tester

Use of cookies

We use cookies to improve and analyse your browsing experience on our web. You can accept these cookies, reject them or choose your settings by clicking on the corresponding buttons. Please note that rejecting cookies may affect your browsing experience. For more information you can consult our Cookies policy.

Configure cookies

Cookies are an essential part of how our web works. The main goal of cookies is to make your browsing experience more comfortable and efficient and to improve our services and the web itself.
Here you can find all the information about the cookies we use and you can activate and/or deactivate them according to your preferences, except for those cookies that are strictly necessary for the operation of the web. Blocking some cookies may affect your experience on the web and how the site works. For more information you can visit our Cookie Policy.

Strictly necessary (technical) cookies

These Cookies are necessary for the web to function and cannot be disabled on our systems. They are generally only set up in response to actions you may take such as requesting services, setting your privacy preferences, logging in or completing forms. You can set your browser to block or warn you about these cookies, but some parts of the web will not work. Information about Cookies.

Analytical cookies

These Cookies allow us to count the number of visits and traffic sources so that we can measure and improve the performance of our site. They help us to find out which pages are the most popular and least popular, and to see how visitors move around the web. All information collected by these Cookies is aggregated and therefore anonymous. If you do not allow these Cookies we will not know when you visited our web. Information about Cookies.

Third party cookies

These cookies are used to analyse your activity in order to show you personalised advertisements. Information about Cookies.

Accept Decline Configure cookies Confirm selected
Search
×
Notes
Search
There are no notes
  • Digital book
  • To customise Pencil press Alt + Down Arrow
  • To customise Highlighter press Alt + Down Arrow

    Change theme

    Error - please check your internet connection...
    Back

    Blink Help

    x
    Error - please check your internet connection...

    How can we help you?

    No results

    View full manual

    Couldn't find what you were looking for?

    Please describe the issue you are experiencing and provide as many details as possible. Let us know the book, class, access device, licence code, username, used browser or if it occcurs in our app:

    Thickness:
    Font size:
    Filter
      No resources found
      Font size:
      Revision mode

      Revision mode

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

       

      1. How does the Internet work?
      2. Personal safety and machine security
      3. Digital responsibility

       

      /useruploads/ctx/a/42497650/r/s/10319050/Unit_2_page_32_introduction.mp3?idcurso=821790 The Internet was born out of a project developed between 1965 and 1969 by the United States Department of Defense. The aim was to create a secure communications network (ARPA) that could be kept active even if one of its nodes failed. Back then, nobody really thought that in just a few years' time we would be able to access this service from anywhere using our mobile phones, tablets and personal computers. But the developments do not stop here: we already know what the immediate future of the Internet is going to be: the Internet of Things, i.e. the connection of lots of everyday objects to the Internet.

      In this rapidly evolving context, there is one constant that is becoming more and more important: the need for security in all its different forms.

      In this unit, we will study how the Internet works, we will see how important it is to safeguard our privacy and protect our devices, and we will learn to be digitally responsible, whatever changes the future brings.

       

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      /useruploads/ctx/a/42497650/r/s/10563149/Unit_2_page_32_introduction.mp3?idcurso=821790Read and listen to the text on the previous page and then answer these questions in your notebook:

      1. Indicate whether the following statements are true or false:
      • The Internet emerged to respond to a need in telecommunications companies.

      • Correct answer
        Wrong answer
      • The Internet of Things is about connecting to the Internet using mobile phones and tablets.

      • Correct answer
        Wrong answer
      • It is very important to protect our security on the Internet and keep our data private.

      • Correct answer
        Wrong answer

      Done
      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. What are the three most important words in the text? Use a dictionary to find out their meaning.

      1. In your own words, explain what you understand by the Internet of Things.

      „ Find out what you already know by answering these questions in your notebook:

      1.  How do you think information was published before the Internet?
      2.  Do you use any social networks? What for? Do you know the minimum age for signing up on these networks?
      3.  List three dangers of browsing on the Internet without taking any precautions.
      4. What does privacy mean to you?
      5.  Write a sentence explaining what our rights and duties are when we use the Internet.
         
         
      6.  When we are in the workshop, it is very important to follow the safety rules. It is just as important to follow safety rules on the Internet. Imagine that you are going to create a Scratch program explaining the importance of safety in all its different forms.

      a. What basic ideas would you talk about? Write down all your ideas in your notebooks.

      b. With the permission of your teacher, take pictures of dangerous objects in the workshop.

      c. Think about how you would make the Scratch program. Draw a flowchart of the programming algorithm.

      We will organise the information in the next exercise.

