 Doctors recognize addictive behaviors as a problem within a person’s life. Being addicted to games may not sound harmful, but it ends in harmful results.

Slides:



Advertisements
Similar presentations
V IDEO G AME A DDICTION By: Nikiya Kelly. V.G.A Background Addiction There are people around the world who play Video Games all day and night. I understand.
Advertisements

Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Thank you to IT Training at Indiana University Computer Malware.
INTERNET SAFETY FOR STUDENTS
What you don’t know CAN hurt you!
Computer Bits and Parts Parts of the computer system.
Teenagers and The Internet Ms Julie Clune Saint Ignatius’ College.
Computer Viruses.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
A Computer is a machine that… Receives inputs Processes info. Gives outputs.
Computer Basics Flashcards #2
INTERNET SAFETY FOR STUDENTS
Internet Consumerism ISA. Buy a Desktop Computer Search the Internet to build a Desktop Computer.
Computer and Internet Basics.
The Knights Diamoneek McDougald.  Video Game Addiction is someone who constantly plays video games  Likes virtual life better than real life  MMORPG.
Jeopardy Game Techable. Powerpoint Jeopardy SpywareInside the Computer CybercrimeVirusesGame Addiction Input/output
Input and Output devices Input ports are connections at the back of a computer. Input devices are connected to these ports, for example, a keyboard which.
How Computers Work. A computer is a machine f or the storage and processing of information. Computers consist of hardware (what you can touch) and software.
Operating Systems What do you have left on your computer after you strip away all of the games and application programs you bought and installed? Name.
Today’s Agenda: Computer Basics Review Hardware: The physical components of a computer, any internal or external computer part that you can touch. Software:
Essential Computer Concepts
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
RULES FOR ONLINE SAFETY BY KYLE K AND JASON. CHECK WITH YOUR PARENTS FIRST ! Don’t ever agree to get together with someone you meet online without checking.
The Romans: Destiny Tucker, Cire Berry, Emmett Mobley, Imani Hawkins, Armani Carter.
Tech 9 Shakira Scott..  Binary Numbers are a base-2 number system that represents numeric values using two digits/symbols, 0 and 1.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 Netiquette Is combination of the words network and etiquette.  Netiquette is using proper manners on the internet.  Netiquette was developed in South.
GIANFRANCO BARBALACE Y FRANCO CAVIGLIA CATENAZZI1ºB Types and components of a computer systems.
How to use a computer and not lose your mind
Business Computer Information Systems I.  Knowing how to use a computer is a basic skill necessary to succeed in business or to function effectively.
Internet and Computers.  The Rules ◦ Divide into two groups ◦ Team 1 will go first ◦ Each team will get points according to the answer given. ◦ The answers.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Computer A computer is an electronic machine that takes information, processes it,and stores it. Computers are made up of hardware ( monitor, tower, keyboard,
The Computer Basics. A computer is an electronic machine Computers can do anything that someone tells them to do Since computers are so fast at processing.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Internet Hardware Computer Literate.
The DYNAMICS ROLES, RASHARD M. Kahlil Elijah Cashai Johnson Sydney Jones Jason Hack.
Parts of the Computer. Monitor A monitor is a screen that displays a computer’s output. It is the most common output device. A monitor looks like a TV.
Common components of computer systems By Francesca.
COMPUTER MAIN PARTS. HARDWARE Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards,
 By: A’Dream Dewitt-Townes, Fatima Johnson and Shelvy Dyson  Pd:8/9.
Introduction to programmable computing devices. What is a computer Computer: How was the computer developed/invented: A computer is a "reckoning" or computing.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Phillip Dinh, Fofanova, 1301, UH Internet Security By Phillip Dinh 1301 Spring 2007 University of Houston.
Elements of a Computer System Understanding Computers.
THE DIFFERENCE BETWEEN INPUT AND OUTPUT. BY FRASER HINE.
SAFE Information & Communication Technology For the Third Grade.  Julianna Madden  ITC 525  Summer 1 Session.
Computers Today.
All about viruses, hacking and backups By Harriet Thomas.
By: Whitney Cannon. What are binary Numbers Binary numbers are the way a computer thinks. The computer see’s thing in zero’s and ones. We used.
Revision Input Process output Software System software Application software Hardware is the physical part of a computer system,including all machines and.
Chapter 1: Applying Computer Basics – Lesson 1 © 2010, 2006 South-Western, Cengage Learning.
Computer security By Georgia. Contents b b What is a virus ? b b How to stop viruses b b What is a hacker ? b b How to prevent hackers b b What are backups,
VIRUS.
Today: Student will be able to describe the basics of their class and computing Tell me about you and how you use computers. Lesson 1 Slide 1.
COMPUTER MAIN PARTS SANTIAGO OCAMPO MEJIA. HARDWARE  Or materials set of physical elements of a computer or a computer system.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
 Input is data you put into your computer like:  Keyboards  Mouse  Data from another computer  Webcam INPUT.
Parts of a Computer. Two Basic Components of a Computer System Hardware Parts of the Computer System you can physically touch Software Computer Instructions.
Parts of a Computer Computer Hardware Hardware refers to the physical parts that make up the computer. Let’s name the computer hardware parts that we.
KEYBOARDING 1 Computer Basics. Definitions Computer  An electronic, digital, programmable machine that has four functions  accepts input  processes.
Hardware/Software Basics Test Get out your DIY Test Review.
Take a tour around my slideshow to learn more about viruses.
Speedway Schools. A computer has many parts that make it work. Some of those parts we can see. Others are hidden inside where we can't see them. In this.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Applications Sharing Computer Literate.
Welcome To The FANTASTiC FiVES’ JEOPARDY GAME ! ! !
Internet Safety.
Essential Question #1 What is a Computer??
Presentation transcript:

