Issues with computers


Published on

Published in: Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Issues with computers

  1. 1. ISSUES WITH COMPUTERS… <ul><li>TOPICS </li></ul><ul><li>  </li></ul><ul><ul><li>Computer Fraud </li></ul></ul><ul><ul><li>Copyright </li></ul></ul><ul><ul><li>Individual Privacy </li></ul></ul><ul><ul><li>Computer Viruses and Hackers </li></ul></ul><ul><ul><li>Dangers in New Technology </li></ul></ul>
  2. 2. COMPUTER FRAUD How to prevent it
  3. 3. Hoax mail intended to scare people   Emails requesting money   Pyramid schemes   Email attempting to gather information Illegally using someone else's computer or &quot;posing&quot; as someone else on the Internet.   Using spyware to gather information about people.     COMPUTER FRAUD Computer fraud covers a variety of activity that is harmful to people. Computer fraud is using the computer in some way to commit dishonesty by obtaining an advantage or causing loss of something of value
  4. 4. COMPUTER FRAUD (How to prevent it) <ul><li>Do not give personal information to anyone or to any company you’ve never heard of before. This includes your full name, your address, your phone number, credit card number, social security numbers, or information about the people in your household. </li></ul><ul><li>  </li></ul><ul><li>Do not pay attention to get rich quick schemes. If they seem too good to be true, they absolutely are. </li></ul><ul><li>  </li></ul><ul><li>Do not open emails from strangers. Install anti-viral software. </li></ul><ul><li>  </li></ul><ul><li>Do not open emails from strangers. Install anti-viral software and spam  </li></ul><ul><li>blocking programs on your computer and your email program </li></ul><ul><li>  and spam. </li></ul>
  5. 5. <ul><li>Don´t download attachments from people you don´t know. </li></ul><ul><li>  </li></ul><ul><li>Teach your children about safe communication on the Internet to protect them from Internet predators. </li></ul><ul><li>Don't keep passwords on your computer, and do not use common passwords or guessable words. Never give your password to someone else. </li></ul><ul><li>  </li></ul><ul><li>If you bank online, make sure you stay at your computer for the entire transaction, and then be sure you sign off completely when you are done. </li></ul><ul><li>  </li></ul><ul><li>Ask to have your account and credit card statements sent to you online directly from your bank or credit card company. </li></ul>COMPUTER FRAUD (How to prevent it)
  6. 6. Copyright 1. What is the law? 2. Rights for educators 3. Permission
  7. 7. What is the Copyright Law? <ul><li>An Overview of Copyright Law </li></ul><ul><li>  </li></ul><ul><li>Copywright laws protect all types of work including  Literary works, musical works, dramatic works, pantomimes and choregraphic works,  pictorial, graphic, and sculptural works, motion pictures, personal correspondence, sound recordings and architectural works </li></ul><ul><li>What is protected? </li></ul><ul><li>  </li></ul><ul><li>Ideas, procedures, processes, systems, methods of operation, concepts, principles, discoveries, and facts cannot be copyrighted, but the expression of a work is copyrightable. Works created by officers and employees of the United States government as part of their jobs cannot be copyrighted. </li></ul>
  8. 8. Rights for Educators (copyright) <ul><li>Educators can make single copies of some copyrighted materials for scholarly research, preparation for teaching, or teaching a class. These materials include:  </li></ul><ul><li>  </li></ul><ul><ul><li>A chapter from a book </li></ul></ul><ul><ul><li>A magazine article </li></ul></ul><ul><ul><li>A newspaper article </li></ul></ul><ul><ul><li>A short story, essay, or poem </li></ul></ul><ul><ul><li>A chart, graph, diagram, drawing, cartoon, or picture  </li></ul></ul><ul><li>  </li></ul><ul><li>Educators can also make multiple copies of the above materials as long as they meet the following requirements:  </li></ul><ul><ul><li>The amount copied is not more than roughly 10 percent of the total work.  </li></ul></ul><ul><ul><li>The teacher does not have time to ask for formal permission to use the material.  </li></ul></ul><ul><ul><li>The teacher does not make more than nine multiple copies for one course during a term.  </li></ul></ul><ul><ul><li>The copies cannot be in replacement of materials regularly used. Consumable materials cannot be copied. </li></ul></ul>
  9. 9. To get permission (copyright) <ul><li>Getting Permission </li></ul><ul><ul><li>first look to see if there is a permission statement on the web site.  </li></ul></ul><ul><ul><li>a few software companies have graphic image libraries that contain images that can be downloaded but ask that you list their company and web site as a source for these images. </li></ul></ul><ul><li>  </li></ul><ul><li>If no permission statement is given, look for an e-mail address for the author or content owner. Send an e-mail to this address containing: </li></ul><ul><ul><li>Your name </li></ul></ul><ul><ul><li>Your company, organization, or school and your title </li></ul></ul><ul><ul><li>A description of what you want to use </li></ul></ul><ul><ul><li>How you want to use it </li></ul></ul><ul><ul><li>Any additional information </li></ul></ul>
  10. 10. Individual Privacy and Cookies Laura Resnizky and Jerry Santa Ana
  11. 11. Individual Privacy and Cookies Definition   It is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity the wish to remain unnoticed or unidentified in the public realm. When something is private to a person , it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy is broader than security and includes the concepts of appropriate use and protection of information.
