School of Education * Dept of Education Malone University Final Project B – Online Edu362 Engaging & Interactive Class Activity Diane Daugherty.

Slides:



Advertisements
Similar presentations
Knowledge Pathways in IT
Advertisements

Computer Tech. What is an unsolicited message sent to many recipients Adware Spam Spyware Phishing here here Want to know how spam really.
Integrating Educational Technology into the Curriculum
Stole it Straight from Wilkes County. Questions from 1.01.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Technology Round 7 Exploring I.C.T. in the Syllabus.
Discovering Computers 2010
ASSIGNMENT 4 GRAPHICS INTERACTIVE POWER POINT CECS 5260 BY DENNIS FREEMAN, SR. Kiosk-style Presents Intro to Computer Literacy Click here to start at the.
Essential Computer Concepts
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
1 AQA ICT AS Level © Nelson Thornes 2008 Operating Systems What are they and why do we need them?
Computer Software Computer Technology Day 5. Software  Provides step-by-step instructions that tell the computer how to perform  Categories  System.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Technology, Digital Media, and Curriculum Integration
Your Interactive Guide to the Digital World Discovering Computers 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
MODULE 1 Computing Essentials © Paradigm Publishing, Inc.1.
Introduction to Business © Thomson South-Western ChapterChapter Business and Technology Computer Systems Business Applications of Technology.
Technology in Action Chapter 1 Why Computers Matter to You: The Importance of Becoming Computer Fluent.
200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt.
By Dinesh Bajracharya Nepal Components of Information system.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Two Types of Software.
Computer Basics Mr. Chu MPHS CIS 1.
Augmented Reality. The blending of digital information with the physical world User can see and is apart of the real world User is immersed in a artificial.
CONTROLLING INFORMATION SYSTEMS
Technology, Digital Media, and Curriculum Integration
Review 1 Chapters Chapter 1 Understanding Computers, 12th Edition 2 Chapter 1 Explain why it is essential to learn about computers today and discuss.
Understanding the Potential of IT
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Digital Technologies in the Classroom Chapter 4 By: Raquel S. Cummings.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
Discovering Computers 2010
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Fly Swatter Game Let’s Swat It Now!!. A contract that defines acceptable rules and policies for computer use:
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Information Technology Chapter 5. What is Information Technology? Information technology is specifically associated with computer-based communication.
Security Issues & Ethics in Education By Maud Mushayamunda.
Computer Basics CHAPTER 1. What is a computer?  A computer is a machine that changes information from one form into another by performing four basic.
By: Brittany Cochran, Lindsey King, and Justin Blanton.
GOAL 1IDENTIFY THE MAIN ELEMENTS OF A COMPUTER SYSTEM. GOAL 2DESCRIBE INPUT DEVICES AND PROCESSING ACTIVITIES. GOAL 3EXPLAIN COMPUTER STORAGE MEDIA AND.
Information Technology. *At Home *In business *In Education *In Healthcare Computer Uses.
6 Technology, Digital Media, and Curriculum Integration
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Memory Parts of a computer
Lesson 2- Protecting Yourself Online
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Jeopardy Security Risks Hardware & Software Computer Types Networking
Chapter 11-Business and Technology
Unit I Flash Cards Start.
HOW DO I KEEP MY COMPUTER SAFE?
Sample Occupation Sample Occupation Programming Sofware Engineering
Lesson 2- Protecting Yourself Online
 Is a machine that is able to take information (input), do some work on (process), and to make new information (output) COMPUTER.
Internal components of a computer.
Sample Occupation Sample Occupation Programming Sofware Engineering
Technology Jeopardy School of Education * Dept of Education
Overview of Computer system
Integrating Educational Technology into the Classroom
INTEGRATION OF COMPUTER AND INTERNET TO SUPPORT TEACHING AND LEARNING BY: MARIA LUISA S. PAPICA TCP EDUCATION TECHNOLOGY.
Presentation transcript:

School of Education * Dept of Education Malone University Final Project B – Online Edu362 Engaging & Interactive Class Activity Diane Daugherty

HardwareSoftwareTechnology Integration Computer Security

 Which term defines the smallest storage size for a computer?  Answer

 Which term defines the smallest storage size for a computer?  Answer KB or Kilobyte  (Question)Question  (Main Menu)Main Menu

 What is Input?  Answer

 What is Input?  Answer  Input is what you enter into the memory of a computer.  (Question)Question  (Main Menu)Main Menu

 What is Output?  Answer

 What is Output?  Answer  Output is data that has been processed into a useful form called information.  (Question)Question  (Main Menu)Main Menu

 What is digital media?  Answer

 What is digital media?  Answer  Digital Media Software refers to any computer- based presentation or application software that uses multimedia elements.  (Question)Question  (Main Menu)Main Menu

 Is SimCity4 software considered a virtual reality game?  Answer

 Is SimCity4 software considered a virtual reality game?  Answer  SimCity4 is considered a virtual reality game because it allows you to create an artificial environment.  (Question)Question  (Main Menu)Main Menu

 What is a great tool for evaluating Software Applications?  Answer

 What is a great tool for evaluating Software Applications?  Answer  The Rubrics is a great tool for evaluating Software Applications.  (Question)Question  (Main Menu)Main Menu

 What is technology integration?  Answer

 What is technology integration?  Answer  Technology integration is the combination of all technology parts, such as hardware and software, together with each subject related area of curriculum to enhance learning.  (Question)Question  (Main Menu)Main Menu

 Is curriculum integration considered the same as technology integration?  Answer

 Is curriculum integration considered the same as technology integration?  Answer  Yes, Curriculum integration is considered the same as technology integration.  (Question)Question  (Main Menu)Main Menu

 What is a KWHL chart and what is another name for this?  Answer

 What is a KWHL chart and what is another name for this?  Answer  KWHL chart is also known as an instructional planning tool, but adds an additional component which is – How students learn.  (Question)Question  (Main Menu)Main Menu

 What is a virus?  Answer

 What is a virus?  Answer  A virus is a potentially damaging computer program designed to affect your computer negatively without your knowledge or permission by altering the way it works.  (Question)Question  (Main Menu)Main Menu

 What can you purchase to avoid a potentially dangerous virus?  Answer

 What can you purchase to avoid a potentially dangerous virus  Answer  You can purchase an antivirus program that is designed to detect, disinfect, and protect computers and networks from viruses.  (Question)Question  (Main Menu)Main Menu

 What is Phishing?  Answer

 What is Phishing?  Answer  Phishing is a scam in which a perpetrator sends an official-looking that attempts to obtain personal and financial information from the recipient.  (Question)Question  (Main Menu)Main Menu