Tuesday 1 December 2015

e safety

                                                                     E SAFETY

 
Internet safety, or online safety, is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.
As the number of internet users continues to grow worldwide, internet safety is a growing concern for both children and adults. Common concerns regarding safety on the internet include: malicious users (spam, phishing, cyber bullying, cyber stalking etc.), websites and software (malware, computer viruses, etc.) and various types of obscene or offensive content. Several crimes can be committed on the Internet such as stalking, identity theft and more.
Most social networking and chat sites have a page about safety. Numerous groups, governments and organizations have expressed concerns about the safety of children using the Internet. Safer Internet Day is celebrated worldwide in February to raise awareness about internet safety.

                                                           E SAFETY TIPS


1)      Don’t post any personal information online – like your address, email address or mobile number.
2)      Think carefully before posting pictures or videos of yourself.  Once you’ve put  a picture of yourself online most people can see it and may be able to download it, it’s not just yours anymore.
3)      Keep your privacy settings as high as possible
Image result for keep calm e safety pics4)      Never give out your passwords
5)      Don’t befriend of people you don’t know
6)      Don’t meet up with people you’ve met online.  Speak to your parent or carer about people suggesting you do
7)      Remember that not everyone online is who they say they are
8)      Think carefully about what you say before you post something online
9)      Respect other people’s views, even if you don’t agree with someone else views doesn’t mean you need to be rude
10)   If you see something online that makes you feel uncomfortable, unsafe or worried: leave the website, turn off your computer if you want to and tell a trusted adult immediately.

Image result for e safety pics

Tuesday 24 November 2015

                                                               COMPUTER SECURITY
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
                                                         
                                           COMPUTER SECURITY THREAT

 Computer security threats are relentlessly inventive. Masters of disguise and manipulation, these threats constantly evolve to find new ways to annoy, steal and harm. Arm yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online.
There are 11 security threats including the following:
  • Install Anti-Virus Software.
    Ensure that reputable anti-virus software is installed on all computers. This should include all servers, PCs and laptops. If employees use computers at home for business use or to remotely access the network, these PCs should also have anti-virus software installed.
  • Ensure that the anti-virus software is up to date.
    Everyday new computer viruses are being released and it is essential that businesses are protected from these viruses by keeping the anti-virus software up to date. If possible, companies should look at policies whereby computers that do not have the most up to date anti-virus software installed are not allowed to connect to the network.
  • Employ a firewall to protect networks.
    As computer viruses can spread by means other than email, it is important that unwanted traffic is blocked from entering the network by using a firewall. For users that use computers for business away from the protection of the company’s network, such as home PCs or laptops, a personal firewall should be installed to ensure the computer is protected.
  • Filter all email traffic.
    All incoming and outgoing email should be filtered for computer viruses. This filter should ideally be at the perimeter of the network to prevent computer viruses. Emails with certain file attachments commonly used by computer viruses to spread themselves, such as .EXE, .COM and .SCR files, should also be prevented from entering the network.
  • Educate all users to be careful of suspicious e-mails.
    Ensure that all users know to never open an attachment or to click on a link in an email they are not expecting. Even when the email is from a known source, caution should be exercised when opening attachments or clicking on links in emails. Criminals use the trust placed in an email contact you know to trick you into clicking on a link or attachment.
  • Scan Internet Downloads.
    Ensure that all files downloaded from the Internet are scanned for computer viruses before being used. Ideally this scanning should be done from one central point on the network to ensure that all files are properly scanned.
  • Don’t run programs of unknown origin.
    It is important that you use a trusted source for your software requirements. This is to ensure that all software installed can be accounted for and that its sources can be confirmed to be legitimate. Apart from ensuring that the correct licensing agreements are in place, using a trusted supplier can help reduce the risk of software infected with a virus compromising your business. All users should be educated to never run a computer program unless the source is known or has originated from a person or company that is trusted.
  • Implement a vulnerability management program.
    Most computer viruses and worms try to exploit bugs and vulnerabilities within the operating system and applications that companies use. New vulnerabilities are introduced into networks every day, be that from installing new software and services, making changes to existing systems or simply from previously undiscovered vulnerabilities coming to light. It is important to regularly review your network and the applications running on it for new vulnerabilities. Any discovered vulnerabilities should be rated and prioritised regarding their criticality and the potential business impact they could have. Once this has been done, a plan on how to manage those vulnerabilities, either by patching, upgrading, or managing the vulnerability using tools such as firewalls or Intrusion Detection Systems should be put into place.
  • Make regular backups of critical data.
    It is important to ensure that regular copies of important files are kept either on removable media such as portable drives or tape to ensure you have a trusted source for data in the event that the network is infected with a computer virus. Not only will this ensure that important data is available in the event of a computer virus infecting the company’s network, backups will also enable the company to restore systems to software that is known to be free from computer virus infection. For added security you should store these backups securely offsite. That way should a major disaster happen to the business, e.g. the building goes on fire, the data will remain safe in the secure offsite location and can be restored quickly in a new facility
  • Develop an Information Security Policy.
    The creation and publication of an Information Security Policy is key to ensuring that information security receives the profile it requires in the organisation and is the first critical step in securing the company’s systems and data. It is important that senior management support the Information Security Policy and that all users are made aware of their roles and responsibilities under this policy.
  • Monitor logs and systems.
    Regular monitoring of network and system logs can assist in the early identification of a computer virus infecting the network or other attacks by criminals. Unusual traffic patterns or log entries could indicate that the network has been infected or that its security has been compromised. As well as monitoring for suspicious traffic and events, it is important that logs for other devices are checked regularly to ensure that the network remains protected. Log files for the backups should be checked regularly to ensure that the backups succeeded, likewise the log files for anti-virus software deployed should be regularly checked to ensure that all PCs are running the latest version of the anti-virus software.
  • Develop an Incident Response Plan.
    Knowing what to do when a computer virus enters the network or when you suffer a security breach is critical to minimise the damage they may cause, both to the business and also to customers and suppliers. The incident response plan should outline the roles and responsibilities that people have in the event of a computer virus infecting the network or indeed any other type of security breach. This plan should be drawn up and agreed between all relevant parties before an incident occurs. Remember, the worst time to develop a security incident response plan is in the middle of such an incident.
  • Restrict end user access to systems
    Where possible, end users should not be given administrative privileges to their workstations. Most computer viruses can only run in the context of the user that is logged into the system, i.e. they only have the same permissions as the user running the program. If that user has their access restricted, then the virus will be similarly restricted. Unfortunately many applications designed for the Windows platform require the end user to have such privileges; however these users should be the exception rather than the rule.
  •  Image result for computer threats picsImage result for computer threats picsImage result for keep calm computer threats pics MADE BY:
  •                                                MAHNOOR IKRAM AND MALAIKA MADNI


