Tech 9 Shakira Scott..  Binary Numbers are a base-2 number system that represents numeric values using two digits/symbols, 0 and 1.

Slides:



Advertisements
Similar presentations
Viruses & Spyware A Module of the CYC Course – Computer Security
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Are You Smarter Than a 5 th Grader? 1,000,000 Blog Online Search Kindle? Documents? Backup Virus click here! Downloading Music Expiration Date?
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
The Internet.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Viruses and Spyware The Real Story Mr. G. From Whence Spyware Comes Spyware usually ends up on your machine because of something you do, like clicking.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Wizards: Miquel Marrow, Dejana Coates, Deion Petty, Juwan Blunt.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
The Knights Diamoneek McDougald.  Video Game Addiction is someone who constantly plays video games  Likes virtual life better than real life  MMORPG.
Jeopardy Game Techable. Powerpoint Jeopardy SpywareInside the Computer CybercrimeVirusesGame Addiction Input/output
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Unit 19 INTERNET SECURITY
IT Security for Users By Matthew Moody.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Jeopardy Game Team W.E.B. Sheronica Hall Sabraya Knight Daneia Prater Marquise Smith Jakeira Frost.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
The Romans: Destiny Tucker, Cire Berry, Emmett Mobley, Imani Hawkins, Armani Carter.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Cyber Security… Compiled by J. Camp Benfer Elementary Klein ISD March 2009 …or How to Keep Your Computer & Your Personal Information Safer …or How to Keep.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
S PYWARE, V IDEOGAME A DDICTION, B INARY NUMBERS, AND V IRUSES By Shakira Pettaway, Shan-Shan Wang, Pauline Pearcy, and Michael Norris.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
The DYNAMICS ROLES, RASHARD M. Kahlil Elijah Cashai Johnson Sydney Jones Jason Hack.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Devon C. Floyd Alyric Knight Brain Vanhook 10/28/10 6/7 Tech-Knowledge G$$
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Computer security By Isabelle Cooper.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Windows Tutorial 5 Protecting Your Computer
Three steps to prevent Malware infection
Hacking Computer crime and cyber security.
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Spyware, Video Gaming Addiction, Netiquette, and Binary Numbers
Protect Your Computer Against Harmful Attacks!
Spyware. By: Katheryn L. Gaston.
Presentation transcript:

Tech 9 Shakira Scott.

 Binary Numbers are a base-2 number system that represents numeric values using two digits/symbols, 0 and 1.

Computers and calculators are the most common technology machines that uses Binary Numbers. The reason why they do is because they can calculate much faster buy using this numerical system.

When converting a whole number to a Binary Number you first have to write down the numbers 128, 64, 32, 16, 8, 4, 2, 1 in separate columns. See if the number you want to convert goes into the number. If so put a 1 under that number. If not put a 0 under that number. Then write down the number that you see in column under each digit.

When converting a Binary Number to a whole number you first write down the numbers 128, 64, 32, 16, 8, 4, 2, 1 in separate columns. Then write down the Binary Number separate in the columns. Then add up all the numbers that have a one.

 A virus is a small piece of software that piggyback on real programs. For example,a virus might attach itself to a program. It shows us how vulnerable we are. .Viruses are created so a word document can then upload to the internet. Three reasons people create viruses are that more

 Spyware can masquerade as a prize notification pop-up window. Spyware tracks your internet habits, tries to sell you unwanted merchandise, or get you to go onto their site. The main purpose of spyware once it is downloaded onto your computer is to lead ads from the internet to you.

 The difference between spyware ad a virus is that viruses are created to damage your computer and spyware gets into your computer without your permission but does not damage your computer. Drive by download is when spyware tries to get downloaded onto your computer.

 Piggybacked spyware will attach to a application you are installing from the internet without you knowing it. Some things you can do to protect yourself is use a spyware scanner, use a pop-up blocker, disable Active X, and be careful of installing new software you do not recognize

 Spyware takes up RAM and processor power. Add-ons are pieces of software that adds things onto your browser toolbar such as another search box, toolbar, etc. Sometimes there is spyware attached to these items and get imbedded into your computer.

 Game Addiction is really affecting all age groups in today times. People play games so they can escape from the real life and into the virtual world. Game Addiction can affect your daily life, mess up your relationship, make you have low grades, and etc.

 A MMORPG is a massive multiplayer online role-playing games.  Some warning signs of video game addiction are playing for a long amount of time, thinking about gaming during other activities, escape from real life problems, and etc. If you don’t admit you is a game hawk (game addict), that is when the problems come in. You have to admit that you is a game hawk to be one cause if not, you may have personal issues when you is not playing.

 Some countries, such as South Korea, China, the Netherlands, Canada, and the United States, have responded to the perceived threat of video game addiction by opening treatment centers.  There has also been some deaths about playing the game. The deaths happen by the way that you killed someone while you was playing or how they killed you.

Binary Number s VIRUS ES Spywar e Game Addictio n

Great job, you really showed that you know it all.

Sorry you did not get the correct answer. Please go back to the information and choose the right answer.

What is the whole number for binary number ? a.)50 c.)70 b.)60 d.)80

What is the Binary Number for 66? a.) b.) c.) d.)

What is the Binary Number for 165? a.) c.) b.) d.)

