The Romans: Destiny Tucker, Cire Berry, Emmett Mobley, Imani Hawkins, Armani Carter.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

V IDEO G AME A DDICTION By: Nikiya Kelly. V.G.A Background Addiction There are people around the world who play Video Games all day and night. I understand.
Computer Parts There are many parts that work together to make a computer work.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Viruses & Destructive Programs
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Newport Photography Club Ryan Erwin PC MAINTENANCE & SECURITY.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
The Knights Diamoneek McDougald.  Video Game Addiction is someone who constantly plays video games  Likes virtual life better than real life  MMORPG.
Jeopardy Game Techable. Powerpoint Jeopardy SpywareInside the Computer CybercrimeVirusesGame Addiction Input/output
Parts of a Computer.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
IT security By Tilly Gerlack.
Tech 9 Shakira Scott..  Binary Numbers are a base-2 number system that represents numeric values using two digits/symbols, 0 and 1.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Under the Hood Monica Loza 1 st period. 5 places to save on a PC On a PC: Flash Drive Send it to your Save to the desktop Save on a CD iCloud Thaw.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
The DYNAMICS ROLES, RASHARD M. Kahlil Elijah Cashai Johnson Sydney Jones Jason Hack.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
We are here to help you… Fight something like this Brownies !
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Devon C. Floyd Alyric Knight Brain Vanhook 10/28/10 6/7 Tech-Knowledge G$$
Technology Competency Computer Infestations Mr. Locke.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer Science Binary. Binary Code Remember the power supply that is inside your computer and how it sends electricity to all of the components? That.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
By: Whitney Cannon. What are binary Numbers Binary numbers are the way a computer thinks. The computer see’s thing in zero’s and ones. We used.
There are many parts that work together to make a computer work. System Unit Computer Parts.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
Computer Parts There are many parts that work together to make a computer work.
Information Technology Essentials Deloris Y. McBride.
 Doctors recognize addictive behaviors as a problem within a person’s life. Being addicted to games may not sound harmful, but it ends in harmful results.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
WHO IT EFFECS The most effected are men between the ages of 15 to 35.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Computer Parts There are many parts that work together to make a computer work.
Computer Parts There are many parts that work together to make a computer work.
Viruses & Destructive Programs
An Overview of the Computer System
Computer Parts There are many parts that work together to make a computer work.
Computer Parts There are many parts that work together to make a computer work.
Computer Technology Notes 5
Computer Parts There are many parts that work together to make a computer work.
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Introduction to Computing Lecture # 1
An Overview of the Computer System
Computer Parts There are four main equipment functions of a computer system: Input, Processing, Storage and Output. Input: the transferring of information.
Computers: Hardware and Software
Computer Parts There are four main equipment functions of a computer system: Input, Processing, Storage and Output. Input: the transferring of information.
Computer Parts There are many parts that work together to make a computer work.
Computer Viruses Standard A-4 (Safety Unit)
Presentation transcript:

The Romans: Destiny Tucker, Cire Berry, Emmett Mobley, Imani Hawkins, Armani Carter

 A computer virus is a computer program that can multiply itself and infect a computer.  A virus is commonly used to refer to other types of malware, adware and spyware programs.  A virus can spread from one computer to another in some type of code when its host is taken to the target computer; it could happen when a user sent it over a network or the Internet, or carried on a floppy disk, CD, DVD, or USB drive.  Viruses show how vulnerable we are

 viruses- it travels as a attachment to messages, and copies itself by automatically sending itself to random people in your contents.  Trojan horses- it’s a computer program which claims to do something but its really just damaging your computer secretly.  Worm – is a small piece of software that uses computer networks and security holes to replicate itself.

 Avoid programs and unknown sources( if don’t know what the program is don’t mess with it, just close out of it)  Use virus protection such as anti virus software and virus scan  Never double click on attachments( hit it once and wait, if nothing shows up, then hit again, if nothing, then assume your computer is acting slow).

 The first programmable computer was created in the 19 th century  The Mother Board is basically called, “ The heart of the computer”  RAM means random access memory  Bill Gates created Microsoft

 The first programmable program was created by Konrad Zuse  Hard Drive- is a storage device that stores basic information  CPU- it sends instructions of programs to the screen

 Optical Drive- a type of storage device, but it uses light to store and receive information.  Power Supply- electric circuit that change to make the computer able to come on  Video Card- displays 2d and 3d images  CPU stands for Central Processing Unit

 Game Addiction occurs when virtual life becomes more appealing than real life because a person can different than they are in real life

 MMORPG stand for Massively Multiplayer Online Role-playing Game  One of the biggest MMORPGs in the world is WOW or World of Warcraft

 People who are addicted to games as a child don’t develop socially and never learn to play a sport

 Most Game addicts are males under 30

 The warning signs of game addiction are:  increasing amounts of time spent on game  constantly think about gaming while doing something else  using games to escape real life problems  concealing gaming  feeling irritable when trying to cut down on time spent gaming

 Binary numbers go by the power of 2. And everything in the computers are converted to 0 ’ s and 1 ’ s, because there is only two states an electrical circuit can be in. it addresses the way the computer count different things that ’ s on it.

