Monday, 30 November 2015

E-safety

                                              E-safety



                                                 Top eight E-Safety Tips



  • Always think of your personal safety first when using  your mobile phone. It is easy for anyone to lie about who they are online, so you can never really be sure about who you are talking to.
  • Do not give out any personal information about yourself online to people you do not know. This includes your full name, address, street name, postcode, or school name. 
  • Never give your contact number to anyone who you don’t know. 
  • It’s a good idea to use a nickname rather than your real name. 
  • Never give out pictures online or over a mobile unless you know the person in real life. 
  • Always use private settings whenever you are setting up a social networking page.
  • Anything you post or upload to the internet is there forever so be very careful what you put online.
  •  Never go onto webcam with people you don’t know in real life. 

Monday, 16 November 2015

computer security threats

                           Computer Security Threats 


Botnets

If you've never heard of a botnet, it's likely because they go largely undetected.

What they are:

A collection of software robot creates an army of infected computers are remotely controlled by the originator. 

What they can do:

  • Send spam emails with viruses attached.
  • Spread all types of malware.
  • Can use your computer as part of a denial of service attack against other systems.


Hacking

Hacking is a term used to describe actions taken by someone to gain unauthorized access to a computer. The availability of information online on the tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities.

What it is:

The process by which cyber criminals gain access to your computer.

What it can do:

  • Find weaknesses in your security settings and exploit them in order to access your information.
  • Install a Trojan horse, providing a back door for hackers to enter and search for your information. 


Pharming

Pharming is a common type of online fraud.

What it is:

A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.

What it can do:

  • Convince you that the site is real and legitimate by spoofing or looking almost identical to the actual site down to the smallest details. You may enter your personal information and unknowingly give it to someone with malicious intent.

Phishing

Phishing is used most often by cyber criminals because it's easy to execute and can produce the results they're looking for with very little effort.

What it is:

Fake emails, text messages and websites created to look like they're from authentic companies. They're sent by criminals to steal personal and financial information from you. This is also known as “spoofing”.

What it does:

  • Trick you into giving them information by asking you to update, validate or confirm your account. It is often presented in a manner than seems official and intimidating, to encourage you to take action.

Viruses

Most people have heard of computer viruses, but not many know exactly what they are or what they do.

What they are:

Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download of a virus.

What they can do:

  • Send spam.
  • Provide criminals with access to your computer and contact lists.
  • Scan and find personal information like passwords on your computer.
  • Hijack your web browser.
  • Disable your security settings.
  • Display unwanted ads.


   Precautions:



Monday, 9 November 2015

Digital Citizenship

                          Nine Elements of Digital Citizenship


1.   Digital Access:   full electronic participation in society.
Technology users need to be aware that not everyone has the same opportunities when it comes to technology.  Working toward equal digital rights and supporting electronic access is the starting point of Digital Citizenship. Digital exclusion makes it difficult to grow as a society increasingly using these tools. Helping to provide and expand access to technology should be goal of all digital citizens.  Users need to keep in mind that there are some that may have limited access, so other resources may need to be provided.  To become productive citizens, we need to be committed to make sure that no one is denied digital access.

2.   Digital Commerce:   electronic buying and selling of goods.
Technology users need to understand that a large share of market economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller needs to be aware of the issues associated with it. The mainstream availability of Internet purchases of toys, clothing, cars, food, etc. has become commonplace to many users. At the same time, an equal amount of goods and services which are in conflict with the laws or morals of some countries are surfacing (which might include activities such as illegal downloading, pornography, and gambling). Users need to learn about how to be effective consumers in a new digital economy. 

3.   Digital Communication:   electronic exchange of information.
One of the significant changes within the digital revolution is a person’s ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options.

4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. 
While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., Videoconferencing, online sharing spaces such as wikis). In addition, workers in many different occupations need immediate information (just-in-time information). This process requires sophisticated searching and processing skills (i.e., information literacy). Learners must be taught how to learn in a digital society. In other words, learners must be taught to learn anything, anytime, anywhere.  Business, military, and medicine are excellent examples of how technology is being used differently in the 21st century. As new technologies emerge, learners need to learn how to use that technology quickly and appropriately. Digital Citizenship involves educating people in a new way— these individuals need a high degree of information literacy skills.

