Vajad kellegagi rääkida?
Küsi julgelt abi LasteAbi
Logi sisse
Ega pea pole prügikast! Tõsta enda õppeedukust ja õpi targalt. Telli VIP ja lae alla päris inimeste tehtu õppematerjale LOE EDASI Sulge

"cyber" - 21 õppematerjali

cyber - bullying 7. Political bullying 8. Military bullying 9. Hazing

Õppeained

Cyber Violence -
Cyber

Kasutaja: Cyber

Faile: 0
thumbnail
18
pptx

Küberkaitse

COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE NATO KÜBERKAITSEKOOSTÖÖ KESKUS NATO COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE The Centre was established on 14 May 2008, it received full accreditation by NATO and attained the status of International Military Organisation on 28 October 2008. The Centre conducts Located Tallinn Filtri tee 12 , Estonia research and training on cyber security and includes a http://www.kmin.ee/et/nato-kuberkaitsekeskus- staff of approximately 40 tallinnas HISTORY

Ühiskond → Ühiskonnaõpetus
11 allalaadimist
thumbnail
1
docx

Inglise keelne kõne

It allows people to work from their home, to form friendships from home, to vote and discuss social issues from home. Internet communications can potentially displace face-to-face communications. People tend to loose their real-life communication skills and the generation growing up now has bigger chance to face the problems similar to social anxiety. Sure, I assume that I am also living a virtual life, but all of my friends online, are also my friends in real life. And even if I make some cyber friends, I always manage to enable face-to-face communication and exchange of emotions. I think it is very important and it should be a priority to everyone. In conclusion, I think everyone should bear in mind to closely examine their behaviour. The time spent online should not negatively impact the personal well-being. Ofcourse, we shouldn't thow our computer out of the window, but then again we should't get lost in the cyber world. That brings me to the end of my presentation

Keeled → Inglise keel
4 allalaadimist
thumbnail
20
ppt

Bullying

1 Types of bullying 1. Physical bullying: hitting, kicking, pushing, choking, punching 2. Verbal bullying: threatening, taunting, teasing, starting rumors, hate speech. 3. Exclusion from activities: This does not mean that a child should not have the right to choose to play, or not to play, with another child; it does mean that children should not be allowed to systematically exclude others: "No one play with Mary;" "No one wants to play with him;" "Don't be her friend." 2 Types of bullying 4. School bullying 5. Workplace bullying 6. Cyber-bullying 7. Political bullying 8. Military bullying 9. Hazing 3 4 DEFINITION • "Bullying is the act of intentionally causing harm to others through verbal harassment, physical assault, or other more subtle ...

Keeled → Inglise keel
1 allalaadimist
thumbnail
12
ppt

Presentatsioon Bullying

Types of bullying 1. Physical bullying: hitting, kicking, pushing, choking, punching 2. Verbal bullying: threatening, taunting, teasing, starting rumors, hate speech. 3. Exclusion from activities: This does not mean that a child should not have the right to choose to play, or not to play, with another child; it does mean that children should not be allowed to systematically exclude others: "No one play with Mary;" "No one wants to play with him;" "Don't be her friend." 27.11.12 TAAB11 2 Types of bullying 4. School bullying 5. Workplace bullying 6. Cyber-bullying 7. Political bullying 8. Military bullying 9. Hazing 27.11.12 TAAB11 3 27.11.12 TAAB11 4 DEFINITION · "Bullying is the act of intentionally causing harm to others through verbal harassment, physical assault, or other m...

Ergonoomika → Ergonoomika
43 allalaadimist
thumbnail
1
docx

Schools should provide computers for every student

this device at certain lessons. Finally, there have been many complaints about plagiarism. As long as the internet has unlimited amount of information, many students tend to copy the articles or information and give them out as their own ideas or creations. That decreases percentage of child's or adolescent's brain work, which later will not pay off. It seems to me that providing every student with computer is not necessary. After all it is very useful to have cyber classes at school, which can be visited few times a month.