      1. Organise the information from the last exercise on a computer. In a text document, write out all the information that you have collected and save your documents and pictures to a folder. Draw the flowchart using a presentation program or a specific program like DIA Diagram Editor or PSeInt (both are free). Remember to create backups as you collect your data. Save the folder containing all these documents with the name Unit02_0A_namesurname.
      1. Individually, create the Scratch program that you planned out to explain the importance of safety in all its different forms. You can do this on the http://scratch.mit.edu website without signing up. When you have finished, each student must download the project to their computer and name it Unit02_0B_namesurname.sb2. You can then look at the different programs together to see how each student interpreted the exercise.

       

       

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

      2 Internet. Security and responsibility

      Learn

      1. How does the Internet work?

      The advent of the Internet can be seen as the beginning of one of the most important developments of the twentieth century. It emerged between 1965 and 1969 as part of the ARPA project of the United States Department of Defense. Since then, it has developed continuously into an essential service that we can access from anywhere using our mobile phones, tablets and personal computers.

      The Internet is a network of thousands of computers and devices around the world connected by copper wires, fibre optics, wireless connections and other methods.

      Sometime soon, we will be using the Internet of Things, which will enable us to interact with everyday objects connected to the Internet. This development will interconnect people and objects and reduce or eliminate barriers of time and distance. Many more things than people will be connected to the Internet: the Internet revolution and its continuous development will radically change the way we understand the world.

      The Internet of Things is a revolutionary concept that describes the connection of everyday objects to the Internet so that we can interact with them.

      Internet basics

      To understand how the Internet works, we need to be familiar with some basic concepts:

      • We can access information on the Internet with the help of two basic elements: the browser and the search engine.
         

        A browser is a programme that displays the content of web pages.

        For example: Internet Explorer, Google Chrome, Mozilla Firefox, Safari, Opera, etc.

        A search engine is a computer system that indexes files stored on websites. Search engines keep their results up to date by continually crawling the Internet.

      For example: Google, Bing, Yahoo!, etc.

      • We type the full address of a web page in the browser. This address is also called the uniform resource locator (URL) and is unique for each web page.
        For example: www.google.es, www.rae.es, etc.
      • A server is a computer with special features, prepared to provide uninterrupted services simultaneously to lots of users.

      KEYWORDS  /useruploads/ctx/a/42497650/r/s/10574089/Unit_2_page_34_keywords.mp3?idcurso=821790

      Make sure you understand these words before moving on!

      • Internet: a network of thousands of computers and devices around the world connected by copperwires, fibre optics, wireless connections and other methods.
      • Browser: a programme that displays the content of web pages.
      • Search engine: a computer system that indexes files stored on websites.
      • Server: a computer with special features, prepared to provide uninterrupted services simultaneously to lots of users.
      • Router: a device that lets us connect to the Internet.
      • IP address: a series of numbers separated by full stops that identifies a computer.

       

      How the Internet works

      We can see the Internet as a series of stages that range from when we type an address in a browser to when the web page appears on our screens. This whole process can take less than a second.

       

      Users can connect to the Internet if they have a contract with an Internet service provider (ISP) and pay a set fee. When we switch on a computer and connect to the Internet, our ISP (for example, Movistar, Jazztel, Ono, etc.) assigns an address to our computer, called an IP address. Every computer is assigned a unique address on the Internet.
       

       

      A router is a device that lets us connect to the Internet. Once connected, we open our browser and type the address of a page in it (URL). At this point, information starts to travel in the form of packets. The information sent out is the request or address of the web page that we want to visit and the information that is sent back is the content of the web page.

      Each web page is also assigned an IP. This way, we can identify the origin and destination of the flow of information.

       

      The next step in the information's journey are the DNS. It would be very difficult to remember the IP address of every website that we could connect with. DNS servers simplify this task for us. DNS stands for domain name system and these servers assign a name to each IP address in the same way that a telephone directory assigns names to telephone numbers so that we do not have to remember them all.

      For example, if we type the IP 64.233.189.104 in our browser, we are connected to the Google home page, which is the same as typing in "https://www.google.es"”.

       

       

       

       

       

       

      Our computer communicates with other computers following a common set of rules called a protocol.

      • The packets of information follow the TCP/IP protocol (transfer control protocol/Internet protocol).
      • Servers use the HTTP protocol (hypertext transfer protocol) to send and receive documents over the Internet.

       

       

      The DNS server sends the request to the server that hosts the web page we want to visit. The server sends us the information packets that make up the web page, which travel over the network along the quickest path that they can find.

      Finally, the packets reach our computer and are reassembled. The page is then displayed in our browser.

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

      2 Internet. Security and responsibility

      Learn

      2. Personal safety and machine security

      The Internet is a form of communication with many advantages but it also has its risks: it is a world of information that we have to deal with safely. A computer is not a harmless tool.

