9 th  Grade Computer Science Rotation Mr. Fedder/Mr. Crowley
Why Learn About Computers?
“ I’m not a techie”
True/False:  1950’s vs. 2005 <ul><li>Homes are 20 times more expensive. </li></ul><ul><li>Cars are 15 times more expensive...
Factors
Number Scale <ul><li>Time to count to 1 Quadrillion?  </li></ul><ul><ul><li>1 count per second = 86,400 counts per day </l...
Factors - Computers         256 $128,000,000  $ 500,000  Cost 56,120,000,000  280,600,000,000 5,000  IPS 250,000,000  4,00...
IBM Blue Gene - Supercomputer
True/False:  1950 vs. 2005 <ul><li>Homes are 20 times more expensive. </li></ul><ul><li>Cars are 15 times more expensive. ...
Malicious Software <ul><ul><li>Spyware </li></ul></ul><ul><ul><li>Viruses   </li></ul></ul><ul><ul><ul><li>Hardware </li><...
Malicious Software <ul><ul><li>Spyware  – Programs that record your surfing behavior and/or keystrokes and transmit the da...
Malicious Software:  Deal with it! <ul><ul><li>Spyware </li></ul></ul><ul><ul><ul><li>Pay attention to what you click. </l...
<ul><ul><li>Viruses   </li></ul></ul><ul><ul><ul><li>Don’t click on  executables ! </li></ul></ul></ul><ul><ul><ul><li>Don...
Executable File Extensions MDE - Microsoft Access MDE Database  MSC - Microsoft Common Console Document  MSI - Windows Ins...
Phishing Threat
Computer Terms WYSIWYG GUI RAM CD-ROM Bit Folder/File 01001101 = “M” BYTE NIBBLE
Terms <ul><li>Mega </li></ul><ul><li>Giga </li></ul><ul><li>Tera </li></ul><ul><li>Nano </li></ul><ul><li>ENIAC </li></ul>...
1.1 History of Computers Nanocomputer CPU Memory Board
1.1 History of Computers – 1940’s 1941 1949
1.1 History of Computers – 1940’s <ul><li>1800 square feet, 30 tons and consumed 160 kilowatts of electrical power.  </li>...
1.1 History of Computers – 1940’s 1946 - ENIAC
1.1 History of Computers – 1940’s 1945 - Vannevar Bush “ As we May Think ” <ul><li>Bush calls for a new relationship betwe...
Upcoming SlideShare
Loading in …5
×

History Days 1 3

717 views

Published on

fcs computer rotation

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
717
On SlideShare
0
From Embeds
0
Number of Embeds
32
Actions
Shares
0
Downloads
16
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • History Days 1 3

