Presentation is loading. Please wait.

Presentation is loading. Please wait.

By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes.

Similar presentations


Presentation on theme: "By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes."— Presentation transcript:

1 By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

2  Spyware makes your computer slow by attaching itself to your operating system. Spyware tracks your habits in order to give you a lot of sales offers and make traffic for their website. More than 80% of computers are infected. You can get spyware when you click on a button on a pop up window, install a package, or end a vulnerability. People can get them from peer to peer file sharing programs and drive by downloads. Some spyware masquerades as programs that help take out spyware. Spyware hogs up RAM and runs in your background. You can protect against spyware by using a spyware scanner, a pop up blocker, disable active x, be suspicious about new things that you are installing and use the “x” to close windows.

3 Most video game addicts don’t know that they are addicts. Video game addicts usually become detached from the real world. Also they play video games to get away from real life problems. Compulsive video gaming is a modern-day psychological disorder. Some signs of being a video game addict are you play more than five hours a day. You experience significant weight loss or weight gain as a result of playing. Relationships with family or friends take a plunge. You play at work. You avoid phone calls from friends and/or lie to them about how much you play.

4 Use Boolean operators to combine your key terms. Boolean operator words are; And, Not, and Or. Use quotation marks around names or phrases. Use search engines such as; Google, Yahoo, and Bing. Searching unproductively on the internet is called thrashing. Use a minus sign (-) to reduce search results from your topic.

5 1. First choose a topic to search about. 2. Decide what key terms to use in your search. 3. Choose a search engine to go to. 4. If there is too many results from your search; use either quotation marks, Boolean words, or a minus sign.

6  Input devices give the CPU information to process.  They allow the user to manipulate the computer.  They include a mouse, keyboard, webcam, and scanner.

7  Output Devices receive information from the CPU in order to present it to the user.  Output devices include a printer, fax machine, speaker, monitor, and projector.

8  Communication devices help the computer connect with other computers, often through the Internet.  The include a wireless router, modem, Ethernet cable, Ethernet hub, and wireless antenna.

9  Storage devices store the computer’s data.  They include Random Access Memory for short-term memory, and a hard drive for long term memory.  A Solid State Drive, USB flash drive, CD, and DVD can also store long term memory.

10  Input, Output, Communication, and Storage Devices come together to allow the CPU to function, and allow the user interact with the CPU.

11  Computer viruses are programs that piggyback on existing files in your computer.  They wreak havoc, slow your computer down, and can erase your hard disk.  They can be “caught” by reading malicious emails, or downloading scary internet stuff.  They can display images or words without a keyboard.

12  Hackers are people who enjoy harassing people and destroying things.  There may be financial motives, such as if you were infecting another companies network.  They have similar motives to arsonists or graffiti artists, they want to spoil and destroy resources for others.

13  They can be “caught” by reading malicious emails, or downloading scary internet stuff.  They cannot be caught simply by going to a website and looking at information.  Online bulletin boards can be corrupted and will infect a host if entered.

14  ILOVEYOU - (2000) One of the most widespread and rapidly spreading viruses ever, the ILOVEYOU virus spread via e-mail, posing as an executable attachment sent by a friend from the target's contact list. (Bright hub)  Code Red - (2001) IIS on Windows servers were the target of this virus. It also launched denial of service (DOS) attacks. (Bright Hub)  Melissa - (1999) The Melissa virus is notable because it is a Word macro virus. It cleverly spread via e-mails sent to contacts from the infected users' address books.(Bright Hub)

15  Trojan horse- a virus pretending to be another program, such as a music player, that gets into your system and runs.  Worm-exploits security holes in computers that are difficult to find or prevent *There are many terms to classify types of viruses. These are main types.

16  Viruses are inevitable, but can be prevented.  Installing anti-virus software will give you notices and will greatly enhance protection.  DO NOT CLICK ON EMAILS FROM PEOPLE YOU DO NOT KNOW!  Only download from trusted sites- Java, ITunes, Adobe.

17 Spyware Video Game Addiction Internet Searchin g I/O/C/S Devices Viruses 100 200 300 400 500 Game Board

18  No No  Yes Yes  Well, obviously its not this option Well, obviously its not this option  If you pick this one, you are really dumb, like I’m not even playing If you pick this one, you are really dumb, like I’m not even playing

19  Go back to the gameboardgameboard

20 Try again, homeboyagain

21  Yes Yes  No No  I don’t know I don’t know  2+2=4 2+2=4

22  Try againagain

23  Go back to the gameboardgameboard

24  Click on Pop-ups Click on Pop-ups  Download music from sketchy looking sites Download music from sketchy looking sites  Don’t have a spyware scanner Don’t have a spyware scanner  Use a Pop-up blocker Use a Pop-up blocker

25  Go back to the gameboardgameboard

26  Try againagain

27  The Background The Background  iTunes Library iTunes Library  The keyboard The keyboard  The mouse The mouse

28  Why don’t you go cry home to yo mama? Try again again

29  Go back to the gameboardgameboard

30  More than 98% More than 98%  Less than 98% Less than 98%  More than 80% More than 80%  Less than 80% Less than 80%

31  Or am I sorry? Try againagain

32  Go back to the gameboardgameboard

33  Call of Duty Modern Warfare 2 Call of Duty Modern Warfare 2  Halo 3 Halo 3  Sims Sims  World of Warcraft World of Warcraft  Pacman Pacman

