1 / 45

Analyzing Technology Issues

Computer Basics. Analyzing Technology Issues. Education Internet Distance Learning Computer-Based Learning Simulations. The Impact of Technology on Education. Science Artificial Intelligence Genetic Engineering Virtual Reality. The Impact of Technology on Science.

tevy
Download Presentation

Analyzing Technology Issues

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Basics Analyzing Technology Issues

  2. Education • Internet • Distance Learning • Computer-Based Learning • Simulations The Impact of Technology on Education

  3. Science • Artificial Intelligence • Genetic Engineering • Virtual Reality The Impact of Technology on Science

  4. Multinational Economy Electronic Commerce The Impact of Technology on Work

  5. Clothes that fight odor and bacteria The flying car Voice recognition Space travel Smart shoes and smart seats Smart houses Electronic shopping The Impact of Technology on Our Lives

  6. Business and Office • Administrative Assistant • Desktop Publisher/Graphic Designer • Network Support and Administration • PC Support Specialist • Manager of Information Systems • Web-Based • Web Developer • Web Master Exploring Technology Careers

  7. A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer. Computer Crimes

  8. Computer fraud • Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. • Computer hacking • Involves invading someone else’s computer, usually for personal gain or just the satisfaction of invasion. Types of Computer Crimes

  9. Theft of computer time • An employee uses a company’s computer for personal use such as running a small business, keeping records of an outside organization, or keeping personal records. • Data diddling • Changing data before it is entered into the computer or after is has been entered into the computer. • Software Piracy • Illegal copying and using of software purchased by someone else Other Computer Crimes

  10. Using computers for good purposes • Public domain • legally copy files and give to anyone • Freeware • given to a user free of charge on a trial basis Computer Ethics

  11. A virus is a program that has been written to cause corruption of data on a computer. Computer Viruses

  12. Types of Computer Viruses • Worm • a virus that replicates itself over and over in the computer's memory until the computer can barely function causing your computer to work more slowly. • Works slowly through files • Time bomb • Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. • Logic bomb • A virus that becomes active when a particular activity happens. • Ex. appearance or disappearance of specified data. • Trojan horse • A virus that hides itself inside another legitimate program causing it to do something different than what it is expected to do. • When the program is used, the virus is released and can begin its work of replication and annoyance or damage.http://www.commoncraft.com/video/computer-viruses-and-threats

  13. Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources. Privacy and Security Issues

  14. Maintain and Enforce Security Measures such as: • Passwords • Electronic identification cards • Firewalls • Antivirus software • Selective hiring process • http://www.commoncraft.com/video/secure-passwords Security Measures

  15. Telecommunication involves electronically transferring data. • Distance learning • Allows the user to take classes without being physically present. • Teleconferencing • Provides conferencing capabilities from several locations without leaving the office, reduces costs for time and travel. Advantages and Uses of Telecommunications

  16. The software program that you use to retrieve documents from the World Wide Web (WWW) and to display them in a readable format. • Examples: • Internet Explorer • Safari What is a browser?

  17. The bar on top of the window that contains the name of the document. Title bar

  18. A horizontal menu that appears on top of a window. Provides a selection of options related to the Web page. Menu Bar

  19. Icons for single-click access to most commonly used menu commands. Tool bar

  20. Contains the URL, or address, of the active Web page; also where you type the location for the Web page you want to visit. Address bar

  21. Connects you to address displayed in the Address bar. Document Window displays the active Web Page Go button

  22. Located at the bottom of the browser; shows the progress of Web page transactions. Status bar

  23. A small picture in the upper right corner of the browser; when animated, it means your browser is accessing data from a remote computer. Access Indicator

  24. Vertical and horizontal scroll bars; lets you scroll vertically and horizontally if the Web page is too long or too wide to fit within one screen. Scroll bars

  25. Email, or electronic mail, is similar to regular mail. You have a message, an address, and a carrier that figures out how to get it from one location to another. Email is used to stay in touch with family and friends, conduct business, and send attachments such as text and image files. What is Email?

  26. Faster way to communicate and respond • Quick and easy way to send messages • Forward messages to other individuals • Send messages to multiple individuals • Include attachments such as pictures, audio files, and documents Advantages and Uses of Email

  27. Inbox Outbox Sent Items Deleted Items Drafts New Message Send Address Book Email Terminology

  28. Electronic Mail Addresses • The address consists of three parts: • The user name of the individual • The @ symbol • The user’s domain name • Example: rsmith@yahoo.com

  29. A tool that lets you find Web pages that match a particular word or phrase. Examples of search engines: What is a search engine?

  30. Search expression Index Spiders or bots Meta tags Directory Keyword search Hyperlink Search Engine Terminology

  31. Early origin in 1960s Closely tied to a networking project started by a governmental division called the Advanced Research Projects Agency. Original name: ARPANET Created so that scientists were able to share information on military and scientific research. Background of the Internet

  32. The World Wide Web • Began in March 1989 when Tim Berners-Lee wrote a small computer program for his personal use. • URL (Universal Resource Locator) • Name for a web site address. Features of the Internet

  33. HTML • Hypertext Markup Language • A series of tags that are integrated into text documents and describes how the text should be formatted when a Web browser displays it on the screen. • HTTP • Hypertext Transfer Protocol • Standard that defines how messages are formatted and transmitted. Web Protocols

  34. Using the computer to create real-time communication between yourself and another user or a group of users. • Internet Relay Chat (IRC) • A text-based chat developed by JarkkoOikarinen in 1988. • One of the most widely used chat forums on the Internet today. Chat Rooms

  35. Web chat • Incorporates graphics, audio and video • Hosted by search engines such as Yahoo, Snap, and Excite. • Proprietary chat • Requires that you download and install software from a company. • Examples are Microsoft Chat, AOL, and Prodigy. • Buddy lists • You specify your list of friends and even tell when they are online. • Examples are ICQ and AOL Messenger Chat Options

  36. A group of people with a shared interest. Their email addresses are collected into a group, and this group is identified by a single name. When a message is sent to the group, everyone on the list receives that message. Mailing Lists

  37. Newsgroups • A discussion forum or a type of bulletin board. • Each board is dedicated to discussion on a particular topic. • USENET • Worldwide network of computers that facilitates the transmission of messages among the news servers.

  38. Research on the Internet • Two basic tools used to find information: • Search engines • Used to search for keywords. • Subject directories • Used to find specialized topics.

  39. Keyword Search • Uses keywords to perform search • Multimedia Search Engines • Used to find graphics, video clips, animation, and MP3 music files. • Meta Search Engines • Search several major search engines at one time. • Subject Directories • Organized by subject categories and displayed in a series of menus. Types of Search Engines

  40. Phrase Searching Search Engine Math Boolean Operators Wildcard Searching Title Searching Tools and Techniques

  41. A phrase is entered using double quotation marks and only matches those that appear adjacent to each other and in the order in which you specify. • Example: “baseball cards” Phrase Searching

  42. Symbols used in formulas to filter out unwanted listings. • Use the plus symbol (+) before words that must appear. • Also known as an inclusion operator. • Use the minus symbol (-) before words that you do not want to appear. • Also known as an exclusion operator. Search Engine Math

  43. Boolean logic consists of three logical operators: • AND • NOT • OR Boolean Operators

  44. The * symbol, called an asterisk, is considered a wildcard character. • Used if you don’t know the spelling of a word • Example: N*Ryan to search for Nolan Ryan • Used to search plurals or variations of words. Wildcard Searching

  45. Searching the title of a web page. When a web page author creates a Web page, the Web page generally contains a HTML title. Title Searching http://www.commoncraft.com/video/web-search-strategies

More Related