By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes
Spyware makes your computer slow by attaching itself to your operating system. Spyware tracks your habits in order to give you a lot of sales offers and make traffic for their website. More than 80% of computers are infected. You can get spyware when you click on a button on a pop up window, install a package, or end a vulnerability. People can get them from peer to peer file sharing programs and drive by downloads. Some spyware masquerades as programs that help take out spyware. Spyware hogs up RAM and runs in your background. You can protect against spyware by using a spyware scanner, a pop up blocker, disable active x, be suspicious about new things that you are installing and use the “x” to close windows.
Most video game addicts don’t know that they are addicts. Video game addicts usually become detached from the real world. Also they play video games to get away from real life problems. Compulsive video gaming is a modern-day psychological disorder. Some signs of being a video game addict are you play more than five hours a day. You experience significant weight loss or weight gain as a result of playing. Relationships with family or friends take a plunge. You play at work. You avoid phone calls from friends and/or lie to them about how much you play.
Use Boolean operators to combine your key terms. Boolean operator words are; And, Not, and Or. Use quotation marks around names or phrases. Use search engines such as; Google, Yahoo, and Bing. Searching unproductively on the internet is called thrashing. Use a minus sign (-) to reduce search results from your topic.
1. First choose a topic to search about. 2. Decide what key terms to use in your search. 3. Choose a search engine to go to. 4. If there is too many results from your search; use either quotation marks, Boolean words, or a minus sign.
Input devices give the CPU information to process. They allow the user to manipulate the computer. They include a mouse, keyboard, webcam, and scanner.
Output Devices receive information from the CPU in order to present it to the user. Output devices include a printer, fax machine, speaker, monitor, and projector.
Communication devices help the computer connect with other computers, often through the Internet. The include a wireless router, modem, Ethernet cable, Ethernet hub, and wireless antenna.
Storage devices store the computer’s data. They include Random Access Memory for short-term memory, and a hard drive for long term memory. A Solid State Drive, USB flash drive, CD, and DVD can also store long term memory.
Input, Output, Communication, and Storage Devices come together to allow the CPU to function, and allow the user interact with the CPU.
Computer viruses are programs that piggyback on existing files in your computer. They wreak havoc, slow your computer down, and can erase your hard disk. They can be “caught” by reading malicious s, or downloading scary internet stuff. They can display images or words without a keyboard.
Hackers are people who enjoy harassing people and destroying things. There may be financial motives, such as if you were infecting another companies network. They have similar motives to arsonists or graffiti artists, they want to spoil and destroy resources for others.
They can be “caught” by reading malicious s, or downloading scary internet stuff. They cannot be caught simply by going to a website and looking at information. Online bulletin boards can be corrupted and will infect a host if entered.
ILOVEYOU - (2000) One of the most widespread and rapidly spreading viruses ever, the ILOVEYOU virus spread via , posing as an executable attachment sent by a friend from the target's contact list. (Bright hub) Code Red - (2001) IIS on Windows servers were the target of this virus. It also launched denial of service (DOS) attacks. (Bright Hub) Melissa - (1999) The Melissa virus is notable because it is a Word macro virus. It cleverly spread via s sent to contacts from the infected users' address books.(Bright Hub)
Trojan horse- a virus pretending to be another program, such as a music player, that gets into your system and runs. Worm-exploits security holes in computers that are difficult to find or prevent *There are many terms to classify types of viruses. These are main types.
Viruses are inevitable, but can be prevented. Installing anti-virus software will give you notices and will greatly enhance protection. DO NOT CLICK ON S FROM PEOPLE YOU DO NOT KNOW! Only download from trusted sites- Java, ITunes, Adobe.
