Presentation is loading. Please wait.

Presentation is loading. Please wait.

S PYWARE, V IDEOGAME A DDICTION, B INARY NUMBERS, AND V IRUSES By Shakira Pettaway, Shan-Shan Wang, Pauline Pearcy, and Michael Norris.

Similar presentations


Presentation on theme: "S PYWARE, V IDEOGAME A DDICTION, B INARY NUMBERS, AND V IRUSES By Shakira Pettaway, Shan-Shan Wang, Pauline Pearcy, and Michael Norris."— Presentation transcript:

1

2 S PYWARE, V IDEOGAME A DDICTION, B INARY NUMBERS, AND V IRUSES By Shakira Pettaway, Shan-Shan Wang, Pauline Pearcy, and Michael Norris

3 S PYWARE IS …… Spyware is bad software that hides behind popup windows to harm your computer. Use popup windows that draw attention to it- saying you won a prize. Make computers operate extremely slowly. Make unwanted changes to your computer without permission.

4 Y OU CAN GET SPYWARE BY … You cause yourself to get spyware by clicking on popup windows Installing a software package They use fake system alert messages to say cancel, but it installing spyware. Piggybacked software installation, drive-by downloads, browser add-ons, masquerading as anti-spyware.

5 C AN YOU GET RID OF SPYWARE... You can get rid of spyware Buy legitimate anti-spyware software. Could cost a lot of money RARELY Your computer has not lost hope if it gets infected by spyware.

6 Y OU CAN PREVENT SPYWARE BY …. Using a spyware scanner Use a pop-up blocker. Disable Active-X. Be suspicious about installing new software. Close pop-up adds instead of clicking on them.

7 V IDEO GAME ADDICTION IS EXCESSIVE OR COMPULSIVE USE OF COMPUTER AND VIDEO GAMES THAT INTERFERES WITH DAILY LIFE.

8 F ACTS ABOUT VIDEO GAME ADDICTION Children who play four to five hours a day, they no time for their family, homework, friends, or play sports. Adults who play video games for four to five hours a day, they have no time for their family, friends, and their jobs.

9 WARNING SIGNS FOR VIDEO GAME ADDICTION ! Playing for increasing amounts of time Thinking about gaming during other activities Gaming to escape from real- life problems, anxiety, or depression Lying to friends and family Feeling irritable when trying to cut down on gaming

10 W AYS TO PROTECT YOUR CHILDREN Logs of when the child plays and for how long Problems resulting from gaming How the child reacts to time limits

11 F ACTS A BOUT V IDEO G AME ADDICTION MMRPG stand for massive multiplayer online role playing game. Age 15-30 are the most risk for gaming addiction

12 T HE B ASE OF B INARY N UMBERS Decimal numbers function on a base 10 system. This means that each time you moved one digit to the left, the value increases by a multiple of ten. Ex. 1 is 10^0, 10 is 10^1, 100 is 10^2, ect. Binary numbers differ from this because they use a base two system. This means that the rightmost number is 1, the number to the left of that is 1 to the power of 2, and so on. Ex. 1 is 2^0, 2 is 2^1, 4 is 2^2, ect.

13 N UMBERS Another thing that makes binary code different from decimal numbers is that binary code uses only two numerals, 1 and 0. You can remember this because “bi” means two, like bi cycle, and there are two numerals used in binary code.

14 R EADING B INARY N UMBERS Binary numbers read from right to left, the exact opposite of decimal numbers. As was stated earlier, binary code uses a base two, meaning that each number is greater than the number to the right of it by a power of two This can be seen here: …512, 256, 128, 64, 32, 16, 8, 4, 2, 1.

15 R EADING B INARY N UMBERS ( CONT.) Reading binary numbers is basically like adding. You add the numbers that are marked by a 1. *Remember, you read binary code from left to right. Since the smallest number in binary code is one, if the rightmost number is marked by a 1 we know to add one to the total, if it is marked by a 0, do not add one. If the next number (2^1, or 2) is marked by a 1, add two, if it is marked by a 0, add nothing.

16 R EADING B INARY N UMBERS ( CONT.) If the next number to the left (2^2, or 4) is marked by a 1, add four to the total. If it is marked by a 0, add nothing. See a pattern? Each time we move one digit to the left the value is multiplied by two, starting with one and going to two, then four, and so on to infinity. Also, we know whether or not to add a number to the total by whether or not it is marked with a 1. If it is marked with a zero instead, add nothing.

