Date post: | 31-Dec-2015 |
Category: |
Documents |
Upload: | bethany-mosley |
View: | 220 times |
Download: | 0 times |
Computer Jeopardy
By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica
Puentes
Spyware makes your computer slow by attaching itself to your operating system. Spyware tracks your habits in order to give you a lot of sales offers and make traffic for their website. More than 80% of computers are infected. You can get spyware when you click on a button on a pop up window, install a package, or end a vulnerability. People can get them from peer to peer file sharing programs and drive by downloads. Some spyware masquerades as programs that help take out spyware. Spyware hogs up RAM and runs in your background. You can protect against spyware by using a spyware scanner, a pop up blocker, disable active x, be suspicious about new things that you are installing and use the “x” to close windows.
SPYWARE
Most video game addicts don’t know that they are addicts. Video game addicts usually become detached from the real world. Also they play video games to get away from real life problems. Compulsive video gaming is a modern-day psychological disorder. Some signs of being a video game addict are you play more than five hours a day. You experience significant weight loss or weight gain as a result of playing. Relationships with family or friends take a plunge. You play at work. You avoid phone calls from friends and/or lie to them about how much you play.
Video Game Addiction
Internet Searching•Use Boolean operators to combine your key terms.•Boolean operator words are; And, Not, and Or.•Use quotation marks around names or phrases.•Use search engines such as; Google, Yahoo, and Bing.•Searching unproductively on the internet is called thrashing.•Use a minus sign (-) to reduce search results from your topic.
Searching Steps
1. First choose a topic to search about.2. Decide what key terms to use in your search.3. Choose a search engine to go to.4. If there is too many results from your search;
use either quotation marks, Boolean words, or a minus sign.
Input devices give the CPU information to process.
They allow the user to manipulate the computer.
They include a mouse, keyboard, webcam, and scanner.
Input Devices
Output Devices receive information from the CPU in order to present it to the user.
Output devices include a printer, fax machine, speaker, monitor, and projector.
Output Devices
Communication devices help the computer connect with other computers, often through the Internet.
The include a wireless router, modem, Ethernet cable, Ethernet hub, and wireless antenna.
Communication Devices
Storage devices store the computer’s data. They include Random Access Memory for
short-term memory, and a hard drive for long term memory.
A Solid State Drive, USB flash drive, CD, and DVD can also store long term memory.
Storage Devices
Input, Output, Communication, and Storage Devices come together to allow the CPU to function, and allow the user interact with the CPU.
The Importance of these Devices
Computer viruses are programs that piggyback on existing files in your computer.
They wreak havoc, slow your computer down, and can erase your hard disk.
They can be “caught” by reading malicious emails, or downloading scary internet stuff.
They can display images or words without a keyboard.
What are computer viruses?
Hackers are people who enjoy harassing people and destroying things.
There may be financial motives, such as if you were infecting another companies network.
They have similar motives to arsonists or graffiti artists, they want to spoil and destroy resources for others.
Who makes computer viruses?
They can be “caught” by reading malicious emails, or downloading scary internet stuff.
They cannot be caught simply by going to a website and looking at information.
Online bulletin boards can be corrupted and will infect a host if entered.
How are computer viruses transmitted?
ILOVEYOU - (2000) One of the most widespread and rapidly spreading viruses ever, the ILOVEYOU virus spread via e-mail, posing as an executable attachment sent by a friend from the target's contact list. (Bright hub)
Code Red - (2001) IIS on Windows servers were the target of this virus. It also launched denial of service (DOS) attacks. (Bright Hub)
Melissa - (1999) The Melissa virus is notable because it is a Word macro virus. It cleverly spread via e-mails sent to contacts from the infected users' address books.(Bright Hub)
Famous computer viruses
Trojan horse- a virus pretending to be another program, such as a music player, that gets into your system and runs.
Worm-exploits security holes in computers that are difficult to find or prevent
*There are many terms to classify types of viruses. These are main types.
Types of computer viruses
Viruses are inevitable, but can be prevented.
Installing anti-virus software will give you notices and will greatly enhance protection.
DO NOT CLICK ON EMAILS FROM PEOPLE YOU DO NOT KNOW!
Only download from trusted sites- Java, ITunes, Adobe.
Prevention
Spyware Video Game Addiction
Internet Searchin
g
I/O/C/S Device
s
Viruses
100 100 100 100 100
200 200 200 200 200
300 300 300 300 300
400 400 400 400 400
500 500 500 500 500
Game Board
No Yes Well, obviously its not this option If you pick this one, you are really dumb, lik
e I’m not even playing
Does spyware hog up your computer’s RAM?
Go back to the gameboard
Correct
WRONG! You are sooo dumb-for real
Try again, homeboy
Yes No I don’t know 2+2=4
Does spyware make your computer slow?
