810 likes | 949 Views
Computer Jeopardy. By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan , and Erica Puentes. SPYWARE.
E N D
Computer Jeopardy By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes
SPYWARE • Spyware makes your computer slow by attaching itself to your operating system. Spyware tracks your habits in order to give you a lot of sales offers and make traffic for their website. More than 80% of computers are infected. You can get spyware when you click on a button on a pop up window, install a package, or end a vulnerability. People can get them from peer to peer file sharing programs and drive by downloads. Some spyware masquerades as programs that help take out spyware. Spyware hogs up RAM and runs in your background. You can protect against spyware by using a spyware scanner, a pop up blocker, disable active x, be suspicious about new things that you are installing and use the “x” to close windows.
Video Game Addiction Most video game addicts don’t know that they are addicts. Video game addicts usually become detached from the real world. Also they play video games to get away from real life problems. Compulsive video gaming is a modern-day psychological disorder. Some signs of being a video game addict are you play more than five hours a day. You experience significant weight loss or weight gain as a result of playing. Relationships with family or friends take a plunge. You play at work. You avoid phone calls from friends and/or lie to them about how much you play.
Internet Searching Use Boolean operators to combine your key terms. Boolean operator words are; And,Not, and Or. Use quotation marksaround names or phrases. Use search engines such as; Google, Yahoo, and Bing. Searching unproductively on the internet is called thrashing. Use a minus sign(-) to reduce search results from your topic.
Searching Steps First choose a topic to search about. Decide what key terms to use in your search. Choose a search engine to go to. If there is too many results from your search; use either quotation marks, Boolean words, or a minus sign.
Input Devices • Input devices give the CPU information to process. • They allow the user to manipulate the computer. • They include a mouse, keyboard, webcam, and scanner.
Output Devices • Output Devices receive information from the CPU in order to present it to the user. • Output devices include a printer, fax machine, speaker, monitor, and projector.
Communication Devices • Communication devices help the computer connect with other computers, often through the Internet. • The include a wireless router, modem, Ethernet cable, Ethernet hub, and wireless antenna.
Storage Devices • Storage devices store the computer’s data. • They include Random Access Memory for short-term memory, and a hard drive for long term memory. • A Solid State Drive, USB flash drive, CD, and DVD can also store long term memory.
The Importance of these Devices • Input, Output, Communication, and Storage Devices come together to allow the CPU to function, and allow the user interact with the CPU.
What are computer viruses? • Computer viruses are programs that piggyback on existing files in your computer. • They wreak havoc, slow your computer down, and can erase your hard disk. • They can be “caught” by reading malicious emails, or downloading scary internet stuff. • They can display images or words without a keyboard.
Who makes computer viruses? • Hackers are people who enjoy harassing people and destroying things. • There may be financial motives, such as if you were infecting another companies network. • They have similar motives to arsonists or graffiti artists, they want to spoil and destroy resources for others.
How are computer viruses transmitted? • They can be “caught” by reading malicious emails, or downloading scary internet stuff. • They cannot be caught simply by going to a website and looking at information. • Online bulletin boards can be corrupted and will infect a host if entered.
Famous computer viruses • ILOVEYOU - (2000) One of the most widespread and rapidly spreading viruses ever, the ILOVEYOU virus spread via e-mail, posing as an executable attachment sent by a friend from the target's contact list. (Bright hub) • Code Red - (2001) IIS on Windows servers were the target of this virus. It also launched denial of service (DOS) attacks. (Bright Hub) • Melissa - (1999) The Melissa virus is notable because it is a Word macro virus. It cleverly spread via e-mails sent to contacts from the infected users' address books.(Bright Hub)
Types of computer viruses • Trojan horse- a virus pretending to be another program, such as a music player, that gets into your system and runs. • Worm-exploits security holes in computers that are difficult to find or prevent *There are many terms to classify types of viruses. These are main types.
Prevention • Viruses are inevitable, but can be prevented. • Installing anti-virus software will give you notices and will greatly enhance protection. • DO NOT CLICK ON EMAILS FROM PEOPLE YOU DO NOT KNOW! • Only download from trusted sites- Java, ITunes, Adobe.
Does spyware hog up your computer’s RAM? • No • Yes • Well, obviously its not this option • If you pick this one, you are really dumb, like I’m not even playing
Correct • Go back to the gameboard
WRONG! You are sooo dumb-for real Try again, homeboy
Does spyware make your computer slow? • Yes • No • I don’t know • 2+2=4
What an idiot, you got it wrong • Try again
You got it right • Go back to the gameboard
What is one way to prevent your computer from getting spyware? • Click on Pop-ups • Download music from sketchy looking sites • Don’t have a spyware scanner • Use a Pop-up blocker
Congratulations! You got it right!! • Go back to the gameboard
Sorry, you got it wrong. • Try again
Where does spyware run on your computer • The Background • iTunes Library • The keyboard • The mouse
WRONG!!!!!!! • Why don’t you go cry home to yo mama? Try again
Correct • Go back to the gameboard
What is the percent of computers that are infected with spyware? • More than 98% • Less than 98% • More than 80% • Less than 80%
Sorry it’s wrong • Or am I sorry? Try again
Correct • Go back to the gameboard
What is the most addicting video game • Call of Duty Modern Warfare 2 • Halo 3 • Sims • World of Warcraft • Pacman
Congratulations! • Good Guess
HAHA. U Got IT Wrong • Try the question again
How long do addicts play video games • 1 hour • 5 hours • 30 minutes • 3 hours • None of the above
HAHA. You are Stupid • Try Again
Do video game addicts know that they are addicts • Yes, but they don’t care that they are • No • Yes • No, but they think they are
HAHAHA U Suck • Try Again, Sucker!
Which of these are signs of being a video game addict? • There's no such thing • Relationships with family or friends take a plunge. • You don’t play that often • Eating Pie • Getting good grades
You are a Loser • Try Again
Is video game addiction a physiological disorder ? • Yes • No • Maybe so • I don’t know • Kinda
Don’t Try Again. Just Go Home. • But if you want to try again click here this is you
Which are Boolean Operators? And Not Or All of the above
Sorry! Try Again Try Again
You can use a ______ to reduce your search results. Minus sign Quotation marks Backspace sign Neither
Sorry! Try Again Try Again
Searching unproductively on the internet is known as: Thrashing Mashing Crashing Lashing
Sorry! Try Again Try Again
What is step #1 to internet searching? Choose keywords that describes your topic. Choose a search engine (Google, Yahoo etc.) Identify your topic of your search. Evaluate your results.