5. Digital Etiquette:   electronic standards of conduct or procedure.Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct).   Many people feel uncomfortable talking to others about their digital etiquette.  Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society.

6.   Digital Law:   electronic responsibility for actions and deeds 
Digital law deals with the ethics of technology within a society. Unethical use manifests itself in form of theft and/or crime. Ethical use manifests itself in the form of abiding by the laws of society. Users need to understand that stealing or causing damage to other people’s work, identity, or property online is a crime. There are certain rules of society that users need to be aware in a ethical society. These laws apply to anyone who works or plays online. Hacking into others information, downloading illegal music, plagiarizing, creating destructive worms, viruses or creating Trojan Horses, sending spam, or stealing anyone’s identify or property is unethical.

7.   Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world.Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights extended to every digital citizen. Digital citizens have the right to privacy, free speech, etc. Basic digital rights must be addressed, discussed, and understood in the digital world.  With these rights also come responsibilities as well.  Users must help define how the technology is to be used in an appropriate manner.  In a digital society these two areas must work together for everyone to be productive. 

8.   Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to be addressed in a new technological world.  Beyond the physical issues are those of the psychological issues that are becoming more prevalent such as Internet addiction.  Users need to be taught that there are inherent dangers of technology. Digital Citizenship includes a culture where technology users are taught how to protect themselves through education and training. 

9.   Digital Security (self-protection):   electronic precautions to guarantee safety. 
In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community. It is not enough to trust other members in the community for our own safety. In our own homes, we put loc

ks on our doors and fire alarms in our houses to provide some level of protection. The same must be true for the digital security. We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.


                                                                 

Monday, 2 November 2015

Cyber safety

                                               Cyber-Safety



What is cyber safety?

Cyber safety is the safe and responsible use of Information and Communication Technologies . Net safe's approach to cyber safety is founded on:
  • Maintaining a positive approach about the many benefits brought by technolog
  • Precautions from cyber safety:ies
  • Encouraging the public to identify the risks 
  • Putting in place strategies to minimise and manage risks
  • Recognising the importance of effective teaching and learning programmes.

  1. Always ask an adult if you’re unsure of anything when you are online.
  2. Don’t sign up for sites that are 13+ if you are not old enough. 
  3. Don’t add people as online friends unless you know them in real life or have parent permission. Never arrange to meet an online friend without talking to a parent.
  4. Remember that you cannot believe everything you read on the internet and you can’t trust everything online friends tell you.
  5. Choose sensible names for usernames, email addresses etc. 
  6. Talk to your parents about what you’re doing online and let them know when you’re going on the internet.
  7. Know what cyber bullying is and tell someone if you think it’s happening to you. Cyber bullying is when someone picks on you, annoys, embarrasses, or threatens you over and over again using technology, such as the internet or a phone.
  8. Protect your digital footprint: don’t put anything online that you wouldn’t want all your friends, family, teachers and future employers to see.
  9. Treat others online the way you’d like to be treated.

Monday, 26 October 2015

Global Dignity Day

               Global Dignity Day In Our School !



The concept of dignity is  to express the idea that a being has an innate right to be valued, respected, and to receive ethical treatment.
The English word "dignity", attested from the early 13th century, comes from Latin . In ordinary modern usage it denotes "respect" and "status", and it is often used to suggest that someone is not receiving a proper degree of
respect, or even that they are failing to treat themselves with proper self-respect.

Last week we celebrated "Global dignity day" in our school. This event was planned by the A level students. The custodian staff was awarded with a card and cup-cakes. The cup-cakes were also made by A levels.The school was decorated with cards and banners. We made a special wall for displaying paintings on dignity day.Some students displayed a role play on dignity which was moral lesson for us all, for our life :)


 The Global Dignity Day was celebrated by teachers and students of Beaconhouse schools across Pakistan with enthusiasm. The day recognises the Universal Right of every individual to lead a dignified life. 

