by: simon regenold, zach thomas, darian murray, jasmine mckethan, and erica puentes

81
Computer Jeopardy By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Upload: bethany-mosley

Post on 31-Dec-2015

232 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Computer Jeopardy

By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica

Puentes

Page 2: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Spyware makes your computer slow by attaching itself to your operating system. Spyware tracks your habits in order to give you a lot of sales offers and make traffic for their website. More than 80% of computers are infected. You can get spyware when you click on a button on a pop up window, install a package, or end a vulnerability. People can get them from peer to peer file sharing programs and drive by downloads. Some spyware masquerades as programs that help take out spyware. Spyware hogs up RAM and runs in your background. You can protect against spyware by using a spyware scanner, a pop up blocker, disable active x, be suspicious about new things that you are installing and use the “x” to close windows.

SPYWARE

Page 3: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Most video game addicts don’t know that they are addicts. Video game addicts usually become detached from the real world. Also they play video games to get away from real life problems. Compulsive video gaming is a modern-day psychological disorder. Some signs of being a video game addict are you play more than five hours a day. You experience significant weight loss or weight gain as a result of playing. Relationships with family or friends take a plunge. You play at work. You avoid phone calls from friends and/or lie to them about how much you play.

Video Game Addiction

Page 4: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Internet Searching•Use Boolean operators to combine your key terms.•Boolean operator words are; And, Not, and Or.•Use quotation marks around names or phrases.•Use search engines such as; Google, Yahoo, and Bing.•Searching unproductively on the internet is called thrashing.•Use a minus sign (-) to reduce search results from your topic.

Page 5: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Searching Steps

1. First choose a topic to search about.2. Decide what key terms to use in your search.3. Choose a search engine to go to.4. If there is too many results from your search;

use either quotation marks, Boolean words, or a minus sign.

Page 6: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Input devices give the CPU information to process.

They allow the user to manipulate the computer.

They include a mouse, keyboard, webcam, and scanner.

Input Devices

Page 7: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Output Devices receive information from the CPU in order to present it to the user.

Output devices include a printer, fax machine, speaker, monitor, and projector.

Output Devices

Page 8: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Communication devices help the computer connect with other computers, often through the Internet.

The include a wireless router, modem, Ethernet cable, Ethernet hub, and wireless antenna.

Communication Devices

Page 9: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Storage devices store the computer’s data. They include Random Access Memory for

short-term memory, and a hard drive for long term memory.

A Solid State Drive, USB flash drive, CD, and DVD can also store long term memory.

Storage Devices

Page 10: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Input, Output, Communication, and Storage Devices come together to allow the CPU to function, and allow the user interact with the CPU.

The Importance of these Devices

Page 11: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Computer viruses are programs that piggyback on existing files in your computer.

They wreak havoc, slow your computer down, and can erase your hard disk.

They can be “caught” by reading malicious emails, or downloading scary internet stuff.

They can display images or words without a keyboard.

What are computer viruses?

Page 12: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Hackers are people who enjoy harassing people and destroying things.

There may be financial motives, such as if you were infecting another companies network.

They have similar motives to arsonists or graffiti artists, they want to spoil and destroy resources for others.

Who makes computer viruses?

Page 13: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

They can be “caught” by reading malicious emails, or downloading scary internet stuff.

They cannot be caught simply by going to a website and looking at information.

Online bulletin boards can be corrupted and will infect a host if entered.

How are computer viruses transmitted?

Page 14: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

ILOVEYOU - (2000) One of the most widespread and rapidly spreading viruses ever, the ILOVEYOU virus spread via e-mail, posing as an executable attachment sent by a friend from the target's contact list. (Bright hub)

Code Red - (2001) IIS on Windows servers were the target of this virus. It also launched denial of service (DOS) attacks. (Bright Hub)

Melissa - (1999) The Melissa virus is notable because it is a Word macro virus. It cleverly spread via e-mails sent to contacts from the infected users' address books.(Bright Hub)

Famous computer viruses

Page 15: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Trojan horse- a virus pretending to be another program, such as a music player, that gets into your system and runs.

Worm-exploits security holes in computers that are difficult to find or prevent

*There are many terms to classify types of viruses. These are main types.

Types of computer viruses

Page 16: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Viruses are inevitable, but can be prevented.

Installing anti-virus software will give you notices and will greatly enhance protection.

DO NOT CLICK ON EMAILS FROM PEOPLE YOU DO NOT KNOW!

Only download from trusted sites- Java, ITunes, Adobe.

Prevention

Page 17: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Spyware Video Game Addiction

Internet Searchin

g

I/O/C/S Device

s

Viruses

100 100 100 100 100

200 200 200 200 200

300 300 300 300 300

400 400 400 400 400

500 500 500 500 500

Game Board

Page 18: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

No Yes Well, obviously its not this option If you pick this one, you are really dumb, lik

e I’m not even playing

Does spyware hog up your computer’s RAM?

Page 19: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Go back to the gameboard

Correct

Page 20: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

WRONG! You are sooo dumb-for real

Try again, homeboy

Page 21: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Yes No I don’t know 2+2=4

Does spyware make your computer slow?

Page 22: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Try again

What an idiot, you got it wrong

Page 23: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Go back to the gameboard

You got it right

Page 24: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Click on Pop-ups Download music from sketchy looking sites Don’t have a spyware scanner Use a Pop-up blocker

What is one way to prevent your computer from getting spyware?

Page 25: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Go back to the gameboard

Congratulations! You got it right!!

Page 26: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Try again

Sorry, you got it wrong.

