Presentation is loading. Please wait.

Presentation is loading. Please wait.

Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A.

Similar presentations


Presentation on theme: "Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A."— Presentation transcript:

1 Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A

2 The Impact of Technology on Education  Education Internet Internet Distance Learning Distance Learning Computer-Based Learning Computer-Based Learning Simulations Simulations 2.01

3 The Impact of Technology on Science  Science Artificial Intelligence Artificial Intelligence Genetic Engineering Genetic Engineering Virtual Reality Virtual Reality 2.01

4  Multinational Economy  Electronic Commerce The Impact of Technology on Work 2.01

5  Clothes that fight odor and bacteria  The flying car  Voice recognition  Space travel  Smart shoes and smart seats  Smart houses  Electronic shopping The Impact of Technology on Our Lives 2.01

6 Exploring Technology Careers  Business and Office Administrative Assistant Administrative Assistant Desktop Publisher/Graphic Designer Desktop Publisher/Graphic Designer  Network Support and Administration PC Support Specialist PC Support Specialist Manager of Information Systems Manager of Information Systems  Web-Based Web Developer Web Developer Web Master Web Master 2.01

7 Computer Crimes  A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer. 2.02

8 Types of Computer Crimes  Computer fraud Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss.  Computer hacking Involves invading someone else’s computer, usually for personal gain or just the satisfaction of invasion. Involves invading someone else’s computer, usually for personal gain or just the satisfaction of invasion. 2.02

9 Other Computer Crimes  Theft of computer time An employee uses a company’s computer for personal use such as running a small business, keeping records of an outside organization, or keeping personal records. An employee uses a company’s computer for personal use such as running a small business, keeping records of an outside organization, or keeping personal records.  Data diddling Changing data before it is entered into the computer or after is has been entered into the computer. Changing data before it is entered into the computer or after is has been entered into the computer. 2.02

10 Computer Viruses A virus is a program that has been written to cause corruption of data on a computer. 2.02

11 Types of Computer Viruses WormWorm Makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks.Makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks. Time bombTime bomb Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. Logic bombLogic bomb Virus triggered by the appearance or disappearance of specified data.Virus triggered by the appearance or disappearance of specified data. Trojan horseTrojan horse Virus that does something different from what it is expected to do.Virus that does something different from what it is expected to do. 2.02

12 Privacy and Security Issues  Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources. 2.02

13 Security Measures Maintain and Enforce Security Measures such as:  Passwords  Electronic identification cards  Firewalls  Antivirus software  Selective hiring process 2.02

14 Advantages and Uses of Telecommunications  Telecommunication involves electronically transferring data. Distance learning Distance learning Allows the user to take classes without being physically present.Allows the user to take classes without being physically present. Teleconferencing Teleconferencing Provides conferencing capabilities from several locations without leaving the office, reduces costs for time and travel.Provides conferencing capabilities from several locations without leaving the office, reduces costs for time and travel. 2.03


Download ppt "Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A."

Similar presentations


Ads by Google