Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Tech nol-ogy stack


Published on

unit 1 basic computer

Published in: Education
  • Be the first to comment

  • Be the first to like this

Tech nol-ogy stack

  1. 1. tech-nol-ogy <ul><li>Noun </li></ul><ul><li>1. The branch of knowledge that deals with the creation and use of technical means and their interrelation which life, society, and the environment,drawing upon such subjects as industrial arts, engineering, applied science, and pure science. </li></ul>
  2. 2. tech-nol-ogy <ul><li>Noun </li></ul><ul><li>2. The terminology of an art, science, etc,; technical nomenclature. </li></ul><ul><li>Nomenclature= naming something. </li></ul><ul><li>A technological process, invention, method, or the like. </li></ul><ul><li>the sum of the ways in which social groups provide themselves with the material objects of their civilization. </li></ul>
  3. 3. Key Words/Concepts <ul><li>Technology </li></ul><ul><li>The use of science to solve practical problems. </li></ul><ul><li>Microprocessor </li></ul><ul><li>A tiny computer chip that receives and carries out instructions. </li></ul>
  4. 4. Key Words cont. <ul><li>Telecommute </li></ul><ul><li>To work at home or another location outside an office with the help of communication devices such as cell phones, fax machines and the Internet </li></ul><ul><li>Ethics </li></ul><ul><li>The principles and standards we use to decide how to act. </li></ul><ul><li>OR </li></ul><ul><li>Society’s rules for what is right and what is wrong. </li></ul>
  5. 5. Key Concepts <ul><li>Netiquette </li></ul><ul><li>The manners people use in electronic communications </li></ul><ul><li>Virus </li></ul><ul><li>A computer program intention designed to cause annoyance or to damage hardware or software. </li></ul>
  6. 6. How do I use Technology? <ul><li>Technology often works behind the scenes. You might not know that computers: </li></ul><ul><li>Keep track of the books in your school library. </li></ul><ul><li>Predict the weather </li></ul><ul><li>Dispense money from ATMs </li></ul><ul><li>Monitor hospital patients </li></ul><ul><li>Make cars safer to drive. </li></ul><ul><li>The “brain of every computerized device is a small but powerful chip called a microprocessor, or microchip. </li></ul>
  7. 7. Technology and YOU! <ul><li>TAKE A MINUTE AND THINK OF TWO TECHNOLOGICAL INVENTIONS OF THE LAST CENTURY THAT HAVE MADE YOUR LIFE EASIER. </li></ul><ul><li>Write them down. </li></ul>
  8. 8. Assignment answer the following on paper <ul><li>What is the most important technology ever invented? Why </li></ul><ul><li>Has it helped or harmed the environment? Yes or No How? </li></ul><ul><li>Would you be able to give up this technology? Why or Why not? </li></ul><ul><li>We will make a list from our top ten pairs of students and be ready to debate. </li></ul>
  9. 9. Key Concepts <ul><li>Operating System </li></ul><ul><li>Program that manages all other programs, stores files and allows to use other files. </li></ul><ul><li>Authentication </li></ul><ul><li>Is what allows you to login to a network or a local PC </li></ul>
  10. 10. Operating Systems <ul><li>Q. What is an operating system? </li></ul><ul><li>A. Program that manages all other programs, stores files and allows to use other files. </li></ul><ul><li>Q. What are some names of operating systems? </li></ul><ul><li>~Microsoft Windows </li></ul><ul><li>~ Microsoft 2003 </li></ul><ul><li>~Microsoft XP </li></ul><ul><li>~Microsoft Vista </li></ul><ul><li>~Microsoft Windows 7 </li></ul>
  11. 11. WINDOWS <ul><li>HAS IT BEEN HERE FOREVER? </li></ul><ul><li>WHEN DID IT ARRIVE ON THE SCENE? </li></ul>
  12. 12. Authentication <ul><li>Security is of top priority with networks </li></ul><ul><li>AUTHENTICATION is what allows you to login to the network or the local PC </li></ul><ul><li>AUTHENTICATION is made up of two components </li></ul><ul><li>Login name or User name </li></ul><ul><li>Password. </li></ul>
  13. 13. <ul><li>The login or user name is what the computer uses to recognize you </li></ul><ul><li>The password is what gets you in. </li></ul><ul><li>The network administrator (Admin) </li></ul><ul><li>Who is Mr. Cross here at RCHS sets up the rules for the passwords. </li></ul>
  14. 14. Passwords <ul><li>We must have 8 characters minimum, at least one uppercase letter and at least one number. </li></ul><ul><li>YOU must reset your password when it ask you to don’t click to do it later!!!!! </li></ul><ul><li>Your user name is your last name and the first initial of your first name unless you have a sibling in the district and then we tact a 1 or 2 at the end of your first name. </li></ul>
  15. 15. Questions <ul><li>What are companies doing that provide logins to their websites? </li></ul><ul><li>What about unsecured home networks? </li></ul><ul><li>What about careers in the field of network security? </li></ul>
  16. 16. Questions <ul><li>Why do people try to steal passwords? </li></ul><ul><li>How do they attempt to get passwords? </li></ul><ul><li>Do you think colleges and employers get mad when students or employees share their passwords? </li></ul><ul><li>Yes or no? Why? </li></ul><ul><li>So you think some employees write their passwords under their keyboards or use easy-to-guess passwords? </li></ul><ul><li>What do you think are the most common types of passwords? </li></ul>