Difference between revisions of "AY Honors/Internet/Requirements"

From Pathfinder Wiki
< AY Honors‎ | InternetAY Honors/Internet/Requirements
(Bot: Automated import of articles *** existing text overwritten ***)
m
 
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
{{HonorSubpage}}
 
{{HonorSubpage}}
  
 
+
<section begin=Body />  
 
 
<section begin=Body />
 
  
 
<b>1. <section begin=req1 /><noinclude><translate><!--T:1-->
 
<b>1. <section begin=req1 /><noinclude><translate><!--T:1-->
</noinclude>Define the following terms:  
+
</noinclude>Define the following terms:
 
<noinclude></translate></noinclude><section end=req1 /></b>
 
<noinclude></translate></noinclude><section end=req1 /></b>
  
 
:<b>a. <section begin=req1a /><noinclude><translate><!--T:2-->
 
:<b>a. <section begin=req1a /><noinclude><translate><!--T:2-->
</noinclude>Internet:
+
</noinclude>Internet
 
<noinclude></translate></noinclude><section end=req1a /></b>
 
<noinclude></translate></noinclude><section end=req1a /></b>
  
 
:<b>b. <section begin=req1b /><noinclude><translate><!--T:3-->
 
:<b>b. <section begin=req1b /><noinclude><translate><!--T:3-->
</noinclude>World Wide Web (WWW)  
+
</noinclude>World Wide Web (WWW)
 
<noinclude></translate></noinclude><section end=req1b /></b>
 
<noinclude></translate></noinclude><section end=req1b /></b>
  
 
:<b>c. <section begin=req1c /><noinclude><translate><!--T:4-->
 
:<b>c. <section begin=req1c /><noinclude><translate><!--T:4-->
</noinclude>Chat Room:
+
</noinclude>Chat Room
 
<noinclude></translate></noinclude><section end=req1c /></b>
 
<noinclude></translate></noinclude><section end=req1c /></b>
  
 
:<b>d. <section begin=req1d /><noinclude><translate><!--T:5-->
 
:<b>d. <section begin=req1d /><noinclude><translate><!--T:5-->
</noinclude>Download  
+
</noinclude>Download
 
<noinclude></translate></noinclude><section end=req1d /></b>
 
<noinclude></translate></noinclude><section end=req1d /></b>
  
 
:<b>e. <section begin=req1e /><noinclude><translate><!--T:6-->
 
:<b>e. <section begin=req1e /><noinclude><translate><!--T:6-->
</noinclude>Upload:
+
</noinclude>Upload
 
<noinclude></translate></noinclude><section end=req1e /></b>
 
<noinclude></translate></noinclude><section end=req1e /></b>
  
 
:<b>f. <section begin=req1f /><noinclude><translate><!--T:7-->
 
:<b>f. <section begin=req1f /><noinclude><translate><!--T:7-->
</noinclude>Website  
+
</noinclude>Website
 
<noinclude></translate></noinclude><section end=req1f /></b>
 
<noinclude></translate></noinclude><section end=req1f /></b>
  
 
:<b>g. <section begin=req1g /><noinclude><translate><!--T:8-->
 
:<b>g. <section begin=req1g /><noinclude><translate><!--T:8-->
</noinclude>Email:
+
</noinclude>Email
 
<noinclude></translate></noinclude><section end=req1g /></b>
 
<noinclude></translate></noinclude><section end=req1g /></b>
  
 
:<b>h. <section begin=req1h /><noinclude><translate><!--T:9-->
 
:<b>h. <section begin=req1h /><noinclude><translate><!--T:9-->
</noinclude>Virus  
+
</noinclude>Virus
 
<noinclude></translate></noinclude><section end=req1h /></b>
 
<noinclude></translate></noinclude><section end=req1h /></b>
  
 
<b>2. <section begin=req2 /><noinclude><translate><!--T:10-->
 
<b>2. <section begin=req2 /><noinclude><translate><!--T:10-->
</noinclude>Define the following terms and give examples of each:  
+
</noinclude>Define the following terms and give examples of each:
 
