1 / 17

Analyzing Technology Issues

Analyzing Technology Issues. 8 th Grade Exploring Business and Marketing. The Impact of Technology on Work. Multinational Economy – conducting business with other countries. Electronic Commerce – allows products to be bought and sold through the Internet

beryl
Télécharger la présentation

Analyzing Technology Issues

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Analyzing Technology Issues 8th Grade Exploring Business and Marketing

  2. The Impact of Technology on Work • Multinational Economy – conducting business with other countries. • Electronic Commerce – allows products to be bought and sold through the Internet • Digital Cash – can pay online by transmitting a number from one computer to another

  3. The Impact of Technology on Education Internet – one of the biggest factors affecting Education • Distance Learning – delivery of education over the Internet • Computer-Based Learning – Using the computer as a tutor • Simulations – Models of real world activities

  4. The Impact of Technology on Science • Science • Artificial Intelligence – to process info. w/o human intervention • Genetic Engineering – to change the DNA of a living organism • Virtual Reality- model of real-world activity that allows you to explore environments that may be dangerous (requires a helmet)

  5. Types of Computer Crimes • Computer fraud • Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. • Computer hacking • Involves invading someone else’s computer, usually for personal gain or just the satisfaction of invasion.

  6. Types of Computer Viruses • Worm - Makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks. • Time bomb - Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. • Logic bomb - Virus triggered by the appearance or disappearance of specified data. • Trojan horse - Virus that does something different from what it is expected to do.

  7. Computer Viruses A virus is a program that has been written to cause corruption of data on a computer. Hoax – program that tricks users into thinking they have a virus Software piracy occurs when you buy single user software and let a friend borrow it.

  8. Security Measures Maintain and Enforce Security Measures such as: • Passwords – safeguard access/should be a RANDOM mix of letters and numbers • Electronic identification cards • Firewalls • Antivirus software – used to disinfect • Selective hiring process • Locking software to prevent users from making copies.

  9. What is a browser? • The software program that you use to retrieve documents from the World Wide Web (WWW) and to display them in a readable format. • Examples: • Internet Explorer • Netscape Communicator

  10. Advantages and Uses of Telecommunications • Telecommunication involves electronically transferring data. • Distance learning • Allows the user to take classes without being physically present. • Teleconferencing • Provides conferencing capabilities from several locations without leaving the office, reduces costs for time and travel.

  11. What is Email? • Email, or electronic mail, is similar to regular mail. You have a message, an address, and a carrier that figures out how to get it from one location to another. • Email is used to stay in touch with family and friends, conduct business, and send attachments such as text and image files.

  12. Advantages and Uses of Email • Faster way to communicate and respond • Quick and easy way to send messages • Forward messages to other individuals • Send messages to multiple individuals • Include attachments such as pictures, audio files, and documents

  13. Electronic Mail Addresses • The address consists of three parts: • The user name of the individual • The @ symbol • The user’s domain name • Example: rsmith@yahoo.com

  14. What is a search engine? • A tool that lets you find Web pages that match a particular word or phrase. • Examples of search engines: • Altavista • Google • HotBot • InfoSeek • Excite • Yahoo

  15. Features of the Internet -Webquest – uses the internet for investigation and problem solving. • File extensions – edu = education, org = organization, gov = government, mil = military

  16. Newsgroups • A discussion forum or a type of bulletin board. • Each board is dedicated to discussion on a particular topic. • USENET • Worldwide network of computers that facilitates the transmission of messages among the news servers.

  17. Other Terms To KnOw • Auto Correct – corrects typos as you type • Ethics - Standards of good moral conduct or principles • Public domain software –distributed free • Freeware – free on a trial basis • Site License – used to load copies of a commercial educational program on every computer in the school. • Auto Complete – Keeps tack of and provides a list of sites a user has visited or fills out forms automatically.

More Related