The Knights Diamoneek McDougald.  Video Game Addiction is someone who constantly plays video games  Likes virtual life better than real life  MMORPG.

Slides:



Advertisements
Similar presentations
Hardware Lesson 3 Inside your computer.
Advertisements

V IDEO G AME A DDICTION By: Nikiya Kelly. V.G.A Background Addiction There are people around the world who play Video Games all day and night. I understand.
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Computer Parts There are many parts that work together to make a computer work.
Thank you to IT Training at Indiana University Computer Malware.
Choosing a PC Before you choose a PC you need to think about what it is going to be used for.
Computer Basics I Course Outline 1: What is a computer? 2: What is an operating system? Using a Desktop Computer 3: What are the basic parts of a desktop.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Computer Basics 1 Computer Basic 1 includes two lessons:
Viruses and Spyware The Real Story Mr. G. From Whence Spyware Comes Spyware usually ends up on your machine because of something you do, like clicking.
A “Java Fun For Everyone” Interactive Quiz
INTERNET SAFETY FOR STUDENTS
Computer Wizards: Miquel Marrow, Dejana Coates, Deion Petty, Juwan Blunt.
Computer Unit Identify the Part Grade 7 Computer Unit.
Internal/External Computer Components Kim Roselli Emily Mross.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Jeopardy Game Techable. Powerpoint Jeopardy SpywareInside the Computer CybercrimeVirusesGame Addiction Input/output
COMPUTER MAIN PARTS “HARDWARE AND SOFTWARE”. HARDWARE LITERALLY, " HARDWARE " WOULD MEAN " HARD GOODS ". THIS CONCEPT IS INTENDED TO MEAN ALL TANGIBLE.
Essential Computer Concepts
Jeopardy Game Team W.E.B. Sheronica Hall Sabraya Knight Daneia Prater Marquise Smith Jakeira Frost.
… but what parts does it have and how do they work? A computer looks like this...
The Romans: Destiny Tucker, Cire Berry, Emmett Mobley, Imani Hawkins, Armani Carter.
Computer system components By Corey Burton. GPU GPU stands for ‘graphics processing unit’. The GPU can help the computer run smoothly. GPU is used for.
Tech 9 Shakira Scott..  Binary Numbers are a base-2 number system that represents numeric values using two digits/symbols, 0 and 1.
Techno – G’s Ronquelda Quillen, Michael Keith, Nikki Tabor, Autumn Long.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
 Netiquette Is combination of the words network and etiquette.  Netiquette is using proper manners on the internet.  Netiquette was developed in South.
Computer Hardware Introduction. Computer Hardware Introduction The basic form of a computer is this: PROCESSING MEMORY INPUTOUTPUT But let’s look inside.
S PYWARE, V IDEOGAME A DDICTION, B INARY NUMBERS, AND V IRUSES By Shakira Pettaway, Shan-Shan Wang, Pauline Pearcy, and Michael Norris.
The Computer Basics. A computer is an electronic machine Computers can do anything that someone tells them to do Since computers are so fast at processing.
The DYNAMICS ROLES, RASHARD M. Kahlil Elijah Cashai Johnson Sydney Jones Jason Hack.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
 By: A’Dream Dewitt-Townes, Fatima Johnson and Shelvy Dyson  Pd:8/9.
Devon C. Floyd Alyric Knight Brain Vanhook 10/28/10 6/7 Tech-Knowledge G$$
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer Security... By Kate Robinson 8P Viruses Hackers Backups Stuxnet Gary Mckinnon.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
10 Internal parts of a PC Created by Federica Proietti Cesaretti.
By: Elliott Mitchell. The computers power supply is one of the most important things in the computer. If the computer was to have no power it wouldn’t.
Computer security By Isabelle Cooper.
All about viruses, hacking and backups By Harriet Thomas.
By: Whitney Cannon. What are binary Numbers Binary numbers are the way a computer thinks. The computer see’s thing in zero’s and ones. We used.
Getting To Know Computers COMPUTER BASICS. WHAT IS A COMPUTER? A computer is an electronic device that manipulates information, or “data.” It has the.
There are many parts that work together to make a computer work. System Unit Computer Parts.
Hardware/Software Basics Test
Click once to reveal the definition. Think of the answer. Then click to see if you were correct. HARDWARE Physical parts of the computer.
Computer Parts There are many parts that work together to make a computer work.
 Doctors recognize addictive behaviors as a problem within a person’s life. Being addicted to games may not sound harmful, but it ends in harmful results.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Naotane Sumino.  Computer games were first introduced in the 1970's. By the end of the decade, they had become a preferred childhood leisure activity,
By Emily King Computer Definitions and Parts. NETWORK CARD A circuit board that has many special cables which connect the computer to the rest of the.
By Hessahn yousofi.  Internet is a global system of interconnected computer networks, a computer that connects to the internet can access information.
20 pt 30 pt 40 pt 50 pt 10 pt 20 pt 30 pt 40 pt 50 pt 10 pt 20 pt 30 pt 40 pt 50 pt 10 pt 20 pt 30 pt 40 pt 50 pt 10 pt 20 pt 30 pt 40 pt 50 pt 10 pt Computer.
Computer Parts There are many parts that work together to make a computer work.
Unit 7 P2 P2 explain potential risks to consider when installing
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Hardware vs. Software Question 1 What is hardware?
Spyware, Video Gaming Addiction, Netiquette, and Binary Numbers
Computer Parts There are many parts that work together to make a computer work.
Computer Basics.
Personal Computers and Applications
The Computer Work Stations
ICT Programming Lesson 2:
Parts of the Computer
The Computer’s Hardware
The System Unit By: Cole and Mariah.
Presentation transcript:

