t a dictionary word or combination of dictionary words (an easy way to do this is by combining the beginning or ending of words!) Doesn’t rely on obvious substitutions
19. Open question
130 seconds
Create a new strong password that is not one of your current passwords
20. Slide
60 seconds
21. Slide
60 seconds
Video Summary
1: Create strong passwords for online accounts and keep them to yourself. 2: Enable two-step verification for Google services like Gmail. 3:Always update your operating system, browsers, and software as soon as a new version is available
22. Slide
60 seconds
4-Be careful of suspicious websites, offers, or emails, and never enter your password on an unfamiliar site. 5-Regularly check your computer for viruses and malware by installing a trusted and reputable anti-virus program.
23. Slide
60 seconds
Two Step Verification
Two-step verification, also known as two-factor authentication (2FA), is like having an extra lock on your online accounts. Instead of just needing a password to get in, you also need a special code. This code is usually sent to your phone or email. So, even if someone knows your password, they can't get into your account without that special code. It's like having a secret code along with your regular password to make your accounts more secure.
24. Slide
60 seconds
Web 1.0
The user is a consumer who passively views content created by others. Static pages and read only content
25. Slide
60 seconds
Web 2.0
content is now user-created, interactive, and dynamic. Web 2.0 users become creators (producers) of content, include everything from social networking sites (Facebook, etc.), to blogs (Blogger), wikis (Wikipedia), video sharing sites (Youtube), hosted and specific services, web applications (“apps” like Google Docs, etc.), and more.
26. Slide
60 seconds
Library Analogy
Web 1.0 was like reading books in the library, where you could only see the information. Web 2.0 was like joining a club, where you could interact with others and share stuff.
27. Slide
60 seconds
Web 3.0
Now, Web 3.0 is like making the library smarter. It's about connecting everything in a clever way, so the library can understand what you're looking for and even help you create new things. It's like the library knows you really well and can suggest books you might love, or it can help you write your own stories. Web 3.0 is like giving the internet a brain to make it even more useful and personal for you.
28. Slide
60 seconds
The Internet of Things
"The Internet of things ( IoT) is the internetworking of physical devices, vehicles (also referred to as "connected devices" and "smart devices'), buildings and other items—embedded. with electronics software, sensors., and network connectivity. that enable these objects to collect and exchange data."
29. Slide
60 seconds
Internet of Things
Imagine if everyday objects, like your fridge, your car, and even your watch, could talk to each other and share information. That's the Internet of Things, or IoT for short. It's like giving things the ability to chat and work together to make your life easier.
30. Slide
60 seconds
Your fridge could tell your phone when you're running low on milk, so you get a reminder to buy more. Your car might talk to your calendar and suggest the best route to a meeting based on the traffic. Basically, it's like making things smarter by connecting them to the internet, so they can help you in clever ways.
31. Slide
60 seconds
32. Slide
60 seconds
IoT Vulnerability
In October 2016, hackers took control of many people's "Internet of Things" devices and took down major websites. This event was unprecedented for its time, and was the largest DDoS (distributed denial of service) attack in history (as of late 2016).
33. Slide
60 seconds
34. Open question
210 seconds
How would you respond if you received an offensive message?
35. Open question
210 seconds
How would you respond if you witnessed cyberbullying?
36. Slide
60 seconds
Digital Ettiquette
Digital etiquette, also known as "netiquette," is all about using good manners and being respectful when you're online. Just like you have polite behavior in real life, digital etiquette is about being kind, considerate, and responsible when you're interacting with others on the internet. It's like treating people online the way you would want to be treated in person.
37. Slide
60 seconds
Netiquette provides rules for correct and acceptable ways of communicating online. As we share, interact, and collaborate with others on the internet, it’s important to maintain high standards of conduct.
38. Slide
60 seconds
Digital Citizenship
Digital citizenship is the continuously developing norms of appropriate, responsible, and empowered technology use Digital citizenship means being a good and responsible member of the online world. It's about using the internet safely, treating others kindly, and making positive contributions. Just like being a good citizen in your community, digital citizenship is about making the online community a better and safer place for everyone.
39. Open question
180 seconds
Should netiquette be enforced in schools as a part of the curriculum to teach students how to responsibly use digital media?
40. Open question
180 seconds
Is cyberbullying an issue that is often overlooked by society, or is it given the attention it deserves?
41. Open question
210 seconds
Is it fair for colleges or employers to search for your name on Google or Facebook before accepting you as a student or new employee?
42. Slide
60 seconds
43. Open question
210 seconds
Describe digital etiquette in your own words
44. Poll
60 seconds
In which situation would the rules of digital etiquette apply?
  • Picking the ringtone for your new cell phone.
  • Standing in line in a crowded computer store
  • Sending an email to your teacher.
  • Sending a birthday card to your cousin.
45. Slide
60 seconds
Lesson 2.10+2.11
Protect your online reputation and share with care
46. Open question
210 seconds
Why is it important to be careful with what you post on the internet?
47. Slide
60 seconds
48. Slide
60 seconds
49. Slide
60 seconds
The Federal Trade Commission urges you to "share with care"
50. Poll
60 seconds
Privacy settings will keep your online posts totally private, preventing unwanted views by others.
  • True
  • False
51. Slide
60 seconds
Even privacy settings can't always control who can see your posts. Before you post anything online, think about how you would feel if your family and friends saw this post.
52. Poll
60 seconds
After you post something online, even deleting it doesn't keep it from living somewhere else online and showing back up in the future.
  • True
  • False
53. Slide
60 seconds
Once you post online, consider it there forever. Think about this BEFORE you post!
54. Slide
60 seconds
L2.12 Cyberbullying
Besides taking care of your personal online reputation, being a good digital citizen includes watching out for others. Not being a cyberbully is part of it
55. Slide
60 seconds

Suggested content