 Doctors recognize addictive behaviors as a problem within a person’s life. Being addicted to games may not sound harmful, but it ends in harmful results  The reason for gaming addiction is uncertain, but it most commonly affects males under 30, such as teens with poor self esteem and social problems.

 Game addicts get lured into a fantasy world that relates to online role-playing games.  Online role playing games would be classified as M assive M ultiplayer O nline R ole- P laying G ames.  The most common known MMORPG would have to be World of Warcraft. (WoW)

 Although gaming addiction seems harmful, there are some negative consequences.  Gaming addiction can cause you to gain excessive amounts of weight because you make playing the game your main priority.  It may also cause you to lose important relationships with others and jeopardize your job.

 Some more ways to help a person overcome their addiction would be to show gamers that they are powerless over their addiction and teach them to use computers responsibly.

 There are ways you can help someone overcome their addiction.  Parents: Keep logs of how long the child plays -Document how the child reacts to time limits

 What Is A Virus ?  A virus is a small piece of software that piggybacks on real programs. Next slide

 Viruses reveal to us how vulnerable we are. The most common form of infections are viruses, Trojan viruses, and worms. Next slide

 Three reasons why people create viruses is because to funnel energy into the creation of destruction viruses. Another, is because of the thrill of watching things blow up. Lastly, because of bragging rights.

 Computers use binary numbers because they are easier for the computer to process.  (Click to go to next slide) (Click to go to next slide)

 Binary numbers run on a 2 base system and only uses the number “1” and the number “0”  (go to next slide) (go to next slide)

 Here is an example of a binary code table. Each column is multiplied by two to get the number for the next column

 Input devices are any devices that provides input into a computer. Computers are usless without imput devices

 Some input devices are  -Keyboard  -Mouse  -type writter

 Output devices are things we use to get information out the computer. The most common out put devices is an monitor.

 Examples of output devices -speaker -monitor -headphones -Printer

 Along with input and output devices there are storage devices. Some examples of storage devices are -Hard drive -Flash memory -SD cards

 Is the manners of the internet.  They tend to vary from domain to domain.  Don’t put any one on blast on the internet that could hurt them.

 Always know where you are in cyberspace.  It Basically states that treat everyone the way you want t be treated.

