Jeopardy Game Team W.E.B. Sheronica Hall Sabraya Knight Daneia Prater Marquise Smith Jakeira Frost.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Viruses and Spyware The Real Story Mr. G. From Whence Spyware Comes Spyware usually ends up on your machine because of something you do, like clicking.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
How to build your own computer And why it will save you time and money.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses & Destructive Programs
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
The Knights Diamoneek McDougald.  Video Game Addiction is someone who constantly plays video games  Likes virtual life better than real life  MMORPG.
Jeopardy Game Techable. Powerpoint Jeopardy SpywareInside the Computer CybercrimeVirusesGame Addiction Input/output
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Tech 9 Shakira Scott..  Binary Numbers are a base-2 number system that represents numeric values using two digits/symbols, 0 and 1.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
S PYWARE, V IDEOGAME A DDICTION, B INARY NUMBERS, AND V IRUSES By Shakira Pettaway, Shan-Shan Wang, Pauline Pearcy, and Michael Norris.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer adware is software that can display all different advertisements on the computer screen. Some computers can get affected at any point when people.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
SPEAKING ‘Information Technology’ ‘Computers’. Make dialogues on a spot, without preparation. Use active vocabulary from the topics ‘Information Technology’
The DYNAMICS ROLES, RASHARD M. Kahlil Elijah Cashai Johnson Sydney Jones Jason Hack.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Devon C. Floyd Alyric Knight Brain Vanhook 10/28/10 6/7 Tech-Knowledge G$$
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
By: Whitney Cannon. What are binary Numbers Binary numbers are the way a computer thinks. The computer see’s thing in zero’s and ones. We used.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Hardware on the Inside.  Computers are made of many electronic components or parts.  These components each have a special job and they all work together.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
W elcome to our Presentation. Presentation Topic Virus.
By Hessahn yousofi.  Internet is a global system of interconnected computer networks, a computer that connects to the internet can access information.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Windows Tutorial 5 Protecting Your Computer
Hacking Computer crime and cyber security.
Malware and Computer Maintenance
Spyware, Video Gaming Addiction, Netiquette, and Binary Numbers
Presentation transcript:

Jeopardy Game Team W.E.B. Sheronica Hall Sabraya Knight Daneia Prater Marquise Smith Jakeira Frost

Video Game Addiction

Some people don’t realize that there addicted to video gaming. When you get addicted to video games it starts to interfere with your daily life. You start to lose your socical life. And then u tend to think that your entire life is a video game.

Video Game Addiction There are many different warning signs of video game addiction. You think about games during activities, lying to friends and family, and feeling irritable when trying to cut off gaming.

Video Game addiction Some of the dangers of video game addiction is for adults if you get to caught up into playing video games you start to forget about the more important things in life for example you can lose your job, put video gaming before your family, and you have a hard time trying to communicate with people because you are use to playing video games all the time instead of socializing with people in the real world.

Video game addiction There are many different types of ways that a parent could try to help stop video game addiction for there children. For example give the child a set schedule on when and what time they can play video games. Also try to get your child interested in something else other than video games.

Video game addiction Not only are children addicted to video gaming but adults are addicted to video gaming too. The group that makes up most of majority of video game addicts are males under 30 with poor self esteem and social problems.

VIDEO GAME ADDICTION In order for people to try to overcome there video gaming addiction you must admit to having a problem or you must go ask for help.

Video Game Addiction Some people cant get enough of video games. Overuse of video gaming can sometimes lead to death. A 3 month old south Korean girl starved herself after parents repeatedly left her alone for 12 hrs were they were nurturing a virtual child through a computer game.

Spyware Spyware is a category of computer programs. Spyware piggybacks on other programs and infects a computer, making it operate slower and less efficiently. Spyware gets into the computer without permission and makes unwanted changes to the user’s computer experience. However, with enough resistance, spyware can be prevented and avoided all together.

