Presentation is loading. Please wait.

Presentation is loading. Please wait.

Analyzing Technology Issues Computer Basics. The Impact of Technology on Education EducationEducation –Internet –Distance Learning- Using Technology as.

Similar presentations


Presentation on theme: "Analyzing Technology Issues Computer Basics. The Impact of Technology on Education EducationEducation –Internet –Distance Learning- Using Technology as."— Presentation transcript:

1 Analyzing Technology Issues Computer Basics

2 The Impact of Technology on Education EducationEducation –Internet –Distance Learning- Using Technology as a medium for schooling or learning. –Computer-Based Learning- Using a computer as a tutor –Simulations- Models a real-world activity.

3 The Impact of Technology on Science ScienceScience –Artificial Intelligence- tries to improve computers by endowing them with some of the characteristics associated with human intelligences. –Genetic Engineering- changing DNA in living organisms –Virtual Reality- an artificial environment that appears to feel like a real environment

4 Multinational EconomyMultinational Economy Electronic Commerce- having an online business.Electronic Commerce- having an online business. The Impact of Technology on Work

5 The flying carThe flying car Voice recognitionVoice recognition Space travelSpace travel Smart housesSmart houses Electronic shoppingElectronic shopping The Impact of Technology on Our Lives

6 Exploring Technology Careers Business and OfficeBusiness and Office –Administrative Assistant –Desktop Publisher/Graphic Designer Network Support and AdministrationNetwork Support and Administration –PC Support Specialist –Manager of Information Systems Web-BasedWeb-Based –Web Developer –Web Master

7 Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer.A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer.

8 Types of Computer Crimes Computer fraudComputer fraud –Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Computer hackingComputer hacking –Involves invading someone else’s computer, usually for personal gain or just the satisfaction of invasion.

9 Other Computer Crimes Theft of computer timeTheft of computer time –An employee uses a company’s computer for personal use such as running a small business, keeping records of an outside organization, or keeping personal records. Data diddlingData diddling –Changing data before it is entered into the computer or after is has been entered into the computer.

10 Computer Viruses A virus is a program that has been written to cause corruption of data on a computer.

11 Types of Computer Viruses WormWorm Makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks.Makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks. Time bombTime bomb Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. Logic bombLogic bomb Virus triggered by the appearance or disappearance of specified data.Virus triggered by the appearance or disappearance of specified data. Trojan horseTrojan horse Virus that does something different from what it is expected to do.Virus that does something different from what it is expected to do.

12 Privacy and Security Issues Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources.Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources.

13 Security Measures Maintain and Enforce Security Measures such as: PasswordsPasswords Electronic identification cardsElectronic identification cards FirewallsFirewalls Antivirus softwareAntivirus software Selective hiring processSelective hiring process

14 Advantages and Uses of Telecommunications Telecommunication involves electronically transferring data.Telecommunication involves electronically transferring data. –Distance learning Allows the user to take classes without being physically present.Allows the user to take classes without being physically present. –Teleconferencing Provides conferencing capabilities from several locations without leaving the office, reduces costs for time and travel.Provides conferencing capabilities from several locations without leaving the office, reduces costs for time and travel.

15 What is a browser? The software program that you use to retrieve documents from the World Wide Web (WWW) and to display them in a readable format.The software program that you use to retrieve documents from the World Wide Web (WWW) and to display them in a readable format. Examples:Examples: –Internet Explorer –Netscape Communicator

16 Title bar The bar on top of the window that contains the name of the document.The bar on top of the window that contains the name of the document.

17 A horizontal menu that appears on top of a window.A horizontal menu that appears on top of a window. Provides a selection of options related to the Web page. Provides a selection of options related to the Web page. Menu Bar

18 Icons for single-click access to most commonly used menu commands.Icons for single-click access to most commonly used menu commands. Tool bar

19 Contains the URL, or address, of the active Web page; also where you type the location for the Web page you want to visit.Contains the URL, or address, of the active Web page; also where you type the location for the Web page you want to visit. Address bar

20 Connects you to address displayed in the Address bar. Document Window displays the active Web PageConnects you to address displayed in the Address bar. Document Window displays the active Web Page Go button

21 Located at the bottom of the browser; shows the progress of Web page transactions.Located at the bottom of the browser; shows the progress of Web page transactions. Status bar

22 A small picture in the upper right corner of the browser; when animated, it means your browser is accessing data from a remote computer.A small picture in the upper right corner of the browser; when animated, it means your browser is accessing data from a remote computer. Access Indicator

23 Vertical and horizontal scroll bars; lets you scroll vertically and horizontally if the Web page is too long or too wide to fit within one screen.Vertical and horizontal scroll bars; lets you scroll vertically and horizontally if the Web page is too long or too wide to fit within one screen. Scroll bars

24 What is Email? Email, or electronic mail, is similar to regular mail. You have a message, an address, and a carrier that figures out how to get it from one location to another.Email, or electronic mail, is similar to regular mail. You have a message, an address, and a carrier that figures out how to get it from one location to another. Email is used to stay in touch with family and friends, conduct business, and send attachments such as text and image files.Email is used to stay in touch with family and friends, conduct business, and send attachments such as text and image files.