17 W RITING BINARY NUMBERS Writing binary numbers is similar to reading them; it is just done in the opposite order. When writing a binary number from a decimal number, chose the largest exponent of two that is equal to or smaller than your number. For example, if the number is 467, the largest exponent of two would be 256 or 2^8. The exponent of two, in this case 8, tells you how many numbers will follow this original number.

18 W RITING B INARY N UMBERS ( CONT.) After choosing the largest exponent of two possible, subtract that number from your decimal number. Ex. 467-256= 211 Put down a 1. Now that your new number is 211, you need to find the largest exponent of two that is smaller than or equal to 211. The next number down, 128, is small enough, so you mark it with a 1 and subtract it from 211. 211-128= 83

19 W RITING B INARY N UMBERS ( CONT.) Now your number is 83, and you must find the next exponent of two that is still smaller than it, which in this case is also the next smallest number, 64. Repeat as in the previous steps, marking with a 1 and subtracting from the previous number. Your new number is 19, and the next smallest number is 32, which is too big, so you mark that spot with a 0.

20 W RITING B INARY N UMBERS ( CONT.) The number after 32, which is 16, is small enough, so you subtract, and mark 16 with a 1. The new number is 3, and the next two numbers, 8 and 4, are both two big, so you mark those spots with a zero. Two is small enough, so you repeat marking and subtracting, and the new number is 1. You subtract this from the final number, which is also 1, and mark with a one.

21 V IRUSES A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program.

22 W ORMS A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

23 T HE O RIGINS OF V IRUSES Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person

24 T HE E VOLUTION OF V IRUSES As virus creators became more sophisticated, they learned new tricks. One important trick was the ability to load viruses into memory so they could keep running in the background as long as the computer remained on.

25 Spyware Video Game Addiction Binary Numbers Viruses $100 $200 $300 $400 $500 Game board

26 W HAT IS S PYWARE ? Highly trained professionals to spy on ware houses. Software that hides behind popup windows to harm your computer. Program to prevent your computer from being infected by viruses. Software that completely crashes your computer once it infects it.

27 C ONGRATULATIONS, Y OU E ARNED $100 ! Go Back to the Game Board

28  S ORRY, Y OU G OT Q UESTION 1 W RONG  Helpful Hint: Spyware masquerades Itself Please, try again

29 H OW D O Y OU G ET S PYWARE ? By calling the product’s number to order. Buy it on Amazon.com. Go to a special spyware store and buy it. Clicking on popup windows.

30 C ONGRATULATIONS, Y OU E ARNED $200 Go Back to the Game Board

31 S ORRY, Y OU G OT Q UESTION 2 W RONG Helpful Hint: You cannot order spyware onto your computer. Please, try again

32 I F YOUR COMPUTER / LAPTOP IS INFECTED BY SPYWARE, CAN IT BE FIXED ? Yes No It’s possible None of the above

33 C ONGRATULATIONS, Y OU E ARNED $300 Go Back to the Game Board

34 S ORRY, Y OU G OT Q UESTION 3 W RONG Helpful Hint: Your Computer isn’t completely hopeless if it’s infected by spyware. Please, try again

35 H OW DO YOU GET RID OF SPYWARE ? Get rid of your computer Buy legitimate anti-spyware software Restart your computer multiple times Spend billions of dollars on someone who can fix the problem

36 C ONGRATULATIONS, Y OU E ARNED $400 Go Back to the Game Board

37 S ORRY, Y OU G OT Q UESTION 4 W RONG Helpful Hint: Spending an extreme amount of money to fix one computer is not necessary. Please, try again

38 H OW CAN YOU PREVENT SPYWARE FROM INFECTING YOUR COMPUTER ? Don’t click on popup adds Prevent spyware scans Click on ONLY one popup add to make them all go away Stop getting on the internet

39 C ONGRATULATIONS, Y OU E ARNED $500 Go Back to the Game Board

40 S ORRY, Y OU G OT Q UESTION 5 W RONG Helpful Hint: Clicking on one popup add can lead to many more popup adds. Please, try again

41 W HICH IS A WARNING SIGN OF VIDEO GAME ADDICTION ? Playing for increasing amounts of time Not thinking about gaming during other activities Playing for decrease amounts of time Not lying to friends or families