Spyware Spyware can get onto a computer in numerous ways. Sneaky spyware infection methods are listed below: Piggybacked software installation- Some applications can install spyware during their usual installation procedure. Users must read the application carefully before installing, especially if the site is offering “free” versions of the application. Drive-by download- In many cases, a website or pop-up automatically appears in front of the user’s face and begins to download spyware onto the computer. Users may get a warning, which includes a message with the name of the software and requesting permission to install it. However, if a user’s settings are low, they may not even receive a warning. Browser add-ons- Pieces of software that add enhancements to a Web browser, such as a toolbar or an additional search box. Browser hijackers embed themselves deeper into a computer and are very difficult to get rid of. Masquerading as anti-spyware- Spyware often disguises itself as anti-spyware to fool the user into downloading it. This is thought to be the sickest way for spyware to infect a computer.

Spyware Spyware is often confused with viruses. Viruses are designed to damage a computer by replicating itself as many times as possible, damaging computer files or even the entire operating system. On the other hand, spyware is primarily designed to slow a computer down and carry out tasks without the user’s permission. There are many ways a user can protect themselves from spyware. Use a spyware scanner- Spyware scanners can make a person’s computer experience much safer and assuring. Ad-ware, Spybot, and Microsoft AntiSpyware are all examples of trustworthy spyware detection and removal software. These applications also detect Internet cookies. Use a pop-up blocker- Browsers, such as Internet Explorer 0.6 and Mozilla Firefox 1.0, are now able to block pop-ups and advertisements. These browsers can alert a user whenever they have prevented a pop-up from appearing. Disable Active-X- Active-X is a special code in Windows that spyware often takes advantage of. Disabling Active-X can prevent this from happening, but it can also prevent a user from using functions of certain websites. Be suspicious of installing new software- A more simple way of prevent and avoiding spyware is to become more alert with new software or unknown sites. A user’s carelessness can result in spyware invasion. Use the “X” to close pop-up windows- Some computer messages could be fake, although some false messages are rather easy to spot. Instead of clicking the “No, thanks” button that may appear in the message, closing the message with the “X” default can save a user from more spyware threats.

Viruses Viruses show us how vulnerable be we are. Most common infection is viruses. A computer virus must piggyback on top of some other programs in order to work. A worm is a small piece of software that uses computer networks. Sometimes people make viruses they love the thrill of doing it. You can protect yourself by getting Macro Virus Protection.

Viruses Viruses show us how vulnerable be we are. Most common infection is viruses. A computer virus must piggyback on top of some other programs in order to work. A worm is a small piece of software that uses computer networks. Sometimes people make viruses they love the thrill of doing it. You can protect yourself by getting Macro Virus Protection.

Quick Facts (Binary Numbers) Binary numbers allow you symbolize any amount you want using just two digits: 0 and 1. Recall back to elementary when we first learned about numbers, we were taught that, in the decimal system, things are organized into columns. For example, “H” is hundreds, “T” is tens, and “O” is ones. H | T | O 1 | 9 | 3 Every “1” digit in a binary number represents a power of two, and each "0" represents zero.

Adding Binary Numbers Examples: = = 0010 (1 plus 1 is equal to 10, carry the 1) = 0110 In a number like “0101” you can figure out the actual value by adding the powers of 2. Adding binary numbers is similar to adding decimal numbers, with the exception of = 10 (in this system).

Video game addiction SpywareVirusesBinaryNumbers Inside Parts of the Computer

Your correct!!!!!!

Sorry… try again 

Video game addiction for 100 What happens when you get addicted to video games? a) Interferes with daily lifeInterferes with daily life b) Loose your social lifeLoose your social life c) You play it to muchYou play it to much d) All of the aboveAll of the above

Video game addiction for 200 What are some dangers for a adult who is addicted to video gaming?? a)Loose your jobLoose your job b)Gain new friendsGain new friends c)A and DA and D d)Lack social lifeLack social life

Video game addiction for 300 Which age group make up most of the population of video game addicts? a)Men around the age of 50Men around the age of 50 b)Children of all agesChildren of all ages c)Males ages 15-30Males ages 15-30

Video game addiction for 400 What are some warning signs of video game addiction? a)you choose video games over other activitiesyou choose video games over other activities b)you play them for hours at a timeyou play them for hours at a time c)go outside a lotgo outside a lot d)a and ba and b