Keeled → Inglise keel
3 allalaadimist
thumbnail
10
pptx

GOTH SUBCULTURE

GOTH SUBCULTURE Katrin Suviste 12.B TÕVL · Goths - a subculture, originated in the late 70s of the XX century in the UK based on punk movement. ORIGIN AND DEVELOPMENT (1979-1985) · The origin of the Gothic subculture dates back to the late 1970s. · ,,First wave" of gothic rock ­ Bauhaus, Southern Death Cult etc. · The most important for the gothic subculture can be considered 1982, marked by the opening of the famous club Batcave. SPLITTING AND MAINSTREAM POPULARITY (1985- 1995) · The second half of the 1980s was marked by the emergence of the "second wave" of gothic rock by the gradual departure of the representatives of the "first wave" into the shadows. · With the advent of the 1990s, the Gothic subculture was established as a "stage,,. CURRENT STATE · For modern goths, constant arguments, discussions and reflections on what "really" is "real Gothic" are an integral part ...

Keeled → Inglise keel
1 allalaadimist
thumbnail
1
pdf

Kodutöö: Research (Internet addiction)

Research INTERNET ADDICTION This study set out with the aim of assessing the negative effects of computer addiction in life. The results of this study show that the Internet may become a problem when it absorbs too much of your time, causing you to neglect your relations, your work, school, or other important things in your life. Surprisingly, computer addiction covers a variety of impulse-control problems including cybersex addiction, cyber-relationship addiction, net compulsions, information overload and Internet addiction. These findings supports the importance of the Internet addiction. Many people turn to the Internet in order to manage unpleasant feelings such as stress, loneliness, depression, and anxiety. This suggests that it's important to remember that there are healthier (and more effective) ways to keep difficult feelings in check. These may include exercising, meditating, using sensory relaxation strategies, and practi...

Keeled → Inglise keel
8 allalaadimist
thumbnail
17
ppt

PP esitlus FBI

Combat public corruption at all levels Combat international and national criminal organizations and enterprises Support federal, state, county, municipal, and international partners Combat significant violent crime Combat major whitecollar crime 8 The FBI is organized into functional branches Office of the Director National Security Branch Criminal, Cyber, Response, and Services Branch Human Resources Branch Science and Technology Branch Information and Technology Branch 9 Hiring process An applicant must be between the ages of 23 and 37 Must hold American citizenship, have a clean record, and hold a fouryear TS/SCI clearance. Have to pass a Physical Fitness Test Spend approximately 21 weeks at the FBI Academy,

Informaatika → Informaatika
20 allalaadimist
thumbnail
2
rtf

USA school system

Estonia got high marks in almost every category. Estonia According to Freedom House, it "ranks among the most wired and technologically advanced countries in the world. With a high internet penetration rate and widespread e-commerce and e-government services embedded into the daily lives of individuals and organizations, Estonia has become a model for free internet access as a development engine for society. As a Mashable reader pointed out, NATO's Cooperative Cyber Defense Centre of Excellence was built in Estonia in 2008, resulting in the funneling of funds to improve the country's IT infrastructure. USA The United States got nearly as excellent marks, with 78% internet penetration and no notable arrests of bloggers. However, the debate over the Stop Online Piracy Act (SOPA) and the PROTECT IP Act (PIPA), two bills considered a threat by many Internet free speech advocates. Freedom House also warned of greater U.S. government interference in the open

Keeled → Inglise keel
2 allalaadimist
thumbnail
24
pptx

eSport PP (Inglise keelne)

for Rolling Stone ... Space Invaders Chamionship Atari, 1980 10000 participants Established competitive gaming as a mainstream hobby ... Netrek ­ "the first online sports game" Nintendo World Championships (1990) Television shows featuring eSports, GamesMaster Tournaments in 1990's included Cyberathlete Professional League, QuakeCon, Professional Gamers League CPL: Counter-Strike, Quake series, Warcraft ... Major growth in 21th century Viewership, prize money 10 in 2000, 260 in 2010 World Cyber Games, Intel Extreme Masters, Major League Gaming Classification as a sport Controversial point of debate Designating some games as sports Never reach the status Popularity not only reason indentified Careful planning, precise timing, skill execution ­ classifies an activity as sport Outdoor playing areas not requried by all sports https://www.youtube.com/watch?v=XPnZdjB VWY4 Teams and associations OpTic Gaming, Evil Geniuses, Cloud9, Fnatic, Natus Vincere, Team SoloMid

