Over Achievers Darius Beckford. Spyware (Informational Slide ) Spyware is used for advertisement...

70
Over Achievers Darius Beckford

Transcript of Over Achievers Darius Beckford. Spyware (Informational Slide ) Spyware is used for advertisement...

Over AchieversDarius Beckford

Spyware(Informational Slide )

Spyware is used for advertisement purposes

Spyware takes away your computer processing power

Spyware does make your computer slow

Spyware(Informational Slide )

Spyware attaches itself to the Windows Operating System

Spyware is not like a virus, it cannot hurt your computer

Spyware most dangerous treats are Trymedia, Nuvens, Estalive, Hotbar and New.Net.Domain.Plugin.

What Are Viruses?

Viruses show us how defenseless we are with our information. A proper engineered virus can have a devastating affect to our computer if not prevented. A computer virus must piggyback on top of another program or document in order to begin. Viruses were brought out by the spread of personal computers, the use of bulletin boards and the floppy disk. One important rick people used to load viruses is to load them into the memory so they could keep running in the background as long as the computer is on. Some people put viruses on computers just to feel the thrill of when the computer blow up, inside.

Other Forms of Electronic Infections

Other forms of electronic infections are e-mail viruses, Trojan horses and worms. A worm is a small piece of software that uses the computer s networks and security holes in order to duplicate itself. An email virus is when somebody sends a virus as an attachment to an email message. Trojan horses are computer programs that say they do one thing, however damage your computer while you run it.

You can avoid getting any forms of electronic infections by avoiding programs from unknown sources, never double clicking on any e-mail attachment that holds an executable and to make sure that Macro Virus Protection is enabled in all of the Microsoft applications.

Input/Output/Communication/Storage Devices

An input device is a device that is used to give the computer information.

Input/Output/Communication/Storage Devices

An output device is a device that is used to get information from the

computer.

Input/Output/Communication/Storage Devices

An communication device is a device that is used to communicate using

voice, picture, or text.

Input/Output/Communication/Storage Devices

An storage device is an device that is used to store data or hardware.

Internet Searching

Internet Searching is basically showing how to work a computer. It’s telling you the dos and don’ts of using a computer. It also tells what some of the abbreviations are for the address bar such as .gov, .edu, .usa, etc. Even telling you lots of computer vocabulary like URL and the TCP/ IP.

What is “WWW”?

World Wide Web is more commonly known as WWW when your typing it in the address bar. The World Wide Web is a part of the internet that contains linked text, image, sound, and video documents.

What is the purpose of the WWW? The World Wide Web has all that

your looking for, weather it’s information, pictures, documents or music!

Without the World Wide Web there wouldn’t be as much technology that there is or as many jobs. Most schools would not be able to give there students grades or work.

Computer Terms

Many technology devices help out the computer. Devices such as the URL, TCP/ IP, Spider or Web Crawler, Stop words, etc.

The TCP/ IP- stands for Transmission Control Protocol/ Internet Protocol. The TCP/ IP is a convention or standard that controls or enables the connections. Connections like communication and data transfer between two(2) computing endpoints.

What is a HTML?

The HTML stands for Hypertext Markup Language. The HTML is a standardized language of computer code containing the textual content images, links to other documents, etc.

Cybercrime (Informational Slide )

A Cybercrime is a criminal activity done using computers and the internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts.

Cybercrime is a growing problem around the world. Many countries are beginning to make laws in attempt to lower the incidence of cybercrimes.

Decide on the type of table (Go to Home>Insert>Layout and use the Content Layout Slide) you are using then select the number of columns and 6 rows. Type in numbers. Hyperlink numbers after you finish completing all information on the slides for the categoryDelete this example game board slide.

Spyware Virus Game Addiction

Input/Output/Communication/ Storage Device

Internet Searching Cybercrime

100 100 100 100 100 100

200 200 200 200 200 200

300 300 300 300 300 300

400 400 400 400 400 400

500 500 500 500 500 500

What is spyware used for?

A) Keeping your computer protected

B) Shutting down your computer

C) Displaying advertisements

Help

Correct Answer

Sorry! You chose wrong!

BETTER LUCK NEXT TIME!!!

# 100 #200 #300 #400 #500

Is spyware harmful to your computer?

A) Yes, it always makes your computer crash

B) No, spyware does not its just advertisements

C) Maybe, it can hurt my computer, but then again help like viruses

Help

A) Your computer’s monitor

B) You computer’s operating system

C) Your computer’s sound system

What does spyware attach itself to?

Help

A) Your computer to shut down

B) Deleting important files from your computer

C) It can take some of your computers processing power

What does spyware cause?