<noinclude></translate></noinclude><section end=req2 /></b>
 
<noinclude></translate></noinclude><section end=req2 /></b>
  
Line 50: Line 48:
  
 
:<b>b. <section begin=req2b /><noinclude><translate><!--T:12-->
 
:<b>b. <section begin=req2b /><noinclude><translate><!--T:12-->
</noinclude>Web browser  
+
</noinclude>Web browser
 
<noinclude></translate></noinclude><section end=req2b /></b>
 
<noinclude></translate></noinclude><section end=req2b /></b>
  
 
:<b>c. <section begin=req2c /><noinclude><translate><!--T:13-->
 
:<b>c. <section begin=req2c /><noinclude><translate><!--T:13-->
</noinclude>IRC/IM (Instant Messenger) client  
+
</noinclude>IRC/IM (Instant Messenger) client
 
<noinclude></translate></noinclude><section end=req2c /></b>
 
<noinclude></translate></noinclude><section end=req2c /></b>
  
 
:<b>d. <section begin=req2d /><noinclude><translate><!--T:14-->
 
:<b>d. <section begin=req2d /><noinclude><translate><!--T:14-->
</noinclude>Streaming Media
+
</noinclude>Streaming Media
 
<noinclude></translate></noinclude><section end=req2d /></b>
 
<noinclude></translate></noinclude><section end=req2d /></b>
  
 
:<b>e. <section begin=req2e /><noinclude><translate><!--T:15-->
 
:<b>e. <section begin=req2e /><noinclude><translate><!--T:15-->
</noinclude>Search Engine & Search Directories  
+
</noinclude>Search Engine & Search Directories
 
<noinclude></translate></noinclude><section end=req2e /></b>
 
<noinclude></translate></noinclude><section end=req2e /></b>
  
 
:<b>f. <section begin=req2f /><noinclude><translate><!--T:16-->
 
:<b>f. <section begin=req2f /><noinclude><translate><!--T:16-->
</noinclude>Antivirus software  
+
</noinclude>Antivirus software
 
<noinclude></translate></noinclude><section end=req2f /></b>
 
<noinclude></translate></noinclude><section end=req2f /></b>
  
 
:<b>g. <section begin=req2g /><noinclude><translate><!--T:17-->
 
:<b>g. <section begin=req2g /><noinclude><translate><!--T:17-->
</noinclude>Firewall  
+
</noinclude>Firewall
 
<noinclude></translate></noinclude><section end=req2g /></b>
 
<noinclude></translate></noinclude><section end=req2g /></b>
  
 
<b>3. <section begin=req3 /><noinclude><translate><!--T:18-->
 
<b>3. <section begin=req3 /><noinclude><translate><!--T:18-->
</noinclude>Complete one of the following:  
+
</noinclude>Complete one of the following:
 
<noinclude></translate></noinclude><section end=req3 /></b>
 
<noinclude></translate></noinclude><section end=req3 /></b>
  
Line 86: Line 84:
  
 
<b>4. <section begin=req4 /><noinclude><translate><!--T:21-->
 
<b>4. <section begin=req4 /><noinclude><translate><!--T:21-->
</noinclude>Why is antivirus software important? Include in your answer:  
+
</noinclude>Why is antivirus software important? Include in your answer:
 
<noinclude></translate></noinclude><section end=req4 /></b>
 
<noinclude></translate></noinclude><section end=req4 /></b>
  
Line 94: Line 92:
  
 
:<b>b. <section begin=req4b /><noinclude><translate><!--T:23-->
 
:<b>b. <section begin=req4b /><noinclude><translate><!--T:23-->
</noinclude>How is having up-to-date antivirus software important for keeping your computer files safe?  
+
</noinclude>How is having up-to-date antivirus software important for keeping your computer files safe?
 
