Download presentation
Presentation is loading. Please wait.
Published byJeffry Brian Goodwin Modified over 8 years ago
1
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs
2
Input/Output Devices Spyware Viruses 100 200 300 400 500 End Bibliography Input/output infoSpyware infoVirus info
3
Click slide
4
An virus is an small piece of software that piggybacks on real programs. They are called viruses because they share some of the traits of biological viruses. They pass from computer to computer, biological viruses pass from person to person. They cannot reproduce. Viruses must piggyback on some other program and document in order to launch.
5
An email virus travels as an attachment to email-messages, and usually replicating itself by automatically mailing itself to dozens of people in the victim’s email book. Some email viruses may not even require a double click, they download when the infected message is opened.
6
A Trojan horse is simply a computer program. It claims to do one thing, but does damage when you run it. They have no way to replicate themselves automatically.
7
A worm is a small piece of software that uses computer networks and security holes to replicate itself. It copies itself from machine to machine.
8
No No Yes Yes It depends on the virus It depends on the virus If your firewall is on If your firewall is on
9
Through applications Through applications Through emails Through emails By text messages By text messages By reading stupid articles. By reading stupid articles.
10
Yes Yes No No Sometimes Sometimes Only e-mail viruses Only e-mail viruses
11
Keyboard to keyboard Keyboard to keyboard Someone types them up Someone types them up Machine to machine Machine to machine Virus to virus Virus to virus
12
A website A website A machine A machine A computer program A computer program An horse An horse
13
Back
14
Back to: 100 200 300 400 500
15
Click slide
16
An input device is anything that transmits information into a computer › A mouse is an example of an input device: when one moves the mouse around and presses its buttons, the actions are shown on the computer monitor screen
17
An output device is anything that can display information › A monitor is an example of an output device: it displays the internal workings of the computer. Game Board
18
Keyboard Keyboard Monitor Monitor CPU CPU Computer Case Computer Case
19
A computer mouse A computer mouse A computer monitor A computer monitor Simon Regenold Simon Regenold A keyboard A keyboard
20
Input Device Input Device Output Device Output Device Cooking utensil Cooking utensil Simon Regenold Simon Regenold
21
Input Device Input Device Output Device Output Device Human Beings Human Beings Simon Regenold Simon Regenold
22
SIMON REGENOLD SIMON REGENOLD SIMON REGENOLD SIMON REGENOLD Input Device Input Device SIMON REGENOLD SIMON REGENOLD
23
http://www.abcya.com/input_output.ht m http://www.abcya.com/input_output.ht m http://www.tigerdirect.com/ http://www.tigerdirect.com/ http://www.tigerdirect.com/applications /SearchTools/item- details.asp?EdpNo=6052510&Sku=V18- 2712 http://www.tigerdirect.com/applications /SearchTools/item- details.asp?EdpNo=6052510&Sku=V18- 2712 http://ziplink.net/~teachcte/comp- rel/misc/in-out1.htm http://ziplink.net/~teachcte/comp- rel/misc/in-out1.htm http://cil.usu.edu/htm/cs/iodevices/ http://cil.usu.edu/htm/cs/iodevices/
24
YOU FOOL Back
25
YOU SUCK Back to 100 Back to 200 Back to 300 Back to 400 Back to 500
26
Click slide
27
Spyware is defined broadly as any program that gets into your computer without your permission and hides in the background while it makes unwanted changes to your user experience. The damage it does is more a by-product of its main mission, which is to serve you targeted advertisements or make your browser display certain sites or search results.
28
Spyware usually ends up on your machine because of something you do, like clicking a button on a pop-up window, installing a software package or agreeing to add functionality to your Web browser. These applications often use trickery to get you to install them, from fake system alert messages to buttons that say "cancel" when they really install spyware.
29
Spyware is a category of computer programs that attach themselves to your operating system in nefarious ways. They can suck the life out of your computer's processing power.
30
Install and use anti-spyware software. Many anti-virus products now have anti- spyware functionality built in. Check your user documentation for your antivirus product to see if it has anti-spyware protection.
31
Trojan Horse- A seemingly harmless computer virus that turns out to be extremely destructive. Malware- A malicious or intentionally or unintentionally damaging software program. Macro- A panel that holds more than one acting entity Directory- A compilation of websites that is categorized and sorted by a topic Game Board
32
A. Spyware is a virus. Spyware is a virus. B. Spyware is a computer part. Spyware is a computer part. C. Spyware is any software that performs sneaky activities behind the user's back. Spyware is any software that performs sneaky activities behind the user's back. D. Spyware is a software that tells you that it going to hack into your computer. Spyware is a software that tells you that it going to hack into your computer.
33
A. You can prevent spyware by eating healthy. You can prevent spyware by eating healthy. B. You can prevent spyware by clicking on pop up ads. You can prevent spyware by clicking on pop up ads. C. You can prevent spyware by downloading anti-virus software. You can prevent spyware by downloading anti-virus software. D. You can prevent spyware by not using your computer. You can prevent spyware by not using your computer.
34
A. Spyware can do many of nasty things to your computer. Spyware can do many of nasty things to your computer. B. Spyware can infect your computer. Spyware can infect your computer. C. Spyware can steal your passwords. Spyware can steal your passwords. D. Spyware can send you targeted emails. Spyware can send you targeted emails. E. All of the above All of the above
35
A. Spyware usually ends up on your machine because of something you do, like clicking a button on a pop-up window. Spyware usually ends up on your machine because of something you do, like clicking a button on a pop-up window. B. Spyware can get on your computer by you playing a game. Spyware can get on your computer by you playing a game. C. Spyware can get on your computer by watching a movie on a website. Spyware can get on your computer by watching a movie on a website. D. Spyware can get on your computer by opening a word document. Spyware can get on your computer by opening a word document.
36
A. Trojan Horse Trojan Horse B. Malware Malware C. Macro Macro D. Directory Directory
37
Howstuffworks.com Ask.com Wisegeek.com Techtarget.com
38
END
39
Bac k
40
Back
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.