1 / 18

Analyzing Technology Issues

Computer Basics. Analyzing Technology Issues. BCT 2.00 2.02 & 2.04. Computer Crime. A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer. Computer Hacking. Computer hacking

nita
Download Presentation

Analyzing Technology Issues

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Basics Analyzing Technology Issues BCT 2.00 2.02 & 2.04

  2. Computer Crime • A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer.

  3. Computer Hacking • Computer hacking • Involves invading someone else’s computer, usually for personal gain, bad intentions or just the satisfaction of invasion.

  4. Computer Viruses A virus is a program that has been written to cause corruption of data on a computer.

  5. Types of Computer Viruses • Worm • Makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks. • Time bomb • Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. • Logic bomb • Virus triggered by the appearance or disappearance of specified data. • Trojan horse • Virus that does something different from what it is expected to do.

  6. Security Measures • Passwords – safeguards access • Firewalls - a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices which is configured to permit or deny computer applications based upon a set of rules and other criteria. • Antivirus software – protects from most viruses

  7. What is a browser? • The software program that you use to retrieve documents from the World Wide Web (WWW) and to display them in a readable format. • Examples: • Internet Explorer • Netscape Communicator

  8. Title Bar Menu Bar Tool Bar

  9. Electronic Mail Addresses (email) • The address consists of three parts: • The user name of the individual • The @ symbol • The user’s domain name • Example: rsmith@yahoo.com domain name User’s name

  10. What is a search engine? • A tool that lets you find Web pages that match a particular word or phrase. • Examples of search engines: • Altavista -Bing • Google -HotBot • InfoSeek -Excite

  11. Background of the Internet • Early origin in 1960s • Closely tied to a networking project started by a governmental division called the Advanced Research Projects Agency. • Original name: ARPANET • Created so that scientists were able to share information on military and scientific research. • The World Wide Web (www) began in March 1989 when Tim Berners-Lee wrote a small computer program for his personal use.

  12. Web Protocols • HTML • Hypertext Markup Language • A series of tags that are integrated into text documents and describes how the text should be formatted when a Web browser displays it on the screen. This is the language used to create documents for the World Wide Web. • HTTP • Hypertext Transfer Protocol • Standard that defines how messages are formatted and transmitted.

  13. Chat Rooms & Options • Internet Relay Chat (IRC) - Using the computer to create real-time communication between yourself and another user or a group of users. • A text-based chat developed by JarkkoOikarinen in 1988. • One of the most widely used chat forums on the Internet today. • Buddy List – when you specify your list of friends who can tell when you are online

  14. Mailing Lists • A group of people with a shared interest. • Their email addresses are collected into a group, and this group is identified by a single name. • When a message is sent to the group, everyone on the list receives that message.

  15. Newsgroups • A discussion forum or a type of bulletin board. • Each board is dedicated to discussion on a particular topic. • USENET • Worldwide network of computers that facilitates the transmission of messages among the news servers.

  16. Types of Search Engines • Keyword Search* • Uses keywords to perform search • Multimedia Search Engines • Used to find graphics, video clips, animation, and MP3 music files. • Meta Search Engines • Search several major search engines at one time. • Subject Directories • Organized by subject categories and displayed in a series of menus.

  17. Privacy and Security IssuesBE CAREFUL! • Anything that you submit electronically – by computer, phone, etc. can be accessed by many, many people & used in various ways. • NOTHING is ever really deleted!!! • Protect yourself – don’t email, text anything that you would not want your mother, father, minister, principal, etc. to see

  18. Questions to ask yourself • 1. Which is a text-based chat forum? • 2. What was the original name of the Internet? 1-IRC 2-ARPANET

More Related