technology evolution. table of content objectives goals pretest (self-knowledge) what is...
TRANSCRIPT
Table of Content
Objectives Goals Pretest (Self-Knowledge) What is Technology? What makes up the components of a
computer? What are peripherals? Internet Uses Internet Safety How has technology evolved present, past &
future?
Table of Content
Types of Viruses, Spyware, Worms Different types of software
applications . Types of medias
Objectives
Have students embrace the value of learning the importance of technology
Proficiency in operating computers How technology has changed the
ways of learning Develop new ways of integrating it
into business and education
Goals
Improve and build upon self-knowledge and awareness
Improve student academic achievement through the use of technology
Ensure that all students become technologically literate after the end of the course
Promote the effective integration of technology into on-going professional development
What is Technology?
"...the know-how and creative processes that may assist people to utilise tools, resources and systems to solve problems and to enhance control over the natural and made environment in an endeavour to improve the human condition." (UNESCO, 1985).
What is Technology?
"...the know-how and creative processes that may assist people to utilise tools, resources and systems to solve problems and to enhance control over the natural and made environment in an endeavour to improve the human condition." (UNESCO, 1985).
What Makes up the Components of a Computer?
System unit-The system unit is the core of a computer system. Storage unit-Your computer has one or more disk drives—devices
that store information on a metal or plastic disk Mouse-A mouse is a small device used to point to and select
items on your computer screen. Keyboard-A keyboard is used mainly for typing text into your
computer. Like the keyboard on a typewriter, it has keys for letters and numbers, but it also has special keys:
Monitor-A monitor displays information in visual form, using text and graphics
Printer-A monitor displays information in visual form, using text and graphics
Speakers-Speakers are used to play sound. They may be built into the system unit or connected with cables
Modem-A modem is a device that sends and receives computer information over a telephone line or high-speed cable.
What are Peripherals?
Electronic equipment connected by cable to the CPU of a computer : "disk drives and printers are important peripherals“
Examples:keyboard mouse joystick pen tablet MIDI keyboard scanner digital camera video camera
Some Internet Uses
Electronic Mail. With an Internet email account, users can communicate with anyone else on-line, any place in the world, with no long distance fees.
World Wide Web. The World Wide Web is not a physical place, not a set of files, nor even a network of computers.
On-Line Chat Rooms (Synchronous , Conversations/reaction)
Some Internet Uses Continued…
Multi-User Dummies (M.U.D.s). Text-based VR ; Role playing games ; Same time
Streamed Broadcast (receiving, sending audio and video)
Internet telephone and video telephone.
Internet Abuse
Plagiarism-"to steal or pass off (the ideas or words of another) as one's own: use (a created production) without crediting the source: to commit literary theft; present as new and original an idea or product derived from an existing source." [7]
Copyright Infringement -exists under the provisions of Article I, Section 8 of the U.S. Constitution, which authorizes Congress “to promote the progress of science and the useful arts.”
Fair Use and the Internet-is an affirmative defense, requiring the defendants to carry the burden of proof. [18]
How has Technology Changed Our Lives?
Our work is easier and more productive More leisure time than ever before Deliver a world of communication Chat Rooms Video-conferencing Cell-phones E-Commerce
Types Internet Cyber Attacks
A virus is a piece of computer code that attaches itself to a computer program.
Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program.
Trojan Horse is a program that appears to be useful software, but instead it compromises your security and causes a lot of damage.
Types Internet Cyber Attacks
A virus is a piece of computer code that attaches itself to a computer program.
Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program.
Trojan Horse is a program that appears to be useful software, but instead it compromises your security and causes a lot of damage.
Types Internet Cyber Attacks Continued….
Rootkit is a program or a collection of programs that is similar to a Trojan Horse. A Rootkit takes Administrator level control of a system without authorization of the system's owners and managers.
Spyware is a general term used for software that performs certain activities such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent.
Different Types of Software Applications
Word Processing software
Desktop Publishing software
Spreadsheet software
Database software Presentation
software
Internet Browsers
Email programs Graphics
Programs (vector-based)
Communications software
Different Types of Software Applications
Word Processing software
Desktop Publishing software
Spreadsheet software
Database software Presentation
software
Internet Browsers
Email programs Graphics
Programs (vector-based)
Communications software
References
The internet. (2000, March 07). Retrieved from http://faculty.washington.edu/baldasty/march7.htm
Davidson, D., & Saubert , W. (2004, March 01). Classroom concerns: legal and ethical implications of internet misuse. Retrieved from http://www.westga.edu/~bquest/2004/misuse.htm
Windows: enduser security what you don’t know can’t hurt you. (2009). Manuscript submitted for publication, University Information Technology Services, Indiana University, Indiana, Indiana. Retrieved from http://ittraining.iu.edu/workshops/win_security/virus.html