Presentation is loading. Please wait.

Presentation is loading. Please wait.

Techno – G’s Ronquelda Quillen, Michael Keith, Nikki Tabor, Autumn Long.

Similar presentations


Presentation on theme: "Techno – G’s Ronquelda Quillen, Michael Keith, Nikki Tabor, Autumn Long."— Presentation transcript:

1 Techno – G’s Ronquelda Quillen, Michael Keith, Nikki Tabor, Autumn Long

2  Cyber crime takes place everywhere in the world.

3  A lot of people who commit cybercrimes are not bought to justice.

4  There are different security programs you could you too protect your self from being attacked.

5 Where does cybercrime take place? a)AsiaAsia b)AfricaAfrica c)AustraliaAustralia d)All 7 continentsAll 7 continents

6 Which of these answers is not a way to protect your self from cyber crime A) Post your passwords all over the web. Post your passwords all over the web. B) Keep passwords secret. Keep passwords secret. C) Install security programs on your computer Install security programs on your computer D) Don’t enter online giveaways Don’t enter online giveaways

7 Who’s being affected by cyber crime A) middle class B) high class people C)poor people D) everyone

8 People, feel which type of way after being attacked? A) confident on the webconfident on the web B) afraid to engage in internet exchanges) afraid to engage in internet exchanges C) want to go authorities) want to go authorities D) feel as though they should seek revengefeel as though they should seek revenge

9 People who are affected, usually find out when ? A) at any point in there lives B the next day C) as soon as it happensas soon as it happens D) 5 years later) 5 years later

10  www.suite101.com www.suite101.com

11  A input device is any peripheral used to provide data and control signals to an information processing system (such as computers)  There are several ways to get new information or input into a computer.  The two most common ways are the keyboard and the mouse.  Other types of input devices are scanners, digital cameras, and touch pads.

12  Output devices display information in a way that you can understand.  Input and Output devices make up the hardware equipment used to communicate the results of data processing carried out by an information processing system to the outside world.  The most common output device is a monitor.  Other input devices are speakers, and printers.

13 . Storage device is a device for recording or storing information  The term usually refers to mass storage devices, such as a disk and tape drives.

14  A communication device is the transmission of data from one computer to another, or from one device to another.

15 A scanner is what type of device? A.Input DeviceInput Device B.Output DeviceOutput Device C.Communication DeviceCommunication Device D.Storage DeviceStorage Device

16 Which of these is an output device? A.Flash driveFlash drive B.CamerasCameras C.SpeakersSpeakers D.ScannersScanners

17 A storage device is A. a device for recording or storing informationa device for recording or storing information B. a device to interact with outside worlda device to interact with outside world C. To get information that input to a computerTo get information that input to a computer D. Transmit data from one computer to another. Transmit data from one computer to another

18 A communication device is…? A.The transmission of data from one computer to another, or from one device to another.The transmission of data from one computer to another, or from one device to another. B.Stores informationStores information C.Inputs information into the computerInputs information into the computer

19 What is the difference between input and output devices? A. Input device is any peripheral used to provide data and control signals to an information processing system.Input device is any peripheral used to provide data and control signals to an information processing system. B. A output device is to store information.A output device is to store information. C. They both store informationThey both store information D. They transmit information from one computer to anotherThey transmit information from one computer to another

20  http://parenting.kaboose.com/education- and-learning/learning- resources/comp_les1.html http://parenting.kaboose.com/education- and-learning/learning- resources/comp_les1.html  http://www.ask.com/questions- about/Difference-between-Input-and- Output-Devices http://www.ask.com/questions- about/Difference-between-Input-and- Output-Devices  http://www.enablemart.com/Communicatio n http://www.enablemart.com/Communicatio n  http://www.webopedia.com/TERM/I/input_ device.html http://www.webopedia.com/TERM/I/input_ device.html

21  Spyware is a program that gets into your computer without your permission and makes unwanted changes to your experience.  It isn't designed to harm your computer. Spyware is designed to track your internet habits, nag you with unwanted sales offers or generate traffic for their host site.

22  Spyware’s mission is o serve your targeted advertisements or make your browser display certain sites or search results.  Spyware can be a Drive-By Download and automatically try to download itself to your computer.  It can be piggybacked on software, usually with peer to peer file sharing.  It can also be browser add on such as toolbars and doesn’t do its job.