The Knights Diamoneek McDougald

 Video Game Addiction is someone who constantly plays video games  Likes virtual life better than real life  MMORPG are massive multiplayer online role playing games  WOW (World of Warcraft ) is the biggest addicting game  It ruins marriages, social life, and careers

 Playing for increasing amounts of time  Thinking about gaming during activities  Gaming to escape real-life problems, anxiety and depression  Lying to friends and family to conceal gaming  Feeling irritable when trying to cut down on gaming

 A child playing videos games for 4 to 5 hours has no time for homework, socializing or playing sports  Compulsive adult gamers jeopardize jobs and relationships  Majority of addicts are under the age of 30

 Show gamers they are powerless over their addiction and teach them real-life excitement as opposed to online excitement  A parent can keep log of gaming behaviors  Logs of when the child plays and for how long  Problems resulting from gaming  How the child reacts to time limits

Joel Tindall The Knights

 Spyware isn’t designed to damage your computer.  It is a program that gets into your computer without permission and hides while it makes unwanted changes.  Spyware is put on computers to gradually collect info about the user.

- Spyware hogs up RAM and processor power -Ways to prevent you from getting spyware are to use a spyware scanner or pop-up blocker -Masquerades as a prize notification pop- up window

 Viruses prevention programs are 100 percent efficient while spyware’s is 90 percent.  It is designed to direct unwanted advertisements to the user from their host website.  To protect yourself from it, be suspicious of installing new software and use the “x” to close pop-ups.

The Knights Zhana’ Wright

 Can damage your computer.  People created viruses to have bragging rights, the fun of watching things blow up, and psychology that drives sandals and arsonists.  Viruses show how vulnerable you are.

 a segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network.  Worms is a small piece of software that uses computer networks and security holes to replicate itself.

 Types of viruses  Mydoom worm  Melissa  system  Trojan horses  I LOVE YOU

Knights Aaron Wallace

 The CPU (Central Processing Unit) controls all the basic and complex functions of the computer. The motherboard is the main circuit board of the computer. The hard drive is what stores all your data. electrical device. The cooling fan prevents the computer from overheating.

 The Optical Drive is a part of the computer that reads CD’s and DVD’s. The Memory in the computer is referred to as the RAM. When your computer boots up, it loads everything into its RAM. This allows your computer to access all of its functions, like clicking the mouse or typing on the keyboard

. The case protects the CPU. Video cards are used to process the graphics on the computer. The power supply is the part of hardware that supplies power to an electrical device.

Video Game Addictio n SpywareVirusesInside the compute r

A.) The same as a virus B.) Computer Game C. A program that damages your computer. D. A program that gets in your computer without permission and hides while it makes unwanted changes

A. Never B. Sometimes C. Always D. All of the above

A. Use a spyware scanner or use a pop-up blockerUse a spyware scanner or use a pop-up blocker B. Turn your computer off immediately without shutting it off correctlyTurn your computer off immediately without shutting it off correctly C. Don’t waste your time reading pop-upsDon’t waste your time reading pop-ups D. Never click “x” on pop-upsNever click “x” on pop-ups

A. It doesn’t damage your computer and it’s prevention program is only 90 percent effective B. Spyware damages it only a little C. Spyware comes with pop-ups while viruses don’t D. Viruses are completely harmless.

A.) RAM and processor power B.) Internet connection C.) Games D.) Pictures

A.) They help your computer stay protected. B.) Something that damages your computer. C.) The same as spyware. D.) A program that is completely harmless.

A.) Pop Ups B.) Trojan Horses C.) Mc A fee Program D.) Google

A.) To protect the CPU B.) to prevent the computer from overheating C.) To process graphics on the computer D.) Stores all of your computers data

A.) Stores all of your data B.) Allows your computer to access its functions C.) The main circuit board of the computer D.) Processes graphics on the computer

A.) DVD B.) CD C.) CPU D.) RAM

A.) the main circuit board of the computer B.) reads CD’s and DVD’s C.) loads everything into its RAM D.) protects the CPU

A.) 5 B.) 7 C.) 8 D.) 9

  /virus /virus  powersupply powersupply

 Dave Coustan, “ How Spyware Works”,  Ed Tittel, “Spyware vs. viruses: Two different fights”, May 25,2005, midmarket.techtarget.com/news/columnhttp://searchcio- midmarket.techtarget.com/news/column