Chuyển tới nội dung chính

Tổng quan các chủ đề

  • Computers and Operating Systems 3 - Security & Email

    Browse to find your image above. Then update alt text here. Set the first size number below to between 300-400.

    Replace this text with a short module introduction in narrative form; provide context and instructor's perspective to review (prior knowledge), preview (highlights of the module), and motivate (relevance to students' personal and career goals). Avoid referencing textbook chapters, page numbers, or dates. To replace image, double click the image placeholder. Select 300–400 pixels wide, and update the description of image. Include attribution of your image (Title, Author, Source, License). 

    [initial draft below]

    Security --- computer networks; types of computer networks; email; issues of digital security, computer security, and network security; ethical and legal issues



    Upon completion of this module, you will be able to:
    1. Apply knowledge of computer technology, including cyber security, email software, ethical use of digital information and computer practices.

    To achieve these objectives: 

    1. Read the Module 3 Introduction
    2. Read and view the materials in the Module 3 Pressbooks book chapter

    Module Pressbooks Resources and Activities

    You will find the following resources and activities in this module at the Pressbooks website. Click on the links below to access or complete each item.