Non-Fiction Text Structure Computers. The computer can freeze. Bugs The computer can crash A person may be forced to restart the computer Cause and Effect.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Chapter 7 Operating Systems and Utility Programs.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
How to Keep Your PC Running Like New Bryan Nowak.
Chapter 1 Introduction to Computers p. 6.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Scams Stevie's Scam School videos
Information about the computer By Sophia and Christina C.
Viruses & Destructive Programs
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
The Ideal Device for Teachers and Students: TABLETS.
Introduction to Computers and the Internet. What is a computer? An "intelligent" machine  You tell a person to do a job and the person follows your “instruction”
By: Marcus Owens. Essential Components Your computer depends on two things: hardware and software. Hardware are physical components that make up your.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
Section 6 Theory Software Copyright, Viruses and Hacking.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
The Internet {By Quinn Franklin 10BB}. What is the Internet? O The internet is an international network that links computers worldwide to eachother. O.
Electronic Communication Is the process of sending and receiving messages. Text Message File Transfer Sending messages from one computer.
What does a Computer Do?. What is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory,
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Homework #2 John Bach IST 110 Section 031 JMB6824 9/15/2012.
How to Install Malwarebytes Anti- Malware Software Khushbu Shah ENG 393 May 4 th, 2010.
Computer Basic By: Ploy G7J.
Introduction: SIMULATION AND ANIMATION DESIGN. What is Simulation and Animation Design? Also known as Video Game Design or Graphic Design Contains: Ethics.
SETTING UP AN INTERNET NETWORK What you’ll need Your options How does data travel the Internet? Different terminology.
TABLETS. What is a Tablet?  Mobile computer  Developed in last 2 decades  With display, circuitry and battery  Touch screen (no mouse or keyboard)
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Ten Common Computer Problems That Can Easily Be Fixed By: Sam Merrifield.
Internet Safety Internet Safety LPM
Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Computer Security By Duncan Hall.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
VIRUS PROTECTION Andrea Newman. What does it do?  Virus protection software protects your computer from harmful viruses.  Saves you time and Money.
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
How to be E-safe Objective To know how to use Technology responsibly in today’s world. Outcome To create a Responsible use of Technology poster suitable.
GUIDE TO INTERNET SAFETY A VISUAL WALKTHROUGH TO SAFE INTERNET BROWSING.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Unit 7 P2 P2 explain potential risks to consider when installing
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
For more information on Rouge, visit:
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
PowerPoint Jeopardy VocabularyComputer LingoNotesCategory 4Category
Internet Safety.
Viruses & Destructive Programs
Electronic Plan By Ben Smithers and Dana Natov
Edexcel GCSE Cyber security threats Computer Science 1CP1
Learn how to protect yourself against common attacks
Lesson 3 Safe Computing.
Information Technology
Computer Basics.
Staying Austin College
Chapter 1 - Introduction to Computers and the Internet
9 ways to avoid viruses and spyware
What devices use the internet?
Presentation transcript:

Non-Fiction Text Structure Computers

The computer can freeze. Bugs The computer can crash A person may be forced to restart the computer Cause and Effect Cause effects This paragraph identifies the effects of computer bugs.

Both require the computer to process information. Both are required for computing. Input / Output SIMILARITIES Input – Computer accepts information Output – Computer gives info to user Input – Controlled by the user Output – controlled by the computer DIFFERENCES Compare/Contrast This paragraph compares and contrasts input and output functions of a computer.

The website will scan your computer for weaknesses. Clicking on an from a strange address. You computer will download a harmful file. The file will run and the attacker will have control of your computer. Computer will connect to a website created to attack computers Cause and Effect Cause effects This paragraph identifies the effects of opening harmful s.

Keep software up to date. A computer virus stealing your files and spying on you is a PROBLEM. Don’t click suspicious links. Don’t open attached files unless you’re expecting them. Install virus protection. Problem/Solution problem solutions This paragraph shares ways to avoid acquiring a computer virus.

They will steal your sensitive information. Someone puts a virus on your computer They will sell your sensitive information. They can use your computer to attack other computers and websites. Cause and Effect Cause effects This paragraph identifies the effects of a computer virus.

Both allow you to connect to the internet. Mobile Data / Wifi SIMILARITIES Mobile – Provided by phone company Wifi – Comes through cable lines Mobile – Internet access anywhere Wifi – Access only when near router. Mobile – slower and limited by plan Wifi – faster and unlimited data DIFFERENCES Compare/Contrast This paragraph compares and contrasts mobile data and wifi.

Chrolonogy 48 Computers sold this year 125 million sold in one year One billion worldwide in 25 years Another 1 billion sold in 5 years 355 sold in one year This paragraph shows the growth of computer sales since 1977.

Google the site you will purchase from Research the Internet Read Reviews Compare Prices Figure out your budget Figure out what you want Input your information Wait for your computer Sequence This paragraph presents the process of buying a computer.

Both have keyboards But can be useful at times Tablets / Computers SIMILARITIES Computer - Better for long tasks like papers, website building. Tablets – Not comfortable to type on over long periods due to small size. Computer - Confined to a desk or large space Tablets – More portable / can be used in comfortable seating. Computers – Plugged in Tablet – Run on batteries DIFFERENCES Compare/Contrast This paragraph compares and contrasts tablets and computers.

Take Eyes off the Screen Poor Eyesight, Back Pain, Injured Wrists due to using a computer for a long time. Stretch Straighten Your Back Walk Around Exercise Take Breaks Problem/Solution problem solutions This paragraph provides ways to avoid injures related to prolonged computer use.