      We can classify the risks of the Internet as:

      • Threats to the machine, i.e. our computer.
      • Threats to individuals, the most important type of risk. Damage to machines is only material damage but when people are hurt, it stays with them and affects other aspects of their lives.

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

      2 Internet. Security and responsibility

      Learn

      3. Digital responsibility

      Besides the software that we can use, our best protection is ourselves and the adults we trust: parents, teachers and experts. As we saw above, our attitude is the best protection. We must be digitally responsible.

      When we use Internet tools, we need to keep in mind our own safety and respect for others.

      The law is here to protect us. Examples include:

      • The Civil Protection of Honour Act
      • The Data Protection Act

      Here are some simple guidelines to help you publish information safely.

      Talk to your parents about your Internet browsing; they can always help if you are unsure about anything. If you receive something unusual or unpleasant, talk to an adult about it or report it.
      On the Internet, do not ask for or give out data such as addresses, passwords, telephone numbers, the place where you study, places where you normally hang out or any other information that could identify you. Use aliases and nicknames that do not contain your date of birth or information about you.
      Do not talk to strangers. People are not always what they say they are. Be wary of anybody who wants to know a lot of information about you. Remember that there are safer ways to make new friends.
      Turn your webcam to a dead angle or put a sticker over it when you are not using it so that it cannot record images. Webcams can be operated remotely by malicious software. The police have been warning us for years that the images we think come from the webcam of another person are often actually images that they have faked.
      Think before you publish photos or videos of yourself; if you decide to do it, only publish things that will not damage your current or future image and publish them in places with restricted access and with the permission of your parents. Remember not to post pictures of anybody without their consent. Be respectful to others.
      Keep up to date with technology and limit how long you spend on the Internet.
      Make sure that you are of the minimum age required to enter a site. You will find this age in the terms of use of the site. You must read these terms before clicking on “I agree”. If you do not read them, you may be allowing the site owners to use your data, pictures, etc.

      Inform yourself about sites. On some sites you cannot “unsubscribe” so we must be careful about what we post on them; we can sometimes give away our data forever.

      In short: use common sense and do not do things on a computer that you would not do in everyday life.

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      EXERCISES

      1. Give the meaning of these abbreviations and explain each concept: TCP/IP, DNS, URL.

      1. Give an outline of the main tools used to protect people and computers. Now explain what each one protects us from.

      1. Use an example to explain why our attitude is our best protection on the Internet.

      KEYWORDS  /useruploads/ctx/a/42497650/r/s/10998849/Unit_2_page_37_keywords.mp3?idcurso=821790

      Make sure you understand these words before moving on!

      • Firewall: defence system that controls and filters the incoming and outgoing traffic of a network through computer ports.
      • Black hacker: computer expert who attempts to bypass Internet security systems to make money from it.
      • Phishing: computer crime that uses trickery to obtain information about a user and use it fraudulently.
      • Spyware: software that tries to obtain data from users.
      • Virus: program that installs itself on a computer without the user's permission for the purpose of causing damage.
      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

      2 Internet. Security and responsibility

      In the computer room

      Practical 1. Your digital footprint /useruploads/ctx/a/42497650/r/s/10591249/Unit_2_page_38_practical_1.mp3?idcurso=821790

      You can do Practical 1 by following the book or by listening to the instructions.

      Everything you do on the Internet leaves a trace, a digital footprint that talks about you. This information is your digital identity and it is your duty to take care of it. You are protected by the law in this.

      Exercise 1. Find out your Internet IP

      As we have seen, every time we connect to the Internet we are identified by a unique address assigned to our computer, called an IP address. We will now see how easy it is to find out our assigned IP.

      1. Open your browser and go to www.google.es. Type “Find out my public IP” in the search box.
      2. Click on any link, look up the IP address you are browsing with and write it down (it will look like the one in Figure 1).
      3. Repeat the operation by clicking on another link and check that it detects the same IP.

      Some sites give us more information than the IP, as you can see in Figure 1.

      Exercise 2. Know your browser so that you can protect yourself

      1. Open any browser. Press the key combination Shift + Ctrl + Supr. This opens a window where you can delete your browsing data (Figures 2 and 3).
      2. Press the Eliminar button to delete everything that has been selected. Nonetheless, there will be some terms that you do not understand.
      3. Click on “Acerca de la eliminación del historial de exploración” if you are using Internet Explorer (Figure 2) or the equivalent option in another browser. A web page will appear explaining what cookies and forms are, etc.
      4. Open a text document and create a table like the one below. Now complete it with the meanings of the terms that you find.​
      Browsing history Explanation
      Cookies Information that is stored on our computer by websites to remember our preferences, such as the sites we have visited, what we like, what we usually do, or our location.
      Form data  
      History  
      Download history  
      1. Do an online search for information and answer the following question in the same document: what is private browsing?
      2. Remember that mobile phones also have a browser: check your privacy settings when you browse on a mobile phone.

