Class Schedule
w/ Mr. Aktas & Mr. Perez
5:00 - 5:30pm --> Ready To Work
5:30 - 6:30pm --> CompTIA
6:30 - 6:45pm --> BREAK
6:45 - 7:15pm --> Review / Flex
7:15 - 8:15pm --> Activity / Lab
8:15 - 8:30pm --> Independent Lesson Review / Quiz
Computer Login (firstTime)
####### (student#)
password1
Student Email
#######@st.brevardschools.org
(Use your Computer Password)
readyToWork Login
####### (student#)
Ready2Work!
Online Activity
Go to this link www.PollEv.com/daktas288
Write about why you joined this class
Online Activity
Go to this link www.copilot.com
Write about a tech fail you or a family member had in detail. Start the story with "Make an image about the following story..."
Optional. Ask the AI to make changes to the image
Copy and paste the image to a slide at the following link TECH FAIL SLIDESHOW
Add your name to the slide
Online Activity
Windows + R
CMD
"ipconfig"
In Person Activity
In Person Activity
Label the following color pages and draw the arrows; input=blue, processing=green, storage=yellow, and output=red
In your group generate at least 5 different parts for each group on slips of paper.
We will unsort our work, move to the next table, and sort the items generated by a different group.
Online Activity
Using the following link claim a slide and find 4 IOT devices, one for each category. Try to include the price in your screen shot.
IOT Devices For Sale
Safety
Useful
Luxury
Funny
A. Press the "Print Screen" button
Screen will go dark
Click and drag over the area of the screen you want to copy
This will copy the screenshot to
Documents->Pictures->Screenshots
To you "clipboard"
B. Go to the document/email/presentation and use either CTRL + v to paste or right click "paste" to add the screen shot.
Online Activity
Clear All Cookies (Watch Demo)
Go to at least 4 different websites
Shopping (Look at specific item)
News (Open a specific article)
Social Media (Find a post or group)
Education
Go to edge://settings/privacy/cookies
3. Click "See All Cookies"
4. Sort by "Most Cookies"
5. Click on the carrot
6. Click on a carrot in the submenu
7. Copy the cookie identifier
8. Search google for the identifier with the word 'cookie' after
9. Go to the following link and fill in information about your cookie
Online Activity
https://www.termsandconditions.game/
Play the game
Share your score with the class
Online Activity
https://phishingquiz.withgoogle.com/
Play the game
Write down what tactics tricked you
Share your score with the class
Online Activity
https://play.phishmeifyoucan.com/
Play the game
Share your score with the class
Video Discussion
https://youtu.be/R9OHn5ZF4Uo?si=ypEn4cMXS8XFoJRo
(Pick 1 or 2 questions to look for during the video sorted from easiest to hardest)
-How do algorithms and AI work?
-What is the real job of builder bot and teacher bot?
-Why do companies want so much data?
-When you complete an “Are you human?” test online, how are you helping train algorithms at the same time?
-Why does the video argue no one fully understands how a modern algorithm (AI) works?
In Person Activity
https://www.kerryveenstra.com/cryptosystem.html
Use two digits for all keys and underline all capital letters when you write out your encrypted messages on index cards.
Senders. Write a Symmetric Key AND Encrypted Message for your partner a flash card. Your unencrypted message should be your name (shortened) and your favorite color. All senders place cards in the “internet” pile.
Teacher: Shuffle the internet pile.
Receivers. Grab and return a random flash card to the pile until you have decrypted your partner's message.
Receivers: Generate a Public / Private Key pair. Write your name and public key on the ‘internet’ board.
Senders: Using your partner's public key, write ONLY the encrypted message for your partner on a flash card. Your unencrypted message should again be your name (shortened) and your favorite ice cream flavor. All senders place cards in the “internet” pile.
Teacher: Shuffle the internet pile.
Receivers: Grab and return a random flash card to the pile until you have decrypted your partner’s message using your public key and your private key.
Online Activity
https://www.passwordmonster.com
Cyber Security Password Strength.xlsx
Create 5 weak passwords and 5 strong MEMORABLE passwords DO NOT USE ANY REAL PASSWORDS. Add each one to the excel sheet and write in the time it would take for that password to be cracked by a computer.
Online Activity
Enter the teachers personal email (danielpaulaktas@gmail.com)
Enter in your personal email (this is all public database) and find out how many times your email and password have been leaked.
Use two of the search engines provided (or find your own). Search one of the provided topics find on slide 2. Rate with stars and write a short review of the search engine using one of the provided questions to consider.
https://www.google.com | Market Share 89.73% | most popular
https://www.bing.com | Market Share 3.98% | AI powered
https://www.yahoo.com | Market Share 1.29% | Bing‑powered
https://www.baidu.com | Market Share 0.81% | China dominant
https://www.yandex.com | Market Share 2.55% | Russia leader
https://duckduckgo.com | Market Share 0.58% | privacy focused
https://www.ask.com | Market Share 0.15% | Q&A search
https://www.naver.com | Market Share 1.25% | Korea top
https://search.aol.com | Market Share 0.06% | legacy engine
https://www.seznam.cz | Market Share 0.04% | Czech leader
List of Common Browser Extensions
PDF Converter / PDF Tools extension
Coupon / Deal Finder extension
Grammar / Writing Assistant extension
Video Downloader extension
Tab Manager / Productivity extension
Screen Reader / Accessibility extension
Pop‑Up Blocker extension
Password Manager extension
Ad Blocker extension
Website Screenshot / Screen Capture extension