techno – g’s ronquelda quillen, michael keith, nikki tabor, autumn long
TRANSCRIPT
JEOPARDYTechno – G’s Ronquelda Quillen,
Michael Keith, Nikki Tabor, Autumn Long
CYBER CRIME
Cyber crime takes place everywhere in the world.
CYBER CRIME A lot of people who commit cybercrimes
are not bought to justice.
CYBER CRIME There are different security programs
you could you too protect your self from being attacked.
CYBER CRIME FOR 100
Where does cybercrime take place?
a) Asia
b) Africa
c) Australia
d) All 7 continents
CYBERCRIME FOR 200
Which of these answers is not a way to protect your self from cyber crime
A) Post your passwords all over the web.B) Keep passwords secret.C) Install security programs on your computerD) Don’t enter online giveaways
CYBERCRIME FOR 300
Who’s being affected by cyber crime
A) middle class
B) high class people
C)poor people
D) everyone
CYBER CRIME FOR 400
People, feel which type of way after being attacked?
A) confident on the web
B) afraid to engage in internet exchanges
C) want to go authorities
D) feel as though they should seek revenge
CYBER CRIME FOR 500
People who are affected, usually find out when ?
A) at any point in there lives
B the next day
C) as soon as it happens
D) 5 years later
BIBLIOGRAPHY www.suite101.com
INPUT/OUTPUT/STORAGE/COMMUNICATION DEVICE
A input device is any peripheral used to provide data and control signals to an information processing system (such as computers)
There are several ways to get new information or input into a computer.
The two most common ways are the keyboard and the mouse.
Other types of input devices are scanners, digital cameras, and touch pads.
INPUT/OUTPUT/STORAGE/COMMUNICATION DEVICE Output devices display information in a
way that you can understand. Input and Output devices make up the
hardware equipment used to communicate the results of data processing carried out by an information processing system to the outside world.
The most common output device is a monitor.
Other input devices are speakers, and printers.
INPUT/OUTPUT/STORAGE/COMMUNICATION DEVICE . Storage device is a device for
recording or storing information The term usually refers to mass storage
devices, such as a disk and tape drives.
INPUT/OUTPUT/STORAGE/COMMUNICATION DEVICE A communication device is the
transmission of data from one computer to another, or from one device to another.
INPUT/OUTPUT/STORAGE/
COMMUNICATION DEVICE FOR 100
A scanner is what type of device?
A. Input DeviceB. Output DeviceC. Communication DeviceD. Storage Device
INPUT/OUTPUT/STORAGE/
COMMUNICATION DEVICE FOR 200
Which of these is an output device?
A. Flash driveB. CamerasC. SpeakersD. Scanners
INPUT/OUTPUT/STORAGE/
COMMUNICATION DEVICE FOR 300
A storage device is
A. a device for recording or storing information B. a device to interact with outside worldC. To get information that input to a computerD. Transmit data from one computer to another
INPUT/OUTPUT/
STORAGE/COMMUNICATIO
N DEVICE FOR 400
A communication device is…?
A. The
transmission of data from one computer to another, or from one device to another.
B. Stores information
C. Inputs information into the computer
INPUT/OUTPUT/STORAGE/
COMMUNICATION DEVICE FOR 500What is the difference between
input and output devices?
A . Input device is any peripheral used to provide data and control signals to an information processing system.
B. A output device is to store information.
C. They both store information
D. They transmit information from one computer to another
BIBLIOGRAPHY http://parenting.kaboose.com/education-
and-learning/learning-resources/comp_les1.html
http://www.ask.com/questions-about/Difference-between-Input-and-Output-Devices
http://www.enablemart.com/Communication
http://www.webopedia.com/TERM/I/input_device.html
SPYWARE
Spyware is a program that gets into your computer without your permission and makes unwanted changes to your experience.
It isn't designed to harm your computer. Spyware is designed to track your internet habits, nag you with unwanted sales offers or generate traffic for their host site.
SPYWARE
Spyware’s mission is o serve your targeted advertisements or make your browser display certain sites or search results.
Spyware can be a Drive-By Download and automatically try to download itself to your computer.