Help

A) Nuvens

B) Hotba

C) Trojan Horses

D) Both A and B

What is a potential spyware problem?Help

BIBLIOGRAPHY

http://www.bcpss.org/webapps/portal/frameset.jsp?tab_id=_2_1&url=%2fwebapps%2fblackboard%2fexecute%2flauncher%3ftype%3dCourse%26id%3d_261314_1%26url%3d

A. Our weaknessB. Our intelligenceC. How vulnerable we areD. How secure we are

A. They want to get information from other people’s computers

B. They like the thrill of when the computer blows up

C. They think it’s funD. They have nothing important in their life.

Why do people put viruses on computers?

A. E-mail virusB. VirusC. Trojan horseD. Worm

A.E-mail virusB.VirusC.Trojan horseD.Worm

Sorry! You chose wrong!

BETTER LUCK NEXT TIME!!!

500400300200100

Bibliography

http://www.howstuffworks.com/virus.htm

What gender is mostly affected by game addiction

1.Males2.Females

Make a team decision on the way you will hyperlink the correct and incorrect answers (Choices: You can hyperlink either words, letter, sentence, shape)

Correct Answer

Sorry! You chose wrong!

BETTER LUCK NEXT TIME!!!

What is the most common affect of gamming addiction

A.)Gain of weightB.)Blindness C.)Listening to music

Category for 300

What age is commonly affected by game addiction.?

A.) 10-18B.)90-100C.)1-5

Category for 400

What is a sign of game addiction.?A.) Learn moreB.)they eat a lotC.) They cut off communications with friends and family

Bibliogra

http://www.webmd.com/mental-health/features/video-game-addiction-no-fun

Which of these devices are Storage Devices?

A). Floppy DiscB). CDC). PrinterD). Cell Phone

Which of these devices are Storage Devices?

A). Floppy DiscB). CDC). PrinterD). Cell Phone

The Correct answer is…

A).Floppy Disc

The answer can’t be a CD because a CD is a output device, a printer is a Input device, and a Cell Phone is a communication device.

What is a Browser?

A). The program that tracks down all of your websites.

B). The device that finds your documents

C). The program that serves as your front end to the Web on the internet.

D). The computer mouse

The correct answer is...

C). The program that serves as your front end to the Web on the internet.

What does .edu stand for?

A). EducationB). Educational InstitutionsC). Educational PurposesD). Education Information

The Correct answer is...

B). Educational Institutions

Educational Institutions. A Educational Institution is of course

a institution dedicated to education. When kids really need help or want tom make a life they go to a Educational Institution. You could basically say that it’s a school. Which is what most students are in today.

What is “intranet”?

A). A company that furnishes corporations

B). A system of standardized words C). Any computer connected to each

other D). A private network inside of a

company that has the same software as the public internet

The correct answer is...

D). A private network inside of a company that has the same software as the public internet

Correct Answer

B). Educational Institutions

Educational Institutions. A Educational Institution is of course

a institution dedicated to education. When kids really need help or want tom make a life they go to a Educational Institution. You could basically say that it’s a school. Which is what most students are in today.

Internet Searching

Internet Searching is telling you exactly what to do when it comes to a computer. Typing things in the address bar and what the ending abbreviations stand for such as .edu, .gov, .org, .mil, .net, etc. The Internet is a vast collection interconnected systems of networks that connects computers around the world.

CATERGORY FOR 500

What is game addiction?A.)When a person has an eating disorderB.)When a person hacks another persons computer C.)When a person spends countless time playing a game

What is a Input device?a)A device that’s used to send the computer informationb)A device that’s used to receive information from the computer.c)A device that send and receive information from the computer.d)None of the above.

Correct Answer

Sorry! You chose wrong!

BETTER LUCK NEXT TIME!!!

500400300200100

What is a Output Device?a)A device you store hardware on.b)A device that sends the computer information.c)A device that receive information from the computer.d)A device that you communicate on.

What a storage device is used for?a)A device that’s used to store hardware.b)A device that’s used to store data.c)A device that’s used to save media.d)All the above.

A printer is what type of device?a)Storageb)Outputc)Communicationd)Input

A mouse is a . . . . Device.a)Storageb)Communicationc)Inputd)Output

Why do people commit Cybercrimes?

A. To exploit, test or take advantage of security holes that may exist.

B. To make money.C.To create viruses.D.All of the above

Sorry! You chose wrong!

BETTER LUCK NEXT TIME!!!

500400300200100

All of these are examples of cybercrime Except.

A. FraudB. SpammingC. Obscene/Offensive ContentD. Excessive Online Gaming

Cybercrime For 300

How can you prevent cyber crime?

A. Anti-Spyware

B. Hardware

C. Virus

D. None of the above

Cybercrime for 400

Why has cybercrimes become popular throughout the world?

A. Computers are more available now. B. More criminals. C. More Internet Users. D. All of the above.

Cybercrime for 500

Who does Cybercrime affect A. Everyone B. Everyone who uses computers and the

internet. C. Only a few D. None of the above

Bibliography

http://cybercrime.planetindia.net/cyber_crime-questions_answers1.htm