“Jeopardy” Video Game Addiction by Will Wisner-Carlson, Viruses by Tavon Cooper, Devices by Da’Shon Palmer, Inside The Computer by Thomas Kwenah Jr., Internet.

Slides:



Advertisements
Similar presentations
Internet Jeopardy 1 Basic Computer Study Guide By Leigh Lewis 12/14/07.
Advertisements

Grade 6 Hopewell Elementary You will read each slide, then try to think of the answer. When you think you know the answer, click ONCE on the mouse.
BlueRedGreenPurpleOrange.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Internal/External Computer Components Kim Roselli Emily Mross.
The Knights Diamoneek McDougald.  Video Game Addiction is someone who constantly plays video games  Likes virtual life better than real life  MMORPG.
Jeopardy Game Techable. Powerpoint Jeopardy SpywareInside the Computer CybercrimeVirusesGame Addiction Input/output
Essential Computer Concepts
Tech 9 Shakira Scott..  Binary Numbers are a base-2 number system that represents numeric values using two digits/symbols, 0 and 1.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
What does a Computer Do?. What is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory,
Concepts of IT Click here to start d b c a 12 Million , , , , , , , , ,
By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Internet Hardware Computer Literate.
The DYNAMICS ROLES, RASHARD M. Kahlil Elijah Cashai Johnson Sydney Jones Jason Hack.
GIANFRANCO BARBALACE Y FRANCO CAVIGLIA CATENAZZI1ºB Types and components of a computer systems.
Computer Security... By Kate Robinson 8P Viruses Hackers Backups Stuxnet Gary Mckinnon.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
All about viruses, hacking and backups By Harriet Thomas.
Chapter 1: Applying Computer Basics – Lesson 1 © 2010, 2006 South-Western, Cengage Learning.
TYPES AND COMPONENTS OF COMPUTER SYSTEMS Camila Rodríguez, Senior I B.
Today: Student will be able to describe the basics of their class and computing Tell me about you and how you use computers. Lesson 1 Slide 1.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
 Apple Inc, is an American multinational corporation headquartered in Cupertino, California that designs, develops, and sells consumer electronics. 
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
“Jeopardy” 4th Grade Math
The Internet.
Input, Output, and Specialist Devices
Fulton County Public Library
Computer Science.
What they are and how to protect against them
Parts of a computer Vocabulary & Labeling.
Discovering Computers 2012: Chapter 8
“Jeopardy” Weather Tools
I have the answer, now… Tell me the Question
Welcome To The FANTASTiC FiVES’ JEOPARDY GAME ! ! !
How to use the internet safely and How to protect my personal data?
War between Good and Evil.
Spyware, Video Gaming Addiction, Netiquette, and Binary Numbers
The physical parts of the computer
1.00 Computer Basics 1.01 Classify computer components.
How to build a good reputation online
Cyber Security By: Pratik Gandhi.
Power Point Vocabulary
Fulton County Public Library
Computer Technology Notes 5
Chapter 1: Applying Computer Basics – Lesson 1
Leading A Healthy Lifestyle Mid-Unit Exam Review
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
STOP. THINK. CONNECT. Online Safety Quiz.
Understand Information Technology activities and careers.
Computer Applications Computer Basics Part 1
Keyboarding Class LHMS Ms. Key © Mr. Thrasher
“Jeopardy” Human Body Test #1
Spyware. By: Katheryn L. Gaston.
4.03 IT PowerPoint Objective 4.03—Understand Information Technology activities and careers.
The Big Wheel: Computer Challenge
HOW DO I KEEP MY COMPUTER SAFE?
“Jeopardy” A Doll’s House
Introduction to Basic Computers Quiz
Computer Viruses Standard A-4 (Safety Unit)
“Jeopardy” IB Psych Intro
1.00 Computer Basics 1.01 Classify computer components.
Welcome to the computer!
Chapter 12& 13 The North & The South
4.03 IT PowerPoint Objective 4.03—Understand Information Technology activities and careers.
Computing Essentials Module 1.
JEOPARDY! Biology 101 Test #1 Review
Computing Essentials Module 1.
Presentation transcript:

“Jeopardy” Video Game Addiction by Will Wisner-Carlson, Viruses by Tavon Cooper, Devices by Da’Shon Palmer, Inside The Computer by Thomas Kwenah Jr., Internet Search by Malik Turnage, and Spyware by Courtney Hughes Edit the topic by double-clicking on Type the topic here.

1 2 3 4 5 1 2 3 4 5 Topic 1 Topic 2 Topic 3 Topic 4 Topic 5 Topic 6 Double-click on each topic at the top to edit it. The numbers are all hyperlinked to the questions. The hyperlinks only work in the Slide Show view. Type Shift and F5 simultaneously to test your links.

