Sunday, 18 June 2017

The End

Hey guys,

As I've already finished the course and I won't have any more ICT classes, I'm going to delete this blog soon.

Hope everything I posted this year has been useful for all of you.


Byeeeeeeeeeeee,
xxx

Tuesday, 23 May 2017

How to modify aspects in a Word document


In this post, I'm going to explain briefly what you have to do to modify some aspects in your Word document.

You can add multiple things such as: a footer, a header, a table of figures, a cover page...


1.- Cover Page

*To add your cover page you just have to click on 'Insert' and then in 'Cover Page':
                         



2.- Customize/create new styles:
--To do so, you just have to follow the following steps:

*First of all, click on Styles:
   
*Then, click with the right finger in your mouse there and choose the 'modify' option:


*Now you can change whatever you want: 



3.- Create a Table Of Contents

*You just have to click on 'References' and then on 'Table Of Contents':



4.- Add Caption to pictures:

*In 'References' you click on 'Add caption':

5.- Create a Table Of Figures:

*In 'References' next to 'Add Caption' you click on 'Create Table Of Fiugres':


6.- Add Page numbers:

*In 'Insert' you click on 'Page Number':

7.- Add Footer and Header:

*You click here next to page number:



Hope you find it useful.
Bye,
xxx



Friday, 19 May 2017

Microsoft Office Word--- WannaCry

These days we've been modifying a word document about the WannaCry.

I leave the link below so that you are able to have access to it:




Hope you find it useful.
Bye,
xxx

Thursday, 4 May 2017

Wordpress Project

We've created a web in WordPress. I leave the link below:

https://moviesfilmshoweveryouwanna.wordpress.com/

Hope you find it useful.
Bye,
xxx

Saturday, 15 April 2017

Creating a web with HTML

Our teacher told us to create our own web with HTML for this holidays.
So, in my web I attached a table (that I had created before) and many other things that she explained in class some days ago.
I'm going to leave a screenshot of the HTML Code of my web and then another screenshot so that you can see how it looks like:



























Hope you find it useful.
Bye,
xxx

HTML(IV)

We also learnt how to design a webpage. This is what we did the last day:


Hope you find it useful.
Bye,
xxx

HTML(III)


Last week we learnt how to create a table with HTML. I'm going to leave the steps below:






Hope you find it useful.
Bye,
xxx

Saturday, 1 April 2017

HTML (II)

Yesterday, we continued trying new aspects of  HTML.

First of all, we learnt how to change the background color. You have to do it by writing this: <tag style="background-color: a color you want to put;"><tag style= "color: another color;"><tag style= "font-family: a type of letter;">

Then, we also learnt how to attach an image. It is really easy, you just have to write the following thing: <img src="name of the photograph you want to attach"  alt= "a number"    height="another number">















Hope you find it useful.
Bye,
xxx

Tuesday, 28 March 2017

HTML

This morning we've learnt how to work with HTML. I'm going to leave all the steps below.

First, you have to open your NotePad and write the following things:


Then, you have to save the note and open it with the web browser: 




Hope you find it useful.
Bye,
xxx

Saturday, 11 March 2017

WiFi Security

Yesterday, Angélica explained us two things about WiFi security.
First of all, she told us the types of WiFi protocols/versions and their speeds and finally, she mentioned a couple of things that we need to connect to the Internet through WiFi:


-WiFi protocols/versions: 

a)  802.11b----- 11 Mbps (2.4 GHz)
b) 802.11a----- 54 Mbps (5 GHz)
c) 802.11g----- 54 Mbps (2.4 GHz)
d) 802.11n----- 300 Mbps (2.4 GHz & 5 GHz)
e) 802.11ac----- 1300 Mbps (5 GHz)


-What do we need to connect to the Internet through WiFi?

  1) A router
  2) An Access Point
  3) A SSIC (Service Set Identification)
  4) An open Network
  5) WEP (Wired Equivalent Privacy)
  6) WPA & WPA2 (Works Progress Administration)



Hope you find it useful.
Bye,
xxx




SECURITY CONCEPTS

We also talked about a couple of security concepts. Such as: Confidentiality, Cryptography, Encrypt, Decrypt, Algorithm, Key and Digital Certificate.

*Confidentiality: when he have private or confidential communications, we have communications in which nobody can see what we're doing. With confidentiality it is difficult (nearly impossible) to do sniffing. The data is only visible with people who have permissions to access to it.

*Cryptography: It is a group of techniques that allow you to encrypt words. With cryptography you can get conifdentiality. Apart from encrypting, you can also decrypt.

*Encrypt: when you are encrypting, you are modifying the data to make it unreadable/ illegible.

*Decrypt: this happens when you recover the original text.

*Algorithm: it is a self-contained sequence of actions to be performed.

*Key: it is a field that you use to sort data. The keys can have a lenght of 1024 numbers. Depending on which key you are applying, the encryption will result in one way or another.

*Digital Certificate: it is an algorithm with a key that allows you to guarantee your personality.



Hope you find it useful.
Bye,
xxx



Friday, 10 March 2017

SECURITY TIPS

Hi guys! Last day we saw a video about security tips and our teacher told us to create a PowerPoint with some more tips. This is the final result:


Security tips de Diana López Pérez


Hope you find it useful.
Bye,
xxx

Tuesday, 14 February 2017

ADWARE VIDEO

Last week, our teacher told us to create a video talking about something related to computers software or applications. My friend Alba and I decided to talk about adware. Here is our video:


Now, I'm going to give you all the information we talked about in the video:
*An adware is any software that makes appear automatically advertisements in order to generate money for its author every time you open a certain tab. The adware may appear in the user's screen.
This software may be designed to analyze which internet sites the user visits and to present advertisement pertinent to the goods or services featured there.
The most common adwares are: Bonanza, Shop Chip, Whilokii, Zwinky Toolbar... And some ways to prevent this malware can be: putting a firewall or changing your browser. The most secure browsers are: Opera and Firefox.



