Jeopardy Game Techable. Powerpoint Jeopardy SpywareInside the Computer CybercrimeVirusesGame Addiction Input/output 100 200 300 400 500 500 500 500 500.

Slides:



Advertisements
Similar presentations
TECH SKILLS COMPUTER BASICS
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Computer Viruses.
WHAT IS A COMPUTER? BY JACK SUMMERS. WHAT IS A COMPUTER? A computer basically a set of different components that when put together in the correct way.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Chapter Nine Maintaining a Computer Part III: Malware.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
The Knights Diamoneek McDougald.  Video Game Addiction is someone who constantly plays video games  Likes virtual life better than real life  MMORPG.
Henry Brady Computer Components Unit 2 – Computer Systems.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Explore the Parts of a Computer
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Hardware Lesson 2 Computer Components. Path of Information Through a Computer Input Device RAM CPU Output Device.
Building a PC Tim Wells. What You Need Required:  Case  Power Supply  Motherboard  Processor & CPU Fan  RAM  Graphics Card  Hard Drive  Keyboard.
Motherboard (Main board)
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Techno – G’s Ronquelda Quillen, Michael Keith, Nikki Tabor, Autumn Long.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Over Achievers Darius Beckford. Spyware (Informational Slide )  Spyware is used for advertisement purposes  Spyware takes away your computer processing.
The 4 functions of a computer are 1.Input 2.Output 3.Storage 4.Processing.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Computer Basics.
Computer main parts Por: Walter Pérez. HARDWARE Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices.
The DYNAMICS ROLES, RASHARD M. Kahlil Elijah Cashai Johnson Sydney Jones Jason Hack.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety Internet Safety LPM
All about viruses, hacking and backups By Harriet Thomas.
Computer security By Georgia. Contents b b What is a virus ? b b How to stop viruses b b What is a hacker ? b b How to prevent hackers b b What are backups,
Getting To Know Computers COMPUTER BASICS. WHAT IS A COMPUTER? A computer is an electronic device that manipulates information, or “data.” It has the.
All you need to know to keep you and your computer safe!!!
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Hardware on the Inside.  Computers are made of many electronic components or parts.  These components each have a special job and they all work together.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Welcome to Technology Michael Cox October 20, 2015 Do now: Open your typing test data file Take a three minute typing test at Typingtest.com (Aesop test)
Don’t let them catch your computer!!!!!
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Computer Basics.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Henry Brady Computer Components Unit 2 – Computer Systems.
Take a tour around my slideshow to learn more about viruses.
COMPUTER VIRUSES By James Robins. THE IMPACT OF VIRUSES By James 2.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
20 pt 30 pt 40 pt 50 pt 10 pt 20 pt 30 pt 40 pt 50 pt 10 pt 20 pt 30 pt 40 pt 50 pt 10 pt 20 pt 30 pt 40 pt 50 pt 10 pt 20 pt 30 pt 40 pt 50 pt 10 pt Computer.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Knights Nigel Palmer Cybercrime Jeopardy. Cybercrime Cyber crime are crimes committed using a computer and the internet to steal a person's identity or.
Unit 7 P2 P2 explain potential risks to consider when installing
Computer Security Keeping you and your computer safe in the digital world.
Inside a Computer. Computer Hardware/Software What is the difference? Computer Hardware.
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
ICT COMPUTER FUNDAMENTALS
Hardware vs. Software Question 1 What is hardware?
3.6 Fundamentals of cyber security
Spyware, Video Gaming Addiction, Netiquette, and Binary Numbers
ICT COMPUTER FUNDAMENTALS
Computer Technology Notes 5
The Computer Work Stations
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Technology 2 Hardware on the Inside.
Presentation transcript:

Jeopardy Game Techable

Powerpoint Jeopardy SpywareInside the Computer CybercrimeVirusesGame Addiction Input/output

Spyware Spyware is designed to make unwanted changes to your computer. They serve you targeted advertisements or make your browser display certain sites or search results. Pop- up tries to automatically download and install spyware. Spyware hogs memory and make your computer run slow

Spyware.vs. viruses There is a difference between spyware and viruses. Spyware goal is to replicate itself and damage your personal files. spyware want to control your computer activity. * Viruses -fills up space on your computer. Spreads more viruses. Replicates itself

Spyware Tips Spyware masquerades as anti-spyware. Be careful They appear as pop- up blocks. Be aware Use the x to close pop-up windows. Be suspicious when installing new software. Use a spyware scanner.

Category 1 for 100 spyware What does spyware masquerade as? ? A. Spyware B. Anti spyware C. Viruses D. Internet sites

Category1 for 200 spyware What is spyware goal ? A. Play with your mind B. Break your computer C. Steal your documents D. Make unwanted changes

Category 1 for 300 spyware What does spyware do ? A. Hogs memory and makes computer run slow B. Replicate itself C. you stuff D. Send you images

Category 1 for400 spyware What is a virus ? A. Something that eats up your documents B. Fills space; replicates it’s self C. Changes your computer experience D. Comes up as pop ups

Category 1 for 500 spyware What is a way to prevent spyware from attacking your computer ? A. Change computer habits B. Use pop- up’s C. Be suspicious of installing new software D. Use active X

INCORRECT * Try again next time

Correct * Continue on to jeopardy game

Parts inside the computer (Informational Slide ) The CPU is the brain of the computer. The CPU controls the monitor. A computer case is a to keep all the parts in the CPU actually together. The cooling fan in a computer is designed to keep all the parts cool in the computer because if they over heat your computer might get damaged.