In the light of this theme, we celebrate the global dignity day with an initiative to commend and encourage good practices of dignified and courageous individuals of our society.

The purpose of celebrating this day was to highlight the fact that all people poor or rich and all occupations/jobs are bound to equal amounts of respect and have th
e same importance. 


Beaconhouse Schools organised special assemblies for this purpose, during which students shared their personal experiences regarding school staff and other people who are not rich but maintain lives worth respecting. 

Students also presented Role Plays and wrote poems highlighting the importance and principles of dignity. 

The event helped a great deal in teaching importance of dignity in our daily life to the students. Videos of the entire assemblies were also recorded by the schools in order to share the experience with the community at large. 

Beaconhouse schools also engaged in fundraising activities such as organising bake sales, donating books and other stuff to help the underprivileged members of society.

Monday, 19 October 2015

Titanic

                                      "Titanic"

                                             the

                                      magical ride!



Image result for titanic history Titanic is the most famous and intriguing ship in history.No other ship in history has fascinated people all over the world as much as the Titanic. It fascinates people until today. It is the sheer immensity of the disaster – the largest ship in the world, proclaimed unsinkable.

RMS Titanic was a British passenger liner that sank in the North Atlantic Ocean in the early morning of 15 April 1912 after colliding with an iceberg during her maiden voyage from Southampton, UK, to New York City, US. The sinking resulted in the loss of more than 1,500 passengers and crew, making it one of the deadliest commercial peacetime maritime disasters in modern history. The RMS Titanic, the largest ship afloat at the time it entered service, was the second of three Olympic class ocean liners operated by the White Star Line, and was built by the Harland and Wolff shipyard in Belfast with Thomas Andrews as her naval architect. Andrews was among those lost in the sinking. On her maiden voyage, she carried 2,224 passengers and crew.


Monday, 12 October 2015

Teacher's Day

                                       Teacher's Day




Teacher's are nation builders.They build the future of citizen country. They have very important role in our life.


In many countries, Teachers' Day is a special day for the appreciation of teachers, and may include celebrations to honour them for their special contributions in a particular field area, or the community in general. The date on which Teachers' Day is celebrated varies from country to country. Teachers' days in different countries are distinct from World Teachers' Day, which is celebrated on 5 October.

On 5th Oct, we celebrated teacher's day.  Our school was decorated and we had a grand assembly in which teacher's were awarded with a mug and appreciation certificate. Student's sat on the floor and did a lot of hootings and clapping for thier favourite teacher's and gave them cards.We also flew the balloons with banner attached of  HAPPY TEACHERS DAY! Our art teachers decorated some boards and wall full of cards .When any teacher use to come in our class we greeted them by saying HAPPY TEACHERS DAY!!

Tuesday, 6 October 2015

Bluetooth Fever

                               Bluetooth Fever


Topology Management: enables the automatic configuration of the piconet topologies especially in scatternet situations that are becoming more common today. This should all be invisible to the users of the technology, while also making the technology just work


Broadcast Channel: enables Bluetooth information points. This will drive the adoption of Bluetooth into cell phones, and enable advertising models based around users pulling information from the information points, and not based around the object push model that is used in a limited way today.
Bluetooth technology already plays a part in the rising Voice over IP (VOIP) scene, with Bluetooth headsets being used as wireless extensions to the PC audio system. As VOIP becomes more popular, and more suitable for general home or office users than wired phone lines, Bluetooth may be used in cordless handsets, with a base station connected to the Internet line

Alternate MAC PHY: enables the use of alternative MAC and PHY's for transporting Bluetooth profile data. The Bluetooth Radio will still be used for device discovery, initial connection and profile configuration, however when lots of data needs to be sent, the high speed alternate MAC PHY's will be used to transport the data. This means that the proven low power connection models of Bluetooth are used when the system is idle, and the low power per bit radios are used when lots of data needs to be sent.
QoS improvements: enable audio and video data to be transmitted at a higher quality, especially when best effort traffic is being transmitted in the same piconet.


