Jeopardy Game Team W.E.B. Sheronica Hall Sabraya Knight Daneia Prater Marquise Smith Jakeira Frost.
-
Upload
marianna-higgins -
Category
Documents
-
view
219 -
download
1
Transcript of Jeopardy Game Team W.E.B. Sheronica Hall Sabraya Knight Daneia Prater Marquise Smith Jakeira Frost.
Jeopardy Game
Team W.E.B.• Sheronica Hall• Sabraya Knight• Daneia Prater• Marquise Smith• Jakeira Frost
Video Game Addiction
Video Game Addiction
• Some people don’t realize that there addicted to video gaming. When you get addicted to video games it starts to interfere with your daily life. You start to lose your socical life. And then u tend to think that your entire life is a video game.
Video Game Addiction
• There are many different warning signs of video game addiction. You think about games during activities, lying to friends and family, and feeling irritable when trying to cut off gaming.
Video Game addiction
• Some of the dangers of video game addiction is for adults if you get to caught up into playing video games you start to forget about the more important things in life for example you can lose your job, put video gaming before your family, and you have a hard time trying to communicate with people because you are use to playing video games all the time instead of socializing with people in the real world.
Video game addiction
• There are many different types of ways that a parent could try to help stop video game addiction for there children. For example give the child a set schedule on when and what time they can play video games. Also try to get your child interested in something else other than video games.
Video game addiction
• Not only are children addicted to video gaming but adults are addicted to video gaming too. The group that makes up most of majority of video game addicts are males under 30 with poor self esteem and social problems.
VIDEO GAME ADDICTION
• In order for people to try to overcome there video gaming addiction you must admit to having a problem or you must go ask for help.
Video Game Addiction
• Some people cant get enough of video games. Overuse of video gaming can sometimes lead to death. A 3 month old south Korean girl starved herself after parents repeatedly left her alone for 12 hrs were they were nurturing a virtual child through a computer game.
Spyware
Spyware is a category of computer programs. Spyware piggybacks on other programs and infects a computer, making it operate slower and less efficiently. Spyware gets into the computer without permission and makes unwanted changes to the user’s computer experience. However, with enough resistance, spyware can be prevented and avoided all together.
SpywareSpyware can get onto a computer in numerous ways. Sneaky spyware
infection methods are listed below:• Piggybacked software installation- Some applications can install
spyware during their usual installation procedure. Users must read the application carefully before installing, especially if the site is offering “free” versions of the application.
• Drive-by download- In many cases, a website or pop-up automatically appears in front of the user’s face and begins to download spyware onto the computer. Users may get a warning, which includes a message with the name of the software and requesting permission to install it. However, if a user’s settings are low, they may not even receive a warning.
• Browser add-ons- Pieces of software that add enhancements to a Web browser, such as a toolbar or an additional search box. Browser hijackers embed themselves deeper into a computer and are very difficult to get rid of.
• Masquerading as anti-spyware- Spyware often disguises itself as anti-spyware to fool the user into downloading it. This is thought to be the sickest way for spyware to infect a computer.
SpywareSpyware is often confused with viruses. Viruses are designed to damage a computer by replicating
itself as many times as possible, damaging computer files or even the entire operating system. On the other hand, spyware is primarily designed to slow a computer down and carry out tasks without the user’s permission. There are many ways a user can protect themselves from spyware.
• Use a spyware scanner- Spyware scanners can make a person’s computer experience much safer and assuring. Ad-ware, Spybot, and Microsoft AntiSpyware are all examples of trustworthy spyware detection and removal software. These applications also detect Internet cookies.
• Use a pop-up blocker- Browsers, such as Internet Explorer 0.6 and Mozilla Firefox 1.0, are now able to block pop-ups and advertisements. These browsers can alert a user whenever they have prevented a pop-up from appearing.
• Disable Active-X- Active-X is a special code in Windows that spyware often takes advantage of. Disabling Active-X can prevent this from happening, but it can also prevent a user from using functions of certain websites.
• Be suspicious of installing new software- A more simple way of prevent and avoiding spyware is to become more alert with new software or unknown sites. A user’s carelessness can result in spyware invasion.
• Use the “X” to close pop-up windows- Some computer messages could be fake, although some false messages are rather easy to spot. Instead of clicking the “No, thanks” button that may appear in the message, closing the message with the “X” default can save a user from more spyware threats.
Viruses• Viruses show us how vulnerable be we are. Most
common infection is email viruses. A computer virus must piggyback on top of some other programs in order to work. A worm is a small piece of software that uses computer networks. Sometimes people make viruses they love the thrill of doing it. You can protect yourself by getting Macro Virus Protection.
