AY Honors/Internet/Answer Key/es

From Pathfinder Wiki
< AY Honors‎ | InternetAY Honors/Internet/Answer Key/es /
Revision as of 06:57, 7 March 2021 by W126jep (talk | contribs) (Created page with "</noinclude>")
Other languages:
English • ‎español • ‎français


Template:Honor desc



1

Definir los siguientes términos:


1a

Internet



1b

World Wide Web (WWW)



1c

Sala de chat (mensaje instantáneo)



1d

Descargar



1e

Subir



1f

Sitio web



1g

Correo electrónico



1h

Virus


* A lo largo de esta especialidad, el término «virus» representa los virus tradicionales, así como troyanos, gusanos y otros códigos maliciosos.

Worm
A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to the poor security the computers infected have. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.



2

Definir los siguientes términos y dar ejemplos de cada uno:


2a

Correo electrónico



2b

Navegador web



2c

IRC/cliente IM (mensajería instantánea)



2d

Contenido multimedia



2e

Motor de búsqueda y directorios de búsqueda



2f

Programa software antivirus


Note
Many of these companies also offer "Internet Security Suites" that assist the user in also blocking and removing trojans, worms, malware, and other malicious code.

1. ^ These software programs are leaders in antivirus technology as of 10/2005. Please check with online resources or local computer/office supply stores for the latest versions and programs available.


2g

Cortafuegos (informática es firewall)


A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

Examples include: ZoneAlarm, Microsoft Firewall, Norton Firewall, and many other free and for-pay packages.



3

Completar uno de los siguientes:


3a

Escribir una breve historia del Internet de 250-300 palabras.


Include date/events surrounding its origin, the major landmark events, the birth and growth of web browsers (such as Mosaic, Netscape, Internet Explorer), and what it is doing today. Remember, this is not a history of computers, but rather a brief history of the Internet. You should list at least 2 online resources from which you found information relevant to your report.


3b

Presentar una charla de dos a tres minutos acerca de la historia del Internet.

Independientemente de la opción elegida, incluir la fecha y los acontecimientos que rodean su origen, los grandes acontecimientos, el nacimiento y el crecimiento de los navegadores web (como Mosaic, Netscape, Internet Explorer) y lo que están haciendo hoy. Recordar, no se trata de una historia de los ordenadores, sino una breve historia del Internet. Se debe hacer una lista de al menos dos de los recursos en línea donde se encontró la información relevante para este reporte.


If you choose this option, you will need to present the same information as in option a. It's OK to use notecards during the oral presentation so that you can follow your outline and not have to memorize dates and other facts.



4

¿Por qué es importante el programa software del antivirus? Incluir en la respuesta:


4a

¿Cuáles son algunas maneras que se puede recibir un virus a través del Internet?


  • Opening an email attachment which was sent by an unknown contact.
  • Clicking on a "pop-up" ad in a web page.
  • Downloading from the Internet any file that contains a virus.


4b

¿Por qué es importante tener actualizado el programa antivirus para mantener los archivos del equipo seguros?


The authors of virus and anti-virus programs are in a continual game of cat-and-mouse. Virus authors are constantly figuring out new ways to get around anti-virus programs, and anti-virus programs are continually updated to thwart the new viruses. The most successful virus programs are the ones most recently developed. If you do not keep your anti-virus software program up-to-date, your computer is vulnerable to the newest viruses.


4c

¿De qué manera no estar protegido puede dar lugar a compartir un virus con otros miembros de la familia y amigos?


We might share a file to our friends or family through an email or device without knowing that the file contains virus. The virus might damage our friend's or family's computer or even thumb drive that we use to share files that might contain virus.


4d

¿Qué daño puede hacer un virus a la computadora o a las computadoras de otras personas?


Viruses can damage your files in the computer including software. The damaged software contains a copy of the virus, and can then spread to other computers. Many viruses will consume computing power on the host, bogging it down and making it unresponsive. They can attempt to infect other machines over the network, consuming the network's bandwidth and slowing down the Internet connection for all other users in the building (even computers that are not infected).