Keeled → Inglise keel
2 allalaadimist
thumbnail
19
pptx

Küberrünnakud- ja küberkaitse

Suuruselt teine küberrünnak maailmas pandi toime Eestis aastal 2007a. Küberrünnakute ulatus: Küberrünnakute ohvriteks võivad langeda terved riigid eesotsas ministeeriumite, riigiettevõtete ja suurte finantsasutustega. Rünnakutüübid: Aktiivsed: Tehakse reaalset kahju ärakasutades süsteemi vigu või nõrku kohti. Nt. ÜLEKOORMAMINE Passiivsed: Kogub infot kasutades nuhkvara, et lugeda paroole, kasutajanimesid, emaile ja ka kuulata võrgu liiklust. Rünnakutüübid: 1. Cyber Espionage ­ Küberspionaaz 2. Web vandalism 3. Propakanda Informatsiooni levitamine 4. Gathering data ­ info kogumine 5. Distributed DenialofService Attacks ­ hajutatud teenuse takistamise rünnak 6. Equipment disruption ­ varustuse segilöömine 7. Attacking critical infrastructure ­ rünnatakse kriitilisi infrastruktuure 8. Compromised Counterfeit Hardware ­ võltsitud raudvara Võrguründed: Rünnang toimub kindla ettevõtte või institutsiooni suunas.

Informaatika → Arvutiõpetus
88 allalaadimist
thumbnail
7
pdf

Sotsiaalne tarkvara ja võrgukogukonnad wiki

5 http://www.guardian.co.uk/technology/2011/apr/27/playstation-users-identity-theft-data-leak 6 http://www.informationweek.com/security/attacks/sony-data-breach-cleanup-to-cost-171-mil/2296 25379 Problem 2 In June 2011, Citigroup disclosed a data breach within their credit card operation, affecting approximately 210,000 or 1% of their customers' accounts. Sources Last week, the company said a total of 360,083 North American Citigroup credit card accounts were affected by the cyber attack in May, the latest in a spate of attacks in recent months targeting high-profile companies like Sony, Google Inc and Lockheed Martin. http://www.reuters.com/article/2011/06/28/us-citigroup-idUSTRE75R7G220110628 (Reuters) - Citigroup, the third-largest U.S. bank by assets, has told government officials that about 3,400 of the customers whose credit-card information was hacked have suffered about $2.7 million in losses, the Wall Street Journal reported. http://www.reuters

Informaatika → Informaatika
9 allalaadimist
thumbnail
10
docx

Arvutisõnastike võrdlus

Arvutisõnastike võrdlus Käesolev essee kuulub sõnastikuvõrdluse valdkonda. Vaatluse alla võtan Arvi Tavasti ja Vello Hansoni poolt üllitatud „Arvutikasutaja sõnastik: inglise-eesti“ esimese ja viimase väljaande, kuna igapäevase arvuti- ja arvutivõrgu terminite kasutajana tunnen huvi, kuidas elava kõne kõrval on asjatundjad sõnu paberisse raiunud. Sõnastikest otsisin eelkõige laialt levinud arvutitermineid ning ühe termini leidnud, liikusin edasi terminit teistega seostavate tähiste kaudu. Arvutikasutaja sõnastiku esmatrükk tuli välja 1996 ning neljas, täiendatud ja parandatud trükk aastal 2008. 1996. aasta paiku hakkasid personaalarvutid tasapisi ka Eestis laiemalt levima. Mitte eriti ammu – 1993 oli Genfi tuumauuringute laboratooriumis välja töötatud ja kinnitatud esimene html-keele ametlik versioon ning Illinoisi ülikoolis esimene mugava kasutajaliidesega veebilehitseja. Ol...