      Exercise 3. Take care of your personal information

      1. The biggest footprint that you can leave is what you upload to the Internet. Discuss this statement in your document and give your opinion on it.
      2. Save the file with the name Unit02_P1_namesurname.

       

      Fig.2. Privacy settings 
      in Internet Explorer.

       

       

       

       

       

       

       

       

       

      Fig.3. Privacy settings
      in Google Chrome.

       

       

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

      2 Internet. Security and responsibility

      In the computer room

       Practical 2. Find the information: successes and failures

      We are going to play a game where we search for information to find out how difficult it is to obtain the correct answer to specific questions about the Internet and to demonstrate our research skills.

      Rules of the game

      1. Read each question in order, search the Internet for the information to answer it and then type your answer in a word processor file with the name Unit02_P2_namesurname.
      2. Each answer leads to the next question.
      3. You must answer every question.
      4. For every correct answer, you win a point. For every question you get wrong, you lose a point.
      5. You can use any browser and search engine.
      6. Look for reliable sources of information.

      Let's begin:

      1. The image in Figure 4 shows a concept related to the Internet. What is this concept? It starts with the letter D. We will call it WORD 1 in the next question.
      2. What does the WORD 1 jp mean, represented by the top cube in Figure 4? We will call it WORD 2.
      3. The last letter of WORD 2 is the first letter of WORD 3, the surname of a person connected to a very important and destructive invention. What surname is WORD 3?
      4. WORD 3 amassed a great fortune from his inventions and left it to create prizes called after him. Which Spanish writer was awarded this prize in 1989? We will call this WORD 4 (even though it is three words: two names and surname).
      5. Put the last word of WORD 4 in the masculine form and you will have an invention. In what year was it invented? The year is WORD 5 and the last one of the game.

      All the answers are hidden in this QR code. Ask your teacher for permission to scan the code using a QR code reader (mobile app) to see the answers.

      Count up your points and see who won.

      Challenges

      Challenge 1. Can you carry on the game by thinking up three more questions? Save your questions in a text document called Unit02_P2_namesurname_challenge1 and pass it on to a classmate to answer them.

      Fig. 4

       

       

       

       

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

      2 Internet. Security and responsibility

      In the computer room

      Practical 3. Stop cyberbullying. Let’s use Prezi!

      You must have permission from your parents or legal guardians to do this practical.

      We are going to create a presentation using Prezi called "Stop cyberbullying"”. Prezi is an online tool for creating presentations. The only requirement is for you to register.

      1. Go to https://prezi.com and click on the Get started button. Sign up for Prezi Public (the free option). Once you are in the main screen, select Create your first Prezi.
      2. Choose a similar template to the one in Figure 5 (called "Explain a Topic"”) and click on Use template. This opens the desktop with a template containing instructions on how to use Prezi.
      3. Click on the desktop to add a title in the space indicated and type "Stop cyberbullying"”. You will see that the title is marked with a 1.
      4. Each slide is a point on the desktop. Click on the first slide after the title, marked with a 2, and write: "Cyberbullying is a type of harassment that uses threats, blackmail, etc., between peers on the Internet, mobile phones or video games"”.
      5. Put the word cyberbullying in bold by pressing the button marked B on the formatting bar.
      6. Let's insert a picture. To do this, drop down Insert and choose Image. Choose an image from the Internet that looks similar to the one in Figure 6.
      7. Add different images or text to each slide until you have filled in all the ones that appear by default in the template. Your presentation should contain information on the following points, which you should develop:
      • The Jokin case (2004)
      • The serious consequences of cyberbullying and its high prevalence
      • How difficult cyberbullying is to detect
      1. Insert the cyberbullying video from the http://pantallasamigas.net website by copying the link.
      2. The last slide should contain the following text: "Put a stop to cyberbullying. If you are being bullied, let people know. If you see somebody else being bullied, let people know. We need your solidarity"”.
      3. In this last step, we will define the path or order that we want Prezi to use to display the objects or slides on the desktop. Click on Edit path (bottom left) and move the numbered paths to put them in the correct order.
      4. View your presentation by clicking on Present.
      5. Save your presentation, leave the editing window by clicking on Exit and, without leaving Prezi, click on Download to save a copy to your local folder with the name Unit02_P3_namesurname.zip.

      Fig. 5

       

       

      Fig. 6

       

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

      2 Internet. Security and responsibility

      In the computer room

       Practical 4. “S.O.S. My computer is under attack”. Let’s use Padlet!

