Hardware components may include: | Bluetooth devicefax and modemkeyboardlaptopmobile phonemonitormousemultimedia kitpersonal computerpersonal digital assistant (PDA), such as palmtopprinterscannerspeakertape cartridgeuniversal serial bus (USB) devicewi-fi router. |
Connectivity of devices may include: | Bluetooth devicehard drivekeyboardlaptopmobile phonemodemmousemultimedia kitpenPDA, such as palmtopprinterscannerspeakertape cartridgetouch padUSB devicewireless fidelity (wi-fi) routerheadphone and microphoneweb camera. |
OHS compliantmay include: | electrical safetyergonomics in the workplace:correct posturestyle and adjustment of chairtype of desktype of monitorworking positionlength of time in front of computerlighting levelplacement of light fittingsrepetitive strain injury (RSI) preventionsafe lifting methodsventilationsocial problems associated with internet and computing addictions. |
Relevant internet sites may be used for: | entertainment:internet TVgamesvideos and podcastsmusiccommunication:emailSkypeinstant messagingfinding using and storing information:searching to enhance personal knowledge and interest and to make informed decisionsparticipating onlineonline consultation, forum and discussionposting photos and videosapplying for jobsnetworking and collaboration:social networkingonline datingtransactionsbankinggovernment services, including registrationsbuying and selling:travelpaying billstrading shares. |
Copyright and intellectual propertymay relate to: | copyright infringement legislationelectronic resources usage policiesethical use of digital technologiesethical decision making when facing inappropriate acts of technology use. |
Socially responsible behaviourmay relate to: | not using obscene, profane, lewd, vulgar, rude, inflammatory or threatening language not publishing information that, if acted upon, could cause damage to property or persons, nor publish deliberately false or defamatory information about a person or organisation not engaging in personal attacks, including prejudicial or discriminatory attacksnot harassing, distressing or annoying another personnot accessing material that is profane, obscene or pornographic, that promotes illegal acts, or that advocates violence or discriminationnot sending inappropriate emailstaking responsibility for protecting personal information and not revealing personal information, including names, addresses, photographs, credit card details and telephone numbers. |
Browser software security may include: | application enablingcookie handlingpop-up blockingprivacy levelssecurity zonestrusted sites. |
Email security may relate to: | taking steps to restrict:malwarephishingspamscams. |
Digital footprint may include: | tracking of internet usage, such as:system login and logoutsvisits to a web pageaccessed or created filesemail messageschat messages. |
External backup devices may include: | DVDsmemory cardsmemory sticksUSB driveshard drives. |
Secure transactions may include: | web browser - secure socket layer (SSL)security verified sitesdigital certificates - VeriSignonline payment services - PayPalstored-value cards smart cardspoint-of-sale devicesdigital cashe-wallets. |
Methods of internet fraud may include: | invalid internet sitescredit card fraudidentification theftimpulse buying strategies. |
Basic applications may include: | databasesemailinternet browsersspreadsheetssystem browsersword processing. |