Analyzing Technology Issues
description
Transcript of Analyzing Technology Issues
![Page 1: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/1.jpg)
ANALYZING TECHNOLOGY ISSUES
Computer Basics
![Page 2: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/2.jpg)
THE IMPACT OF TECHNOLOGY ON EDUCATION
Education Internet Distance Learning Computer-Based Learning Simulations
![Page 3: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/3.jpg)
THE IMPACT OF TECHNOLOGY ON SCIENCE
Science Artificial Intelligence Genetic Engineering Virtual Reality
![Page 4: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/4.jpg)
THE IMPACT OF TECHNOLOGY ON WORK
Multinational Economy Electronic Commerce
![Page 5: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/5.jpg)
THE IMPACT OF TECHNOLOGY ON OUR LIVES
Clothes that fight odor and bacteria
The flying car Voice recognition Space travel Smart shoes and smart
seats Smart houses Electronic shopping
![Page 6: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/6.jpg)
EXPLORING TECHNOLOGY CAREERS
Business and Office Administrative Assistant Desktop Publisher/Graphic Designer
Network Support and Administration PC Support Specialist Manager of Information Systems
Web-Based Web Developer Web Master
![Page 7: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/7.jpg)
COMPUTER CRIMES A criminal act committed through the
use of a computer. It can also involve the theft of a
computer and any equipment associated with the computer.
![Page 8: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/8.jpg)
TYPES OF COMPUTER CRIMES
Computer fraud Conduct that involves the manipulation of a
computer or computer data in order to obtain money, property, or value dishonestly or to cause loss.
Computer hacking Involves invading someone else’s computer, usually for personal gain or just the satisfaction of invasion.
![Page 9: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/9.jpg)
OTHER COMPUTER CRIMES Theft of computer time
An employee uses a company’s computer for personal use such as running a small business, keeping records of an outside organization, or keeping personal records.
Data diddling Changing data before it is entered into the
computer or after is has been entered into the computer.
Software Piracy Illegal copying and using of software purchased by
someone else
![Page 10: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/10.jpg)
COMPUTER ETHICS
Using computers for good purposes Public domain
legally copy files and give to anyone Freeware
given to a user free of charge on a trial basis
![Page 11: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/11.jpg)
COMPUTER VIRUSES
A virus is a program that has been written to cause corruption of data on a computer.
![Page 12: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/12.jpg)
TYPES OF COMPUTER VIRUSES• Worm
• a virus that replicates itself over and over in the computer's memory until the computer can barely function causing your computer to work more slowly.
• Works slowly through files• Time bomb
• Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
• Logic bomb• A virus that becomes active when a particular activity happens. • Ex. appearance or disappearance of specified data.
• Trojan horse• A virus that hides itself inside another legitimate program
causing it to do something different than what it is expected to do.
• When the program is used, the virus is released and can begin its work of replication and annoyance or damage.http://www.commoncraft.com/video/computer-viruses-and-threats
![Page 13: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/13.jpg)
PRIVACY AND SECURITY ISSUES
Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources.
![Page 14: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/14.jpg)
SECURITY MEASURES
Maintain and Enforce Security Measures such as: Passwords Electronic identification cards Firewalls Antivirus software Selective hiring process http://
www.commoncraft.com/video/secure-passwords
![Page 15: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/15.jpg)
ADVANTAGES AND USES OF TELECOMMUNICATIONS
Telecommunication involves electronically transferring data. Distance learning
Allows the user to take classes without being physically present.
Teleconferencing Provides conferencing capabilities from several
locations without leaving the office, reduces costs for time and travel.
![Page 16: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/16.jpg)
WHAT IS A BROWSER?
The software program that you use to retrieve documents from the World Wide Web (WWW) and to display them in a readable format.
Examples: Internet Explorer Safari
![Page 17: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/17.jpg)
TITLE BAR
The bar on top of the window that contains the name of the document.
![Page 18: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/18.jpg)
MENU BAR
• A horizontal menu that appears on top of a window.
Provides a selection of options related to the Web page.
![Page 19: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/19.jpg)
TOOL BAR
Icons for single-click access to most commonly used menu commands.
![Page 20: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/20.jpg)
ADDRESS BAR Contains the
URL, or address, of the active Web page; also where you type the location for the Web page you want to visit.
![Page 21: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/21.jpg)
GO BUTTON Connects
you to address displayed in the Address bar. Document Window displays the active Web Page
![Page 22: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/22.jpg)
STATUS BAR Located
at the bottom of the browser; shows the progress of Web page transactions.
![Page 23: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/23.jpg)
ACCESS INDICATOR A small
picture in the upper right corner of the browser; when animated, it means your browser is accessing data from a remote computer.
![Page 24: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/24.jpg)
SCROLL BARS Vertical
and horizontal scroll bars; lets you scroll vertically and horizontally if the Web page is too long or too wide to fit within one screen.
