Presentation is loading. Please wait.

Presentation is loading. Please wait.

By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.

Similar presentations


Presentation on theme: "By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs."— Presentation transcript:

1 By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs

2 Input/Output Devices Spyware Viruses 100 200 300 400 500 End Bibliography Input/output infoSpyware infoVirus info

3 Click slide

4  An virus is an small piece of software that piggybacks on real programs.  They are called viruses because they share some of the traits of biological viruses. They pass from computer to computer, biological viruses pass from person to person.  They cannot reproduce.  Viruses must piggyback on some other program and document in order to launch.

5  An email virus travels as an attachment to email-messages, and usually replicating itself by automatically mailing itself to dozens of people in the victim’s email book. Some email viruses may not even require a double click, they download when the infected message is opened.

6  A Trojan horse is simply a computer program. It claims to do one thing, but does damage when you run it.  They have no way to replicate themselves automatically.

7  A worm is a small piece of software that uses computer networks and security holes to replicate itself. It copies itself from machine to machine.

8  No No  Yes Yes  It depends on the virus It depends on the virus  If your firewall is on If your firewall is on

9  Through applications Through applications  Through emails Through emails  By text messages By text messages  By reading stupid articles. By reading stupid articles.

10  Yes Yes  No No  Sometimes Sometimes  Only e-mail viruses Only e-mail viruses

11  Keyboard to keyboard Keyboard to keyboard  Someone types them up Someone types them up  Machine to machine Machine to machine  Virus to virus Virus to virus

12  A website A website  A machine A machine  A computer program A computer program  An horse An horse

13 Back

14 Back to: 100 200 300 400 500

15 Click slide

16  An input device is anything that transmits information into a computer › A mouse is an example of an input device: when one moves the mouse around and presses its buttons, the actions are shown on the computer monitor screen

17  An output device is anything that can display information › A monitor is an example of an output device: it displays the internal workings of the computer. Game Board

18  Keyboard Keyboard  Monitor Monitor  CPU CPU  Computer Case Computer Case

19  A computer mouse A computer mouse  A computer monitor A computer monitor  Simon Regenold Simon Regenold  A keyboard A keyboard

20  Input Device Input Device  Output Device Output Device  Cooking utensil Cooking utensil  Simon Regenold Simon Regenold

21  Input Device Input Device  Output Device Output Device  Human Beings Human Beings  Simon Regenold Simon Regenold

22  SIMON REGENOLD SIMON REGENOLD  SIMON REGENOLD SIMON REGENOLD  Input Device Input Device  SIMON REGENOLD SIMON REGENOLD

23  http://www.abcya.com/input_output.ht m http://www.abcya.com/input_output.ht m  http://www.tigerdirect.com/ http://www.tigerdirect.com/  http://www.tigerdirect.com/applications /SearchTools/item- details.asp?EdpNo=6052510&Sku=V18- 2712 http://www.tigerdirect.com/applications /SearchTools/item- details.asp?EdpNo=6052510&Sku=V18- 2712  http://ziplink.net/~teachcte/comp- rel/misc/in-out1.htm http://ziplink.net/~teachcte/comp- rel/misc/in-out1.htm  http://cil.usu.edu/htm/cs/iodevices/ http://cil.usu.edu/htm/cs/iodevices/

24 YOU FOOL Back

25  YOU SUCK Back to 100 Back to 200 Back to 300 Back to 400 Back to 500

26 Click slide

27 Spyware is defined broadly as any program that gets into your computer without your permission and hides in the background while it makes unwanted changes to your user experience. The damage it does is more a by-product of its main mission, which is to serve you targeted advertisements or make your browser display certain sites or search results.

28  Spyware usually ends up on your machine because of something you do, like clicking a button on a pop-up window, installing a software package or agreeing to add functionality to your Web browser. These applications often use trickery to get you to install them, from fake system alert messages to buttons that say "cancel" when they really install spyware.

29  Spyware is a category of computer programs that attach themselves to your operating system in nefarious ways. They can suck the life out of your computer's processing power.

30  Install and use anti-spyware software. Many anti-virus products now have anti- spyware functionality built in. Check your user documentation for your antivirus product to see if it has anti-spyware protection.

31  Trojan Horse- A seemingly harmless computer virus that turns out to be extremely destructive.  Malware- A malicious or intentionally or unintentionally damaging software program.  Macro- A panel that holds more than one acting entity  Directory- A compilation of websites that is categorized and sorted by a topic Game Board

32 A. Spyware is a virus. Spyware is a virus. B. Spyware is a computer part. Spyware is a computer part. C. Spyware is any software that performs sneaky activities behind the user's back. Spyware is any software that performs sneaky activities behind the user's back. D. Spyware is a software that tells you that it going to hack into your computer. Spyware is a software that tells you that it going to hack into your computer.

33 A. You can prevent spyware by eating healthy. You can prevent spyware by eating healthy. B. You can prevent spyware by clicking on pop up ads. You can prevent spyware by clicking on pop up ads. C. You can prevent spyware by downloading anti-virus software. You can prevent spyware by downloading anti-virus software. D. You can prevent spyware by not using your computer. You can prevent spyware by not using your computer.

34 A. Spyware can do many of nasty things to your computer. Spyware can do many of nasty things to your computer. B. Spyware can infect your computer. Spyware can infect your computer. C. Spyware can steal your passwords. Spyware can steal your passwords. D. Spyware can send you targeted emails. Spyware can send you targeted emails. E. All of the above All of the above

35 A. Spyware usually ends up on your machine because of something you do, like clicking a button on a pop-up window. Spyware usually ends up on your machine because of something you do, like clicking a button on a pop-up window. B. Spyware can get on your computer by you playing a game. Spyware can get on your computer by you playing a game. C. Spyware can get on your computer by watching a movie on a website. Spyware can get on your computer by watching a movie on a website. D. Spyware can get on your computer by opening a word document. Spyware can get on your computer by opening a word document.

36 A. Trojan Horse Trojan Horse B. Malware Malware C. Macro Macro D. Directory Directory

37  Howstuffworks.com  Ask.com  Wisegeek.com  Techtarget.com

38 END

39 Bac k

40 Back


Download ppt "By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs."

Similar presentations


Ads by Google