Spyware Video Game Addiction Internet Searchin g I/O/C/S Devices Viruses Game Board
No No Yes Yes Well, obviously its not this option Well, obviously its not this option If you pick this one, you are really dumb, like I’m not even playing If you pick this one, you are really dumb, like I’m not even playing
Go back to the gameboardgameboard
Try again, homeboyagain
Yes Yes No No I don’t know I don’t know 2+2=4 2+2=4
Try againagain
Go back to the gameboardgameboard
Click on Pop-ups Click on Pop-ups Download music from sketchy looking sites Download music from sketchy looking sites Don’t have a spyware scanner Don’t have a spyware scanner Use a Pop-up blocker Use a Pop-up blocker
Go back to the gameboardgameboard
Try againagain
The Background The Background iTunes Library iTunes Library The keyboard The keyboard The mouse The mouse
Why don’t you go cry home to yo mama? Try again again
Go back to the gameboardgameboard
More than 98% More than 98% Less than 98% Less than 98% More than 80% More than 80% Less than 80% Less than 80%
Or am I sorry? Try againagain
Go back to the gameboardgameboard
Call of Duty Modern Warfare 2 Call of Duty Modern Warfare 2 Halo 3 Halo 3 Sims Sims World of Warcraft World of Warcraft Pacman Pacman
Good Guess
Try the question again Try the question again
1 hour 1 hour 5 hours 5 hours 30 minutes 30 minutes 3 hours 3 hours None of the above None of the above
Try Again Try Again
Yes, but they don’t care that they are Yes, but they don’t care that they are No No Yes Yes No, but they think they are No, but they think they are
Try Again, Sucker! Try Again, Sucker!
There's no such thing There's no such thing Relationships with family or friends take a plunge. Relationships with family or friends take a plunge. You don’t play that often You don’t play that often Eating Pie Eating Pie Getting good grades Getting good grades
Try Again Try Again
Yes Yes No No Maybe so Maybe so I don’t know I don’t know Kinda Kinda
But if you want to try again click hereclick here this is you
a) And And b) Not Not c) Or Or d) All of the above All of the above
Try Again
a) Minus sign Minus sign b) Quotation marks Quotation marks c) Backspace sign Backspace sign d) Neither Neither
Try Again
a) Thrashing Thrashing b) Mashing Mashing c) Crashing Crashing d) Lashing Lashing
Try Again
a) Choose keywords that describes your topic. Choose keywords that describes your topic. b) Choose a search engine (Google, Yahoo etc.) Choose a search engine (Google, Yahoo etc.) c) Identify your topic of your search. Identify your topic of your search. d) Evaluate your results. Evaluate your results.
Try Again
a) Headline Headline b) Home plate Home plate c) Homepage Homepage d) Home stead Home stead
Try Again
Go Back To Game Board
Modem Modem Scanner Scanner Copier Copier CD-Rom CD-Rom
That was incorrect. Back to the Question
That was correct! Back to Gameboard
True True False False
You clicked on the wrong answer. Back to the Question
You selected the correct answer. Back to Gameboard
Allows the computer access the Internet Allows the computer access the Internet Could be a fax machine Could be a fax machine Houses the computer’s information Houses the computer’s information Gives the CPU information from the user Gives the CPU information from the user
That is wrong. Back to the Question
You are right. Back to Gameboard
Storage Storage Communication Communication Output Output Input Input
You chose an incorrect answer. Back to the Question
You chose the correct answer! Back to Gameboard
Storage Storage Communication Communication Output Output Input Input
You selected an incorrect answer. Back to the Question
You selected the correct answer! Back to Gameboard
Create ads on your computer Create ads on your computer Make pop-ups Make pop-ups Destroy files and erase hard disks Destroy files and erase hard disks Create images on your computer screen Create images on your computer screen
TRY AGAIN…..or else. TRY AGAIN
Financial priorities Financial priorities Simple joy of destruction Simple joy of destruction They want to ruin great resources for others They want to ruin great resources for others All of the above All of the above
TRY AGAIN…..or else. TRY AGAIN
Worm Worm Trojan horse Trojan horse Bug Bug
TRY AGAIN…..or else. TRY AGAIN
TRY AGAIN…..or else. TRY AGAIN
Buying a new computer Buying a new computer Only visiting certain sites Only visiting certain sites Only visiting reputable websites Only visiting reputable websites Opening all s Opening all s Clicking on pop-ups Clicking on pop-ups
TRY AGAIN…..or else. TRY AGAIN
(FIST BUMP) Back to game boardgame board
security/articles/38830.aspx security/articles/38830.aspx Mrs. Kotsch. Searching the Internet, N/A Baltimore City College Oct , [ _ID=86592&type=u&termREC_ID=&pREC_ID=71408] [ _ID=86592&type=u&termREC_ID=&pREC_ID=71408] Coustand, David, How Spyware Works, (n.d) How Stuff Works, October 25,2010, [ addiction-no-fun addiction-no-fun addiction.html addiction.html