To find the total of the true numbers for the binary it ’ s easier to use the chart Decimal number (true number) converted to Binary Numbers =79-64=15-8=7-4=3-2=1-1= Add together the columns where the 0 ’ s and 1 ’ s are to get decimal number Subtract the largest binary number into the decimal number

 A byte is a unit of data that is eight binary digits long. A byte it’s a unit most computers use to represent a letter, number, or symbol.

Viruses Inside the Computer Game Addiction Binary numbers

What is a virus A.is a computer program that can multiply itself and infect a computeris a computer program that can multiply itself and infect a computer B.Is a computer program that hacks your computer and then fixes itIs a computer program that hacks your computer and then fixes it C.Is a computer program that creates a lot of pop up windowsIs a computer program that creates a lot of pop up windows D.Is a computer program that takes away all our battery lifeIs a computer program that takes away all our battery life

Which one is a form of a virus A.Trojan birdTrojan bird B.Trojan wormTrojan worm C.Trojan horseTrojan horse D.Trojan virusTrojan virus

Viruses show how____ we are. A. weak weak B. Vulnerable Vulnerable C. Egotistical Egotistical D. powerful powerful

Which one is not way to protect yourself from viruses? A. avoid unknown internet websitesavoid unknown internet websites B. Never double click a attachment Never double click a attachment C. Use virus protection Use virus protection D. Avoid random programs Avoid random programs

Which one is not a reason why people create viruses? A. people like devastationpeople like devastation B. Bragging rights Bragging rights C. for the fun of it for the fun of it D. Test different computers weaknesses Test different computers weaknesses

Back to information

 rent-kinds-computer-viruses.html rent-kinds-computer-viruses.html  s/whatis.aspx s/whatis.aspx  ompvir.htm ompvir.htm

What does CPU stand for? A) Control Program Unit B) Control Processing Unit C) Central Processing Unit D) Computer Use Unit

What is the basic function of the Video Card? A) Stores games. B) Displays 2d images. C) Displays 2d and 3d images.

What is the professional name for the “Heart of the Computer”? A) Motherboard B) Hard Drive C) Optical Drive

A) Steve Jobs B) Zonrad Zuse C) Bill Gates Who created the first computer?

A) Optical drive uses light to receive information and a Hard drive stores informationA) Optical drive uses light to receive information and a Hard drive stores information. B) Optical Drive stores information and a Hard drive uses light to receive information. C) They both use light to receive information What is the difference between and Optical drive and a Hard drive?

Back to information

  

How old are most addicts? A)30 and under30 and under B) C) D)

Why do people get addicted to games? A)They like to play video gamesThey like to play video games B)Virtual Life becomes more appealing than real lifeVirtual Life becomes more appealing than real life C)They are dating someone in the gameThey are dating someone in the game D)It is free and they feel that they need to take advantage of itIt is free and they feel that they need to take advantage of it

What happens if someone is addicted to games as a child? A)They grow up to live a normal lifeThey grow up to live a normal life B)They don’t develop socially and never learn to play a sportThey don’t develop socially and never learn to play a sport C)They don’t learn to play a sport, but they develop sociallyThey don’t learn to play a sport, but they develop socially D)They don’t develop socially, but they learn to play a sportThey don’t develop socially, but they learn to play a sport

What does MMORPG stand for and what does WOW stand for? A)Magically Multiplayer Offline Role-Playing God and World of WarmonkeysMagically Multiplayer Offline Role-Playing God and World of Warmonkeys B)Magnificently Magically Online Role- Playing Game and Warcraft of WonderlandMagnificently Magically Online Role- Playing Game and Warcraft of Wonderland C)Massively Multiplayer Online Role-Playing Game and World of WarcrackersMassively Multiplayer Online Role-Playing Game and World of Warcrackers D)Massively Multiplayer Online Role-Playing Game and World of WarcraftMassively Multiplayer Online Role-Playing Game and World of Warcraft

What is a warning sign of game addiction? A)Playing games when they have timePlaying games when they have time B)Only thinking about gaming when playingOnly thinking about gaming when playing C)Feeling great when cutting down on gamingFeeling great when cutting down on gaming D)Spending increasing amounts of time gamingSpending increasing amounts of time gaming

Go Back and information

 health/features/video-game-addiction-no- fun health/features/video-game-addiction-no- fun  wow-addiction.html wow-addiction.html

what power does binary numbers go by? A. 4 B. 2 C. 1 D. 5

What is a byte? A.a unit of data that is seven binary digits long.a unit of data that is seven binary digits long. B.the unit some computers use to represent a letter, number, or symbol.the unit some computers use to represent a letter, number, or symbol. C.The unit of characters.The unit of characters. D.a unit of data that is nine binary digits long.a unit of data that is nine binary digits long.

What is the conversion of ? A.134 B.200 C.180 D.201

What is the conversion of ? A.1515 B.2020 C.4040 D.3030

What is the binary number for 227? A B C D

Go back to information.

 /0,,sid5_gci211721,00.html (byte) /0,,sid5_gci211721,00.html  TSS; Computers and the Internet- Unit 2, Binary Numbers Information, Binary Number System Made Easy, Binary Numbers Chart