      You must have permission from your parents or legal guardians to do this practical.

      In this practical, you are going to use Padlet to explain to your classmates what Internet threats can put your computer under attack. You will need the images from the virtual CD (Unit 2 folder).

      1. Open the browser and go to https://es.padlet.com to start using Padlet. Click on Sign up and sign in with your Gmail account (Figure 7). If you do not have a Gmail account, you can create a Padlet account.
      2. After signing up, a blank screen will appear with a toolbar on the right.
      3. Click on the Settings icon and, under the Basic Info tab, choose a portrait image. Enter the title "S.O.S. My Computer is Under Attack!”" and type "Computer threats on the Internet"” (Figure 9) in the description.
      4. Now go to the Wallpaper tab and choose Wood.
      5. In the Layout tab, select Freeform.
      6. Double-click on the wallpaper on the screen to start publishing entries. As the title of your first entry, type "Viruses and Trojans"” and copy the information from the "Learn"” section of this unit about viruses and Trojans (Figure 10). Click on the camera icon and upload the image Unit02_P4_Virus.jpg from the virtual CD.
      7. Repeat the process with the information and images on spyware and hackers.
      8. Now create another entry to include a video on Internet security. Type "Security Videos"” as the title of this entry and enter the description "Viruses"”. Click on the video camera icon and paste the address of the video that you will find in the text file Unit02_P4_Security_videos_addresses of the virtual CD.
      9. Repeat these steps to insert the spyware video.
      10. Click on the Address tab and change the address of your padlet. Type "computersecurity"” as the address (Figure 11). Open a new tab in the browser and type in the full address to view the result
      11. Select Share / Export from the toolbar (Figure 8). You have several options here, including emailing the padlet to somebody, inserting it on a website and exporting it as a PDF file.
      12. Choose the Mobilize option and copy the QR code. Scan the code with a code reader to see the result. Paste it into a text processor and save the document as Unit02_P4_namesurname.

      Scan this QR code with your mobile phone to see how your practical should look:

      Fig. 7

      Fig. 8

      Fig. 9

      Fig. 10

      Fig. 11

       

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

      2 Internet. Security and responsibility

      In the computer room

      Practical 5. WhatsApp and Snapchat: the good and the bad

      You must have permission from your parents or legal guardians to do this practical.

      In this practical, we are going to look at two popular chat applications: WhatsApp and Snapchat.

      Exercise 1. Create an informative document

      Open a new document in a word processor and then create a table like the one in Figure 12 to collect all the information from this practical. Complete each cell of the table with the information from the following exercises.

      Exercise 2. WhatsApp

      1. Go to www.whatsapp.com and read the How it works section. In the table in your document, copy the services available in WhatsApp.
      2. Now find the Privacy & Terms section and go to point 9: Ability to Accept Terms of Service. Find the minimum age of use and complete the relevant cell in the information table with this data.
      3. Also in the privacy and terms section, find paragraph B of point 3, WhatsApp Access, and look for the two pieces of information that WhatsApp takes from your telephone. Add this information to the relevant cell of your table.
      4. In point 4 of the Privacy & Terms section, WhatsApp explains which users can see your status in the application and which users you can hide this from. Complete the important permissions cell with this information.

      Exercise 3. Snapchat

      1. Go to https://es.wikipedia.org/wiki/Snapchat and read about how Snapchat works. Copy the services of the application and complete the relevant cell in your table.
      2. Now go to the Snapchat page (www.snapchat.com) and select Terms of Service in the LEGAL Section. The minimum age for using the application is indicated in Point 1. Copy and paste this data in the relevant cell of your table.
      3. In point 2 of the same section, Your Content, read the permissions that you grant to Snapchat on any of the content that you exchange with this application. Try to understand what each permission involves. Complete the important permissions cell with this information.
      4. Go to the Privacy Policy section and read the Information We Get Automatically When You Use Our Services section. Select five items of your data that are collected by the application and insert them in the relevant cell of your information table.

      Exercise 4. Analysis

      Below the table, write a short analysis indicating the most relevant points for the services received and the data provided by users. Save the file with the name Unit02_P5_namesurname.

      Fig. 12

       

       

       

       

       

       

       

       

       

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

      2 Internet. Security and responsibility

      In the computer room

      Practical 6. Our attitude, the best protection. Let's use PowToon!

      You must have permission from your parents or legal guardians to do this practical.

      In this practical, you are going to create an animated presentation with PowToon to explain to your colleagues how to protect themselves when they browse the Internet or use a mobile phone.