Page 27: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

The Background iTunes Library The keyboard The mouse

Where does spyware run on your computer

Page 28: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Why don’t you go cry home to yo mama? Try again

WRONG!!!!!!!

Page 29: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Go back to the gameboard

Correct

Page 30: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

More than 98% Less than 98% More than 80% Less than 80%

What is the percent of computers that are infected with spyware?

Page 31: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Or am I sorry? Try again

Sorry it’s wrong

Page 32: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Go back to the gameboard

Correct

Page 33: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Call of Duty Modern Warfare 2 Halo 3 Sims World of Warcraft Pacman

What is the most addicting video game

Page 34: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Good Guess

Congratulations!

Page 35: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Try the question again

HAHA. U Got IT Wrong

Page 36: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

1 hour 5 hours 30 minutes 3 hours None of the above

How long do addicts play video games

Page 37: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Try Again

HAHA. You are Stupid

Page 38: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Yes, but they don’t care that they are No Yes No, but they think they are

Do video game addicts know that they are addicts

Page 39: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Try Again, Sucker!

HAHAHA U Suck

Page 40: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

There's no such thing Relationships with family or friends take a pl

unge. You don’t play that often Eating Pie Getting good grades

Which of these are signs of being a video game addict?

Page 41: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Try Again

You are a Loser

Page 42: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Yes No Maybe so I don’t know Kinda

Is video game addiction a physiological disorder ?

Page 43: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

But if you want to try again click here

this is you

Don’t Try Again. Just Go Home.

Page 44: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Which are Boolean Operators?

a) Andb) Notc) Ord) All of the above

Page 45: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Sorry! Try Again

Try Again

Page 46: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

You can use a ______ to reduce your search results.

a) Minus signb) Quotation marksc) Backspace signd) Neither

Page 47: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Sorry! Try Again

Try Again

Page 48: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Searching unproductively on the internet is known as:

a) Thrashingb) Mashingc) Crashingd) Lashing

Page 49: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Sorry! Try Again

Try Again

Page 50: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

What is step #1 to internet searching?

a) Choose keywords that describes your topic.

b) Choose a search engine (Google, Yahoo etc.)

c) Identify your topic of your search.d) Evaluate your results.

Page 51: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Sorry! Try Again

Try Again

Page 52: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

An introductory or title page of a site is commonly referred

to as a:a) Headlineb) Home platec) Homepaged) Home stead

Page 53: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Sorry! Try Again

Try Again

Page 54: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Go Back To Game Board

YAY! You got it right Great Job

Page 55: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Modem Scanner Copier CD-Rom

Which of the following is an input device?

Page 56: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

That was incorrect.

Back to the Question

Incorrect!

Page 57: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

That was correct!

Back to Gameboard

Correct!

Page 58: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

True False

Output devices let the user give information to the computer.

Page 59: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

You clicked on the wrong answer.

Back to the Question

Oops!

Page 60: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

You selected the correct answer.

Back to Gameboard

Yes!!

Page 61: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Allows the computer access the Internet Could be a fax machine Houses the computer’s information Gives the CPU information from the user

A storage device…

Page 62: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

That is wrong.Back to the Question

Oh no!

Page 63: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

You are right.

Back to Gameboard

Yay!!

Page 64: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Storage Communication Output Input

What type of device is a USB flash drive?

Page 65: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

You chose an incorrect answer.

Back to the Question

Not Great!

Page 66: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

You chose the correct answer!

Back to Gameboard

Great!

Page 67: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Storage Communication Output Input

What type of device is a modem?

Page 68: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

You selected an incorrect answer.

Back to the Question

You Are Wrong!

Page 69: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

You selected the correct answer!

Back to Gameboard

Congratulations!

Page 70: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Create ads on your computer Make pop-ups Destroy files and erase hard disks Create images on your computer screen

What can viruses do?

Page 71: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

TRY AGAIN…..or else.

FAIL

Page 72: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Financial priorities Simple joy of destruction They want to ruin great resources for others All of the above

What are virus creators’ motives?

Page 73: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

TRY AGAIN…..or else.

FAIL

Page 74: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Worm Trojan horse Bug

Which one is not a virus?

Page 75: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

TRY AGAIN…..or else.

FAIL

Page 76: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

2001 1984 2004 2000

What year did the ILOVEYOU virus strike?

Page 77: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

TRY AGAIN…..or else.

FAIL

Page 78: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

Buying a new computer Only visiting certain sites Only visiting reputable websites Opening all emails Clicking on pop-ups

How can you prevent viruses?

Page 79: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

TRY AGAIN…..or else.

FAIL

Page 80: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

(FIST BUMP) Back to game board

WIN

Page 81: By: Simon Regenold, Zach Thomas, Darian Murray, Jasmine McKethan, and Erica Puentes

http://www.brighthub.com/computing/smb-security/articles/38830.aspx

http://www.howstuffworks.com/virus.htm Mrs. Kotsch. Searching the Internet, N/A Baltimore

City College Oct. 26. 2010, [http://www.baltimorecitycollege.us/apps/pages/index.jsp?uREC_ID=86592&type=u&termREC_ID=&pREC_ID=71408]

Coustand, David, How Spyware Works, (n.d) How Stuff Works , October 25,2010, [http://computer.howstuffworks.com/spyware.htm/printable].

http://www.webmd.com/mental-health/features/video-game-addiction-no-fun

http://www.ocregister.com/news/game-208290-wow-addiction.html

http://www.free-emoticons.co.uk/emoticons/Angry/

Sources