<noinclude></translate></noinclude><section end=req4b /></b>
 
<noinclude></translate></noinclude><section end=req4b /></b>
  
 
:<b>c. <section begin=req4c /><noinclude><translate><!--T:24-->
 
:<b>c. <section begin=req4c /><noinclude><translate><!--T:24-->
</noinclude>How can not being protected lead to sharing the virus with other family and friends?  
+
</noinclude>How can not being protected lead to sharing the virus with other family and friends?
 
<noinclude></translate></noinclude><section end=req4c /></b>
 
<noinclude></translate></noinclude><section end=req4c /></b>
  
 
:<b>d. <section begin=req4d /><noinclude><translate><!--T:25-->
 
:<b>d. <section begin=req4d /><noinclude><translate><!--T:25-->
</noinclude>What harm can a virus do to your computer or to other people’s computers?  
+
</noinclude>What harm can a virus do to your computer or to other people’s computers?
 
<noinclude></translate></noinclude><section end=req4d /></b>
 
<noinclude></translate></noinclude><section end=req4d /></b>
  
 
<b>5. <section begin=req5 /><noinclude><translate><!--T:26-->
 
<b>5. <section begin=req5 /><noinclude><translate><!--T:26-->
</noinclude>In what ways do content filters(programs like Net Nanny™ or AOL Parental Control) protect your family? With your family, develop & sign a Covenant of Family Internet Usage including the following elements:  
+
</noinclude>In what ways do content filters(programs like Net Nanny™ or AOL Parental Control) protect your family? With your family, develop & sign a Covenant of Family Internet Usage including the following elements:
 
<noinclude></translate></noinclude><section end=req5 /></b>
 
<noinclude></translate></noinclude><section end=req5 /></b>
  
 
:<b>a. <section begin=req5a /><noinclude><translate><!--T:38-->
 
:<b>a. <section begin=req5a /><noinclude><translate><!--T:38-->
</noinclude>Never reveal personal information
+
</noinclude>Never reveal personal information.
 
<noinclude></translate></noinclude><section end=req5a /></b>
 
<noinclude></translate></noinclude><section end=req5a /></b>
  
 
:<b>b. <section begin=req5b /><noinclude><translate><!--T:39-->
 
:<b>b. <section begin=req5b /><noinclude><translate><!--T:39-->
</noinclude>Remember that people may not be who they say they are
+
</noinclude>Remember that people may not be who they say they are.
 
<noinclude></translate></noinclude><section end=req5b /></b>
 
<noinclude></translate></noinclude><section end=req5b /></b>
  
 
:<b>c. <section begin=req5c /><noinclude><translate><!--T:40-->
 
:<b>c. <section begin=req5c /><noinclude><translate><!--T:40-->
</noinclude>Never meet an online friend in the flesh for the first time without a parent present
+
</noinclude>Never meet an online friend in the flesh for the first time without a parent present.
 
<noinclude></translate></noinclude><section end=req5c /></b>
 
<noinclude></translate></noinclude><section end=req5c /></b>
  
 
:<b>d. <section begin=req5d /><noinclude><translate><!--T:41-->
 
:<b>d. <section begin=req5d /><noinclude><translate><!--T:41-->
</noinclude>Never respond to flames
+
</noinclude>Never respond to flames.
 
<noinclude></translate></noinclude><section end=req5d /></b>
 
<noinclude></translate></noinclude><section end=req5d /></b>
  
Line 130: Line 128:
  
 
:<b>f. <section begin=req5f /><noinclude><translate><!--T:43-->
 
:<b>f. <section begin=req5f /><noinclude><translate><!--T:43-->
</noinclude>Time each member of the family may spend on the internet per week. Set boundaries that encourage time for family, homework, and other necessary family activities
+
</noinclude>Time each member of the family may spend on the internet per week. Set boundaries that encourage time for family, homework, and other necessary family activities.
 