Hope you find it useful.
Bye,
xxx


Tuesday, 31 January 2017

SECURITY

Today, we learnt a couple of things related to security. For example: what is security, which things do you want to protect, what an UPS is and what Social Engineering is.

a) What is the computer security?

- It is the protection of computer systems from the theft or damage to the hardware, software and many other files.




b) Which things do you want to protect from other people?
- It is really important to protect your data (addresses, credit card, etc...), your hardware, your network and you have to protect yourself too.
For example: if  someone takes/hacks your credit card, that person will be able to use it and spend all your money or if someone gets your WiFi password, that person will use your internet for free.


c) What is the meaning of  UPS?
- UPS (Uninterruptible Power Supply) is an electrical machine that provides emergency power to a load when the main power source fails.



d) What is "Social Engineering"?
- It is the psychological manipulation of people to get confidential information about important data (ex.: accounts' passwords)

*It is also important to always have an antivirus, this way you can avoid malware.





Hope you find it useful.
Bye,
xxx

Saturday, 21 January 2017

SECURE PASSWORDS

Yesterday, we learnt how to make a stronger password and what a two-step verification was:

First of all, our teacher explained us everything and finally she gave us some questions to answer. These are the questions:

1. Think about 5 services you use with a password:

-Whatsapp, Instagram, Twitter, computers and mobile phones.


2. 6 recommendations to create a secure password: 


-It must have at least 8 characters, it shouldn't contain your name or the name of your company, it mustn't contain your personal information (such as: your ID, your  born date/place, etc...), you can't use words from the dictionary (ex.: sky/cielo), it can't be formed by letters or numbers that are adjacent in the keyboard (ex.: 123456asdfgh) and it must contain characters from each of the following groups: capital letters, lowercase letters, digits or special characters.

3. What is a password manager? Advantages and disadvantages:


A password manager is a software or hardware application that helps a user to store and organize passwords.


-Advantages: it is the best way to make sure you have a strong and unique password for every online account, without  a password manager people tend to have weak passwords and they can be hacked easily, you can aslo store you bank details, passport numbers, credit card, etc...


-Disadvantages: they have a single point of failure (with a password manager you have just one password and if that one password is compromised, everything will be compromised), the Terms & Conditions and, a virus can gain access to whatever is stored on your computer.

4. Which were the most common passwords used in 2017?:


-1234,asdfghjklñ, 12345asdfgh, qwerty, qwertyuiop, etc...


5. Write 5 strong passwords. Check their strength here:


  1) " h3ymynam3sD1ana "--- 609 milliion years.

  2) " wut1sg01ng0nh3r3 "--- 227 million years.
  3) " d0ntudar3t0says0 "--- 6 million years.
  4) " th1s1ss0c00lw0w "--- 175 thousand years.
  5) " 1l1k3ch0c0lat3 "--- 5 thousand years.

6. Two-step verification. What is that?: 


-It protects your accounts by requiring you to provide an additional piece of information after you give your password to get into your account. After entering your password correctly, an online service sends you a text message with a unique string of numbers that you will need to use to get access to your account.


*You can find a two-step verification on your Apple ID, Whatsapp, Gmail, etc...






Hope you find it useful.

Bye,
xxx

Thursday, 19 January 2017

ABOUT USER PROFILES

A user profile is a collection of settings and information associated with a user. It can be defined as the explicit digital representation of the identity of the user with respect to the operating environment (for example: websites). User profiles contain information such as: the system needs, general data, restrictions and application settings.

It can also help in specifying the terms for certain features in the system (the layout view, color themes, preferred languages, dates, etc...)





















Hope you find it useful.
Bye,
xxx

HOW TO CREATE A USER ACCOUNT

We've learnt how to create a user account in the Virtual Machine. Follow the next steps:

1.- Go to Control Panel















2.- User & family safety















3.- Click in User accounts















4.- Create your new account
















Hope you find it useful.
Bye,
xxx

Tuesday, 17 January 2017

WINDOWS' USERS

We've learnt two types of Windows' users: local and domain.


  • LOCAL USER: you can only use them if they are in the machine in which they were created ("alumnoBach" for example). There are two types of local users: Administrator and Standard.


  • DOMAIN USER: One person can control all the computers with just a computer, the domain controller (for example: changing the wallpaper, prohibit access to files, etc...). The Domain user has advantages and disadvantages. One advantage is the fact that you don't need to know the password of each device and a couple of disadvantages of this user are that if the network is down, you can't access to your computer and if you don't log off your domain user session, anyone who uses the computer afterwards can access to your data.


Hope you find it useful.
Bye,
xxx

HOW TO CONFIGURE YOUR IP ADDRESS

Today I'm going to explain step by step how to configure your IP Address:

1.- Go to Control Panel.














2.- Now, you're in Control Panel. Then, you have to click in Network and Internet.














3.- You have to click in Network and Sharing Centre.














4.- You have to go to Connection: Local Area connections.














5.- Click in Properties.














6.- Click in Internet Protocol V. 4














7.- Finally, you have to use the following IP Address, fill the gaps and click in: OK.















Hope you find it useful.
Bye,
xxx

Tuesday, 10 January 2017

CHANGES

Today I've done some changes in my blog. I've put my classmates' blogs so that you are able to access to them.

Hope you find it useful.
Bye,
xxx