      1. Go to www.powtoon.com. Go to the Create option and click on Start from Scratch (Figure 13). You must register and create an account first, or you can use your Gmail account.
      2. Once inside the application, choose one of the themes or templates. Choose Picto and click on Go. An empty slide will appear on the PowToon desktop. In Characters, in the menu on the right, choose the Stand image of the girl and drag and drop it to the slide.
      3. Now, in the Props category, click on More and select the image of a speech bubble. You are going to add some text to this. Drag it next to the image of the girl and adjust the size to her by positioning the cursor on the edges of the speech bubble. Select Flip from the left panel to show the speech bubble in mirror view (Figure 14).
      4. On the right, select Text. A dialogue box will appear so that you can write on the slide. Type "Protect yourself on the Internet"”. Select text size 22 and adjust the text box so that it fills the whole speech bubble (Figure 15).
      5. Below the slide you will see the timeline and the elements of the slide (Figure 16). Increase the timeline to 16 seconds with the + sign. Select the image of the girl. Some arrows will appear. Move the first arrow to 0.5 seconds and the last one to 2 seconds. For the speech bubble, move the first arrow to 1 second and the last one to 2. Do the same with the text.
      6. Drag the Presenting figure from the animation menu on the right to the slide. Adjust the timelines and position the first one at 2.5 seconds and the second at 11.5 seconds. From the menu on the left, choose the enter and exit effects, such as Fade (Figure 17).
      7. Go to the Text category and type the text shown in Figure 18. In the text effects icon, select Plain Text. Adjust the timelines between 3 and 11 seconds. Select Fade as the enter and exit effects.
      8. Select Text again and type "On the Internet, use your common sense"”. Select size 36. Choose Hand Writing in the text effects icon and set the time from 12 to 16 seconds (Figure 19).
      9. Watch the presentation by clicking on the Preview icon (Figure 20).
      10. Save the file with the title Protect Yourself on the Internet.

      You can complete this practical with activities 2 and 3 of the "Internet Activities"” section of this unit. Scan the following QR with a code reader to see an example of the final result:

      Challenges

      Challenge 1. Add sound to your presentation. Choose one you like from the options in PowToon and see what happens.

      Fig. 13

      Fig. 14

      Fig. 15

      Fig. 16

      Fig. 17

      Fig. 18

      Fig. 19

      Fig. 20

       

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

      2 Internet. Security and responsibility

      Review

      Unit summary

      • The Internet is a network of thousands of computers and devices around the world connected by copper wires, fibre optics, wireless connections and other methods.
      • The Internet of Things is a revolutionary concept that describes the connection of everyday objects to the Internet so that we can interact with them.
      • A browser is a programme that displays the content of web pages.
      • A search engine is a computer system that indexes files stored on websites. Search engines keep their results up to date by continually crawling the Internet.
      • The URL (uniform resource locator) is the address that identifies a website on the Internet.
      • A server is a computer with special features, prepared to provide uninterrupted services simultaneously to lots of users.
      • TCP/IP is the Internet communication protocol that computers use to communicate with each other.
      • Each computer has a unique address on the Internet called the IP address.
      • DNS servers assign names to IP addresses.
      • Servers use the HTTP protocol (hypertext transfer protocol) to send and receive documents over the Internet.
      • Cyberbullying is a type of harassment that uses threats, blackmail, etc., between peers on the Internet, mobile phones or video games.
      • Viruses and Trojans are programs that install themselves on a computer without the user's permission for the purpose of causing damage.
      • Spyware is software that tries to obtain data from users.
      • A firewall is a defence system that controls and filters the incoming and outgoing traffic of a network through our computer ports.
      • Black hackers are computer experts who attempt to bypass Internet security systems to make money from it.
      • When we use Internet tools, we need to keep in mind our own safety and respect for others. The law is here to protect us.
      • Prezi, Padlet and PowToon are three Internet applications that we used in this unit to explain different concepts.
      • For safe browsing, your attitude is your best protection.

       Express yourself!

      At the end of the book, on page 171 you will find the definitions of the keywords with examples of how to use them. You can also expand your vocabulary and learn new idiomatic expressions and language structures related to this topic.

      KEYWORDS  
      black hacker Internet router spyware
      browser IP address search engine virus
      firewall phishing server
      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

      2 Internet. Security and responsibility

      In the computer room

      Communication Corner. Inserting a video on the blog

      In this unit you have studied some very important concepts about Internet security and the Internet of Things. It is time now to put to work what you have learned by inserting a video on your blog.

      Exercise 1. The Internet of Things

      1. Go to YouTube, search for the Microsoft Sustainability video and watch it.
      2. Write a summary of what the video is about.
      3. Indicate four things in the video that are used now and four things that have yet to be developed.
      4. Copy the address of the video that you have just watched from your browser.
      5. Go to your technology blog and select Entrada nueva. Type the title of your entry "‘Internet of Things; the future's coming"” and add the summary that you wrote earlier.
      6. Now insert a link to the Microsoft Sustainability video. To do this, select Entrada nueva and click on the video icon on the toolbar. Paste the address of the video and click on Seleccionar.
      7. Click on Publicar. Check how your blog looks using the Ver blog option. Do not close Blogger.