    1. 1. 9 th Grade Computer Science Rotation Mr. Fedder/Mr. Crowley
    2. 2. Why Learn About Computers?
    3. 3. “ I’m not a techie”
    4. 4. True/False: 1950’s vs. 2005 <ul><li>Homes are 20 times more expensive. </li></ul><ul><li>Cars are 15 times more expensive. </li></ul><ul><li>Computers are 100,000 times more powerful. </li></ul><ul><li>The development and innovation of computing technology has resulted in the greatest cultural revolution in the history of mankind. </li></ul><ul><li>You will use computers in some form for the rest of your life. </li></ul>
    5. 5. Factors
    6. 6. Number Scale <ul><li>Time to count to 1 Quadrillion? </li></ul><ul><ul><li>1 count per second = 86,400 counts per day </li></ul></ul><ul><ul><li>1,000,000,000,000,000 ÷ 86,400 = 11,574,074,074 days </li></ul></ul><ul><ul><li>11,574,074,074 ÷ 365 = 31,710,000 years (Cenozoic Era) </li></ul></ul>Kilo Mega Giga Tera Peta 1 Billion Millions 1,000,000,000,000,000 QUADRILLION 1 Million Millions 1,000,000,000,000 TRILLION 1 Thousand Millions 1,000,000,000 BILLION 1 Thousand Thousands 1,000,000 MILLION   1,000 THOUSAND
    7. 7. Factors - Computers         256 $128,000,000 $ 500,000 Cost 56,120,000,000 280,600,000,000 5,000 IPS 250,000,000 4,000,000,000,000 16,000 Storage (bytes) 10,250,000,000 4,000,000,000,000 200 Memory(bytes)       Computer         Factor (SC vs. 1950) 2007 Supercomputer 1950 INDUSTRY         0.0020 $ 1,000 $ 500,000 Cost 1,945,200 9,726,000,000 5,000 IPS 5,000,000 80,000,000,000 16,000 Storage (bytes) 5,000,000 1,000,000,000 200 Memory(bytes)       Computer         Factor (PC vs. 1950) 2005 PC 1950 INDUSTRY
    8. 8. IBM Blue Gene - Supercomputer
    9. 9. True/False: 1950 vs. 2005 <ul><li>Homes are 20 times more expensive. </li></ul><ul><li>Cars are 15 times more expensive. </li></ul><ul><li>Computers are 100,000 times more powerful. </li></ul><ul><li>The development and innovation of computing technology has resulted in the greatest cultural revolution in the history of mankind. </li></ul><ul><li>You will use computers in some form for the rest of your life. </li></ul>
    10. 10. Malicious Software <ul><ul><li>Spyware </li></ul></ul><ul><ul><li>Viruses </li></ul></ul><ul><ul><ul><li>Hardware </li></ul></ul></ul><ul><ul><ul><li>Software </li></ul></ul></ul>
    11. 11. Malicious Software <ul><ul><li>Spyware – Programs that record your surfing behavior and/or keystrokes and transmit the data to the collector’s database. </li></ul></ul><ul><ul><li>Viruses - Programs that piggyback on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs too where it can reproduce (by attaching to other programs) or wreak system havoc. </li></ul></ul><ul><ul><li>E-mail Viruses – An E-mail virus is transmitted via e-mail messages and usually replicates automatically by mailing a copy of itself to dozens of people in the victim's e-mail address book. </li></ul></ul><ul><ul><li>Worms - Software that use computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. </li></ul></ul><ul><ul><li>Trojan Horses – A software program that claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically. </li></ul></ul>
    12. 12. Malicious Software: Deal with it! <ul><ul><li>Spyware </li></ul></ul><ul><ul><ul><li>Pay attention to what you click. </li></ul></ul></ul><ul><ul><ul><li>Don’t click on “too good to be true” ads. </li></ul></ul></ul><ul><ul><ul><li>Google it! Check for hoaxes. </li></ul></ul></ul><ul><ul><ul><li>Get Anti-Spyware software (2) </li></ul></ul></ul><ul><ul><ul><ul><li>Ad-Aware </li></ul></ul></ul></ul><ul><ul><ul><ul><li>CounterSpy </li></ul></ul></ul></ul><ul><ul><ul><ul><li>SpyBot </li></ul></ul></ul></ul>
    13. 13. <ul><ul><li>Viruses </li></ul></ul><ul><ul><ul><li>Don’t click on executables ! </li></ul></ul></ul><ul><ul><ul><li>Don’t open suspicious eMail. </li></ul></ul></ul><ul><ul><ul><li>Install Anti-Virus Software </li></ul></ul></ul>Malicious Software How to Deal? <ul><ul><ul><ul><li>AVG Anti-Virus </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Anti-Vir </li></ul></ul></ul></ul>
    14. 14. Executable File Extensions MDE - Microsoft Access MDE Database MSC - Microsoft Common Console Document MSI - Windows Installer Package MSP - Windows Installer Patch MST - Visual Test Source File OCX - ActiveX Objects PCD - Photo CD Image PIF - Shortcut to MS-DOS Program POT - PowerPoint Templates PPT - PowerPoint Files REG - Registration Entries SCR - Screen Saver SCT - Windows Script Component SHB - Document Shortcut File SYS - System Config/Driver URL - Internet Shortcut VB - VBScript File VBE - VBScript Encoded Script File VBS - VBScript Script File WSH - Windows Scripting Host Settings File XL* - Excel Files and Templates File types that should be considered suspicious when received in email and should not be opened unless you requested or expected the attachment: MDE - Microsoft Access MDE Database MSC - Microsoft Common Console Document MSI - Windows Installer Package MSP - Windows Installer Patch MST - Visual Test Source File OCX - ActiveX Objects PCD - Photo CD Image PIF - Shortcut to MS-DOS Program POT - PowerPoint Templates PPT - PowerPoint Files REG - Registration Entries SCR - Screen Saver SCT - Windows Script Component SHB - Document Shortcut File SYS - System Config/Driver URL - Internet Shortcut VB - VBScript File VBE - VBScript Encoded Script File VBS - VBScript Script File WSH - Windows Scripting Host Settings File XL* - Excel Files and Templates ADE - Microsoft Access Project Extension ADP - Microsoft Access Project BAS - Visual Basic Class Module BAT - Batch File CHM - Compiled HTML Help File CMD - Windows NT Command Script COM - MS-DOS Application CPL - Control Panel Extension CRT - Security Certificate DLL - Dynamic Link Library DO* - Word Documents and Templates EXE - Application HLP - Windows Help File HTA - HTML Applications INF - Setup Information File INS - Internet Communication Settings ISP - Internet Communication Settings JS - JScript File JSE - JScript Encoded Script File LNK - Shortcut MDB - Microsoft Access Application ADE - Microsoft Access Project Extension ADP - Microsoft Access Project BAS - Visual Basic Class Module BAT - Batch File CHM - Compiled HTML Help File CMD - Windows NT Command Script COM - MS-DOS Application CPL - Control Panel Extension CRT - Security Certificate DLL - Dynamic Link Library DO* - Word Documents and Templates EXE - Application HLP - Windows Help File HTA - HTML Applications INF - Setup Information File INS - Internet Communication Settings ISP - Internet Communication Settings JS - JScript File JSE - JScript Encoded Script File LNK - Shortcut MDB - Microsoft Access Application MDE - Microsoft Access MDE Database MSC - Microsoft Common Console Document MSI - Windows Installer Package MSP - Windows Installer Patch MST - Visual Test Source File OCX - ActiveX Objects PCD - Photo CD Image PIF - Shortcut to MS-DOS Program POT - PowerPoint Templates PPT - PowerPoint Files REG - Registration Entries SCR - Screen Saver SCT - Windows Script Component SHB - Document Shortcut File SYS - System Config/Driver URL - Internet Shortcut VB - VBScript File VBE - VBScript Encoded Script File VBS - VBScript Script File WSH - Windows Scripting Host Settings File XL* - Excel Files and Templates ADE - Microsoft Access Project Extension ADP - Microsoft Access Project BAS - Visual Basic Class Module BAT - Batch File CHM - Compiled HTML Help File CMD - Windows NT Command Script COM - MS-DOS Application CPL - Control Panel Extension CRT - Security Certificate DLL - Dynamic Link Library DO* - Word Documents and Templates EXE - Application HLP - Windows Help File HTA - HTML Applications INF - Setup Information File INS - Internet Communication Settings ISP - Internet Communication Settings JS - JScript File JSE - JScript Encoded Script File LNK - Shortcut MDB - Microsoft Access Application
    15. 15. Phishing Threat
    16. 16. Computer Terms WYSIWYG GUI RAM CD-ROM Bit Folder/File 01001101 = “M” BYTE NIBBLE
    17. 17. Terms <ul><li>Mega </li></ul><ul><li>Giga </li></ul><ul><li>Tera </li></ul><ul><li>Nano </li></ul><ul><li>ENIAC </li></ul><ul><li>IBM </li></ul><ul><li>DEC </li></ul><ul><li>Apple </li></ul><ul><li>RFID </li></ul><ul><li>Hardware </li></ul><ul><li>Software </li></ul><ul><li>CPU </li></ul><ul><li>Disk/Hard Drive </li></ul><ul><li>Batch Processing </li></ul><ul><li>Timesharing </li></ul><ul><li>MIPS/FLOPS </li></ul><ul><li>Kilo </li></ul><ul><li>GUI </li></ul>
    18. 18. 1.1 History of Computers Nanocomputer CPU Memory Board
    19. 19. 1.1 History of Computers – 1940’s 1941 1949
    20. 20. 1.1 History of Computers – 1940’s <ul><li>1800 square feet, 30 tons and consumed 160 kilowatts of electrical power. </li></ul><ul><li>1000 times faster than any other calculating machine to date. Performed 5,000 additions (5 KIPS), 357 multiplications or 38 divisions (FLOPS) </li></ul><ul><li>Programming ENIAC entailed flipping switches and moving plug cords. </li></ul><ul><li>Developed by John Mauchley and J. Presper Eckert </li></ul><ul><li>18 months and $500,000 tax dollars to build. </li></ul><ul><li>Military Uses: </li></ul><ul><ul><li>Calculate trajectories </li></ul></ul><ul><ul><li>Design hydrogen bomb </li></ul></ul><ul><ul><li>Weather prediction </li></ul></ul><ul><ul><li>Wind-tunnel design. </li></ul></ul><ul><li>17,468 vacuum tubes, 70,000 resistors, 10,000 capacitors, 1,500 relays, 6,000 manual switches and 5 million soldered joints. </li></ul>1946 - ENIAC ENIAC ENIAC
    21. 21. 1.1 History of Computers – 1940’s 1946 - ENIAC
    22. 22. 1.1 History of Computers – 1940’s 1945 - Vannevar Bush “ As we May Think ” <ul><li>Bush calls for a new relationship between “ thinking man and the sum of our knowledge“. </li></ul><ul><li>Proposes “ Memex” - a machine that stores vast amounts of information, where users could: </li></ul><ul><ul><li>Create information trails </li></ul></ul><ul><ul><li>Use Links b/n related texts and illustrations </li></ul></ul><ul><ul><li>Store data and use for future reference. </li></ul></ul>

    ×