Bluetooth technology already plays a part in the rising Voice over IP (VOIP) scene, with Bluetooth headsets being used as wireless extensions to the PC audio system. As VOIP becomes more popular, and more suitable for general home or office users than wired phone lines, Bluetooth may be used in cordless handsets, with a base station connected to the Internet link.










Monday, 28 September 2015

Eid-Ul-Adha Celebrations!!!!

Eid-ul-adha is our religious festival, we celebrate it with great respect for Allah!


I was waiting impatiently for Eid vacations.We brought a camel and a bull as we had a huge family.I was really excited for qurbani . I brought three beautiful dresess for Eid and matching jewellery and shoes. I took great care of animals until i started to love them. I used to give them water and a lot of leaves,I was not scared of them, took a lot of pictures and selfies with them.

Day 1:


 I woke up early in the morning at 6:00 and rushed in the bathroom to take a quick bath. When i got ready, butchers were ready to sacrifice the bull.I started crying because it was a heart breaking moment but it was all for Allah. My  mom made miraculous food and dishes. She was so much busy in the kitchen, just cutting and chopping meat.

Day 2:


We sacrificed camel this day. I was very sad as both animals were gone. I was very scared  when the camel started to shout and shiver when the butchers arrived.

Monday, 14 September 2015

Advantages and Disadvantages of Internet

ADVANTAGES OF INTERNET

COMMUNICATION:The Internet has made it easy for people to communicate with others because it is cheap and convenient. The only costs incurred are those paid to the Internet service provider. If you want to talk to someone who is in another part of the globe, you can just fire up Skype or any other communication app and hold a video chat.

INFORMATION AND RESOURCES:The Internet is swamped with information about anything and everything. There are multiple search engines that have made it easier for Internet users to find information.

ONLINE SERVICES AND E-COMMERCE:Today it is possible to carry out financial transactions online. We can transfer funds, pay taxes and utility bills or book movie tickets over the Internet in the comfort of your office or home.

ENTERTAINMENT:This is one of the major reasons why many people enjoy surfing the Internet – entertainment. You can watch movies, listen to music, read your favorite celebrity gossip columns and play games over the Internet. The Internet has become a mammoth amusement park that never closes.
                   

Disadvantages of Internet

SPAM MAIL:Spamming is the sending of unwanted and useless emails to random people. These emails obstruct the recipient needlessly. They are illegal and can cause frustration because they make it hard for people to access their email accounts. Bots are used to bombard your inbox with endless advertisements. This is quite perplexing as it always gets mixed up with important emails. Luckily, most email service providers have a security system in place to prevent spam emails from going to your inbox. All emails that are deemed suspicious get their email ID or IP address blocked or sent to the Spam folder.
VIRUS,TROJAN AND OTHER MALWARE:These are malicious programs that plague the Internet time and again. They attack a computer with the sole intent of causing harm. They can make the computer malfunction or even this can be very costly especially if you lose important data. Worse yet is the fact that you can easily fall victim to malicious software by clicking on a link on the Internet that appears genuine. Internet viruses can be categorized to three types - those that harm your executable boot files and system, those that affect a specific file by destroying it and those that keep changing things in your computer like Word files. You can protect yourself by installing a reliable anti-virus program on your computer before accessing the Internet.
LEAKAGE OF PRIVATE INFORMATION:The fact that the Internet has become a market place has also seen a rise in fraud cases. Credit/debit card details are particularly vulnerable. This calls for extreme caution when transacting online. Make sure to use a reliable payment processor instead of sending your details directly to an individual or business.

Addiction to Internet

Just like everything else, people also get addicted to the Internet. This may sound bizarre, but some people spend more than their fair amount of time on the Internet. This affects their social interactions a great deal. Internet addiction has been known to be a major cause of obesity and has, in some cases, led to some diseases like carpal tunnel syndrome. With some help, people addicted to the Internet can overcome this challenge.