Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Tech. What is an unsolicited e-mail message sent to many recipients Adware Spam Spyware Phishing here here Want to know how email spam really.

Similar presentations


Presentation on theme: "Computer Tech. What is an unsolicited e-mail message sent to many recipients Adware Spam Spyware Phishing here here Want to know how email spam really."— Presentation transcript:

1 Computer Tech

2 What is an unsolicited message sent to many recipients Adware Spam Spyware Phishing here here Want to know how spam really works. Click here and read the article completely! It is full of great information.here

3 A security system consisting of hardware and/or software that prevents unauthorized intrusion Phishing Spam Firewall Denial of Service

4 Hides within or looks like legitimate program until triggered Worm Trojan Horse Virus Spam To learn more about how a Trojan Horse works, read the article and then scroll down to watch the video from “How Stuff Works” (brought to you by the “Lab Rats”. Click here.here

5 An illegal duplication of copyrighted software Software Encryption Ergonomics Software Phishing Software Software Piracy

6 When you buy a computer software program, what does the software license agreement let you do? Right to use software – (you don’t own the software, you only have a license to use it.) Right to sell software – after you buy the software you can sell it to as many people as you want. Right to change the software – (after you buy it, you can edit it any way you want.)

7 A scam in which a perpetrator sends an official looking that attempts to obtain your personal and financial information Phishing Scamming Spying Adwaring Learn more about Phishing by watching the video from “How Stuff Works.watching the video

8 What are moral guidelines that govern the use of computers and information systems Computer Ergonomics Computer Ethics Computer Intellectual Rights Computer Privacy Guidelines

9 An applied science devoted to comfort, efficiency, and safety in the work place Relaxation Encrypting Ergonomics Slacking

10 A potentially damaging computer program Virus Worm Trojan Horse Spam To learn more about how computer viruses work, read the article from “How Stuff Works”. It’s a great article!article

11 This software program identifies and removes viruses Firewall Software Anti Piracy Software Ergonomics Software Anti Virus Software

12 What is a small file that is put on your computer that contains data about you? Cookie Trojan Horse Worm Virus To understand better how cookies work, read this article from “How Stuff Works”.this article

13 Watch this video on Internet cookies!

14 What copies itself repeatedly, using up computer resources and can possibly shut your computer & network down? Virus Trojan Horse Worm Cookie

15 The process of converting plaintext (readable data)into ciphertext (unreadable characters) Scrambling Phishing Spamming Encryption

16 What is it called when a computer consumes your entire social life? Computer addiction Computer ethics Computer ergonomics Computer spamming

17 Reducing electricity and environmental waste while using computers Salvaging Reprocessing Reclaiming Green computing


Download ppt "Computer Tech. What is an unsolicited e-mail message sent to many recipients Adware Spam Spyware Phishing here here Want to know how email spam really."

Similar presentations


Ads by Google