أمن الفضاء السيبرني ضد التطرّف والإرهابAlghajatiفضاء سيبرني في تمدد واتساع متواصل و دائم
استهلاك كبير للمحتويات الرقمية من قبل الافراد
غياب الادراك الأدنى للمخاطر ونقص الخبرة
وقاية و حماية الافراد من التهديدات السيبرنية
استعراض مواقع تصميم الإختبارات الإلكترونيةArwaalimتم في هذه المادة استعراض بعض مواقع إعداد الإختبارات الإلكترونية وهناك المزيد من المواقع فهي في تطور وتجدد مستمر
RedbullstratosHashim Husseinto show and teach students about the jump of Flex Baumgartener and the team of the mission
عرض للتأهيل للتعريف برحلة فلكس باومجارتنر إلى حافة طيقة الستراتوسفير ومن ثم قفزته من هناك ومن ساهم فيها
O leary2012 comp_ppt_ch08Dalia SaeedThe document discusses various types of secondary storage devices used in computing. It describes hard disks, which use rigid platters to store files organized into tracks and sectors. Optical disks are discussed, including CDs, DVDs, and Blu-ray discs, along with their varying capacities. Solid-state storage options like solid-state drives, flash memory cards, and USB drives are also covered. The document provides details on the characteristics and capabilities of these common secondary storage technologies.
RedbullstratosHashim Husseinto show and teach students about the jump of Flex Baumgartener and the team of the mission
عرض للتأهيل للتعريف برحلة فلكس باومجارتنر إلى حافة طيقة الستراتوسفير ومن ثم قفزته من هناك ومن ساهم فيها
O leary2012 comp_ppt_ch08Dalia SaeedThe document discusses various types of secondary storage devices used in computing. It describes hard disks, which use rigid platters to store files organized into tracks and sectors. Optical disks are discussed, including CDs, DVDs, and Blu-ray discs, along with their varying capacities. Solid-state storage options like solid-state drives, flash memory cards, and USB drives are also covered. The document provides details on the characteristics and capabilities of these common secondary storage technologies.
Protecting young-children-online-power point-presentation-securityMohamed ElGabryThis document provides tips for protecting young children online and establishing internet safety. It recommends that parents 1) pay attention to their children's online activities by evaluating websites and monitoring behavior, 2) set clear rules about keeping personal information private, respecting others, and using computers safely, and 3) put technology to work by using family safety tools, protecting devices, and being the administrator of home computers. If problems arise, parents should teach children to trust their instincts and always report threats or cyberbullying. The overall message is that internet safety requires vigilance and open communication similar to teaching children to swim safely.
Children arabicMohamed ElGabryThis document provides instructions on how to sign up for and install Microsoft Security Essentials, a free antivirus software program from Microsoft. It outlines downloading and running the setup file from the Microsoft website, accepting the license agreement and privacy statement, and allowing the program to install. It then recommends regularly updating the software to ensure protection from the latest viruses and other malware. The document also includes a sample of a notification email with login credentials that would be received after completing the signup process.
Tot edu eng.Mohamed ElGabryThe document discusses various topics related to online safety, including internet usage statistics, common online risks for children like inappropriate content and cyberbullying, tips for safe internet use like using family safety software and keeping communication open with children, and threats to computer security like viruses, spam, and identity theft. It provides advice on how to create strong passwords, protect sensitive data and devices whether at home or on public WiFi, and emphasizes being cautious of phishing attempts, unauthorized downloads, and social engineering attacks online.