Informaatika → Arvuti õpetus
7 allalaadimist
thumbnail
8
docx

Denotative and connotative meanings in motion graphics text

It represetens importance, the person who is wearing it is important. When the star explodes into pieces it symbolises that this repetation is destroyed, it is harmful for the wearer. 0:53 ­ 0:55 Denotataive look : - Same codeball is surrounded buy some grid - White elements with trail are bursting into it Connotative look : - This time codeball is surrounded by a protective code, encryption which protects against cyber attacks. The protective grid moves a bit, seemingly protecting the code inside. 0:58 ­ 1:05 Denotative look : - Words numbers and characters are transformed into another set of randomly positioned characters symbols and numbers. Connotataive look : - Computer code is encrypted by the software. Output code of the encryption seems like random characters, numbers and symbols. For the program, with right key and this

Keeled → Inglise keel
1 allalaadimist
thumbnail
14
doc

Interneti otsimootorite kasutamisvõimalused

from" friending" their own children who happen ... Paper presented at Internet research 11.0: Sustainability, Participation, Action (Gothenburg, Sweden ... LSE, London: EU Kids Online ... Cite Save More Being Publicly Private: Extreme Nationalist User Practices on Social Networks A Siibak - Security in Cyberspace: Targeting Nations, …, 2014 - books.google.com ... secure the existence of our people and a future for white children', http://archive. ... Herzog, S.(2011),'Revisiting the Estonian cyber attacks: digital threats and multinational responses', Journal ... meet bits: social media, the mobile web and augmented revolution', Future Internet, 4: ... Cite Save Nimi:ANNERIIN TRUU Õpperühm:IK 12 9. Leidke eestikeelseid materjale, mille pealkirjas esineb märksõna „infosüsteem“. Palju ja mida leiate? Leian 6 materjali. [CITATION] Infosüsteem ESTER uueneb Ü Treikelder - 2001 - Raamatukogu Cited by 2 Related articles Cite Save

Informaatika → Infootsing: allikad ja...
34 allalaadimist
thumbnail
6
doc

Topic - Sport

When there is a game on, I just am supporting one of the playing teams. Of course, if the Estonian team is playing, I support them. 11. Conclusion I think that going in for sports is very good. First, it keeps you fit. Then, it is good for your health. And if you attend school, you will do much better in physical education lessons. However, in the new millennium, new sports have been going further from the physical aspect to the mental or psychological aspect of competing and cyber sports organizations are becoming more and more popular.

Keeled → Inglise keel
34 allalaadimist
thumbnail
12
docx

Arvutisõltuvus

Tallinn: Tallinna Ülikooli Informaatika Instituut. http://www.cs.tlu.ee/~rinde/mm_materjal/pdf/mm_analoog_digitaal.pdf 19.11.2013 Tadolder, M. Tänav, T. 2001. Arvuti ajalugu (online). Tallinn: Tallinna Tehnikagümnaasium. http://web.zone.ee/arvutiajalugu/sissejuh.htm 20.11.2013 Wikipedia. 2013. (online) 09.09.2013 http://et.wikipedia.org/wiki/Arvuti 20.11.2013 Nykodym, N., Ariss, S. and Kurtz, K. n. d. Journal of Leadership, Accountability and Ethics. Computer Addiction and Cyber Crime. Toledo: The University of Toledo. Tõugu, E. 2007. Pahandused küberruumis. (online) 21.02.2007 http://www.akadeemia.ee/_repository/File/TEGEVUS/Esitlused20070221/Esitlused_2 008/Tougu_teesid.pdf 20.11.2013 Kaha, A. 2002. Arvutisõltuvus kui tänapäeva tehnoloogia varjukülg (online). 21.06.2002. https://www.ria.ee/lib/am-2001-2005/3016_628.HTM 20.11.2013 Kaha, A. 2002. Arvutisõltuvus kui tänapäeva tehnoloogia varjukülg (online). 21.06.2002. https://www.ria

Psühholoogia → Psühholoogia
23 allalaadimist
thumbnail
14
doc

Digitaalsed fotokaamerad

TALLINNA MAJANDUSKOOL Infotöötluse osakond Kristi Rüütna Tarkvara arendus DIGITAALSED FOTOKAAMERAD Referaat Juhendaja: Mati Kirikal Tallinn 2010 SISUKORD SISUKORD.................................................................................................................................2 SISSEJUHATUS........................................................................................................................ 3 DIGITAALSED FOTOKAAMERAD ...................................................................................... 4 KOKKUVÕTE..........................................................................................................................13 KASUTATUD ALLIKAD....................................................................................................... 14 ...

