Download presentation
Presentation is loading. Please wait.
Published byBethany Mosley Modified over 9 years ago
1
By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes
2
Spyware makes your computer slow by attaching itself to your operating system. Spyware tracks your habits in order to give you a lot of sales offers and make traffic for their website. More than 80% of computers are infected. You can get spyware when you click on a button on a pop up window, install a package, or end a vulnerability. People can get them from peer to peer file sharing programs and drive by downloads. Some spyware masquerades as programs that help take out spyware. Spyware hogs up RAM and runs in your background. You can protect against spyware by using a spyware scanner, a pop up blocker, disable active x, be suspicious about new things that you are installing and use the “x” to close windows.
3
Most video game addicts don’t know that they are addicts. Video game addicts usually become detached from the real world. Also they play video games to get away from real life problems. Compulsive video gaming is a modern-day psychological disorder. Some signs of being a video game addict are you play more than five hours a day. You experience significant weight loss or weight gain as a result of playing. Relationships with family or friends take a plunge. You play at work. You avoid phone calls from friends and/or lie to them about how much you play.
4
Use Boolean operators to combine your key terms. Boolean operator words are; And, Not, and Or. Use quotation marks around names or phrases. Use search engines such as; Google, Yahoo, and Bing. Searching unproductively on the internet is called thrashing. Use a minus sign (-) to reduce search results from your topic.
5
1. First choose a topic to search about. 2. Decide what key terms to use in your search. 3. Choose a search engine to go to. 4. If there is too many results from your search; use either quotation marks, Boolean words, or a minus sign.
6
Input devices give the CPU information to process. They allow the user to manipulate the computer. They include a mouse, keyboard, webcam, and scanner.
7
Output Devices receive information from the CPU in order to present it to the user. Output devices include a printer, fax machine, speaker, monitor, and projector.
8
Communication devices help the computer connect with other computers, often through the Internet. The include a wireless router, modem, Ethernet cable, Ethernet hub, and wireless antenna.
9
Storage devices store the computer’s data. They include Random Access Memory for short-term memory, and a hard drive for long term memory. A Solid State Drive, USB flash drive, CD, and DVD can also store long term memory.
10
Input, Output, Communication, and Storage Devices come together to allow the CPU to function, and allow the user interact with the CPU.
11
Computer viruses are programs that piggyback on existing files in your computer. They wreak havoc, slow your computer down, and can erase your hard disk. They can be “caught” by reading malicious emails, or downloading scary internet stuff. They can display images or words without a keyboard.
12
Hackers are people who enjoy harassing people and destroying things. There may be financial motives, such as if you were infecting another companies network. They have similar motives to arsonists or graffiti artists, they want to spoil and destroy resources for others.
13
They can be “caught” by reading malicious emails, or downloading scary internet stuff. They cannot be caught simply by going to a website and looking at information. Online bulletin boards can be corrupted and will infect a host if entered.
14
ILOVEYOU - (2000) One of the most widespread and rapidly spreading viruses ever, the ILOVEYOU virus spread via e-mail, posing as an executable attachment sent by a friend from the target's contact list. (Bright hub) Code Red - (2001) IIS on Windows servers were the target of this virus. It also launched denial of service (DOS) attacks. (Bright Hub) Melissa - (1999) The Melissa virus is notable because it is a Word macro virus. It cleverly spread via e-mails sent to contacts from the infected users' address books.(Bright Hub)
15
Trojan horse- a virus pretending to be another program, such as a music player, that gets into your system and runs. Worm-exploits security holes in computers that are difficult to find or prevent *There are many terms to classify types of viruses. These are main types.
16
Viruses are inevitable, but can be prevented. Installing anti-virus software will give you notices and will greatly enhance protection. DO NOT CLICK ON EMAILS FROM PEOPLE YOU DO NOT KNOW! Only download from trusted sites- Java, ITunes, Adobe.
17
Spyware Video Game Addiction Internet Searchin g I/O/C/S Devices Viruses 100 200 300 400 500 Game Board
18
No No Yes Yes Well, obviously its not this option Well, obviously its not this option If you pick this one, you are really dumb, like I’m not even playing If you pick this one, you are really dumb, like I’m not even playing
19
Go back to the gameboardgameboard
20
Try again, homeboyagain
21
Yes Yes No No I don’t know I don’t know 2+2=4 2+2=4
22
Try againagain
23
Go back to the gameboardgameboard
24
Click on Pop-ups Click on Pop-ups Download music from sketchy looking sites Download music from sketchy looking sites Don’t have a spyware scanner Don’t have a spyware scanner Use a Pop-up blocker Use a Pop-up blocker
25
Go back to the gameboardgameboard
26
Try againagain
27
The Background The Background iTunes Library iTunes Library The keyboard The keyboard The mouse The mouse
28
Why don’t you go cry home to yo mama? Try again again
29
Go back to the gameboardgameboard
30
More than 98% More than 98% Less than 98% Less than 98% More than 80% More than 80% Less than 80% Less than 80%
31
Or am I sorry? Try againagain
32
Go back to the gameboardgameboard
33
Call of Duty Modern Warfare 2 Call of Duty Modern Warfare 2 Halo 3 Halo 3 Sims Sims World of Warcraft World of Warcraft Pacman Pacman
34
Good Guess
35
Try the question again Try the question again
36
1 hour 1 hour 5 hours 5 hours 30 minutes 30 minutes 3 hours 3 hours None of the above None of the above
37
Try Again Try Again
38
Yes, but they don’t care that they are Yes, but they don’t care that they are No No Yes Yes No, but they think they are No, but they think they are
39
Try Again, Sucker! Try Again, Sucker!
