Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer and Society Introduction to: World Wide Web Wild Card

Similar presentations


Presentation on theme: "Computer and Society Introduction to: World Wide Web Wild Card"— Presentation transcript:

1 Computer and Society Introduction to: World Wide Web Wild Card
Security/Privacy Computer Crimes Viruses Ethics Etiquette/ Netiquette Edited By A. Moore 02/12 Information retrieved from 2008 Exploring Business Technologies & Business Computer Technology—BE 6400, and Digital Literacy curriculum.

2 Lesson Objectives After completing this lesson you will be able to:
Understand the world wide web and the use of the wild card symbol. Identify the common measures used to protect your computer and your data. Discuss security, confidentiality, and ethical issues as related to computer usage. Identify computer viruses. Understand computer ethics, etiquette, and netiquette.

3 World Wide Web WWW - collection of data that is accessible from the Internet. Web browser - software that allows you to retrieve resources from the web. Internet Explorer, Mozilla Firefox, Google Chrome Search engine – allows users to search for information on the WWW. Google, Alta Vista, Excite

4 Wild Card Searching The * symbol, called an asterisk, is considered a wildcard character. Used if you don’t know the spelling of a word Example: N*Ryan to search for Nolan Ryan Used to search plurals or variations of words.

5 What is Computer Security & Privacy?
Damages your computer or the data on it is a computer threat. When your computer is connected to a network, the computer becomes more vulnerable to computer threats. Video 5 Worst Photos Post Online

6 Security Measures Maintain & enforce security measures such as:
Passwords Firewalls Limits data that passes through the Internet and protects data from damage by unauthorized users. Antivirus software

7 Other Terms Scams - attractive offers through messages or chat room communication. Online predators - individuals who contacts Internet users online. Involve others into inappropriate and unethical relationships.

8 Computer Privacy Computer privacy - keeping personal files, data, and messages, away from anyone without permission Computer Security – protecting a computer system from accidental or intentional loss and tampering (Ex: user name and password).

9 Computer Laws Copyright - Law protecting the original work of an
artist or author (software, text, paintings, photographs, books, songs, video/movies).

10 Computer Crimes Criminal act committed through the use of a computer.
Hacker - Using the computer to misuse or tamper with the programs and data stored on the computer. Computer hacking - Invading someone else’s computer, for personal gain or the satisfaction of invasion. Computer fraud - Manipulating a computer or its data for dishonest profit. Theft of computer time - Using a company’s computer for personal use.

11 Computer Crimes (con’t.)
Plagiarism - Taking ideas or words that are not yours and claiming it as yours (research papers). Data diddling - Changing data before or while entering in the computer. Piracy - Violation of copyright law. Illegally copying and reselling as your original.

12 Identity Theft Hacker steals your personal information to assume your identity.

13 Viruses Viruses – software written to cause malfunctioning of a computer or damage the stored data. Worms – uses computer networks and duplicates copies of itself in the computer's memory and causes the computer to crash. viruses – travels as an attachment by automatically mailing itself to the address book.

14 Viruses con’t. Trojan horse - does something harmful while
appearing to do something useful (trick disguised as a game). Logic bomb – virus takes affect at an event (deleting an , closing a pop-up window) Time bomb – virus takes affect at a certain date or time (Friday 13th). Hoax – virus that tricks you into thinking you have a virus.

15 Spyware Spyware – program installed on your computer without your knowledge. Secretly sends out information about your Web browsing habits or other personal details to another computer through the network.

16 EXE Called executable files, make things happen.
EXE files are necessary for running your applications. EXE files can be dangerous files and damage your computer system and your security. Do not open EXE files than you received as an .

17 What is Ethics? Moral principles or values
Distinguishing between right and wrong

18 Technology Ethics Ethics - moral principles by which people
conduct themselves. Not play computer games during work hours. Not check personal . Not use the Internet for personal use such as shopping online.

19 Acceptable Use Policy (AUP)
Policy a user must agree to follow in order to be provided access (login - user name & password) to a network or to the Internet.

20 Etiquette Etiquette - Use good manners when writing messages. Use correct spelling and punctuation. Keep your message short. DO NOT USE ALL CAPS! It looks like you are yelling.

21 Netiquette - Good internet behavior

22 Electronic Mail Electronic form of postal mail.
consists of three parts: The user name of the individual symbol The user’s domain name (name of the computer that handles your mail) Example:

23 Parts of an E-Mail Message
Header Body

24 Are You Paying Attention?
Take out a blank sheet of paper. Write your first name, last name, class and date in the right corner. Label this assignment “Computer Society” Number it 1-5.

25 You receive an e-mail message from an unknown
address. The message requests you to share your credit card details to receive a discount on some music CDs. What will you do with this message? A. Reply to the message to provide your credit card details. B. Encrypt the message. C. Scan the message for viruses. D. Delete the message.

26 2) Lina is unable to access the account that her Internet service provider (ISP) provides. She realizes that someone has hacked into her account. What action will she take to remedy this issue? A. Protect her computer from surges and spikes B. Use Microsoft® Windows® Update C. Install spyware D. Report the incident to her ISP

27 3) Ken decides to download the latest song from his favorite band from a publicly available Web site and share it with his friends. What is Ken doing? A. Breaching copyright B. Breaching security C. Slandering the singer D. Violating privacy

28 4) While reading a novel, you realize that the author has copied material from another author. How will you categorize this violation? A. Phishing B. Plagiarism C. Libel D. Slander

29 5) Gloria uses the Internet frequently for online purchasing
5) Gloria uses the Internet frequently for online purchasing. To protect her system from virus attacks, she installs an antivirus program. However, within a few days, she gets a virus alert on her system. Which of the following measures will she implement to prevent this virus in the future? A. Update and run virus scans daily. B. Update the Internet browser. C. Check Windows Update. D. Use a strong password.


Download ppt "Computer and Society Introduction to: World Wide Web Wild Card"

Similar presentations


Ads by Google