Try again
What an idiot, you got it wrong
Go back to the gameboard
You got it right
Click on Pop-ups Download music from sketchy looking sites Don’t have a spyware scanner Use a Pop-up blocker
What is one way to prevent your computer from getting spyware?
Go back to the gameboard
Congratulations! You got it right!!
Try again
Sorry, you got it wrong.
The Background iTunes Library The keyboard The mouse
Where does spyware run on your computer
Why don’t you go cry home to yo mama? Try again
WRONG!!!!!!!
Go back to the gameboard
Correct
More than 98% Less than 98% More than 80% Less than 80%
What is the percent of computers that are infected with spyware?
Or am I sorry? Try again
Sorry it’s wrong
Go back to the gameboard
Correct
Call of Duty Modern Warfare 2 Halo 3 Sims World of Warcraft Pacman
What is the most addicting video game
Good Guess
Congratulations!
Try the question again
HAHA. U Got IT Wrong
1 hour 5 hours 30 minutes 3 hours None of the above
How long do addicts play video games
Try Again
HAHA. You are Stupid
Yes, but they don’t care that they are No Yes No, but they think they are
Do video game addicts know that they are addicts
Try Again, Sucker!
HAHAHA U Suck
There's no such thing Relationships with family or friends take a pl
unge. You don’t play that often Eating Pie Getting good grades
Which of these are signs of being a video game addict?
Try Again
You are a Loser
Yes No Maybe so I don’t know Kinda
Is video game addiction a physiological disorder ?
But if you want to try again click here
this is you
Don’t Try Again. Just Go Home.
Which are Boolean Operators?
a) Andb) Notc) Ord) All of the above
Sorry! Try Again
Try Again
You can use a ______ to reduce your search results.
a) Minus signb) Quotation marksc) Backspace signd) Neither
Sorry! Try Again
Try Again
Searching unproductively on the internet is known as:
a) Thrashingb) Mashingc) Crashingd) Lashing
Sorry! Try Again
Try Again
What is step #1 to internet searching?
a) Choose keywords that describes your topic.
b) Choose a search engine (Google, Yahoo etc.)
c) Identify your topic of your search.d) Evaluate your results.
Sorry! Try Again
Try Again
An introductory or title page of a site is commonly referred
to as a:a) Headlineb) Home platec) Homepaged) Home stead
Sorry! Try Again
Try Again
Go Back To Game Board
YAY! You got it right Great Job
Modem Scanner Copier CD-Rom
Which of the following is an input device?
That was incorrect.
Back to the Question
Incorrect!
That was correct!
Back to Gameboard
Correct!
True False
Output devices let the user give information to the computer.
You clicked on the wrong answer.
Back to the Question
Oops!
You selected the correct answer.
Back to Gameboard
Yes!!
Allows the computer access the Internet Could be a fax machine Houses the computer’s information Gives the CPU information from the user
A storage device…
That is wrong.Back to the Question
Oh no!
You are right.
Back to Gameboard
Yay!!
Storage Communication Output Input
What type of device is a USB flash drive?
You chose an incorrect answer.
Back to the Question
Not Great!
You chose the correct answer!
Back to Gameboard
Great!
Storage Communication Output Input
What type of device is a modem?
You selected an incorrect answer.
Back to the Question
You Are Wrong!
You selected the correct answer!
Back to Gameboard
Congratulations!
Create ads on your computer Make pop-ups Destroy files and erase hard disks Create images on your computer screen
What can viruses do?
TRY AGAIN…..or else.
FAIL
Financial priorities Simple joy of destruction They want to ruin great resources for others All of the above
What are virus creators’ motives?
TRY AGAIN…..or else.
FAIL
Worm Trojan horse Bug
Which one is not a virus?
TRY AGAIN…..or else.
FAIL
2001 1984 2004 2000
What year did the ILOVEYOU virus strike?
TRY AGAIN…..or else.
FAIL
Buying a new computer Only visiting certain sites Only visiting reputable websites Opening all emails Clicking on pop-ups
How can you prevent viruses?
TRY AGAIN…..or else.
FAIL
(FIST BUMP) Back to game board
WIN
http://www.brighthub.com/computing/smb-security/articles/38830.aspx
http://www.howstuffworks.com/virus.htm Mrs. Kotsch. Searching the Internet, N/A Baltimore
City College Oct. 26. 2010, [http://www.baltimorecitycollege.us/apps/pages/index.jsp?uREC_ID=86592&type=u&termREC_ID=&pREC_ID=71408]
Coustand, David, How Spyware Works, (n.d) How Stuff Works , October 25,2010, [http://computer.howstuffworks.com/spyware.htm/printable].
http://www.webmd.com/mental-health/features/video-game-addiction-no-fun
http://www.ocregister.com/news/game-208290-wow-addiction.html
http://www.free-emoticons.co.uk/emoticons/Angry/
Sources