Download presentation
Presentation is loading. Please wait.
Published byScott Parrish Modified over 9 years ago
1
The Knights Diamoneek McDougald
2
Video Game Addiction is someone who constantly plays video games Likes virtual life better than real life MMORPG are massive multiplayer online role playing games WOW (World of Warcraft ) is the biggest addicting game It ruins marriages, social life, and careers
3
Playing for increasing amounts of time Thinking about gaming during activities Gaming to escape real-life problems, anxiety and depression Lying to friends and family to conceal gaming Feeling irritable when trying to cut down on gaming
4
A child playing videos games for 4 to 5 hours has no time for homework, socializing or playing sports Compulsive adult gamers jeopardize jobs and relationships Majority of addicts are under the age of 30
5
Show gamers they are powerless over their addiction and teach them real-life excitement as opposed to online excitement A parent can keep log of gaming behaviors Logs of when the child plays and for how long Problems resulting from gaming How the child reacts to time limits
6
Joel Tindall The Knights
7
Spyware isn’t designed to damage your computer. It is a program that gets into your computer without permission and hides while it makes unwanted changes. Spyware is put on computers to gradually collect info about the user.
8
- Spyware hogs up RAM and processor power -Ways to prevent you from getting spyware are to use a spyware scanner or pop-up blocker -Masquerades as a prize notification pop- up window
9
Viruses prevention programs are 100 percent efficient while spyware’s is 90 percent. It is designed to direct unwanted advertisements to the user from their host website. To protect yourself from it, be suspicious of installing new software and use the “x” to close pop-ups.
10
The Knights Zhana’ Wright
11
Can damage your computer. People created viruses to have bragging rights, the fun of watching things blow up, and psychology that drives sandals and arsonists. Viruses show how vulnerable you are.
12
a segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network. Worms is a small piece of software that uses computer networks and security holes to replicate itself.
13
Types of viruses Mydoom worm Melissa E-mail system Trojan horses I LOVE YOU
14
Knights Aaron Wallace
15
The CPU (Central Processing Unit) controls all the basic and complex functions of the computer. The motherboard is the main circuit board of the computer. The hard drive is what stores all your data. electrical device. The cooling fan prevents the computer from overheating.
16
The Optical Drive is a part of the computer that reads CD’s and DVD’s. The Memory in the computer is referred to as the RAM. When your computer boots up, it loads everything into its RAM. This allows your computer to access all of its functions, like clicking the mouse or typing on the keyboard
17
. The case protects the CPU. Video cards are used to process the graphics on the computer. The power supply is the part of hardware that supplies power to an electrical device.
18
Video Game Addictio n SpywareVirusesInside the compute r 100 200 300 400 500
30
A.) The same as a virus B.) Computer Game C. A program that damages your computer. D. A program that gets in your computer without permission and hides while it makes unwanted changes
32
A. Never B. Sometimes C. Always D. All of the above
34
A. Use a spyware scanner or use a pop-up blockerUse a spyware scanner or use a pop-up blocker B. Turn your computer off immediately without shutting it off correctlyTurn your computer off immediately without shutting it off correctly C. Don’t waste your time reading pop-upsDon’t waste your time reading pop-ups D. Never click “x” on pop-upsNever click “x” on pop-ups
36
A. It doesn’t damage your computer and it’s prevention program is only 90 percent effective B. Spyware damages it only a little C. Spyware comes with pop-ups while viruses don’t D. Viruses are completely harmless.
38
A.) RAM and processor power B.) Internet connection C.) Games D.) Pictures
40
A.) They help your computer stay protected. B.) Something that damages your computer. C.) The same as spyware. D.) A program that is completely harmless.
42
A.) Pop Ups B.) Trojan Horses C.) Mc A fee Program D.) Google
50
A.) To protect the CPU B.) to prevent the computer from overheating C.) To process graphics on the computer D.) Stores all of your computers data
52
A.) Stores all of your data B.) Allows your computer to access its functions C.) The main circuit board of the computer D.) Processes graphics on the computer
54
A.) DVD B.) CD C.) CPU D.) RAM
56
A.) the main circuit board of the computer B.) reads CD’s and DVD’s C.) loads everything into its RAM D.) protects the CPU
58
A.) 5 B.) 7 C.) 8 D.) 9
60
www.webmd.com www.webmd.com http://dictionary.reference.com/browse /virus http://dictionary.reference.com/browse /virus http://www.techterms.com/definition/ powersupply http://www.techterms.com/definition/ powersupply
61
Dave Coustan, “ How Spyware Works”, http://computer.howstuffworks.com/spyware.htm http://computer.howstuffworks.com/spyware.htm Ed Tittel, “Spyware vs. viruses: Two different fights”, May 25,2005, http://searchcio- midmarket.techtarget.com/news/columnhttp://searchcio- midmarket.techtarget.com/news/column
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.