Video Game Addiction VirusBinary Numbers Input and Output Devices Netiquette

A. SimsSims B. World of WarcraftWorld of Warcraft C. Wii SportsWii Sports D. NBA 2k11NBA 2k11

A. Teens who love gamesTeens who love games B. Males under 30Males under 30 C. EveryoneEveryone D. Teens who are shyTeens who are shy

A. Jeopardize relationships, school and/or jobsJeopardize relationships, school and/or jobs B. Gain new friends/meet new peopleGain new friends/meet new people C. Make you popularMake you popular D. Gain you a promotionGain you a promotion

A. Communicate as another personCommunicate as another person B. Contact strangersContact strangers C. Interact with other players in a virtual worldInteract with other players in a virtual world D. Have a secret life over the computerHave a secret life over the computer

A. Teach them to use the computer responsiblyTeach them to use the computer responsibly B. Keep logs of how long they playKeep logs of how long they play C. Conceal their gaming habitsConceal their gaming habits D. Allow them to play for increasing amounts of timeAllow them to play for increasing amounts of time

 health/features/video-game-addiction- no-fun health/features/video-game-addiction- no-fun  omepage/abox/article_ php omepage/abox/article_ php

A.Buy a new computerBuy a new computer B.Avoid the problemAvoid the problem C.Install a secure operating systemInstall a secure operating system D.Open unknown programsOpen unknown programs

A.That we have a bad computerThat we have a bad computer B. We are vulnerableWe are vulnerable C.The computer software is bad qualityThe computer software is bad quality D.The computer is protectedThe computer is protected

A.RAMRAM B.A program that downloadsA program that downloads C.Protection against virusesProtection against viruses D.A program that copies itself from machine to machineA program that copies itself from machine to machine

A. When the computer virus travels upon programs to launch.When the computer virus travels upon programs to launch. B. When a program is copied from machine to machine.When a program is copied from machine to machine. C. When viruses load into the memory of a computer.When viruses load into the memory of a computer. D. When they travel through s to other recipients.When they travel through s to other recipients.

A. Spread into personal computersSpread into personal computers B. People create them for bragging rightsPeople create them for bragging rights C. Use bulletin boardsUse bulletin boards D. Over 10 different formsOver 10 different forms

 term=viruses term=viruses  /BiologyPages/V/Viruses.html /BiologyPages/V/Viruses.html

A.2-base2-base B.3-base3-base C.Base 10Base 10 D.Base 5Base 5

GO TO GAME SLIDE

Go to Info SLIDE

A.The 0’s in the columnsThe 0’s in the columns B.The 1’s in the columnsThe 1’s in the columns C.NoneNone D.Just add all of the ones and zeros togetherJust add all of the ones and zeros together

 What is 101 in decimal form? › A.2 A.2 › B. 3 B. 3 › C. 4 C. 4 › D. 5 D. 5

 What is in decimal form? › A. 10 A. 10 › B.3 B.3 › C C › D.21 D.21

 What is 52 in Binary code? › A. 54 A. 54 › B B › C. 60 C. 60 › D D

 /binary.html /binary.html  news=binar... news=binar... 

 All of these are examples of input devices with the exception of? A. Mouse Mouse B. Typewriter Typewriter C. Monitor Monitor D. keyboard keyboard

 What are output devices? A. Any device that provides input into a computer Any device that provides input into a computer B. Things you use to take stuff out the computer Things you use to take stuff out the computer C. The transmission of data from one computer to another The transmission of data from one computer to another D. A hardware device used to store data A hardware device used to store data

 What is the most common output device. A. Monitor Monitor B. Keyboard Keyboard C. Internet Internet D. Hard drive Hard drive

Which one of these devices are examples of storage devices? A. Mouse Mouse B. Hard drive Hard drive C. Sc card Sc card D. Both B and C Both B and C E. None None

  

A.)A.)With no respect what so ever. B.)B.)The way you want to be treated. C.)C.)Like they do not have statues compared to you.

A) A) Keep everyone aware that you are friendly. B)B)So they realize who they are talking towards C)C)To keep your stats up

A)A)Attitude B)B)Statues C)C)Netiquette

A)A)“You and your people are punks and can’t do any thing about it.” B) B) “Trust and believe life is of my value.” C) C) “The way you act is not very fair toward the game winner.”

A)A)Dominants B) B) A Bluff C)C)Anti-Netiquettes