23  Spyware can masquerade itself as a prize notification pop-up window.  There are certain ways to protect yourself from Spyware. You can use a spyware scanner daily, use a pop up blocker, disable Active X, and be suspicious of installing new software.

24 What Does Spyware Masquerade itself as? A.A evil devilA evil devil B.A unusual new tabA unusual new tab C.A prize notification pop-upA prize notification pop-up D.It doesn’t masquerade itselfIt doesn’t masquerade itself

25 A.Harm Your ComputerHarm Your Computer B.Protect Your ComputerProtect Your Computer C.Track Your Habits and Nag you with Pop-UpsTrack Your Habits and Nag you with Pop-Ups D.NothingNothing What is Spyware designed to do ?

26 What is one way Spyware can get in Your Computer? A. It comes when You Buy your computer. It comes when You Buy your computer. B. It Downloads with your permission It Downloads with your permission C. It can Piggyback with another software, usually peer to peer sharing It can Piggyback with another software, usually peer to peer sharing D. You have to Buy Spyware from a store You have to Buy Spyware from a store

27 What is Spyware’s main mission? A. To Attack You To Attack You B. To serve You targeted advertisements To serve You targeted advertisements C. To Damage Your Computer To Damage Your Computer D. To just relax with your files To just relax with your files

28 How can You protect your computer from Spyware ? A. Get a Virus Protection Software Get a Virus Protection Software B. Use a Pop-Up Blocker Use a Pop-Up Blocker C. Don’t Use a Spyware Scanner Don’t Use a Spyware Scanner D. All of The Above All of The Above

29  http://computer.howstuffworks.com/spywar e.htm

30  The computer contains many components that makes it work functionally. Without certain parts, the computer will not function properly. Such components as the motherboard, the cpu, the power supply, along with the hard drive. The components of the computer ranges from all kinds of components including the computer case, RAM (Random Access Memory) and the list goes on and on.

31  A hard drive, also known as a hard disk drive or HDD, is a fundamental part of modern computers. The hard drive is where all of your programs and files are stored, so if the drive is damaged for some reason, you will lose everything on your computer.  A hard drive uses similar memory storage technology to cassette tapes and video tapes. Hard drives contain round, mirror-like platters that are covered with that same magnetic recording medium.

32  The motherboard uses tiny electrical paths to connect each component of the computer together. In Simpler terms the motherboard controls everything the computer does. The computer can not function without this component.  The Power Supply plays a big role in the making of the computer. It is a device that supplies electrical energy to one or more electric loads.  CPU (Central Processing Unit) is an older term for processor and Microprocessor, the central unit in a computer containing the logic circuitry that performs the instructions of a computer's programs.

33 CybercrimeInput Output Storage Communicat ion Devices Spyware Inside The Computer 100 200 300 400 500

34 What Is The Function Of The Motherboard? Babysits the computer The main board of the computer Controls everything the computer doesControls everything the computer does She’s a mother

35 What Is The Role Of The Power Supply? Supplies The Computer It Controls the electricity inside the computer Makes Electricity Supplies Electrical Energy

36 A.) Round, mirror-like platters that are covered with that same magnetic material. Round, mirror-like platters that are covered with that same magnetic material. B.) Mirror Like TapeMirror Like Tape C.) Disk With Tape On ItDisk With Tape On It D.) Square, So You Can Insert It Into The Computer.Square, So You Can Insert It Into The Computer.  What Does The Hard-Drive Looks Like?

37 What Is The Function Of The CPU? Processes Everything Contains the necessary components to perform Allows The Computer To Follow Instructions

38 A.) similar memory storage technologysimilar memory storage technology B.) Video and Cassette TapesVideo and Cassette Tapes C.) Mirror Like PlattersMirror Like Platters D.) The Computer’s Own Information To ProcessThe Computer’s Own Information To Process  What Does The Hard Drive Use?

39  http://www.wisegeek.com/what-is-a-hard- drive.htm http://www.wisegeek.com/what-is-a-hard- drive.htm  http://searchcio- midmarket.techtarget.com/sDefinition/0,,si d183_gci213867,00.html http://searchcio- midmarket.techtarget.com/sDefinition/0,,si d183_gci213867,00.html

40

41 Cyber Crime Input Output Devices Spyware Inside The Computer


Download ppt "Techno – G’s Ronquelda Quillen, Michael Keith, Nikki Tabor, Autumn Long."

Similar presentations


Ads by Google