1 / 81

Computer Jeopardy

Computer Jeopardy. By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan , and Erica Puentes. SPYWARE.

gina
Download Presentation

Computer Jeopardy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Jeopardy By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

  2. SPYWARE • Spyware makes your computer slow by attaching itself to your operating system. Spyware tracks your habits in order to give you a lot of sales offers and make traffic for their website. More than 80% of computers are infected. You can get spyware when you click on a button on a pop up window, install a package, or end a vulnerability. People can get them from peer to peer file sharing programs and drive by downloads. Some spyware masquerades as programs that help take out spyware. Spyware hogs up RAM and runs in your background. You can protect against spyware by using a spyware scanner, a pop up blocker, disable active x, be suspicious about new things that you are installing and use the “x” to close windows.

  3. Video Game Addiction Most video game addicts don’t know that they are addicts. Video game addicts usually become detached from the real world. Also they play video games to get away from real life problems. Compulsive video gaming is a modern-day psychological disorder. Some signs of being a video game addict are you play more than five hours a day. You experience significant weight loss or weight gain as a result of playing. Relationships with family or friends take a plunge. You play at work. You avoid phone calls from friends and/or lie to them about how much you play.

  4. Internet Searching Use Boolean operators to combine your key terms. Boolean operator words are; And,Not, and Or. Use quotation marksaround names or phrases. Use search engines such as; Google, Yahoo, and Bing. Searching unproductively on the internet is called thrashing. Use a minus sign(-) to reduce search results from your topic.

  5. Searching Steps First choose a topic to search about. Decide what key terms to use in your search. Choose a search engine to go to. If there is too many results from your search; use either quotation marks, Boolean words, or a minus sign.

  6. Input Devices • Input devices give the CPU information to process. • They allow the user to manipulate the computer. • They include a mouse, keyboard, webcam, and scanner.

  7. Output Devices • Output Devices receive information from the CPU in order to present it to the user. • Output devices include a printer, fax machine, speaker, monitor, and projector.

  8. Communication Devices • Communication devices help the computer connect with other computers, often through the Internet. • The include a wireless router, modem, Ethernet cable, Ethernet hub, and wireless antenna.

  9. Storage Devices • Storage devices store the computer’s data. • They include Random Access Memory for short-term memory, and a hard drive for long term memory. • A Solid State Drive, USB flash drive, CD, and DVD can also store long term memory.

  10. The Importance of these Devices • Input, Output, Communication, and Storage Devices come together to allow the CPU to function, and allow the user interact with the CPU.

  11. What are computer viruses? • Computer viruses are programs that piggyback on existing files in your computer. • They wreak havoc, slow your computer down, and can erase your hard disk. • They can be “caught” by reading malicious emails, or downloading scary internet stuff. • They can display images or words without a keyboard.

  12. Who makes computer viruses? • Hackers are people who enjoy harassing people and destroying things. • There may be financial motives, such as if you were infecting another companies network. • They have similar motives to arsonists or graffiti artists, they want to spoil and destroy resources for others.

  13. How are computer viruses transmitted? • They can be “caught” by reading malicious emails, or downloading scary internet stuff. • They cannot be caught simply by going to a website and looking at information. • Online bulletin boards can be corrupted and will infect a host if entered.

  14. Famous computer viruses • ILOVEYOU - (2000) One of the most widespread and rapidly spreading viruses ever, the ILOVEYOU virus spread via e-mail, posing as an executable attachment sent by a friend from the target's contact list. (Bright hub) • Code Red - (2001) IIS on Windows servers were the target of this virus. It also launched denial of service (DOS) attacks. (Bright Hub) • Melissa - (1999) The Melissa virus is notable because it is a Word macro virus. It cleverly spread via e-mails sent to contacts from the infected users' address books.(Bright Hub)

  15. Types of computer viruses • Trojan horse- a virus pretending to be another program, such as a music player, that gets into your system and runs. • Worm-exploits security holes in computers that are difficult to find or prevent *There are many terms to classify types of viruses. These are main types.

  16. Prevention • Viruses are inevitable, but can be prevented. • Installing anti-virus software will give you notices and will greatly enhance protection. • DO NOT CLICK ON EMAILS FROM PEOPLE YOU DO NOT KNOW! • Only download from trusted sites- Java, ITunes, Adobe.

  17. Game Board

  18. Does spyware hog up your computer’s RAM? • No • Yes • Well, obviously its not this option • If you pick this one, you are really dumb, like I’m not even playing

  19. Correct • Go back to the gameboard

  20. WRONG! You are sooo dumb-for real Try again, homeboy

  21. Does spyware make your computer slow? • Yes • No • I don’t know • 2+2=4

  22. What an idiot, you got it wrong • Try again

  23. You got it right • Go back to the gameboard

  24. What is one way to prevent your computer from getting spyware? • Click on Pop-ups • Download music from sketchy looking sites • Don’t have a spyware scanner • Use a Pop-up blocker

  25. Congratulations! You got it right!! • Go back to the gameboard

  26. Sorry, you got it wrong. • Try again

  27. Where does spyware run on your computer • The Background • iTunes Library • The keyboard • The mouse

  28. WRONG!!!!!!! • Why don’t you go cry home to yo mama? Try again

  29. Correct • Go back to the gameboard

  30. What is the percent of computers that are infected with spyware? • More than 98% • Less than 98% • More than 80% • Less than 80%

  31. Sorry it’s wrong • Or am I sorry? Try again

  32. Correct • Go back to the gameboard

  33. What is the most addicting video game • Call of Duty Modern Warfare 2 • Halo 3 • Sims • World of Warcraft • Pacman

  34. Congratulations! • Good Guess

  35. HAHA. U Got IT Wrong • Try the question again

  36. How long do addicts play video games • 1 hour • 5 hours • 30 minutes • 3 hours • None of the above

  37. HAHA. You are Stupid • Try Again

  38. Do video game addicts know that they are addicts • Yes, but they don’t care that they are • No • Yes • No, but they think they are

  39. HAHAHA U Suck • Try Again, Sucker!

  40. Which of these are signs of being a video game addict? • There's no such thing • Relationships with family or friends take a plunge. • You don’t play that often • Eating Pie • Getting good grades

  41. You are a Loser • Try Again

  42. Is video game addiction a physiological disorder ? • Yes • No • Maybe so • I don’t know • Kinda

  43. Don’t Try Again. Just Go Home. • But if you want to try again click here this is you

  44. Which are Boolean Operators? And Not Or All of the above

  45. Sorry! Try Again  Try Again

  46. You can use a ______ to reduce your search results. Minus sign Quotation marks Backspace sign Neither

  47. Sorry! Try Again  Try Again

  48. Searching unproductively on the internet is known as: Thrashing Mashing Crashing Lashing

  49. Sorry! Try Again  Try Again

  50. What is step #1 to internet searching? Choose keywords that describes your topic. Choose a search engine (Google, Yahoo etc.) Identify your topic of your search. Evaluate your results.

More Related