technology evolution. table of content objectives goals pretest (self-knowledge) what is...

22
TECH SAVVY ACADEMY Technology Evolution

Upload: godfrey-kory-summers

Post on 25-Dec-2015

215 views

Category:

Documents


1 download

TRANSCRIPT

TECH SAVVY ACADEMY

Technology Evolution

Table of Content

Objectives Goals Pretest (Self-Knowledge) What is Technology? What makes up the components of a

computer? What are peripherals? Internet Uses Internet Safety How has technology evolved present, past &

future?

Table of Content

Types of Viruses, Spyware, Worms Different types of software

applications . Types of medias

Objectives

Have students embrace the value of learning the importance of technology

Proficiency in operating computers How technology has changed the

ways of learning Develop new ways of integrating it

into business and education

Goals

Improve and build upon self-knowledge and awareness

Improve student academic achievement through the use of technology

Ensure that all students become technologically literate after the end of the course

Promote the effective integration of technology into on-going professional development

Pre-Test

Surveys Puzzles True and false assessments Games

What is Technology?

"...the know-how and creative processes that may assist people to utilise tools, resources and systems to solve problems and to enhance control over the natural and made environment in an endeavour to improve the human condition." (UNESCO, 1985).

What is Technology?

"...the know-how and creative processes that may assist people to utilise tools, resources and systems to solve problems and to enhance control over the natural and made environment in an endeavour to improve the human condition." (UNESCO, 1985).

What Makes up the Components of a Computer?

System unit-The system unit is the core of a computer system. Storage unit-Your computer has one or more disk drives—devices

that store information on a metal or plastic disk Mouse-A mouse is a small device used to point to and select

items on your computer screen. Keyboard-A keyboard is used mainly for typing text into your

computer. Like the keyboard on a typewriter, it has keys for letters and numbers, but it also has special keys:

Monitor-A monitor displays information in visual form, using text and graphics

Printer-A monitor displays information in visual form, using text and graphics

Speakers-Speakers are used to play sound. They may be built into the system unit or connected with cables

Modem-A modem is a device that sends and receives computer information over a telephone line or high-speed cable.

What are Peripherals?

Electronic equipment connected by cable to the CPU of a computer : "disk drives and printers are important peripherals“

Examples:keyboard mouse joystick pen tablet MIDI keyboard scanner digital camera video camera

Some Internet Uses

Electronic Mail. With an Internet email account, users can communicate with anyone else on-line, any place in the world, with no long distance fees.

World Wide Web. The World Wide Web is not a physical place, not a set of files, nor even a network of computers.

On-Line Chat Rooms (Synchronous , Conversations/reaction)

Some Internet Uses Continued…

Multi-User Dummies (M.U.D.s). Text-based VR ; Role playing games ; Same time

Streamed Broadcast (receiving, sending audio and video)

Internet telephone and video telephone.

Internet Abuse

Plagiarism-"to steal or pass off (the ideas or words of another) as one's own: use (a created production) without crediting the source: to commit literary theft; present as new and original an idea or product derived from an existing source." [7]

Copyright Infringement -exists under the provisions of Article I, Section 8 of the U.S. Constitution, which authorizes Congress “to promote the progress of science and the useful arts.”

Fair Use and the Internet-is an affirmative defense, requiring the defendants to carry the burden of proof. [18]

How has Technology Changed Our Lives?

Our work is easier and more productive More leisure time than ever before Deliver a world of communication Chat Rooms Video-conferencing Cell-phones E-Commerce

How has Technology Changed Our Lives?

Virtual Classrooms Online dating

Types Internet Cyber Attacks

A virus is a piece of computer code that attaches itself to a computer program.

Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program.

Trojan Horse is a program that appears to be useful software, but instead it compromises your security and causes a lot of damage.

Types Internet Cyber Attacks

A virus is a piece of computer code that attaches itself to a computer program.

Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program.

Trojan Horse is a program that appears to be useful software, but instead it compromises your security and causes a lot of damage.

Types Internet Cyber Attacks Continued….

Rootkit is a program or a collection of programs that is similar to a Trojan Horse. A Rootkit takes Administrator level control of a system without authorization of the system's owners and managers.

Spyware is a general term used for software that performs certain activities such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent.

Different Types of Software Applications

Word Processing software

Desktop Publishing software

Spreadsheet software

Database software Presentation

software

Internet Browsers

Email programs Graphics

Programs (vector-based)

Communications software

Different Types of Software Applications

Word Processing software

Desktop Publishing software

Spreadsheet software

Database software Presentation

software

Internet Browsers

Email programs Graphics

Programs (vector-based)

Communications software

References

The internet. (2000, March 07). Retrieved from http://faculty.washington.edu/baldasty/march7.htm

Davidson, D., & Saubert , W. (2004, March 01). Classroom concerns: legal and ethical implications of internet misuse. Retrieved from http://www.westga.edu/~bquest/2004/misuse.htm

Windows: enduser security what you don’t know can’t hurt you. (2009). Manuscript submitted for publication, University Information Technology Services, Indiana University, Indiana, Indiana. Retrieved from http://ittraining.iu.edu/workshops/win_security/virus.html

References Continued….

Lee-Berners, T. (1996, August 01). The world wide web: past, present and future. Retrieved from http://www.w3.org/People/Berners-Lee/1996/ppf.html