Informaatika → Arvutite riistvara alused
41 allalaadimist
thumbnail
25
docx

Arvutimängude populaarsus, uurimistöö

VASTSELIINA GÜMNAASIUM ARVUTIMÄNGUDE POPULAARSUS VASTSELIINA GÜMNAASIUMI PÕHIKOOLI ÕPILASTE NÄITEL Uurimistöö Koostaja: Kristjan Nedo 11. klass Juhendaja: Külli Lendsaar Vastseliina 2013 SISUKORD SISSEJUHATUS Tänapäeval on noored hakanud üha enam mängima arvutimänge. Kui 10 aastat tagasi saadi väljas kokku, et tagaajamist mängida, siis nüüd kutsutakse sõpru Internetti, et koos mängida saaks. Kuna olen ka ise päris pikka aega arvutimänge mänginud, otsustasin valida uurimistöö teemaks ,,Arvutimängude populaarsus Vastseliina Gümnaasiumi põhikooli õpilaste näitel". Uurimistöö eesmärgiks on anda ülevaade, kas Vastseliina Gümnaasiumi põhikooli õpilased mängivad arvutimänge, milliseid mäng...

Informaatika → Arvutiõpetus
81 allalaadimist
thumbnail
34
doc

MIS ON INFOÃœHISKOND I loeng

Hoolimata erinevatest teoreetilisest käsitlusest tundub, et elektroonilise kommunikatsiooni kasutuselevõtuga pole siiski midagi muutunud (Poster, 1990). Pärast seda kui infoühiskond on muutunud käibefraasiks poliitikute ja meedia jaoks, on tulnud esile ka skeptilised sotsiaalteadlased. Steve Woolgar esindab kriitiliste sotsiaalteadlaste koolkonda, kes leiavad, et liigne infoühiskonnast ja Internetist rääkimine on viinud meid küberboolini (Cyberbole= cyber + hyperbole), mis tuleb eesliidete liigkasutusest ning on omandanud hüperboolilised mõõtmed. Woolgar väidab, et hype ehk haip on ajaloost tuttav ja korduv nähtus. Iga uut tehnoloogiat või nähtust tutvustatakse kui enneolematut ja revolutsioonilist. Sotsioloogiliselt kriitilist suunda kajastavad üha rohkem raamatuid pealkirjadega, mis kutsuvad üles reaalsuse kontrollile. Põhiliseks argumendiks on see, et inimeste isiklikud kogemused tehnoloogiaga on pigem kaksipidised

Infoteadus → Sissejuhatus infoteadustesse
29 allalaadimist
thumbnail
64
docx

Arvutiarhitektuuri eksami teooriaküsimused vastustega

Kui kolmanda põlvkonna arvuteis olid integraallülitustel üksnes vahe- ja registermälud, siis neljanda põlvkonna arvuteis on nendel ka põhimälud  Mikroprotsessoritele põhinevad personaalarvutid hakkavad järk-järgult välja tõrjuma miniarvuteid  Tarkvaraarenduses on tähelepanu keskmes operatsioonisüsteemide, kompilaatorite ja rööptöötluseks sobivate kõrgkeelte arendamine Esindajaid: IBM System 370, MITS 816, Apple II, Cray 1, CYBER 205, VAX11/780 Viies põlvkond (1981 – 1991) Iseloomulikud jooned:  Mikrolülituste integratsioonitaseme jätkuv tõus. Valmistatakse keerukaid ja võimsaid mikroprotsessorkiipe ning suure infomahutavusega mälulülitusi  Turule tulevad võimsad RISC-arhitektuuriga mikroprotsessorid. Kõrvuti universaalprotsessoritega hakatakse laialdasemalt tootma eriprotsessoreid  Informatsiooni töötlemisel hakatakse massiliselt rakendama rööp- ehk paralleeltöötlust.

Informaatika → Süsteemiteooria
35 allalaadimist


Sellel veebilehel kasutatakse küpsiseid. Kasutamist jätkates nõustute küpsiste ja veebilehe üldtingimustega Nõustun