34  Good Guess

35  Try the question again Try the question again

36  1 hour 1 hour  5 hours 5 hours  30 minutes 30 minutes  3 hours 3 hours  None of the above None of the above

37  Try Again Try Again

38  Yes, but they don’t care that they are Yes, but they don’t care that they are  No No  Yes Yes  No, but they think they are No, but they think they are

39  Try Again, Sucker! Try Again, Sucker!

40  There's no such thing There's no such thing  Relationships with family or friends take a plunge. Relationships with family or friends take a plunge.  You don’t play that often You don’t play that often  Eating Pie Eating Pie  Getting good grades Getting good grades

41  Try Again Try Again

42  Yes Yes  No No  Maybe so Maybe so  I don’t know I don’t know  Kinda Kinda

43  But if you want to try again click hereclick here this is you

44 a) And And b) Not Not c) Or Or d) All of the above All of the above

45 Try Again

46 a) Minus sign Minus sign b) Quotation marks Quotation marks c) Backspace sign Backspace sign d) Neither Neither

47 Try Again

48 a) Thrashing Thrashing b) Mashing Mashing c) Crashing Crashing d) Lashing Lashing

49 Try Again

50 a) Choose keywords that describes your topic. Choose keywords that describes your topic. b) Choose a search engine (Google, Yahoo etc.) Choose a search engine (Google, Yahoo etc.) c) Identify your topic of your search. Identify your topic of your search. d) Evaluate your results. Evaluate your results.

51 Try Again

52 a) Headline Headline b) Home plate Home plate c) Homepage Homepage d) Home stead Home stead

53 Try Again

54 Go Back To Game Board

55  Modem Modem  Scanner Scanner  Copier Copier  CD-Rom CD-Rom

56  That was incorrect. Back to the Question

57  That was correct! Back to Gameboard

58  True True  False False

59  You clicked on the wrong answer. Back to the Question

60  You selected the correct answer. Back to Gameboard

61  Allows the computer access the Internet Allows the computer access the Internet  Could be a fax machine Could be a fax machine  Houses the computer’s information Houses the computer’s information  Gives the CPU information from the user Gives the CPU information from the user

62  That is wrong. Back to the Question

63  You are right. Back to Gameboard

64  Storage Storage  Communication Communication  Output Output  Input Input

65  You chose an incorrect answer. Back to the Question

66  You chose the correct answer! Back to Gameboard

67  Storage Storage  Communication Communication  Output Output  Input Input

68 You selected an incorrect answer. Back to the Question

69 You selected the correct answer! Back to Gameboard

70  Create ads on your computer Create ads on your computer  Make pop-ups Make pop-ups  Destroy files and erase hard disks Destroy files and erase hard disks  Create images on your computer screen Create images on your computer screen

71  TRY AGAIN…..or else. TRY AGAIN

72  Financial priorities Financial priorities  Simple joy of destruction Simple joy of destruction  They want to ruin great resources for others They want to ruin great resources for others  All of the above All of the above

73  TRY AGAIN…..or else. TRY AGAIN

74  Worm Worm  Trojan horse Trojan horse  Bug Bug

75  TRY AGAIN…..or else. TRY AGAIN

76  2001 2001  1984 1984  2004 2004  2000 2000

77  TRY AGAIN…..or else. TRY AGAIN

78  Buying a new computer Buying a new computer  Only visiting certain sites Only visiting certain sites  Only visiting reputable websites Only visiting reputable websites  Opening all emails Opening all emails  Clicking on pop-ups Clicking on pop-ups

79  TRY AGAIN…..or else. TRY AGAIN

80  (FIST BUMP)  Back to game boardgame board

81  http://www.brighthub.com/computing/smb- security/articles/38830.aspx http://www.brighthub.com/computing/smb- security/articles/38830.aspx  http://www.howstuffworks.com/virus.htm http://www.howstuffworks.com/virus.htm  Mrs. Kotsch. Searching the Internet, N/A Baltimore City College Oct. 26. 2010, [http://www.baltimorecitycollege.us/apps/pages/index.jsp?uREC _ID=86592&type=u&termREC_ID=&pREC_ID=71408] [http://www.baltimorecitycollege.us/apps/pages/index.jsp?uREC _ID=86592&type=u&termREC_ID=&pREC_ID=71408]  Coustand, David, How Spyware Works, (n.d) How Stuff Works, October 25,2010, [http://computer.howstuffworks.com/spyware.htm/printable].  http://www.webmd.com/mental-health/features/video-game- addiction-no-fun http://www.webmd.com/mental-health/features/video-game- addiction-no-fun  http://www.ocregister.com/news/game-208290-wow- addiction.html http://www.ocregister.com/news/game-208290-wow- addiction.html  http://www.free-emoticons.co.uk/emoticons/Angry/ http://www.free-emoticons.co.uk/emoticons/Angry/


Download ppt "By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes."

Similar presentations


Ads by Google