Many viruses completely take over the computer they infect and can be remotely controlled by the attacker. These attackers can then use the computer to send spam, or mount a Distributed Denial of Service (DDoS) attack against their target's web server or computer network. Sometimes these viruses record keystrokes on the infected computer so that they can capture usernames, passwords, and bank account numbers. This information can then be forwarded to the attacker who can either use the information or sell it to someone else.



5

¿De qué manera filterware/control parental (programas como Net Nanny™ o AOL control paterno) protegen a la familia? Desarrollar con su familia y firmar un pacto familiar del uso de Internet que incluya los siguientes elementos:


  • a. Never reveal personal information
  • b. Remember that people may not be who they say they are.
  • c. Never meet an online friend in the flesh for the first time without a parent present.
  • d. Never respond to flames
  • e. Stop immediately if you see or read anything that upsets you.
  • f.Time each member of the family may spend on the internet per week. Set boundaries that encourage time for family, homework, and other necessary family activities.
  • g. Types of websites that are acceptable/unacceptable to view. What are the principles that your family will use to determine what are acceptable? Base these principles on the Bible.

An agreement ready to sign has been prepared for you on the third page of the pdf of the Internet Honor requirements on the Pathfinders website: http://www.pathfindersonline.org/pdf/ayhonors/internet_a.pdf


6

Mostrar la capacidad para navegar por Internet, demostrando los siguientes:


6a

Visitar al menos tres sitios diferentes (distintos nombres de dominio). Imprimir o mostrar la primera página de cada sitio a su instructor.


To save paper, it is recommended that rather than printing hard-copies of web pages, that the Pathfinder open the three web pages in separate tabs in the browser. A tab can be opened usually by right-clicking on the link and selecting the "Open page in another tab" option. In Firefox, clicking the link with the center mouse button (or using both the left and right buttons at the same time) will open the page in a new tab. Once three tabs have been opened, the instructor can check that the requirement has been met on-screen, without printing anything.


6b

Demostrar la capacidad para utilizar un motor de búsqueda para encontrar una página de la Biblia en línea. Ir a la página web, buscar por lo menos tres diferentes textos de la Biblia de memoria en tres diferentes versiones e imprimir o mostrar los resultados al instructor.



6c

Encontrar tres sitios web creados por la Iglesia Adventista del Séptimo Día. Imprimir o mostrar la primera página de cada sitio al instructor.


pcmagazine.com church websites such as http://plusline.org, http://iiw.org, and http://adventist.org



7

Demostrar la capacidad para utilizar el correco electrónico mediante la demostración de lo siguiente al instructor (si es necesario, crear una cuento de correo electrónico, con unnombre de usario y contraseña):


7a

Crear y enviar mensajes de correo electrónico



7b

Recibir y descargar correo electrónico



7c

Descargar/ver un archivo adjunto



7d

Conocer cinco principios de usar el correo electrónico prudentemente y sin peligro.


  1. Do not reply to unknown emails or Spam. You’re simply verifying that yours is a “real” email address and you will immediately receive even more junk email.
  2. Do not open emails with attachments unless you are SURE that they’re okay, and that your antivirus program is fully updated (most are auto-updated these days).
  3. Report any material sent to you in email that is unsafe or that you feel breaks God’s laws.
  4. Never respond to "unsubscribe" directions in a spam or UCE (unwanted commercial email) message.
  5. Keep your computers operating system patches up to date. If you're using Windows, do this from the MS Windows Update site using the Windows Update function.



8

Memorizar Filipenses 4:8. ¿Cómo funciona este texto de la Biblia como guía para el cristiano en el uso del Internet?


“Finally, brothers, whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable——if anything is excellent or praiseworthy——think about such things.” Philippians 4:8

Some questions to guide a small group discussion on this text:

  1. What do you think the writer, the apostle Paul, would say this text meant for internet users today?
  2. What do you think God had in mind when he asked Paul to write down this text?
  3. What are some things on the internet that you make use of that match (are consistent with) this Bible text?
  4. What are some of the things that are on the internet that do not match (are inconsistent) with this Bible message?
  5. Why do you think this text is important to Christians today?
  6. What are some ways that we as a club can help each other apply this text to our daily lives?
  7. What do you think are some ways we can live lives that match (are consistent) with this text?