It can be piggybacked on software , usually with peer to peer file sharing.
It can also be browser add on such as toolbars and doesn’t do its job.
SPYWARE
Spyware can masquerade itself as a prize notification pop-up window.
There are certain ways to protect yourself from Spyware. You can use a spyware scanner daily , use a pop up blocker , disable Active X, and be suspicious of installing new software.
SPYWARE FOR 100
What Does Spyware Masquerade itself as?
A. A evil devilB. A unusual new tabC. A prize notification pop-upD. It doesn’t masquerade itself
SPYWARE FOR 200
A.Harm Your Computer
B.Protect Your Computer
C.Track Your Habits and Nag you with Pop-Ups
D.Nothing
What is Spyware designed to do ?
SPYWARE FOR 300
What is one way Spyware can get in Your Computer?
A. It comes when You Buy your computer.
B. It Downloads with your permission
C. It can Piggyback with another software , usually peer to peer sharing
D. You have to Buy Spyware from a store
SPYWARE FOR 400
What is Spyware’s main mission?
A. To Attack YouB. To serve You target
ed advertisementsC. To Damage Your Co
mputerD. To just relax with yo
ur files
SPYWARE FOR 500
How can You protect your computer from Spyware?
A. Get a Virus Protection SoftwareB. Use a Pop-Up BlockerC. Don’t Use a Spyware ScannerD. All of The Above
BIBLIOGRAPHY http://computer.howstuffworks.com/
spyware.htm
INSIDE THE COMPUTER The computer contains many components that makes it
work functionally. Without certain parts, the computer will not function properly. Such components as the motherboard, the cpu, the power supply, along with the hard drive. The components of the computer ranges from all kinds of components including the computer case, RAM (Random Access Memory) and the list goes on and on.
INSIDE THE COMPUTER A hard drive, also known as a hard disk drive or HDD, is a
fundamental part of modern computers. The hard drive is where all of your programs and files are stored, so if the drive is damaged for some reason, you will lose everything on your computer.
A hard drive uses similar memory storage technology to cassette tapes and video tapes. Hard drives contain round, mirror-like platters that are covered with that same magnetic recording medium.
INSIDE THE COMPUTER The motherboard uses tiny electrical paths to connect
each component of the computer together. In Simpler terms the motherboard controls everything the computer does. The computer can not function without this component.
The Power Supply plays a big role in the making of the computer. It is a device that supplies electrical energy to one or more electric loads.
CPU (Central Processing Unit) is an older term for processor and Microprocessor, the central unit in a computer containing the logic circuitry that performs the instructions of a computer's programs.
Cybercrime
Input Output Storage Communication Devices
Spyware
Inside The Computer
100
100
100
10020
0200
200
20030
0300
300
30040
0400
400
40050
0500
500
500
INSIDE THE COMPUTER FOR 100
What Is The Function Of The Motherboard?
• Babysits the computer• The main board of the computer• Controls everything the computer does• She’s a mother
INSIDE THE COMPUTER FOR 200
What Is The Role Of The Power Supply?
• Supplies The Computer
• It Controls the electricity inside the computer
• Makes Electricity
• Supplies Electrical Energy
INSIDE THE COMPUTER FOR
300
A.) Round, mirror-like platters that are covered with that same magnetic material.
B.) Mirror Like Tape
C.) Disk With Tape On It
D.) Square, So You Can Insert It Into The Computer.
What Does The Hard-Drive Looks Like?
INSIDE THE COMPUTER FOR
400
What Is The Function Of The CPU?
• Processes Everything• C
ontains the necessary components to perform• Allows The Computer To Follow Instructions
INSIDE THE COMPUTER FOR
500
A.) similar memory storage technology
B.) Video and Cassette Tapes•C.) Mirror Like Platters
•D.) The Computer’s Own Information To Process
What Does The Hard Drive Use?
BIBLIOGRAPHY http://www.wisegeek.com/what-is-a-hard
-drive.htm http://searchcio-midmarket.techtarget.c
om/sDefinition/0,,sid183_gci213867,00.html
CORRECT !!!
INCORRECT !!!!• Cyber Crime• Input Output Devices• Spyware• Inside The Computer