What is the Binary Number for 153? a.) c.) b.) d.)

What is the Binary Number for ? a.) c.) b.) d.) Category 1 for 500

 acc6.its.brooklyn.cuny.edu  mathisfun.com  (used my personal notes)

What is viruses designed to do your computer? A.Destroy your computerDestroy your computer B.Tracks your internetTracks your internet C.Shut down the computerShut down the computer D.To create a virusTo create a virus

 Good job, you really showed you know a lot about viruses and you know what will affected your computer.

Incorrect because the computer viruses are made to destroy your computer by having games and etc….This may cause pop-up blockers, spam and so on.

What are notifications that you have a virus? A. Security software will pop upSecurity software will pop up B. Anti virus will appear and alert on your screen. Anti virus will appear and alert on your screen C.Security will be 100% complete every time your computer is activatedSecurity will be 100% complete every time your computer is activated D. All of the aboveAll of the above

 Good job, you really showed you know a lot about viruses and you know what will affected your computer.

Incorrect because the computer viruses are made to destroy your computer by having games and etc….This may cause pop-up blockers, spam and so on.

 What are the factors that started up viruses A. More and more people have virusMore and more people have virus B. People get a thrill out of creating viruses /program. People get a thrill out of creating viruses /program C. To create a word document.To create a word document. D. All of the aboveAll of the above

 A is correct because everyday millions of people log onto the internet and most likely do not know what they are doing. So they are going to click anything, play anything and etc….

Are because people do not like to have and enjoy the thrill of giving them and other people a virus because it gives them non access to there computer.

 What is the new trick for viruses ? A. Worm from computer networksWorm from computer networks B. To damage all of your memory on your computer.To damage all of your memory on your computer. C. To allow new factors and opportunities.To allow new factors and opportunities. D. All of the aboveAll of the above

Are incorrect because the computer viruses are made to destroy your computer by having games and etc….This may cause pop-up blockers, spam and so on.

 What is the worm? A. Creates a word documentCreates a word document B.A small piece of software that uses computer networks, and securityA small piece of software that uses computer networks, and security C. It opens up a softwareIt opens up a software D. All of the aboveAll of the above

 A is correct because it helps you use your computer and protects it from any damages and will have a back up on it if anything is un normal.

 Are incorrect because the computer viruses are made to destroy your computer by having games and etc….This may cause pop-up blockers, spam and so on.

 A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware including but not limited to adware and spyware, programs that do not have the reproductive ability.

What is spyware designed to do to your computer? a)Destroy your computerDestroy your computer b)Tracks your internet habitsTracks your internet habits c)Shut down the computerShut down the computer d)To create a virusTo create a virus

 Great job, you really showed that you know all of this information. WAY TO GO. Click the circle below to go onto the next question.

SORRY YOU DID NOT ASWER THE QUESTION CORRECTLY. PLEASE CLICK ON THE CIRCLE BELOW AND REREAD THE INFORMATION TO ASWER THE QUESTION CORRECTLY. = (

What is two ways you can protect yourself from spyware? a)Use spyware scannerUse spyware scanner b)Enable Active XEnable Active X c)Do not use pop-up blockerDo not use pop-up blocker d)Close the X on pop-up windowClose the X on pop-up window

What is the main difference between a virus and spyware? a) Spyware destroys your computer and a virus just slows it down Spyware destroys your computer and a virus just slows it down b) A virus destroys your computer and spyware shuts it down A virus destroys your computer and spyware shuts it down c) Spyware just slows down your computer and a virus destroys your computer Spyware just slows down your computer and a virus destroys your computer d) A virus shows how vulnerable we are and spyware destroys your computer A virus shows how vulnerable we are and spyware destroys your computer

What does spyware take up? a) RAM RAM b) GUI GUI c) ROM ROM d) PDF PDF

What is piggybacked spyware attached to? a) A virus A virus b) Add-On’s Add-On’s c) Applications you are installing Applications you are installing d) Created files Created files

 Coustan, Dave. How Spyware Works( October 7,2010) A Discovery Company November 1, 2010[

 Great job, you really showed that you know all of this information. Way to go. Click the shape below to go onto the next question.

What does MMORPG mean? 1.Massive multiplayer online role- playing gamesMassive multiplayer online role- playing games 2.More mega online role playing gamesMore mega online role playing games 3.Mega more online role playing gamesMega more online role playing games 4.Million more online fun games.Million more online fun games.

Sorry you did not answer the question correctly. Please go back to the information and choose the right answer.

Some warnings signs for game addiction? A. playing for a long amount of time playing for a long amount of time B. Thinking about gaming during other activities Thinking about gaming during other activities C. Escape from real life problems Escape from real life problems D. All the above All the above

 What are some countries that responded to the treatment of video game addiction?  A. United StatesUnited States  B. Asia B. Asia  C. AustraliaAustralia  D. Egypt Egypt

 What does game addictions affect?  A. Daily LifeDaily Life  B. RelationshipsRelationships  C. JobsJobs  D. All the aboveAll the above

 What ages are being affected by Game addiction?  A A  B B  C C  D. All the Above D. All the Above

 Some of the information that I used was in the article when we had to finish the game addiction assignment. The other information I used was a Wikipedia site.   ddiction ddiction