Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Thank you to IT Training at Indiana University Computer Malware.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Computer Parts There are many parts that work together to make a computer work.
Hardware of Personal Computers
Digital Literacy.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
New Data Regulation Law 201 CMR TJX Video.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Bellringer Do you think students should study computers? Why or why not?
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Essential Computer Concepts
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
How computers work Learning objective 2: Explain the four basic functions of a computer.
Overview of Windows and Microsoft Word. Operating System Performs 3 functions –Controls the hardware of the computer Screen, keyboard, disk drives, etc.
OBJECTIVE 3 ELECTRONIC COMMUNICATIONS. USES OF COMPUTING Pros Made tasks such as clerical work and computing easier and faster Buying, banking, and paying.
Your Interactive Guide to the Digital World Discovering Computers 2012.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Types of Electronic Infection
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Technology Vocabulary Words. Understanding the meaning A motherboard is the main circuit board of the computer. Why do you think it is called a motherboard.
Chapter 1: Applying Computer Basics – Lesson 1 © 2010, 2006 South-Western, Cengage Learning.
Getting To Know Computers COMPUTER BASICS. WHAT IS A COMPUTER? A computer is an electronic device that manipulates information, or “data.” It has the.
Hardware/Software Basics Test
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Today: Student will be able to describe the basics of their class and computing Tell me about you and how you use computers. Lesson 1 Slide 1.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Cybersecurity Test Review Introduction to Digital Technology.
Hardware/Software Basics Test Get out your DIY Test Review.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Power Point Vocabulary Suarez, Alejandra Per. 6 10/12/13.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
Computer Technology. HardwareSoftware  Hardware ◦ Monitor ◦ Keyboard ◦ Hard disk drive ◦ Mouse ◦ CPU (Central Processing Unit) ◦ Graphic and sound cards.
 Apple Inc, is an American multinational corporation headquartered in Cupertino, California that designs, develops, and sells consumer electronics. 
IT Vocabulary Basics Review Sit at tables. Need pencil/pen.
Security Risks Todays Lesson Security Risks Security Precautions
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Chapter 3: SYSTEM SOFTWARE
Managing Windows Security
What they are and how to protect against them
Computer Information Systems
Discovering Computers 2012: Chapter 8
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Technology Vocabulary Words
Electronic Communications
Lecture 1 Computers & Internet.
Unit 4 IT Security.
Objectives Overview Define system software and identify the two types of system software Describe the functions of an operating system Summarize the features.
Types of Computers & Computer Hardware
Chapter 1: Applying Computer Basics – Lesson 1
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Introduction to computers
Types of Software.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen Monday 5/23 – 1 st, 3 rd Tuesday 5/24 – 2 nd

Hardware/Software CPU: the “brains” of the computer I/O ports: connect input and output devices to the computer Motherboard: a printed circuit board that is the foundation of a computer; the main circuit board

Hardware/Software Hard drive: a device used to permanently store and also retrieve information Monitor: a display screen for video images and the case that holds it Peripheral: Hardware that allows a computer to perform additional functions but is not necessary for the computer to work

Hardware/Software Operating system: Enables the computer hardware to communicate with the computer software Application software: programs that run on your computer – some examples are web browsers, , games

Hardware/Software Hardware: any physical device used in or with your machine Software: collection of code installed on your computer’s hard drive

Hardware/Software Input: receiving information Processing: handling and managing data Storage: saving data and info for later use Output: providing user with information

Hardware/Software Crash: when a program or the entire operating system unexpectedly stops working Boot: to power up a computer and load the system software Reboot: the process of a computer system restarting

Hardware/Software File: stores data, information, settings or commands Browser: software created to present and explore content on the Internet

Hardware/Software Cookies: information that a website puts on your hard drive so it can remember something about you at a later date provides a way for the website to recognize you and keep track of your preferences

Hardware/Software Bandwidth: the amount of digital data that can be transmitted over a computer network, or another communication device, at any given time Backup: to copy data as a security measure

Hardware/Software Firewall A security gate for your computer Analyzes incoming data and allows certain information to pass through if that information is safe

Hardware/Software Captcha: technology used to insure that a human is making an online transaction rather than a computer Keyword: a word used in a text search on a browser Network: a system that transmits any combination of voice, video or data between users

Hardware/Software Server: a computer or device on a network that manages network resources Flash drive: small data storage device that connects to a computer’s I/O port Mobile device: portable electronic product that performs computer-like tasks

Hardware/Software Cloud computing: storing and accessing data and programs over the Internet instead of your computer’s hard drive Laptop: portable computer you can take with you and use in different environments; includes a screen, keyboard and trackpad

Hardware/Software Tablet: wireless, portable personal computer with a touchscreen surface; typically smaller than a notebook but larger than a smartphone Google drive: example of cloud-based computing

Cybersecurity Malware: software designed specifically to damage or disrupt a system Virus: a program or piece of code that attacks a computer or network through contaminated data Trojan: a destructive program that masquerades as a harmless application

Cybersecurity Spyware: software that secretly gathers user information through the user’s Internet connection without his or her knowledge Adware: software that is given to the user with advertisements hidden in the application Identity theft: the act of a person obtaining information illegally about someone else

Cybersecurity Antivirus software: computer programs that can block, detect, and remove viruses and other malware Encryption: the process of using codes to make readable information unreadable Spam: unsolicited s sent to many addresses

Cybersecurity Ways to avoid becoming a victim of identity theft Shopping only secure sites Protecting PINs and passwords Using an alternate identity for web surfing

Cybersecurity Downloading apps can compromise your computer or electronic device’s security. It’s important to update your security automatically because ways to attack your computer are constantly being developed.

Cybersecurity Ways to keep a “clean machine”: Installing the latest Security software Web browser Operating system

Cybersecurity No system is completely secure. In order to protect your files the most important step would be to back up files to an external location.

Communication Stores and restaurants are NOT the main places where customer service is important. You CAN learn to give good customer service even if you’re not a “people person”.