Tuesday 10 November 2015

DIGITAL CITIZENSHIP

                                                                     DIGITAL CITIZENSHIP
Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately. Digital Citizenship is more than just a teaching tool; it is a way to prepare students/technology users for a society full of technology. Digital citizenship is the norms of appropriate, responsible technology use.
                                                  NINE ELEMENTS OF DIGITAL CITIZENSHIP
1.   Digital Access:   full electronic participation in society.
Technology users need to be aware that not everyone has the same opportunities when it comes to technology.  Working toward equal digital rights and supporting electronic access is the starting point of Digital Citizenship. 
2.   Digital Commerce:   electronic buying and selling of goods.
Technology users need to understand that a large share of market economy is being done electronically.
 3.   Digital Communication:   electronic exchange of information.
One of the significant changes within the digital revolution is a person’s ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).
4.   Digital Literacy:   process of teaching and learning about technology and the use of technology.
While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used.
 5. Digital Etiquette:   electronic standards of conduct or procedure.
Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct).
6.   Digital Law:   electronic responsibility for actions and deeds
Digital law deals with the ethics of technology within a society. Unethical use manifests itself in form of theft and/or crime. Ethical use manifests itself in the form of abiding by the laws of society.
 7.   Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world.
Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights extended to every digital citizen.
8.   Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to be addressed in a new technological world.
 9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community.
                                                                                   MADE BY:
                                                                                           MAHNOOR & MALAIKA



Tuesday 3 November 2015

cyber safety

CYBER SAFETY
 
 Cyber safety is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime  in general.As the number of internet users continues to grow worldwide, internet safety is a growing concern for both children and adults.
 
PRECAUTIONS: 
 
 
1)      Don’t post any personal information online – like your address, email address or mobile number.
2)      Think carefully before posting pictures or videos of yourself.  Once you’ve put  a picture of yourself online most people can see it and may be able to download it, it’s not just yours anymore.
3)      Keep your privacy settings as high as possible
4)      Never give out your passwords
5)      Don’t befriend people you don’t know
6)      Don’t meet up with people you’ve met online.  Speak to your parent or carer about people suggesting you do
7)      Remember that not everyone online is who they say they are
8)      Think carefully about what you say before you post something online
9)      Respect other people’s views, even if you don’t agree with someone else’s views doesn’t mean you need to be rude
10)   If you see something online that makes you feel uncomfortable, unsafe or worried: leave the website, turn off your computer if you want to and tell a trusted adult immediately.