Parts inside the computer (Informational Slide ) The CPU is the brain of the computer. The CPU controls the monitor. A computer case is a to keep all the parts in the CPU actually together. The cooling fan in a computer is designed to keep all the parts cool in the computer because if they over heat your computer might get damaged.

Parts inside the computer (Informational Slide ) motherboard uses electrical paths that connect each component of the computer together. The power supply supplies the electrical power for a computer. It supplies power to the motherboard, drives, and certain expansion cards.

Parts inside the computer (Informational Slide ) The video card is a expansion card that allows the computer to send graphic information to a video display device. Optical drives receives or stores data. The hard drive disk is the largest storage device in the computer. * Memory ram is the working memory in the computer.

Category 2 FOR 100 What parts help the brain of the computer ? A. Electrical power B. Desk top C. The case and cooling fanC. The case and cooling fan. D. Computer filter

CATEGORY 2 FOR 200 What is The motherboard ? A. the main hard drive B. A place were you explore the inside of the computer C. Cable connectors D. electrical paths to connect each component of the computer together. \

CATEGORY 2 FOR 300 What is the purpose of the Hard Drive ? A. Smallest storage device B. largest storage device in the computer C. Stores half of the computers memory D. Helps stores energy

CATEGORY 2 FOR 400 The video card ? A. Allows information to transfer B. Allows the computer to send sound C. allows the computer to send graphic information D. Allow information to save

CATEGORY 2 FOR 500 Memory ram is the ? A. Working memory B. Computer storage C. Complete memory D. Stored memory

INCORRECT * Try again next time

Correct * Continue on to jeopardy game

Bibliography Powerpoint by kerri Jones.

Cyber Crime Cyber Crime is the use of computers and the internet to hack into someone's personal business. Most of the worlds Cyber Crimes occur In Brazil, China, and USA.

Cyber Crime Out of 10% of the worlds hackers, 5% use it to take money from rich people who does not care about the poor. For example, if Josh{made up person} gets into someone's info, and see that he is raising 4 children, on a low salary, he won’t hack him.

Cyber Crime The other 5% uses hacking to take money from whomever they can, they really don’t care how poor a person is, they will take whatever they have.

Why do people commit Cyber Crimes? a).To make people feel good. b).To get a name for themselves in the “Hacking World”. c).To get to know someone. d).To take money from rich people who does not care about the poor.

Where does the worlds most Cyber Crime occur? a). USA b).Brazil c).China d).All of the above

What makes people commit Cyber Crimes? a).Being rich b).To spy on someone c). Poverty reasons d).To open a store

All Hackers take everyone’s money. a).True b).False

Hacking can be done with a television. a).True b).False

Correct answer!!

INCORRECT answer

Game addiction Game Addiction is a real problem in where people take games too far out of proportion

Game addiction Game addiction at a young age can cause social problems and cause problems down the road. An 25 year old can have social skills of a 15 year old.

Game Addiction Some ways to tell if you have game addiction is A person lies to their friends to play games. A person spends every minute on video games. When a person is away for the game they still think about it.

What is game addiction? A: When you Constantly Play Games B: When You Play occasionally C: When you smoke D: Playing outside

What are some problems with Game Addiction? A: Marriage problems B:Lost In Brain Cells C:Loss in Money D:Death

What are some ways you can tell you are addicted? A: Lying About hours played B: Going Outside C: Playing Sports D: Watching TV

Does Game Addiction cause social problems? A: True B: False

Is Game Addiction a Real Problem? A: True B: False

Correct

Incorrect

What is a virus A virus is a computer program designed to hurt your computer, it stops your computer from running correctly BUT a virus can only work after it has piggy backed on a file.

What are types of Viruses There are different types of viruses like for example the virus which basically sends a viruses to you in the form of a virus and when you open it spreads to all your contacts. Or worms which is powered by the holes in your computer security

Viruses VS Spyware Viruses are created to harm your computer while spyware was created to track your internet habits

The Melissa Virus The Melissa Virus was a virus in 1999 that was huge because it caused Microsoft and other big companies to shut down their systems until the virus was destroyed

Virus Origins The first know virus was the Jerusalem virus in 1989 basically it caused files on the computer not to open. It spread quickly because ant- viruses were uncommon so they couldn’t fix it

A)a is a computer program that’s program its self on your computer and multiply its self and infect your computer.a is a computer program that’s program its self on your computer and multiply its self and infect your computer. B) a type of computer game C) Malware on your computer D) an annoying advertisement What is a Virus?

A)Drive By DownloadDrive By Download B) C)MelissaMelissa D)B&CB&C What are types of viruses?

A)Viruses damage more dataViruses damage more data B)There isn’t a differenceThere isn’t a difference C)Spyware hog up space and viruses doesn’tSpyware hog up space and viruses doesn’t D)A&CA&C How do viruses differ from spyware?

A)A viruses that caused Microsoft to shut down in 1999A viruses that caused Microsoft to shut down in 1999 B)An VirusAn Virus C)Another name for WormsAnother name for Worms D)None of the aboveNone of the above What was the Melissa Viruses and why was it so big ?

A)In 1989 with the Jerusalem virusIn 1989 with the Jerusalem virus B)In 1999 with the Melissa VirusIn 1999 with the Melissa Virus C)In 2000 with the virusIn 2000 with the virus D)None of the aboveNone of the above When were viruses first created and what was the first type of virus ?

Correct

Incorrect

What type of device is a keyboard?

An Input device

What type of device is a USB?

Input/output devise

Is a computer monitor and input device or an output device?

An Output device

What is the definition of an input devise?

Incorrect

An input device is a device that puts information into the computer.

What is the definition of an out put device?

An output device is a device that takes information out of the computer

Bibliography learning/learning-resources/comp_les1.html