Devon C. Floyd Alyric Knight Brain Vanhook 10/28/10 6/7 Tech-Knowledge G$$

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
V IDEO G AME A DDICTION By: Nikiya Kelly. V.G.A Background Addiction There are people around the world who play Video Games all day and night. I understand.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
Internet etiquette, or netiquette guides us in proper behavior on the Internet. There are widely accepted rules of behavior to follow when you're online.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
How do you use the internet?
What you don’t know CAN hurt you!
How to keep your kids safe online
Risks & Dangers on the internet.. We will introduce you to the harm the internet could cause. - Sharing and posting personal information – By Chloé &
The Internet = A World of Opportunities
Information for Students and Families
Internet Safety Review Are You A Safe User? Grades 4th - 6th
E SAFETY. SOME FACTS A Talk Talk survey of 500 children aged 6-15 in Feb 2010 found: 5% had communicated with a stranger via webcam. 2% have actually.
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
INTERNET SAFETY FOR STUDENTS
Security Advice Georgie Pepper Campsmount Acadamy.
+ An Introduction to Safety on the Internet 1 Material and Advice provided by:
Threats to I.T Internet security By Cameron Mundy.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
The Knights Diamoneek McDougald.  Video Game Addiction is someone who constantly plays video games  Likes virtual life better than real life  MMORPG.
Jeopardy Game Techable. Powerpoint Jeopardy SpywareInside the Computer CybercrimeVirusesGame Addiction Input/output
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
INTERNET SAFETY Sergeant Karl Youngblood Barbara Burchard Information adapted from the
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
IT security By Tilly Gerlack.
Tech 9 Shakira Scott..  Binary Numbers are a base-2 number system that represents numeric values using two digits/symbols, 0 and 1.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Addiction? Addiction – the state of being enslaved to a habit or practice or to something that is psychologically or physically habit- forming to such.
Internet Safety Dangers and Netiquette Trust No One You Don’t Know! A shark is a predator. Predators swim around looking for victims. The ocean is beautiful.
Lecture 2 Title: Computer Software By: Mr Hashem Alaidaros MIS 101.
S PYWARE, V IDEOGAME A DDICTION, B INARY NUMBERS, AND V IRUSES By Shakira Pettaway, Shan-Shan Wang, Pauline Pearcy, and Michael Norris.
Acceptable Use Policy Review Crisafulli Elementary School Click “GO” to begin.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
“Taking care of myself while surfing the Internet” Children’s Experiences & eSafety Rules.
SAFE Information & Communication Technology For the Third Grade.  Julianna Madden  ITC 525  Summer 1 Session.
Cassidy Culligan Digital Citizenship Project ED 505.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Digital Citizenship Jamaal Hunter. What is digital citizenship? Digital Citizenship is a concept which helps teachers, technology leaders and parents.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Digital Citizenship By: William Rickman Digital Citizenship is the knowledge for children and other computer users to know how to appropriately use the.
By: Mr. Jamie Ferguson. Before we begin using our computers for internet use this semester, we will be learning the rules for the classroom. You will.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
WHO IT EFFECS The most effected are men between the ages of 15 to 35.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Let’s Get Savvy about Technology Mrs. George Dondero School.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Naotane Sumino.  Computer games were first introduced in the 1970's. By the end of the decade, they had become a preferred childhood leisure activity,
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Christian Citizenship in a Digital World Lesson 4:Digital Etiquette.
INTERNET SAFETY, NETIQUETTE, AND COPYRIGHT LAWS By Alex Pagliaro.
Welcome to Introduction to Psychology! Let’s share a bit about where we are all from…
Internet Safety.
Internet Etiquette or Netiquette
Internet Etiquette or Netiquette
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Spyware, Video Gaming Addiction, Netiquette, and Binary Numbers
STOP. THINK. CONNECT. Online Safety Quiz.
Follow safety rules so that YOU: Avoid getting HURT.
NETIQUETTE.
Presentation transcript:

Devon C. Floyd Alyric Knight Brain Vanhook 10/28/10 6/7 Tech-Knowledge G$$

o Video game addiction is an addiction to video games. People think that this type of addiction is not real so it goes unnoticed, but it is real. Kids and grown men fall folly to this addiction. Most addicts of video games have lots of time, like men who have been laid off or retired workers. They feel accomplished when complete or finishing a video game. Vide Game Addiction

 Some signs of video game addiction are playing for increasing amounts of time, thinking about gaming during other activities, gaming to escape from real-life problems, anxiety, or depression, lying to friends and family to conceal gaming feeling irritable when trying to cut down on gaming. Besides being addicting, video games waste a lot of time from your family, work, and friends that you could be spending with them. Signs of VG Addiction

 Some addicts even skip showers and homework to video games. The first step into getting rid of your addiction is by acknowledging your addiction. This is tough for video game addicts because there is nothing wrong with playing games. But it is easy to lose the addiction, by busing yourself with activities, this will cut down your time to game. Actions of an Addicts

About Netiquette  Network and etiquette makes up netiquette.  Network are collection of devices and computers which connect to enable communication.  Etiquette is a behavior according to norms.

About Netiquette Slide 2  Netiquette is the internet code.  The rule of netiquette is using good manners when on the internet.  The concept is to remember to be human and to show others the same.

About Spyware  Spyware is software that masquerades as advertisement and other application in order to track internet habits and collect personal information from various users  Spyware can appear as various programs and application and has been a troubleshooting problem for some years now.

History  The first recorded use of the term "spyware" is said to have occurred on October 16, 1995 in a Usenet post about Microsoft's business model.  Another problem in the early years spyware took place in 2001 when Steve Gibson, founder of Gibson Research discovered to his alarm that advertising software had been installed on his system.