<noinclude></translate></noinclude><section end=req5f /></b>
 
<noinclude></translate></noinclude><section end=req5f /></b>
  
Line 137: Line 135:
 
<noinclude></translate></noinclude><section end=req5g /></b>
 
<noinclude></translate></noinclude><section end=req5g /></b>
  
 +
<section begin=challenge />
 
<b>6. <section begin=req6 /><noinclude><translate><!--T:27-->
 
<b>6. <section begin=req6 /><noinclude><translate><!--T:27-->
</noinclude>Show your ability to navigate your way around the internet by demonstrating the following:  
+
</noinclude>Show your ability to navigate your way around the internet by demonstrating the following:
 
<noinclude></translate></noinclude><section end=req6 /></b>
 
<noinclude></translate></noinclude><section end=req6 /></b>
  
 
:<b>a. <section begin=req6a /><noinclude><translate><!--T:28-->
 
:<b>a. <section begin=req6a /><noinclude><translate><!--T:28-->
</noinclude>Visit at least 3 different websites (distinct domain names). Print out the front page of each site for your instructor.  
+
</noinclude>Visit at least 3 different websites (distinct domain names). Print out the front page of each site for your instructor.
 
<noinclude></translate></noinclude><section end=req6a /></b>
 
<noinclude></translate></noinclude><section end=req6a /></b>
  
Line 150: Line 149:
  
 
:<b>c. <section begin=req6c /><noinclude><translate><!--T:45-->
 
:<b>c. <section begin=req6c /><noinclude><translate><!--T:45-->
</noinclude>Find 3 websites that talk about the Seventh-day Adventist Church. Print out the front page of each site for your instructor.  
+
</noinclude>Find 3 websites that talk about the Seventh-day Adventist Church. Print out the front page of each site for your instructor.
 
<noinclude></translate></noinclude><section end=req6c /></b>
 
<noinclude></translate></noinclude><section end=req6c /></b>
 +
<section end=challenge />
  
 
:<b>d. <section begin=req6d /><noinclude><translate><!--T:30-->
 
:<b>d. <section begin=req6d /><noinclude><translate><!--T:30-->
</noinclude>Download a compressed file from the internet (tar, zip, etc.) to your hard drive and uncompress it and operate the program or file.  
+
</noinclude>Download a compressed file from the internet (tar, zip, etc.) to your hard drive and uncompress it and operate the program or file. <noinclude></translate></noinclude><section end=req6d /></b>
<noinclude></translate></noinclude><section end=req6d /></b>
 
  
 
<b>7. <section begin=req7 /><noinclude><translate><!--T:31-->
 
<b>7. <section begin=req7 /><noinclude><translate><!--T:31-->
</noinclude>Demonstrate your ability to use email by demonstrating the following (If necessary, create an email account, with a distinct username and password):  
+
</noinclude>Demonstrate your ability to use email by demonstrating the following (If necessary, create an email account, with a distinct username and password):
 
<noinclude></translate></noinclude><section end=req7 /></b>
 
<noinclude></translate></noinclude><section end=req7 /></b>
  
Line 166: Line 165:
  
 
:<b>b. <section begin=req7b /><noinclude><translate><!--T:33-->
 
:<b>b. <section begin=req7b /><noinclude><translate><!--T:33-->
</noinclude>Receive and download email  
+
</noinclude>Receive and download email
 
<noinclude></translate></noinclude><section end=req7b /></b>
 
<noinclude></translate></noinclude><section end=req7b /></b>
  
Line 174: Line 173:
  
 
:<b>d. <section begin=req7d /><noinclude><translate><!--T:35-->
 
:<b>d. <section begin=req7d /><noinclude><translate><!--T:35-->
</noinclude>Know 5 principles of operating email safely.
+
</noinclude>Know 5 principles of operating email safely
 
<noinclude></translate></noinclude><section end=req7d /></b>
 
<noinclude></translate></noinclude><section end=req7d /></b>
  
 
<b>8. <section begin=req8 /><noinclude><translate><!--T:36-->
 
<b>8. <section begin=req8 /><noinclude><translate><!--T:36-->
</noinclude>Memorize Philippians 4:8. How does this Bible text guide a Christian’s use of the internet?  
+
</noinclude>Memorize Philippians 4:8. How does this Bible text guide a Christian’s use of the internet?
 