40
There's no such thing There's no such thing Relationships with family or friends take a plunge. Relationships with family or friends take a plunge. You don’t play that often You don’t play that often Eating Pie Eating Pie Getting good grades Getting good grades
41
Try Again Try Again
42
Yes Yes No No Maybe so Maybe so I don’t know I don’t know Kinda Kinda
43
But if you want to try again click hereclick here this is you
44
a) And And b) Not Not c) Or Or d) All of the above All of the above
45
Try Again
46
a) Minus sign Minus sign b) Quotation marks Quotation marks c) Backspace sign Backspace sign d) Neither Neither
47
Try Again
48
a) Thrashing Thrashing b) Mashing Mashing c) Crashing Crashing d) Lashing Lashing
49
Try Again
50
a) Choose keywords that describes your topic. Choose keywords that describes your topic. b) Choose a search engine (Google, Yahoo etc.) Choose a search engine (Google, Yahoo etc.) c) Identify your topic of your search. Identify your topic of your search. d) Evaluate your results. Evaluate your results.
51
Try Again
52
a) Headline Headline b) Home plate Home plate c) Homepage Homepage d) Home stead Home stead
53
Try Again
54
Go Back To Game Board
55
Modem Modem Scanner Scanner Copier Copier CD-Rom CD-Rom
56
That was incorrect. Back to the Question
57
That was correct! Back to Gameboard
58
True True False False
59
You clicked on the wrong answer. Back to the Question
60
You selected the correct answer. Back to Gameboard
61
Allows the computer access the Internet Allows the computer access the Internet Could be a fax machine Could be a fax machine Houses the computer’s information Houses the computer’s information Gives the CPU information from the user Gives the CPU information from the user
62
That is wrong. Back to the Question
63
You are right. Back to Gameboard
64
Storage Storage Communication Communication Output Output Input Input
65
You chose an incorrect answer. Back to the Question
66
You chose the correct answer! Back to Gameboard
67
Storage Storage Communication Communication Output Output Input Input
68
You selected an incorrect answer. Back to the Question
69
You selected the correct answer! Back to Gameboard
70
Create ads on your computer Create ads on your computer Make pop-ups Make pop-ups Destroy files and erase hard disks Destroy files and erase hard disks Create images on your computer screen Create images on your computer screen
71
TRY AGAIN…..or else. TRY AGAIN
72
Financial priorities Financial priorities Simple joy of destruction Simple joy of destruction They want to ruin great resources for others They want to ruin great resources for others All of the above All of the above
73
TRY AGAIN…..or else. TRY AGAIN
74
Worm Worm Trojan horse Trojan horse Bug Bug
75
TRY AGAIN…..or else. TRY AGAIN
76
2001 2001 1984 1984 2004 2004 2000 2000
77
TRY AGAIN…..or else. TRY AGAIN
78
Buying a new computer Buying a new computer Only visiting certain sites Only visiting certain sites Only visiting reputable websites Only visiting reputable websites Opening all emails Opening all emails Clicking on pop-ups Clicking on pop-ups
79
TRY AGAIN…..or else. TRY AGAIN
80
(FIST BUMP) Back to game boardgame board
81
http://www.brighthub.com/computing/smb- security/articles/38830.aspx http://www.brighthub.com/computing/smb- security/articles/38830.aspx http://www.howstuffworks.com/virus.htm http://www.howstuffworks.com/virus.htm Mrs. Kotsch. Searching the Internet, N/A Baltimore City College Oct. 26. 2010, [http://www.baltimorecitycollege.us/apps/pages/index.jsp?uREC _ID=86592&type=u&termREC_ID=&pREC_ID=71408] [http://www.baltimorecitycollege.us/apps/pages/index.jsp?uREC _ID=86592&type=u&termREC_ID=&pREC_ID=71408] Coustand, David, How Spyware Works, (n.d) How Stuff Works, October 25,2010, [http://computer.howstuffworks.com/spyware.htm/printable]. http://www.webmd.com/mental-health/features/video-game- addiction-no-fun http://www.webmd.com/mental-health/features/video-game- addiction-no-fun http://www.ocregister.com/news/game-208290-wow- addiction.html http://www.ocregister.com/news/game-208290-wow- addiction.html http://www.free-emoticons.co.uk/emoticons/Angry/ http://www.free-emoticons.co.uk/emoticons/Angry/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.