25 Advantages and Uses of Email Faster way to communicate and respondFaster way to communicate and respond Quick and easy way to send messagesQuick and easy way to send messages Forward messages to other individualsForward messages to other individuals Send messages to multiple individualsSend messages to multiple individuals Include attachments such as pictures, audio files, and documentsInclude attachments such as pictures, audio files, and documents

26 Email Terminology InboxInbox OutboxOutbox Sent ItemsSent Items Deleted ItemsDeleted Items DraftsDrafts New MessageNew Message SendSend Address BookAddress Book

27 Electronic Mail Addresses The address consists of three parts: The user name of the individualThe user name of the individual The @ symbolThe @ symbol The user’s domain nameThe user’s domain name Example: rsmith@yahoo.com

28 What is a search engine? A tool that lets you find Web pages that match a particular word or phrase.A tool that lets you find Web pages that match a particular word or phrase. Examples of search engines:Examples of search engines: –Altavista –Google –HotBot –InfoSeek –Excite

29 Search Engine Terminology Search expressionSearch expression IndexIndex Spiders or botsSpiders or bots Meta tagsMeta tags DirectoryDirectory Keyword searchKeyword search HyperlinkHyperlink

30 Background of the Internet Early origin in 1960sEarly origin in 1960s Closely tied to a networking project started by a governmental division called the Advanced Research Projects Agency.Closely tied to a networking project started by a governmental division called the Advanced Research Projects Agency. Original name: ARPANETOriginal name: ARPANET Created so that scientists were able to share information on military and scientific research.Created so that scientists were able to share information on military and scientific research.

31 Features of the Internet The World Wide WebThe World Wide Web –Began in March 1989 when Tim Berners-Lee wrote a small computer program for his personal use.

32 Web Protocols HTMLHTML –Hypertext Markup Language A series of tags that are integrated into text documents and describes how the text should be formatted when a Web browser displays it on the screen.A series of tags that are integrated into text documents and describes how the text should be formatted when a Web browser displays it on the screen. HTTPHTTP –Hypertext Transfer Protocol Standard that defines how messages are formatted and transmitted.Standard that defines how messages are formatted and transmitted.

33 Chat Rooms Using the computer to create real-time communication between yourself and another user or a group of users.Using the computer to create real-time communication between yourself and another user or a group of users. –Internet Relay Chat (IRC) A text-based chat developed by Jarkko Oikarinen in 1988.A text-based chat developed by Jarkko Oikarinen in 1988. One of the most widely used chat forums on the Internet today.One of the most widely used chat forums on the Internet today.

34 Chat Options Web chatWeb chat –Incorporates graphics, audio and video –Hosted by search engines such as Yahoo, Snap, and Excite. Proprietary chatProprietary chat –Requires that you download and install software from a company. –Examples are Microsoft Chat, AOL, and Prodigy. Buddy listsBuddy lists –You specify your list of friends and even tell when they are online. –Examples are ICQ and AOL Messenger

35 Mailing Lists A group of people with a shared interest.A group of people with a shared interest. Their email addresses are collected into a group, and this group is identified by a single name.Their email addresses are collected into a group, and this group is identified by a single name. When a message is sent to the group, everyone on the list receives that message.When a message is sent to the group, everyone on the list receives that message.

36 Newsgroups A discussion forum or a type of bulletin board.A discussion forum or a type of bulletin board. Each board is dedicated to discussion on a particular topic.Each board is dedicated to discussion on a particular topic. USENETUSENET Worldwide network of computers that facilitates the transmission of messages among the news servers.Worldwide network of computers that facilitates the transmission of messages among the news servers.

37 Research on the Internet Two basic tools used to find information:Two basic tools used to find information: Search enginesSearch engines Used to search for keywords.Used to search for keywords. Subject directoriesSubject directories Used to find specialized topics.Used to find specialized topics.

38 Types of Search Engines Keyword SearchKeyword Search –Uses keywords to perform search Multimedia Search EnginesMultimedia Search Engines –Used to find graphics, video clips, animation, and MP3 music files. Meta Search EnginesMeta Search Engines –Search several major search engines at one time. Subject DirectoriesSubject Directories –Organized by subject categories and displayed in a series of menus.

39 Tools and Techniques Phrase SearchingPhrase Searching Search Engine MathSearch Engine Math Boolean OperatorsBoolean Operators Wildcard SearchingWildcard Searching Title SearchingTitle Searching

40 Phrase Searching A phrase is entered using double quotation marks and only matches those that appear adjacent to each other and in the order in which you specify.A phrase is entered using double quotation marks and only matches those that appear adjacent to each other and in the order in which you specify. –Example: “baseball cards”

41 Search Engine Math Symbols used in formulas to filter out unwanted listings.Symbols used in formulas to filter out unwanted listings. –Use the plus symbol (+) before words that must appear. Also known as an inclusion operator.Also known as an inclusion operator. –Use the minus symbol (-) before words that you do not want to appear. Also known as an exclusion operator.Also known as an exclusion operator.

42 Boolean Operators Boolean logic consists of three logical operators:Boolean logic consists of three logical operators: –AND –NOT –OR

43 Wildcard Searching The * symbol, called an asterisk, is considered a wildcard character.The * symbol, called an asterisk, is considered a wildcard character. Used if you don’t know the spelling of a wordUsed if you don’t know the spelling of a word –Example: N*Ryan to search for Nolan Ryan Used to search plurals or variations of words.Used to search plurals or variations of words.

44 Title Searching Searching the title of a web page.Searching the title of a web page. When a web page author creates a Web page, the Web page generally contains a HTML title.When a web page author creates a Web page, the Web page generally contains a HTML title.


Download ppt "Analyzing Technology Issues Computer Basics. The Impact of Technology on Education EducationEducation –Internet –Distance Learning- Using Technology as."

Similar presentations


Ads by Google