42 G OOD JOB ! Click here!

43 S ORRY TRY AGAIN Go back!

44 WHAT CAN HAPPEN TO AN ADULT WHEN THEY PLAY FOR FOUR OR FIVE HOURS A DAY ? No time for their family, friends, and jobs Have time for their family Have times to hang out with their friends Doing a good job on their jobs

45 G OOD JOB ! Click here!

46 S ORRY TRY AGAIN Go back!

47 W HAT DOES MMORPG STAND FOR Massive multiplayer online role playing game Massive more online role playing game Massive multiplayer on role playing game Massive more on role playing game

48 G OOD JOB ! Click here!

49 S ORRY TRY AGAIN Go back!

50 W HICH AGE GROUP IS AT THE MOST RISK FOR GAMING ADDICTION ? 20-25 10-31 51-55 15-30

51 G OOD JOB ! Click here!

52 S ORRY TRY AGAIN Go back!

53 W HICH ONE IS NOT WHAT YOU CAN DO TO PROTECT YOUR CHILDREN FROM VIDEO GAMES ADDICTION ? Logs of when the child plays and for how long Let your children play as long as they can Not care about them Don’t care about how they react

54 G OOD JOB ! Click here!

55 S ORRY TRY AGAIN Go back!

56 H OW MANY NUMERIC SYMBOLS ARE USED IN BINARY NUMBERS ? 10 1 2 3

57 W RONG ! Sorry, that answer is incorrect. Hint: Think about it, bi nary. Try Again

58 C ORRECT ! That is the right answer! You have earned $100! Back to Game board

59 W HAT ARE THE NUMERALS USED IN BINARY CODE ? 0 and 1 1 and 2 2 and 3 0 and 3

60 W RONG ! That is not the right answer! Hint: Try to think simpler (i.e. smaller) Try Again

61 C ORRECT ! That is the right answer! You have won $200! Back to Game Board

62 W HAT IS THE BASE NUMBER OF BINARY CODE ? 0 1 2 10

63 W RONG ! That is an incorrect answer. Hint: Remember bi nary. Try Again

64 C ORRECT ! That is the right answer! You have won $300! Back to Game Board

65 T RANSLATE 495 INTO BINARY CODE. 111111111 111101111 000100010 101010101

66 W RONG ! That is not the right answer. Hint: Remember what 1 and 0 mean. Try again

67 C ORRECT ! That is right! You have won $400! Back to Game Board

68 W HAT IS 100111010 IN “ NORMAL ” NUMBERS ? 1000 3 314 506

69 W RONG ! That is not right. Hint: Remember, exponents of two. Try Again

70 C ORRECT ! That is right! You have won $500! Back to Game Board

71 W HAT IS A VIRUS ? A small piece of software that piggybacks on real programs A small piece of software that uses computer networks and security holes to replicate itself. An attachment to e-mail messages, but does not replicate itself by automatically mailing itself to dozens of people in the victim's e-mail address book. The program claims to do one thing, but instead does damage when you run it.

72 C ONGRATULATIONS ! Go back to the game board

73 S ORRY ! Try again

74 W HAT IS A W ORM ? The program claims to do one thing, but instead does damage when you run it. A small piece of software that uses computer networks and security holes to replicate itself. A program that can infect other programs or documents. A silly message.

75 C ONGRATULATIONS ! Go back to the game board

76 SORRY Try again

77 A RE VIRUS CREATORS BECOMING MORE SOPHISTICATED ? True False

78 C ONGRATULATIONS ! Go back to the game board

79 SORRY Try again

80 D OES A WORM USUALLY EXPLOIT SOME SORT OF SECURITY HOLE IN A PIECE OF SOFTWARE OR THE OPERATING SYSTEM ? True False

81 C ONGRATULATIONS ! Go back to the game board

82 SORRY Try again

83 W HY ARE COMPUTER VIRUSES ARE CALLED VIRUSES Computer viruses are called viruses because they share some of the traits of biological viruses. A person has to write the code, test it to make sure it spreads properly and then release it. They just are. It has the ability to load viruses into memory so they could keep running in the background as long as the computer remained on.

84 S ORRY Try again

85 C ONGRATULATIONS ! Go back to the game board

86 B IBLIOGRAPHY http://l3d.cs.colorado.edu/courses/CSCI1200- 96/binary.html


Download ppt "S PYWARE, V IDEOGAME A DDICTION, B INARY NUMBERS, AND V IRUSES By Shakira Pettaway, Shan-Shan Wang, Pauline Pearcy, and Michael Norris."

Similar presentations


Ads by Google