LifeSmarts: Technology. 11111 22222 33333 44444 55555.

Slides:



Advertisements
Similar presentations
SYSTEMS OF EQUATIONS AND INEQUALITIES
Advertisements

Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Rational Expressions
Criminal Law Kelly Stephenson
1 LifeSmarts: Consumer Rights and Responsibilities.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
With your host: Mr. Dillon
Animal Science Chapter
MEDICAL TERMINOLOGY
$200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $500 $100 Category One Category Two Category.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Spyware! Tia. What Is Spyware? With so many types of popular software being spread around the Internet, it is important to be aware of what spyware is.
LifeSmarts: Health and Safety
What is Skype and how do you use it? Before we start, it is a REQUIREMENT of this lesson to have a valid address. If you don’t have one, please.
Science Survey Ch1: Intro to Science Scientific Notation and Conversions.
LifeSmarts: Environment
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
IT security By Tilly Gerlack.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Cyber Security… Compiled by J. Camp Benfer Elementary Klein ISD March 2009 …or How to Keep Your Computer & Your Personal Information Safer …or How to Keep.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
World War II Who was Harry S. Truman.
With your host: Mr. Spiconardi
FCATrivia Brought to you by Mrs. Cowan and Mrs. McGeachy.
Contracts When someone tells verbal lies about you.
With your host: Mr. Dillon
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Laboratory/Research Safety
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
What is Spam? d min.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
How well do you know Mrs. Mudd?
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Any criminal action perpetrated primarily through the use of a computer.
Human Resources Natural Resources.
Early Hominids Australopithecus aferensis LUCY.
Computers and You Chapter 2. Definitions Technology – the use of science to solve practical problems Microprocessor, the “brain” of every computerized.
Windows Tutorial 5 Protecting Your Computer
“Jeopardy” Weather Tools
“Jeopardy” Video Game Addiction by Will Wisner-Carlson, Viruses by Tavon Cooper, Devices by Da’Shon Palmer, Inside The Computer by Thomas Kwenah Jr., Internet.
Unit 4 IT Security.
Personal spaces.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Cyber Security By: Pratik Gandhi.
Definitions By: Gurmansi Kang.
yahoo mail technical support number
Unit 4 IT Security Kerris Davies.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Google Drive Use personal google account IF you actually know the password. Log on with school credentials if not: User:
Presentation transcript:

LifeSmarts: Technology

What are icons?

What is a virus?

What is a firewall?

What are RAM and hard drive?

What is phishing?

What is airtime?

What is standby time?

What is the phone book or the Internet?

The acronym SMS, used for text messaging, stands for What is short message service?

What is an activation fee?

What is the V-Chip?

What are ways that broadband access enters your home?

What is High Definition?

What is local?

What is suggestive dialogue? What is strong suggestive dialogue?

What is a privacy policy?

What is spam?

Who is a hacker?

What is bootleg or pirated software?

What is a strong password?

What is a blog?

What is a browser?

What is a homepage?

Triggered by a mouse click, these Internet advertisements are annoying What are pop-ups?

What is spyware?

As a team, decide how many of the points you already have you wish to wager. If you get the question correct, you will earn double the points you wagered. If you get the question incorrect, you will lose the points you wagered. Good luck!