2.00 Powerpoint Presentation.pptx

calendargrumpyΒιοτεχνολογία

14 Δεκ 2012 (πριν από 4 χρόνια και 6 μήνες)

244 εμφανίσεις

ANALYZING
TECHNOLOGY ISSUES

Computer Basics

THE IMPACT OF
TECHNOLOGY ON
EDUCATION


Education


Internet


Distance Learning


Computer
-
Based Learning


Simulations

THE IMPACT OF
TECHNOLOGY ON
SCIENCE


Science


Artificial Intelligence


Genetic Engineering


Virtual Reality

THE IMPACT OF
TECHNOLOGY ON WORK


Multinational Economy


Electronic Commerce

THE IMPACT OF
TECHNOLOGY ON OUR
LIVES


Clothes that fight odor and
bacteria


The flying car


Voice recognition



Space travel


Smart shoes and smart seats


Smart houses


Electronic shopping

EXPLORING TECHNOLOGY CAREERS


Business and Office


Administrative Assistant


Desktop Publisher/Graphic Designer


Network Support and Administration


PC Support Specialist


Manager of Information Systems


Web
-
Based


Web Developer


Web Master

COMPUTER CRIMES


A criminal act committed through the use of a
computer.


It
can also involve the theft of a computer and any
equipment associated with the computer.

TYPES OF COMPUTER CRIMES


Computer fraud


Conduct that involves the manipulation of a computer or
computer data in order to obtain money, property, or value
dishonestly or to cause loss.



Computer hacking


Involves invading someone else’s

computer
, usually for personal
gain


or just the satisfaction of invasion.

OTHER COMPUTER CRIMES


Theft of computer time


An employee uses a company’s computer for personal
use such as running a small business, keeping records
of an outside organization, or keeping personal
records.


Data diddling


Changing data before it is entered into the computer or
after is has been entered into the computer
.


Software Piracy


Illegal copying and using of software purchased by
someone else

COMPUTER ETHICS


Using computers for good purposes


Public domain


legally copy files and give to anyone


Freeware



given to a user free of charge on a trial basis

COMPUTER VIRUSES


A virus is a program that has been written to
cause
corruption
of data on a computer
.


TYPES OF COMPUTER VIRUSES


Worm


a virus that replicates itself over and over in the computer's memory until the
computer can barely function causing your computer to work more slowly.


Works slowly through files


Time
bomb


Virus that does not cause its damage until a certain date or until the system
has been booted a certain number of times.


Logic
bomb


A virus that becomes active when a particular activity happens.


Ex. appearance
or disappearance of specified data.


Trojan
horse


A virus that hides itself inside another legitimate program causing it to do
something different than what it is expected to do.


When the program is used, the virus is released and can begin its work of
replication and annoyance or damage.

http://
www.commoncraft.com/video/computer
-
viruses
-
and
-
threats


PRIVACY AND SECURITY ISSUES


Any time you submit information on the Internet,
it is possible for the information to be gathered by
many persons and used for various situations
including being sold. Information can be gathered
from online sources such as schools, banks,
hospitals, insurance companies, and many other
sources.

SECURITY MEASURES

Maintain and Enforce Security Measures such as:


Passwords


Electronic identification cards


Firewalls


Antivirus software


Selective hiring
process


http://
www.commoncraft.com/video/secure
-
passwords


ADVANTAGES AND USES OF
TELECOMMUNICATIONS


Telecommunication involves electronically
transferring data.


Distance learning


Allows the user to take classes without being physically
present.


Teleconferencing


Provides conferencing capabilities from several locations
without leaving the office, reduces costs for time and travel.

WHAT IS A BROWSER?


The software program that you use to
retrieve documents from the World
Wide Web (WWW) and to display
them in a readable format.


Examples:


Internet Explorer


Safari

TITLE BAR


The bar on
top of the
window that
contains the
name of the
document.

MENU BAR


A horizontal
menu that
appears on
top of a
window.


Provides a
selection of
options
related to
the Web
page.

TOOL BAR


Icons for
single
-
click
access to
most
commonly
used menu
commands.

ADDRESS BAR


Contains the
URL, or address,
of the active
Web page; also
where you type
the location for
the Web page
you want to visit.

GO BUTTON


Connects
you to
address
displayed in
the Address
bar.
Document
Window
displays the
active Web
Page

STATUS BAR


Located at
the bottom
of the
browser;
shows the
progress of
Web page
transactions.

ACCESS INDICATOR


A small picture
in the upper
right corner of
the browser;
when
animated, it
means your
browser is
accessing data
from a remote
computer.