      Exercise 2. Padlet. Publish your work

      In this exercise, you are going to add the work that you did in Practical 4 of this unit to your technology blog.

      1. Open a new tab in your browser and go to www.padlet.com.
      2. Enter your account using your username and password. Select the S.O.S. My Computer is Under Attack! padlet.
      3. Click on the Share/Export icon on the right toolbar and copy the HTML code in Embed.
      4. In your blog, select Entrada nueva. Write the title of the entry as "My Padlet on Security"”.
      5. Select the HTML tab, paste the HTML code and click on Publicar.
      6. Check how your blog looks using the Ver blog option.

      Challenges

      Challenge 1. Improve your blog by giving all the entries a title and adding a brief explanation of what the video and the embedded padlet contain.

       

       

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

      2 Internet. Security and responsibility

      Activities

      COMPREHENSION ACTIVITIES

      When you have completed the topic, do the following exercises in your exercise book:

      1. What is the Internet of Things? Invent and explain what the effect of the following would be (use your imagination for this):

      a. Objects in a home connected to the Internet (fridge, blinds, heating, etc.)

      b. Elements of a vehicle connected to the Internet (windows, steering wheel, petrol tank, etc.)

      c. The floors of public spaces connected to the Internet (in airports, shopping centres, etc.)

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. What is a browser? Write down the names of at least three browsers.

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. Describe the two communication protocols that we have seen in this unit.

        2l, TCP/IP protocol (transfer control protocol/Internet protocol): allows computers to communicate with each other. 2l, HTTP protocol (hypertext transfer protocol): used to send and receive documents over the Internet.

      Done
      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. What is a server?

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. What are DNS used for?

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. In your notebook, match up the items in these two columns: 
      Threat Answer
      • Virus

      • Trojans

      • Black hackers

      • Cyberbullying

      • Spyware

      • Loss of privacy

      • Phishing

      • Report

      • Antivirus

      • White hacking

      • Firewall

      • Cryptography

      • Take care of our privacy

      • Passwords

      Done
      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. /useruploads/ctx/a/42497650/r/s/10602799/Unit_2_page_46_exercise_7.mp3?idcurso=821790 You will now hear some of the keywords from page 44. Write them down and then check to see whether you have spelled them correctly.

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. In pairs, take turns to say whether the following statements about Internet safety are true or false. Give reasons for your answers :
      • a. Knowing about Internet tools can help us to protect ourselves.
      • Correct answer
        Wrong answer
      • b. We can post photos of another person on the Internet without their consent, so long as the person is not doing anything in the photo that could harm their image.
      • Correct answer
        Wrong answer
      • c. If we switch our webcam off, we do not have to worry about people recording us.
      • Correct answer
        Wrong answer
      • d. We can sometimes extract more personal information than we might first think by studying a photo or a video carefully.
      • Correct answer
        Wrong answer

      Done
      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      EXTEND YOUR KNOWLEDGE

      You must have permission from your parents or legal guardians to do some of these exercises. Remember also to read all the terms of the service carefully.

      1. Based on Practical 4, create a padlet to explain the basic measures for protecting ourselves on the Internet.  
      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. Enter your Gmail account and send an e-mail to three of your classmates. Type one address in the To field, one in the CC field and one in BCC. What happens to the addresses that you include in BCC?

      @@2l@@

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. Do an online search for information about the following Internet crimes: sexting, smishing and romance scam. In your notebook, write a brief description of each.
      Jm5ic3A7U2V4dGluZzogc2VuZGluZyBvZiBzZXh1YWwgY29udGVudCAocGhvdG9zIGFuZC9vciB2aWRlb3MpIHRvIG90aGVyIHBlb3BsZSBieSBtb2JpbGUgcGhvbmUuPGJyIC8+DQpTbWlzaGluZzogY3liZXJjcmltZSB3aGVyZSB0ZXh0IG1lc3NhZ2VzIGFyZSB1c2VkIHRvIHJlcXVlc3QgaW5mb3JtYXRpb24uPGJyIC8+DQpSb21hbmNlIHNjYW06IGN5YmVyY3JpbWUgd2hlcmUgYSByb21hbnRpYyByZWxhdGlvbnNoaXAgaXMgc2ltdWxhdGVkIG9ubGluZS4gVGhlIHN1cHBvc2VkIHBhcnRuZXIgdGhlbiB0cmlja3MgdGhlaXIgdmljdGltIG91dCBvZiBsYXJnZSBhbW91bnRzIG9mIG1vbmV5Lg==

      Done
      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. Sometimes, we need to extract the audio (or a part of it) from a YouTube video. One way to do this is with the ListenToYouTube application.

      a. Go to YouTube, search for and select the Data Protection Agency video Tu dato and copy the address of the video.

      b. In a different browser tab, go to www.listentoyoutube.com, paste the address of the video in the place indicated and click on Go. Once it has finished, click on the link to download the MP3 and download the audio to your computer.