History Slide 2  Gibson created one of the first anti-spyware program called OptOut in order to counteract the spyware

What are not signs of video game addiction? a. Playing on free timePlaying on free time b. AnxietyAnxiety c. Gaming to escape real-life problemsGaming to escape real-life problems d. Lying to friends to play the gameLying to friends to play the game Video Game Addiction for 100

 Who is most likely to experience game addictions? a. A retired workerA retired worker b. A little kidA little kid c. A babyA baby d. A teenagerA teenager Video Game Addiction for 200

 Is video game addiction a diagnosable addiction?? a. yes. yes b. no. no Video Game Addiction for 300

 What is the first step into losing a video game addiction? a. Detoxing from video gamesDetoxing from video games b. Playing less hoursPlaying less hours c. Acceptance about having an addiction to video gamesAcceptance about having an addiction to video games d. Denial about addiction. Denial about addiction Video Game Addiction for 400

What are not reasons why video game addiction go unnoticed ? a. People do not recognize it as an addictionPeople do not recognize it as an addiction b. People do not carePeople do not care c. People think it causes no harmPeople think it causes no harm d. People do not like less play timePeople do not like less play time Video Game Addiction for 500

Spyware for $100 What is Spyware? a) A program on your computer in which help’s it A program on your computer in which help’s it b) Software that speeds up your processing unit and RAM Software that speeds up your processing unit and RAM c) Software that tracks your internet habits and try to steal your personal info Software that tracks your internet habits and try to steal your personal info d) A program on your computer that get apps and advertisement A program on your computer that get apps and advertisement

Spyware for $200 When was spyware discovered? a) Sept Sept b) Oct Oct c) Oct Oct d) Aug Aug

Spyware for $300 What happens to RAM and processing power when you let spyware enter your system? a) It speeds it up It speeds it up b) It slows it down It slows it down c) It updates the system It updates the system d) The system itself restarts The system itself restarts

Spyware for $400 Name two ways spyware can develop on your computer? a) Opening s, sharing files Opening s, sharing files b) Masquerading as anti-spyware, piggybacked program Masquerading as anti-spyware, piggybacked program c) Clicking on unknown files, avoiding pop-up Clicking on unknown files, avoiding pop-up d) Surfing the internet, not having knowledge of spywareSurfing the internet, not having knowledge of spyware

Spyware for $500 What is the difference between spyware and viruses? a) Spyware destroys the computer ability to operate properly, Viruses steal personal information. Spyware destroys the computer ability to operate properly, Viruses steal personal information. b) Spyware is able to slow down your computer, Viruses controls the computer Spyware is able to slow down your computer, Viruses controls the computer c) Viruses destroy the computers ability to operate properly, Spyware steal personal information Viruses destroy the computers ability to operate properly, Spyware steal personal information d) Viruses adjust your settings without your permission, Spyware spies on you internet habits Viruses adjust your settings without your permission, Spyware spies on you internet habits

Netiquette for $100 What is Netiquette? a) To know how to act properly. To know how to act properly. b) To show respect. To show respect. c) To send an to a friend. To send an to a friend. d) To know the proper code of the internet. To know the proper code of the internet.

Netiquette for $200 What is the most important thing to remember with netiquette? a) You are an avatar. You are an avatar. b) You should finish before its to late. You should finish before its to late. c) You are human and the other people are human to. You are human and the other people are human to. d) You need to send a . You need to send a .

Netiquette for $300  When is it okay to not use netiquette? a) If you want to yell at someone you do not like.If you want to yell at someone you do not like. b) It is never okay to not use netiquette you should always use your manners. It is never okay to not use netiquette you should always use your manners. c) If you want to hurry up and finish what you are doing. If you want to hurry up and finish what you are doing. d) You never have to use netiquette. You never have to use netiquette.

Netiquette for $400  What does it means to have proper netiquette? a) To use good manners while on the internet. To use good manners while on the internet. b) You are a computer wiz. You are a computer wiz. c) You beat a new online game. You beat a new online game. d) To have a new friend request. To have a new friend request.

Netiquette for $500  If you get an of a rumor about one of your friends what do you do? a) Call the friend and ask them if what you have read is true. Call the friend and ask them if what you have read is true. b) Do not open delete it. Do not open delete it. c) Confront the person who sent it cause you know it cannot be true. Confront the person who sent it cause you know it cannot be true. d) Read it and send to all your contacts. Read it and send to all your contacts.

WRONG! Click $100 $200 $300 $400 $500

Wrong!!!!!! Try Again $100 $200 $300 $400 $500

Correct: You have won… $100 Go back to game board

Correct: You have won… $200 Go back to game board

Correct: You have won… $300 Go back to game board

Correct: You have won… $400 Go back to game board

Correct: You have won… $500 Go back to game board

 Correct you earn $100  Go back to game board. Go back to game board.

 Correct you earned $200  Go back to game board. Go back to game board.

 Correct you earned $300  Go back to game board. Go back to game board.

 Correct you earned $400  Go back to game board. Go back to game board.

 Correct you earned $500  Go back to game board. Go back to game board.

 Sorry try again!!!  Go back to question1. Go back to question1.

 Sorry try again!!!  Go back to question 2. Go back to question 2.

 Sorry try again!!!  Go back to question 3. Go back to question 3.

 Sorry try again!!!  Go back to question 4. Go back to question 4.

 Sorry try again!!!  Go back to question 5. Go back to question 5.

You got the Tech-Knowledge G$$  You understand the concepts of these particular topic when studying technology and its components.  You are aware of troubleshooting problems that can be avoided  You also know the different issue cause by technology and how it can affect us  And you also smart than a 5 th grader

Devon C. Floyd Alyric Knight Brain Vanhook 10/28/10 6/7 Tech-Knowledge G$$