![Page 25: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/25.jpg)
WHAT IS EMAIL? Email, or electronic mail, is similar to
regular mail. You have a message, an address, and a carrier that figures out how to get it from one location to another.
Email is used to stay in touch with family and friends, conduct business, and send attachments such as text and image files.
![Page 26: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/26.jpg)
ADVANTAGES AND USES OF EMAIL
Faster way to communicate and respond Quick and easy way to send messages Forward messages to other individuals Send messages to multiple individuals Include attachments such as pictures,
audio files, and documents
![Page 27: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/27.jpg)
EMAIL TERMINOLOGY Inbox Outbox Sent Items Deleted Items Drafts New Message Send Address Book
![Page 28: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/28.jpg)
ELECTRONIC MAIL ADDRESSES
The address consists of three parts:• The user name of the individual• The @ symbol• The user’s domain name
Example: [email protected]
![Page 29: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/29.jpg)
WHAT IS A SEARCH ENGINE? A tool that lets you find Web pages that
match a particular word or phrase. Examples of search engines:
![Page 30: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/30.jpg)
SEARCH ENGINE TERMINOLOGY
Search expression Index Spiders or bots Meta tags Directory Keyword search Hyperlink
![Page 31: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/31.jpg)
BACKGROUND OF THE INTERNET
Early origin in 1960s Closely tied to a networking project
started by a governmental division called the Advanced Research Projects Agency.
Original name: ARPANET Created so that scientists were able to
share information on military and scientific research.
![Page 32: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/32.jpg)
FEATURES OF THE INTERNET
The World Wide Web Began in March 1989 when Tim Berners-
Lee wrote a small computer program for his personal use.
URL (Universal Resource Locator) Name for a web site address.
![Page 33: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/33.jpg)
WEB PROTOCOLS
HTML Hypertext Markup Language
A series of tags that are integrated into text documents and describes how the text should be formatted when a Web browser displays it on the screen.
HTTP Hypertext Transfer Protocol
Standard that defines how messages are formatted and transmitted.
![Page 34: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/34.jpg)
CHAT ROOMS
Using the computer to create real-time communication between yourself and another user or a group of users. Internet Relay Chat (IRC)
A text-based chat developed by Jarkko Oikarinen in 1988.
One of the most widely used chat forums on the Internet today.
![Page 35: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/35.jpg)
CHAT OPTIONS Web chat
Incorporates graphics, audio and video Hosted by search engines such as Yahoo,
Snap, and Excite. Proprietary chat
Requires that you download and install software from a company.
Examples are Microsoft Chat, AOL, and Prodigy.
Buddy lists You specify your list of friends and even tell
when they are online. Examples are ICQ and AOL Messenger
![Page 36: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/36.jpg)
MAILING LISTS
A group of people with a shared interest.
Their email addresses are collected into a group, and this group is identified by a single name.
When a message is sent to the group, everyone on the list receives that message.
![Page 37: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/37.jpg)
NEWSGROUPS
• A discussion forum or a type of bulletin board.
• Each board is dedicated to discussion on a particular topic.• USENET
• Worldwide network of computers that facilitates the transmission of messages among the news servers.
![Page 38: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/38.jpg)
RESEARCH ON THE INTERNET
• Two basic tools used to find information:• Search engines
• Used to search for keywords.• Subject directories
• Used to find specialized topics.
![Page 39: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/39.jpg)
TYPES OF SEARCH ENGINES
Keyword Search Uses keywords to perform search
Multimedia Search Engines Used to find graphics, video clips, animation, and
MP3 music files. Meta Search Engines
Search several major search engines at one time. Subject Directories
Organized by subject categories and displayed in a series of menus.
![Page 40: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/40.jpg)
TOOLS AND TECHNIQUES
Phrase Searching Search Engine Math Boolean Operators Wildcard Searching Title Searching
![Page 41: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/41.jpg)
PHRASE SEARCHING A phrase is entered using double
quotation marks and only matches those that appear adjacent to each other and in the order in which you specify. Example: “baseball cards”
![Page 42: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/42.jpg)
SEARCH ENGINE MATH
Symbols used in formulas to filter out unwanted listings. Use the plus symbol (+) before words that
must appear. Also known as an inclusion operator.
Use the minus symbol (-) before words that you do not want to appear.
Also known as an exclusion operator.
![Page 43: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/43.jpg)
BOOLEAN OPERATORS
Boolean logic consists of three logical operators: AND NOT OR
![Page 44: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/44.jpg)
WILDCARD SEARCHING
The * symbol, called an asterisk, is considered a wildcard character.
Used if you don’t know the spelling of a word Example: N*Ryan to search for Nolan Ryan
Used to search plurals or variations of words.
![Page 45: Analyzing Technology Issues](https://reader035.fdocuments.in/reader035/viewer/2022062814/56816870550346895ddeddc3/html5/thumbnails/45.jpg)
TITLE SEARCHING Searching
the title of a web page.
When a web page author creates a Web page, the Web page generally contains a HTML title.
http://www.commoncraft.com/video/web-search-strategies