  12. 12. Concerns About Individual Privacy <ul><li>Concern over privacy looks to have increased over the last two years. </li></ul><ul><li>• By using a 1 to 5 scale where 1 meant ‘very concerned’ and 5 ‘not concerned at all’, 59% of all respondents declared a high degree of concern, that is 1+2 on the scale. This is the highest result yet recorded in an intermittent series going back to 2001. </li></ul><ul><li>  </li></ul><ul><li>• Comparisons over time for this question should however be treated with caution, because ‘individual privacy’ was asked about on its own in 2010 but alongside a randomised list of other possible concerns in all previous years. </li></ul><ul><li>  </li></ul><ul><li>• 39% nominated the highest level of concern (point 1 on the scale). </li></ul><ul><li>  </li></ul><ul><li>• Around a quarter (23%) said they were not concerned (4+5 on the scale). </li></ul><ul><li>Like in 2008, the level of concern was fairly even across most demographics. </li></ul><ul><li>  </li></ul><ul><li>• However, blue collar workers were more concerned than white collar workers (71% and 56% respectively), and those who use social network sites were slightly more concerned (62%) than those who don’t use them (57%). </li></ul><ul><li>  </li></ul>
  13. 13. COOKIES   A cookie has many different names including HTTP cookie, web cookie, or browsers cookie.  Cookies are like markers which allow a site, computer, preference, or many other things to be identified and authenticated quickly by a computer.
  14. 14. Computer Virus-Hackers <ul><ul><li>Computer Viruses </li></ul></ul><ul><ul><li>Computer Hackers </li></ul></ul><ul><ul><li>How to avoid them </li></ul></ul>
  15. 15. Computer Viruses <ul><ul><li>A computer virus is created when a programmer puts or infects a disk or computer program with computer code that has the capability to replicate itself, hide, watch for a certain event to occur, and/or deliver a destructive or prankish payload </li></ul></ul><ul><li>  </li></ul><ul><li>There are various types of computer viruses: </li></ul><ul><ul><li>Polymorphic Viruses Stealth Viruses, Fast and Slow Infectors, Sparse Infectors, Armored Viruses, Multipartite Viruses Cavity (Spacefiller), Viruses Tunneling Viruses, Camouflage Viruses, Virus Droppers </li></ul></ul><ul><li>  </li></ul><ul><ul><li>The most important way to avoid getting a computer virus is to buy antivirus software for your computer and to make sure it is up to date, current, and activated.  Be sure to avoid suspicious e-mails and notify friends if you get infected with an e-mail generated virus. </li></ul></ul><ul><ul><li>Typical symptoms of computer viruses are a breakdown of computer software functions,Files begin to disappear or are corrupt, and computer shutdown or unwillingness  to turn on. </li></ul></ul>
  16. 16. Computer Hackers <ul><ul><li>A computer hacker is a person who is able to access computer files and data, especially remotely. </li></ul></ul><ul><ul><li>They are generally interested in stealing personal information from corporations, businesses, or individuals. </li></ul></ul><ul><ul><li>There is also a type of computer hacker that enjoys messing with non-tech savvy people for their own amusement. </li></ul></ul>
  17. 17. Prevent Computer Hackers/Viruses from affecting you <ul><ul><li>Make sure to have firewall protection and use reliable internet sources </li></ul></ul><ul><ul><li>Don´t make your information available to the public </li></ul></ul><ul><ul><li>Don't share passwords or keep them saved in your e-mail accounts or computer files </li></ul></ul><ul><ul><li>Don't download unknown files or from sites that may be untrustworthy </li></ul></ul><ul><li>  </li></ul>
  18. 18. Dangers in new Technology   1. Health 2. Violence in Society 3. Uncontrolable students in the classroom.
  19. 19. 1. Health Dangers <ul><ul><li>Wireless Effects... </li></ul></ul><ul><ul><ul><li>Neurological </li></ul></ul></ul><ul><ul><ul><li>Physiological </li></ul></ul></ul><ul><ul><ul><li>Behavioral      </li></ul></ul></ul><ul><ul><ul><li>Cancer </li></ul></ul></ul><ul><ul><ul><li>  </li></ul></ul></ul><ul><ul><li>Car accidents </li></ul></ul><ul><ul><li>Tripping while texting </li></ul></ul><ul><li>  </li></ul>
  20. 20. 2.Violence in Society <ul><li>  </li></ul><ul><ul><li>Video Games </li></ul></ul><ul><ul><li>Movies </li></ul></ul><ul><ul><li>uTube </li></ul></ul><ul><ul><li>  Adult websites </li></ul></ul><ul><li>  </li></ul>
  21. 21. 3. Uncontrolable Students in the Classroom <ul><li>  </li></ul><ul><ul><li>Can not sit still </li></ul></ul><ul><ul><li>Talk constantly </li></ul></ul><ul><ul><li>No attention span </li></ul></ul><ul><ul><li>No manners </li></ul></ul><ul><ul><li>Need for instant gratification </li></ul></ul>
  22. 22. Works Cited <ul><li>Computer Fraud </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li>United States Department of Justice </li></ul><ul><li>Computer Crime & Intellectual Property Section  </li></ul><ul><li>Report Computer Crime </li></ul><ul><li> </li></ul><ul><li>  </li></ul><ul><li>Copywright </li></ul><ul><li>  </li></ul><ul><li> </li></ul><ul><li> </li></ul>
  23. 23. Works Cited cont. <ul><li>3rd topic </li></ul><ul><li>  </li></ul><ul><li>  </li></ul><ul><li>  </li></ul><ul><li>  </li></ul><ul><li>  </li></ul><ul><li>  </li></ul><ul><li>  4th topic </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li>  </li></ul>
  24. 24. Works cited cont. <ul><li>5th topic </li></ul><ul><li> </li></ul>