THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Computer Basics I Course Outline 1: What is a computer? 2: What is an operating system? Using a Desktop Computer 3: What are the basic parts of a desktop.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to Keep Your PC Running Like New Bryan Nowak.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Security, Privacy, and Ethics Online Computer Crimes.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Internet safety By Lydia Snowden.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Possible WebQuest type links  
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Essential Computer Concepts
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Introduction to Computers
Heba Daraghmeh 27/6/2010 Basic Computer Terminology.
COMPUTER ETHICS Do you know the difference between right and wrong?
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Types of Electronic Infection
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Protecting Students on the School Computer Network Enfield High School.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
history, hardware, software, safety, and computer ethics
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
INTERNET SAFETY FOR KIDS
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Introduction to Information Technology Applications.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
By Liam Wright Manga comic group Japan SAFETY on your computer.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
The History of Computers Hardware, Software, Programs, Computers Safety Tips, and Computer Ethics.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Chapter 3: Software Explain the difference between systems software and application software
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Part 3.
Presentation transcript:

THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS

HISTORY

HARDWARE IS THE GENERAL TERM FOR THE PHYSICAL ARTIFACTS OF A TECHNOLOGY THE TECHNICAL DETAILS ABOUT EACH HARDWARE COMPONENT ARE CALLED SPECIFICATIONS. AN IMPORTANT PART OF THE COMPUTER HARDWARE IS THE MOTHERBOARD WHICH IS LOCATED INSIDE THE COMPUTER AND IS THE MAIN ELECTRONIC COMPONENT OF THE COMPUTER. THE MOTHERBOARD IS A CIRCUIT BOARD WHICH IS A RIGID PIECE OF INSULATING MATERIAL WITH CIRCUITS. WITHOUT THE MOTHERBOARD THE COMPUTER WOULDN’T BE ABLE TO FUNCTION AT ALL

SOFTWARE SOFTWARE REFERS TO THE INTANGIBLE COMPONENTS OF A COMPUTER SYSTEM, PARTICULARY THE PROGRAMS, OR LISTS OF INSTRUCTIONS, THAT THE COMPUTER NEEDS TO PERFORM A SPCIFIC TASK AN EXAMPLE OF SOFTWARE IS APPLICATION SOFTWARE WHICH INCLUDES END-USERS APPLICATIONS OF COMPUTERS SUCH AS WORD PROCESSORS OF VIDEO GAMES, AND ERP SOFTWARE FOR GROUPS OF USERS SYSTEM SOFTWARE HELPS THE COMPUTER CARRY OUT ITS BASIC OPERATING TASKS. DOCUMENT PRODUCTION SOFTWARE INCLUDES WORD PROCESSING SOFTWARE, DESKTOP PUBLISHING SOFTWARE, EDITORS, AND WEB AUTHORING SOFTWARE GRAPHICS AND PRESENTATION SOFTWARE ALLOW YOU TO CREATE ILLUSTRATIONS, DIAGRAMS, GRAPHS, AND CHARTS THAT CAN BE PROJECTED BEFORE A GROUP, PRINTES OUT FOR QUICK REFERENCE, OR TRANSMITTED TO REMOTE COMPUTERS

COMPUTER SAFETY TIPS Website information - Limit the personal and financial data you send to websites. Do not give out information unless you'll get something worthwhile in return (like an opportunity to win something valuable). Antivirus Software - Use it! Download and install the updates every week or two. Find some great deals on anti-virus software by shopping the COMPUTER DEPARTMENTof Free World Mall. Personal Firewall Software - Another essential piece of software, especially if you are browsing with a permanent internet connection. A firewall will block incoming connections to your computer thus keeping out hackers. Passwords - Use long, random passwords and write them down. Don't store your passwords on your computer, use a notebook or place them in your wallet or file system. - Delete spam without opening or reading it. Some nasty viruses will attack your computer when you simply open a message or attachment. Never open an attachment unless you are certain you know who sent it and what it contains. Backups - Back up your data regularly. The new high-speed CD recorders are an excellent choice. They are fast, reliable, and may be stored off site. Find excellent deals on CD recorders in Free World Mall. We recommend storing one backup CD on premises and one off premises. Remember to destroy your old backup data. Surfing The Web - Browse the web with cookies disabled. Only allow cookies from web site you will revisit. Consider using a web browser other than Microsoft Internet Explorer. Explorer is a prime target of hackers. Laptop Security - Laptop computers are on many thieves most wanted list. Guard your laptop at all times. Keep it with you whenever possible. Delete unneeded files and data often from your laptop or handheld computer. Encryption - You can protect your data by installing an and file encryptor. PGP Security makes encryption software that renders your data into unreadable characters unless you enter the proper password. Use encryption for important , tax information, and bank account numbers. Defrag - Defragmenting your computer will keep it running faster without major problems. Before running defrag, use scan disk to find and correct problems. Access scan disk and defrag from your windows menu, or use Norton Disk Doctor for hard disk maintenance. Shut Down - Be sure to turn off your computer when you are not using it.

COMPUTER ETHICS THE TEN COMMANDMENTS FOR COMPUTER ETHICS 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not use or copy software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you write. 10. Thou shalt use a computer in ways that show consideration and respect.