Image result for CYBER SAFETYImage result for CYBER SAFETY

Tuesday 27 October 2015

Dignity day

 DIGNITY DAY 

The word dignity is used to  express the idea that a being has an innate right to be valued, respected, and to receive ethical treatment.The English word "dignity", attested from the early 13th century, comes from Latin dignitas (worthiness)[2] by way of French dignité.
 Global Dignity is an independent, non-political organization. Their project is the universal right of every human being to lead a dignified life. The organization was established in 2006 by Crown Prince haakon of Norway, John Hope Bryant and Pekka Himanen.

HOW DID WE CELEBRATED DIGNITY DAY

We celebrated dignity in school. On 20th October It was an awesome windy day when we celebrated it. We had an awesome assembly. Our head mistress Ms Humaira Mahmood and Ms Saima distributed cupcakes amongst the custodian staff.When they were getting cupcakes, we all started to clap for them. We also started hooting and appreciating them. The female and the male custodian staff got an equal amount of cupcakes. Then after the assembly, we all had a competition among all the 7th graders. The competition was about dignity day. We all had to write an essay or a speech on dignity. Everyone created her own speeches and then they performed that speech infront of Ms Amra and the girls.
WE HAD A LOT OF FUN ON DIGNITY DAY!!!!!!!




 

Tuesday 20 October 2015

history of titanic

                                                                 HISTORY OF TITANIC

On April 10, 1912, the Titanic, largest ship afloat, left Southampton, England on her maiden voyage to New York City. The White Star Line had spared no expense in assuring her luxury. A legend even before she sailed, her passengers were a mixture of the world's wealthiest basking in the elegance of first class accommodations and immigrants packed into steerage.

She was touted as the safest ship ever built, so safe that she carried only 20 lifeboats - enough to provide accommodation for only half her 2,200 passengers and crew. This discrepancy rested on the belief that since the ship's construction made her "unsinkable," her lifeboats were necessary only to rescue survivors of other sinking ships. Additionally, lifeboats took up valuable deck space.

The history of the Titanic was forever altered when the ship struck an iceberg on April 14, 1912. Having received iceberg warnings via wireless telegraph, Captain Edward Smith altered the ship's course. However, the radio operators were more concerned with relaying private messages to passengers than passing along updated iceberg warnings to the bridge.
At approximately 11:40 p.m., lookouts spotted an iceberg directly in the path of the ship. Evasive action was taken in an attempt to avoid the collision. A sharp turn to the port side was ordered, and the iceberg struck the ship on the right side damaging the hull. Captain Smith ordered a full stop to assess the damage. Initially, only five compartments were flooded, and the watertight doors had been closed to prevent additional flooding. However, water was able to flow over the top of bulkheads and in through normal openings causing two more compartments to flood. It quickly became obvious the Titanic would sink.

The first lifeboat was lowered about an hour after the collision. It had a 65 person capacity; only 19 were aboard. Tragically, many of the lifeboats were launched far under capacity. This is attributable to several factors. Assured by the still working electricity and seeming calm, many passengers didn't think the ship was sinking. In addition, many of the third class passengers became lost or trapped in the ship and didn't make it to the lifeboats. Due to a women and children first rule, many men did not board lifeboats despite there being space.
Radio operators broadcasted distress signals, but the RMS Carpathia, the closest ship, was four hours away. All but two lifeboats were successfully launched. Eventually, the Titanic split and was completely sunk by 2:20 a.m. Roughly four hours after receiving the distress call, the Carpathia arrived and began rescue efforts. More than 1,500 people died.
 BEFORE:                                                                                                 AFTER:
 BEFORE:
Image result for titanic Image result for titanic                              

Tuesday 13 October 2015

TEACHERS DAY!!

TEACHERS DAY CELEBRATIONS!!!!!


 World Teachers' Day, held annually on October 5 since 1994, commemorates teachers' organizations worldwide. Its aim is to mobilize support for teachers and to ensure that the needs of future generations will continue to be met by teachers.World Teachers' Day, held annually on October 5 since 1994, commemorates teachers ’ organizations worldwide. Its aim is to mobilize support for teachers and to ensure that the needs of future generations will continue to be met by teachers.


On 5th October it was the best teachers day ceremony.It was an awesome day as we all had a lot of fun with our teachers.Every single teacher got a mug and a certificate.Everyone was hooting and shouting,appriciating our teachers. Some girls gave a speech on teachers day . After that it was our poster flying cermony in which we tie baloons on a poster and then we let it in the air.Finally we sang the national anthem and the ceremony came to its end!!!!

 
Image result for teachers day                                   
                                            Image result for keep calm posters on teachers 
HAPPY TEACHERS DAY!!!!!!!!!!!!!!!!!!!!!!
                                                                                  By: MAHNOOR IKRAM & MALAIKA MADNI
Image result for SMALL HEARTS