Video game addiction for 500 Why is video game addiction considered to be a mental problem? a)it can lead to deathit can lead to death b)people can forget what is important in life other than gamingpeople can forget what is important in life other than gaming c)A and BA and B

Spyware For 100 Question: Spyware is a category of what programs? A: Video B: Fitness C: Computer D: Educational

Spyware For 200 Question: What’s one way to protect yourself from spyware? A: Visiting unknown websites B: Not running spyware scans C: Doing nothing D: Use a pop-up blocker

Spyware For 300 Question: What is one example of a trustworthy spyware scanner? A: Godzilla Spyfox 5.0 B: Slow Traveler SV C: Microsoft AntiSpyware D: You can not trust any spyware scanners. It is pointless.

Spyware For 400 Question: What term fits this description? Pieces of software that distribute enhancements to a web browser A: Browser add-ons B: Masquerading as anti-spyware C: Drive-by download D: Piggybacked software installation

Spyware For 500 Question: Which Area of Interaction would spyware fall under? A: Community and Service B: Important Things In The World C: Human Ingenuity D: There is no such thing as an “Area of Interaction”.

Please go back to the game board.game board.

Bibliography Coustan, Dave. How Spyware Works, (n,d) HowStuffWorks, November 1, 2010, [ Coustan, Dave. How Spyware Works, (n.d) HowStuffWorks, November 1, 2010, [ Coustan, Dave. How Spyware Works, (n.d) HowStuff Works, November 1, 2010, [ Coustan, Dave. How Spyware Works, (n.d) HowStuffWorks, November 1, 2010, [

Viruses for 100 What do viruses show us ? A. That we have no brain. B. How vulnerable We Are. C. We Don’t Care. D. All of The above.

Viruses for 200 Most common Viruses ? A. Viruses B. Infections C. Piggyback D. None Of The Above

Viruses for 300 What are worms ? A. Things Underground B. Small Piece Of Software C. They Help Make A computer Generate D. Something that breaks down your cpu.

Viruses for 400 Why Do People Create Viruses ? A. They Are Bored B. They Have No Life C. The Thrill Of Doing It D. All Of The Above

Viruses for 500 Ways To Protect Yourself ? A. Throw Your Cpu Out. B. Get Macro Virus Protection Or Norton. C. Get Spyware Protection D. B and C

Bibliography htm

Binary Numbers for 100 What numbers do binary numbers use? a)1 and 21 and 2 b)0 and 10 and 1 c)10 and 2010 and 20 d)3 and 43 and 4

Binary Numbers for 200 Add the following binary numbers a) b) c) d)

Binary Numbers for 300 Determine the two’s compliment of the binary number a) b) c) d)

Binary Numbers for 400 not Which number is not a binary number? a) b) c) d)

Binary Numbers for 500 Solve using the formula: a) b) c) d)

Return to the game boardgame board

Please try again.try again.

Inside Parts of the Computer for 100 Why does a computer have a power supply? – A- to keep the computer from over heating A- to keep the computer from over heating – B- to hold memory B- to hold memory – C- to power the computer C- to power the computer – D- to play games D- to play games

Inside Parts of the Computer for 200 Why does a computer have a case? – A- to stop kids from touching the cords A- to stop kids from touching the cords – B- to prevent the computer from damages B- to prevent the computer from damages – C- to make it look better C- to make it look better – D- to make it heavier D- to make it heavier

Inside Parts of the Computer for 300 What is the motherboard purpose? – A- holds all the data A- holds all the data – B- cools the computer down B- cools the computer down – C- a disk drive C- a disk drive – D- the system main components D- the system main components

Inside Parts of the Computer for 400 What kind of memory does a computer come with? – A- Random access memory A- Random access memory – B-Read only memory B-Read only memory – C-hard drive C-hard drive – D-Floppy disk D-Floppy disk

Inside Parts of the Computer for 500 What is the main purpose of the Video Card? – A- play videos A- play videos – B- display output images B- display output images – C- store music, videos, and pictures C- store music, videos, and pictures – D- play music D- play music

Incorrect

Correct

Bibliography The website I used was