<noinclude></translate></noinclude><section end=req8 /></b>
 
<noinclude></translate></noinclude><section end=req8 /></b>
 
<section end=Body />
 
<section end=Body />
 
<noinclude><translate>
 
<!--T:37-->
 
[[Category:Honor Requirements|{{#titleparts:{{PAGENAME}}|1|2}}]]
 
[[Category:Honor Requirements Revision 3|{{#titleparts:{{PAGENAME}}|1|2}}]]
 
<noinclude></translate></noinclude>
 
{{CloseHonorPage}}
 

Latest revision as of 02:21, 4 January 2023

Other languages:
English • ‎español • ‎français
Internet

Skill Level

2

Year

2006

Version

05.05.2024

Approval authority

General Conference

Internet AY Honor.png
Internet
Vocational
Skill Level
123
Approval authority
General Conference
Year of Introduction
2006
See also



1. Define the following terms:

a. Internet

b. World Wide Web (WWW)

c. Chat Room

d. Download

e. Upload

f. Website

g. Email

h. Virus

2. Define the following terms and give examples of each:

a. Webmail / POP3 / IMAP mail

b. Web browser

c. IRC/IM (Instant Messenger) client

d. Streaming Media

e. Search Engine & Search Directories

f. Antivirus software

g. Firewall

3. Complete one of the following:

a. Write a brief 250-300 word history of the Internet.

b. Present a 2-3 minute talk concerning the history of the internet. Regardless of the option chosen, include date/events surrounding its origin, the major landmark events, the birth and growth of web browsers (such as Mosaic, Netscape, Internet Explorer), and what it is doing today. Remember, this is not a history of computers, but rather a brief history of the Internet. You should list at least 2 online resources from which you found information relevant to your report.

4. Why is antivirus software important? Include in your answer:

a. What are some ways you can receive viruses via the Internet?

b. How is having up-to-date antivirus software important for keeping your computer files safe?

c. How can not being protected lead to sharing the virus with other family and friends?

d. What harm can a virus do to your computer or to other people’s computers?

5. In what ways do content filters(programs like Net Nanny™ or AOL Parental Control) protect your family? With your family, develop & sign a Covenant of Family Internet Usage including the following elements:

a. Never reveal personal information.

b. Remember that people may not be who they say they are.

c. Never meet an online friend in the flesh for the first time without a parent present.

d. Never respond to flames.

e. Stop immediately if you see or read anything that upsets you

f. Time each member of the family may spend on the internet per week. Set boundaries that encourage time for family, homework, and other necessary family activities.

g. Types of websites that are acceptable/unacceptable to view. What are the principles that your family will use to determine what are acceptable? Base these principles on the Bible.


6. Show your ability to navigate your way around the internet by demonstrating the following:

a. Visit at least 3 different websites (distinct domain names). Print out the front page of each site for your instructor.

b. Demonstrate your ability to use a search engine to find an online Bible website. Go to the website, look up at least 3 different Bible memory texts in 3 different versions, and print your results for your instructor.

c. Find 3 websites that talk about the Seventh-day Adventist Church. Print out the front page of each site for your instructor.


d. Download a compressed file from the internet (tar, zip, etc.) to your hard drive and uncompress it and operate the program or file.

7. Demonstrate your ability to use email by demonstrating the following (If necessary, create an email account, with a distinct username and password):

a. Create and send email

b. Receive and download email

c. Download/view an attachment

d. Know 5 principles of operating email safely

8. Memorize Philippians 4:8. How does this Bible text guide a Christian’s use of the internet?