Computer Basics Technology’s Impact.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

The Internet and the Web
Standard 1.02 Investigate uses of the Internet and World Wide Web.
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Crime and Security in the Networked Economy Part 4.
Lecturer: Fadwa Tlaelan
COMPUTER Protection & PRIVACY ISSUES Selected examples using concepts from Computer Concepts by Pusins & Ambrose, South-Western Education Division, 2001.
Unit 18 Data Security 1.
Analyzing Technology Issues 8 th Grade Exploring Business and Marketing.
Security, Privacy, and Ethics Online Computer Crimes.
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
By: Bihu Malhotra 10DD.   A global network which is able to connect to the millions of computers around the world.  Their connectivity makes it easier.
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.
Computer and Society Introduction to: World Wide Web Wild Card
Risks and Revenues Virtual Business Copyright © Texas Education Agency, All rights reserved.
VIRUSES and DESTRUCTIVE PROGRAMS
IT Introduction to Information Technology. The Internet & World Wide Web Began in 1969 with the ARPANET (Advanced Research Project Agency Network)
Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
Viruses, Hacking and Backups By Katie Louise Bieber!
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Lesson 2 – The Internet, the Web, and Electronic Commerce Lecture/Discussion Fill up the vocabulary matrix AGENDA – DIGITAL COMPUTER 1A OCT. 3, 2011 –
Computer Crimes Career & Technology Education Department.
Topic 5: Basic Security.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Internet and Communication Basics. Background of the Internet Early origin in 1960s Closely tied to a networking project started by a governmental division.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Essential Standard 2.00 UNDERSTAND THE NATURE OF BUSINESS. 1.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Technical Implementation: Security Risks
Digital Security Identity theft Copyright Laws Plagiarism, and More.
BASIC CONCEPTS ON INTERNET &
Legal and ethical issues
Marking the Most of the Web’s Resources
Understand the nature of business.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Unit A: Exploring Computer Systems
HISTORY OF COMPUTERS AND TECHNOLOGY
COMPUTER VIRUSES Computer Technology.
Microsoft Office Illustrated Introductory, Premium Edition
McGraw-Hill Technology Education
Analyzing Technology Issues
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Computer Technology Day 21
BCT 2.00 Analyze Technology Issues
Telecommunications Tele – distant; at a distance; over a distance
UNIT 18 Data Security 1.
Internet Safety Vocabulary
The Internet An Overview.
Societal Issues in Computing (COMP466)
Objectives To understand the about types of computer network
King Saud University- College OF Applied Studies
Understand the nature of business.
Understand the nature of business.
Computer Security.
Internet and the world wide web (www)
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Computer Basics Technology’s Impact

The Impact of Technology on Education Internet Distance Learning Computer-Based Learning Simulations

The Impact of Technology on Science Artificial Intelligence Genetic Engineering Virtual Reality

The Impact of Technology on Work Global Economy Electronic Commerce (E-bay)

The Impact of Technology on Our Lives Daily Lives Voice recognition Space travel Smart cars Electronic shopping

Exploring Technology Careers Business and Office Administrative Assistant Desktop Publisher/Graphic Designer Network Support PC Support Specialist Network Manager Web-Based Web Developer Web Master

History of the Internet

What is a browser? The software program that you use to retrieve documents from the World Wide Web (WWW) and to display them in a readable format. Examples: Internet Explorer Firefox Google Chrome

Background of the Internet Early origin in 1960s Closely tied to a networking project started by the Advanced Research Projects Agency. Original name: ARPANET Created so that scientists were able to share information on military and scientific research.

Features of the Internet The World Wide Web Began in March 1991 when Tim Berners-Lee wrote a small computer program for his personal use.

Electronic Mail Addresses The address consists of three parts: The user name of the individual The @ symbol The user’s domain name Example: ccoombe@pgasd.com

Computer Crimes A criminal act committed through the use of a computer or theft of any computer equipment.

Types of Computer Crimes Computer fraud Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Computer hacking Involves invading someone else’s computer, usually for personal gain or just the satisfaction of invasion.

Other Computer Crimes Theft of computer time Using a company’s computer for personal use such as running a small business or keeping personal records. Data diddling Changing data before or after it is entered into the computer

Piracy The unauthorized use or reproduction of copyrighted or patented material Music, movies, software…anything digital!

Computer Viruses A virus is a program that has been written to cause corruption of data on a computer.

Types of Viruses Worm Time Bomb Makes copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks Time Bomb Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times

Viruses Logic Bomb Trojan Horse Virus triggered by the appearance or disappearance of specified data. Trojan Horse Virus that does something different from what it is expected to do

Activity Open up Microsoft Word Computer Impact Essay Handout

Activity Go onto my website and open “History of the Internet WebQuest” Answer questions. You may work with a partner.

Career Current Event Find a news article online related to the job that you researched. Using the Current Event document on the wikispace, complete it and summarize the article. When you finish, send it to me through Moodle.