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. Based on Practical 6, create a PowToon presentation explaining how to use an email client like Gmail.
      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. Compose five sentences about the Internet using the following expressions: "to browse/surf/upload a video to the Internet"”, "computers can be threatened by...”", "we must protect ourselves online by..."”. Practise them in pairs.

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. Get into small groups and think of different situations where you could use these expressions: “to link up”, “to browse through something”, “to connect the dots”.
      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. Based on the explanations in the "Learn"” section and Practical 3, create a presentation in Prezi on how the Internet works. 
      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      1. There are lots of websites specialising in the protection of minors. Now go to www.protegeles.com and www.thephonbies.com. Do a search to find out what a phonbie is and write an explanation in your own words in your notebook.

       

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

      2 Internet. Security and responsibility

      In the computer room

      MULTIMEDIA ACTIVITIES

      1. Internet test

      Open exercise Unit02 01 Unit test in Unit 2 of the virtual CD and test your knowledge. There is only one correct answer to each question. Keep repeating the test until you score at least 80%.

       

       

      2. Vocabulary

      Open exercise Unit02 02 Vocabulary in Unit 2 of the virtual CD. This exercise contains important words from this unit and their meanings.

      Match them up correctly. Keep repeating the exercise until you have matched them all up correctly.

       

      3. Threats and solutions

      Open exercise Unit02 03 Threats and solutions in Unit 2 of the virtual CD.

      Put each word in the correct column: threat or solution.

       

       

      4. Internet applications

      Open exercise Unit02 04 Internet applications in Unit 2 of the virtual CD.

      Match each application to its correct function. Keep repeating the exercise until you have matched them all up correctly.

       

       

      5. Internet safety

      Open exercise Unit02 05 Internet safety in Unit 2 of the virtual CD.

      For each action, state whether it is safe or dangerous. Keep repeating the exercise until all your answers are correct.

       

       

      Digital book
      Unit 2. Internet. Security and responsibility
      Without background sound
      Logo

       

      ONLINE ACTIVITIES  

      1. Stay safe online

      1. Start your word processor and create a new blank document.
      2. Go to https://staysafeonline.org. Go to I Want to Stay Safe Online, select Spam & Phishing and read the article.
      3. Answer the following questions in your document:

      a) What is spam?

      b) What is phishing?

      c) What is spear phishing?

      1. Save the file with the name Unit02_Internet1_namesurname. 

      2. Create a YouTube channel

      We often need a YouTube channel to be able to upload our own videos. To do this, we need a Gmail account.

      1. From your Gmail account, go to Google apps and select YouTube. Choose English as the language.
      2. Click on My Channel, fill in the information that you want to appear and click on Create Channel. Now you can start uploading videos.
      3. In the channel description, type "This is the video channel of namesurname, a technology fan"”.
      4. Take a screenshot of this description and paste it in a text document.
      5. Save the file with the name Unit02_Internet2_namesurname.

      3. Upload your PowToon presentation to YouTube

      1. Enter www.powtoon.com using your Gmail account and go to Dashboard. Select the presentation that you created in Practical 6 of the unit and click on Export.
      2. Enter all the required information about the video. Click on Next and select Upload to YouTube. Click on Publish.
      3. When the video is published, a message will be sent to your Gmail account with a link to view the video on YouTube. Copy the address of the link and paste it in a text document.
      4. Save the file with the name Unit02_Internet3_namesurname.

      Useful addresses

      • www.pantallasamigas.net/english Pantallas Amigas is an initiative to encourage the safe and healthy use of new technologies and to promote responsible digital citizenship in childhood and adolescence.
      • www.agpd.es Website of the Spanish Data Protection Agency with information on all our rights regarding the processing of our personal data on and off the Internet.
      • www.staysafeonline.org Website with very interesting information about online safety in different areas.

       

      ,
      You have completed the lesson!

      Below is the time you have spent on the activity and the score you obtained.

      Time spent

      Score

      1. 1
      2. 2
      3. 3
      4. 4
      5. 5
      6. 6
      7. 7
      8. 8
      9. 9
      10. 10
      11. 11
      12. 12
      13. 13
      14. 14
        Eraser
        Rich text editor
        close