Question 1 What kind of games do users typically become addicted to? Racing games Puzzle games MMORPGs WTVs #2. Question 1

Good Job Go to game board

Sorry you got it wrong #1 Try again #2 Try Again #3 Try Again

Question 2 What is a common reason for excessive playing of video games? Having few friends or a poor social life in the real world. Because it helps with illness. Playing makes you smarter. Playing Teaches you how to use weapons. #2. Question 2

Question 3 What is the most played online video game? Runescape Clan wars World of Warcraft Baseball #2. Question 3

Question 4 What is the affect of video games on the addict’s life? It gets them into better physical shape Destroys any social life they had Makes them popular in school Helps the addict’s grades #2. Question 4

Question 5 What is the typical grade and gender of an average addict? 9-12yr old girls & boys 80-90yr old women 35-45yr old males 15-30yr old males #2. Question 5

Question 1 What exactly is a virus? Something that gets into your body an makes you sick. A small piece of software that piggybacks on real programs. A small organism that moves with flagella. A person that makes you so mad you feel sick.

Sorry you got it wrong Try again

Sorry you got it wrong Try again

Sorry you got it wrong Try again

CONGRATULATIONS You got 100 points Return to game board.

CONGRATULATIONS You got 200 points Return to game board.

CONGRATULATIONS You got 300 points Return to game board.

CONGRATULATIONS You got 400 points Return to game board.

CONGRATULATIONS You got 500 points Return to game board.

Question 2 What are the different types of viruses? Trojan hog , Email , Worm Trojan horse , Email , Parasite Email , Trojan Horse , Worm Email , Ring Worm , Trojan Moose

Question 3 Where do viruses come from? A dark alley. They were always here. They made themselves inside of your computer. People made them.

Sorry you got it wrong Try again

Question 4 Why were viruses created? To make your computer explode. To slow your computer down. To damage files on you computer. Make your computer a zombie.

Question 5 How do you stop and/or prevent viruses from infecting your computer? Go crazy and click on anything. Don’t go to random ads and pop-ups. Tell the viruses you going to tell your mom. Call the cops and say someone’s destroying everything on you computer.

Sorry you got it wrong Try again

Question 1 What is a main example of a storage device? Flash Drive Printer Web Cam Bank

Good Job Go Back To Game Board

Sorry You Got It Wrong! Try Again

Sorry You Got It Wrong! Try Again

Sorry You Got It Wrong! Try Again

Sorry You Got It Wrong! Try Again

Sorry You Got It Wrong! Try Again

Question 2 A Device that can show information out of the computer? Storage Communication Output Face book

Question 3 What are the 4 types of devices? Engine, communication, writing, storage Plane, RAM, Snicker, Input Motherboard, RAM, Keyboard, Monitor Communication, storage, Input, Output

Question 4 What are 2 examples of an input device? Printer, Phone Binary Numbers, Keyboard Computer, Germ X Mouse, Keyboard

A webcam is what type of Device? Storage Communication Input Output Question 5 A webcam is what type of Device? Storage Communication Input Output

Question 1 How many main parts/components makes up the inside of the computer? 3 2 17 11

Question 2 True or false there are 3 parts inside the computer? A) True B) False

Question 3 Name the two primarily sizes that the computer comes in? Batman & Robin Tut und tun Portable and desktops Any size

Question 4 What is the job of the Microprocessor? A) stores energy B) the brain of the computer that performs commands C) prints outs D) controls the mouse

Question 5 Name two types of a portable computer? A) LG and Sony B) PSP and Xbox C) Laptops or notebooks D) notebooks and keypads

Sorry wrong answer! TRY AGAIN!

CORRECT ANSWER! GO BACK TO GAME BOARD!

What is The Most Common Way to Search On The Internet? Blog Websites Wiki’s Search Engines Personal Pages

What Is The Best Way To Get Results From A Search Engine? Long Phrases Key Words and Quotations Short Phrases One Word

What Is The Most Used Search Engine? Bing Aol Yahoo Google Msn

What Type of Search Engines Search Other Search Engines? Mega Searchers Cranium Searchers Meta Searchers Web Searchers

How Many Types of Search Engines Are There? 1 6 812 750 4

Congratulations, you have the correct answer and you just received some more points to your score!

Sorry, You have the wrong answer you should’ve studied.

What may spyware masquerade as? Viruses Wallpaper Ads Anti-Spyware

What is its main mission? To hack your emails To hack your personal information To serve you targeted advertisements To destroy your software

What is Drive by download? A website or pop-up window that automatically tries to download and install spyware on your machine. A smiley face A worm that gets into your computer when it is turned off. A phony email

What is spyware designed to do? Destroy your motherboard Ruin your internet connection Track your Internet Habits Offer you a fun and easy website

Where does Piggybacked software often come from? Your recently sent emails Recently downloaded files A recently inserted floppy disk Peer-to-peer applications

CORRECT! GO BACK TO GAMEBOARD

SORRY WRONG ANSWER! Try again

Daily Double! These “Daily Double” slides are linked to the questions. As a team, decide how many of the points you already have you wish to wager. If you get the question correct, you will earn double the points you wagered. If you get the question incorrect, you will lose the points you wagered. Good luck!

Daily Double! Template designed by Theresa M. Dyson Computer Resource Specialist, Virginia Beach City Public Schools Adjunct Professor, Tidewater Community College As a team, decide how many of the points you already have you wish to wager. If you get the question correct, you will earn double the points you wagered. If you get the question incorrect, you will lose the points you wagered. Good luck!

Credit to Mr.Ochs 6/7 MYP Technology Class