SCROLL BARS


Vertical and
horizontal
scroll bars; lets
you scroll
vertically and
horizontally if
the Web page
is too long or
too wide to fit
within one
screen.

WHAT IS EMAIL?


Email, or electronic mail, is similar to regular mail.
You have a message, an address, and a carrier that
figures out how to get it from one location to
another.


Email is used to stay in touch with family and
friends, conduct business, and send attachments
such as text and image files.

ADVANTAGES AND USES OF EMAIL


Faster way to communicate and respond


Quick and easy way to send messages


Forward messages to other individuals


Send messages to multiple individuals


Include attachments such as pictures, audio files,
and documents





EMAIL TERMINOLOGY


Inbox


Outbox


Sent Items


Deleted Items


Drafts


New Message


Send


Address Book

ELECTRONIC MAIL ADDRESSES

The address consists of three parts:


The user name of the individual


The @ symbol


The user’s domain name



Example: rsmith@yahoo.com

WHAT IS A SEARCH ENGINE?


A tool that lets you find Web pages that match a
particular word or phrase.


Examples of search engines
:

SEARCH ENGINE TERMINOLOGY


Search expression


Index


Spiders or bots


Meta tags


Directory


Keyword search


Hyperlink

BACKGROUND OF THE INTERNET


Early origin in 1960s


Closely tied to a networking project started by a
governmental division called the Advanced
Research Projects Agency.


Original name: ARPANET


Created so that scientists were able to share
information on military and scientific research.

FEATURES OF THE INTERNET


The World Wide Web


Began in March 1989 when Tim Berners
-
Lee wrote a
small computer program for his personal use
.


URL (Universal Resource Locator)


Name for a web site address.


WEB PROTOCOLS


HTML


Hypertext Markup Language


A series of tags that are integrated into text documents and
describes how the text should be formatted when a Web
browser displays it on the screen.


HTTP


Hypertext Transfer Protocol


Standard that defines how messages are formatted and
transmitted.

CHAT ROOMS


Using the computer to create real
-
time
communication between yourself and another user
or a group of users.


Internet Relay Chat (IRC)


A text
-
based chat developed by
Jarkko

Oikarinen

in 1988.


One of the most widely used chat forums on the Internet
today.

CHAT OPTIONS


Web chat


Incorporates graphics, audio and video


Hosted by search engines such as Yahoo, Snap, and
Excite.


Proprietary chat


Requires that you download and install software from a
company.


Examples are Microsoft Chat, AOL, and Prodigy.


Buddy lists


You specify your list of friends and even tell when they
are online.


Examples are ICQ and AOL Messenger

MAILING LISTS


A group of people with a shared interest.


Their email addresses are collected into a group,
and this group is identified by a single name.


When a message is sent to the group, everyone on
the list receives that message.

NEWSGROUPS


A discussion forum or a type of bulletin
board.


Each board is dedicated to discussion on a
particular topic.


USENET


Worldwide network of computers that
facilitates the transmission of messages
among the news servers.

RESEARCH ON THE INTERNET


Two basic tools used to find information:


Search engines


Used to search for keywords.


Subject directories


Used to find specialized topics.

TYPES OF SEARCH ENGINES


Keyword Search


Uses keywords to perform search


Multimedia Search Engines


Used to find graphics, video clips, animation, and MP3 music
files.


Meta Search Engines


Search several major search engines at one time.


Subject Directories


Organized by subject categories and displayed in a series of
menus.

TOOLS AND TECHNIQUES


Phrase Searching


Search Engine Math


Boolean Operators


Wildcard Searching


Title Searching

PHRASE SEARCHING


A phrase is entered using double quotation
marks and only matches those that appear
adjacent to each other and in the order in
which you specify.


Example: “baseball cards”

SEARCH ENGINE MATH


Symbols used in formulas to filter out unwanted
listings.


Use the plus symbol (+) before words that must
appear.


Also known as an inclusion operator.


Use the minus symbol (
-
) before words that you do not
want to appear.


Also known as an exclusion operator.

BOOLEAN OPERATORS


Boolean logic consists of three logical
operators:


AND


NOT


OR

WILDCARD SEARCHING


The * symbol, called an asterisk, is considered a
wildcard character.


Used if you don’t know the spelling of a word


Example: N*Ryan to search for Nolan Ryan


Used to search plurals or variations of words.

TITLE SEARCHING


Searching the
title of a web
page.


When a web
page author
creates a Web
page, the Web
page generally
contains a
HTML title.

http://www.commoncraft.com/video/web
-
search
-
strategies