Viruses
• Viruses show us how vulnerable be we are. Most common infection is email viruses. A computer virus must piggyback on top of some other programs in order to work. A worm is a small piece of software that uses computer networks. Sometimes people make viruses they love the thrill of doing it. You can protect yourself by getting Macro Virus Protection.
Quick Facts (Binary Numbers)• Binary numbers allow you
symbolize any amount you want using just two digits: 0 and 1.
• Recall back to elementary when we first learned about numbers, we were taught that, in the decimal system, things are organized into columns. For example, “H” is hundreds, “T” is tens, and “O” is ones. H | T | O 1 | 9 | 3
• Every “1” digit in a binary number represents a power of two, and each "0" represents zero.
Adding Binary Numbers
Examples:0001 + 0100 = 01010001 + 0001 = 0010
(1 plus 1 is equal to 10, carry the 1) 0011 + 0011 = 0110
• In a number like “0101” you can figure out the actual value by adding the powers of 2.
• Adding binary numbers is similar to adding decimal numbers, with the exception of 1 + 1 = 10 (in this system).
Video game addiction
Spyware Viruses BinaryNumbers
Inside Parts of the
Computer
100 100 100 100 100
200 200 200 200 200
300 300 300 300 300
400 400 400 400 400
500 500 500 500 500
Your correct!!!!!!
Sorry… try again
Video game addiction for 100
What happens when you get addicted to video games?
a) Interferes with daily life b) Loose your social lifec) You play it to muchd) All of the above
Video game addiction for 200
What are some dangers for a adult who is addicted to video gaming??
a) Loose your jobb) Gain new friendsc) A and Dd) Lack social life
Video game addiction for 300
Which age group make up most of the population of video game addicts?
a) Men around the age of 50b) Children of all agesc) Males ages 15-30
Video game addiction for 400
• What are some warning signs of video game addiction?
a) you choose video games over other activitiesb) you play them for hours at a timec) go outside a lotd) a and b
Video game addiction for 500
• Why is video game addiction considered to be a mental problem?
a) it can lead to deathb) people can forget what is important in life ot
her than gaming c) A and B
Spyware For 100
Question: Spyware is a category of what programs?
A: VideoB: FitnessC: Computer D: Educational
Spyware For 200
Question: What’s one way to protect yourself from spyware?
A: Visiting unknown websitesB: Not running spyware scansC: Doing nothingD: Use a pop-up blocker
Spyware For 300
Question: What is one example of a trustworthy spyware scanner?
A: Godzilla Spyfox 5.0B: Slow Traveler SVC: Microsoft AntiSpywareD: You can not trust any spyware scanners. It is pointless.
Spyware For 400
Question: What term fits this description?Pieces of software that distribute
enhancements to a web browser
A: Browser add-onsB: Masquerading as anti-spywareC: Drive-by downloadD: Piggybacked software installation
Spyware For 500
Question: Which Area of Interaction would spyware fall under?
A: Community and ServiceB: Important Things In The WorldC: Human IngenuityD
: There is no such thing as an “Area of Interaction”.
Please go back to the game board.
GREAT JOB!!!!
WHAT WERE YOU THINKING!!!!?? Please go back and redeem yourself.
Bibliography• Coustan, Dave. How Spyware Works, (n,d) HowStuffWorks, November 1,
2010, [http://computer.howstuffworks.com/spyware.htm]• Coustan, Dave. How Spyware Works, (n.d) HowStuffWorks, November 1,
2010, [http://computer.howstuffworks.com/spyware1.htm]• Coustan, Dave. How Spyware Works, (n.d) HowStuff Works, November 1,
2010, [http://computer.howstuffworks.com/spyware2.htm]• Coustan, Dave. How Spyware Works, (n.d) HowStuffWorks, November 1,
2010, [http://computer.howstuffworks.com/spyware3.htm]
Viruses for 100
What do viruses show us ?
A. That we have no brain.B. How vulnerable We Are.C. We Don’t Care.D. All of The above.
Viruses for 200
• Most common Viruses ?
A. Email VirusesB. InfectionsC. PiggybackD. None Of The Above
Viruses for 300
• What are worms ?
A. Things UndergroundB. Small Piece Of SoftwareC. They Help Make A computer GenerateD. Something that breaks down your cpu.
Viruses for 400
• Why Do People Create Viruses ?
A. They Are BoredB. They Have No LifeC. The Thrill Of Doing ItD. All Of The Above
Viruses for 500
• Ways To Protect Yourself ?
A. Throw Your Cpu Out.B. Get Macro Virus Protection Or Norton.C. Get Spyware ProtectionD. B and C
C O R R E C T ! ! ! C O R R E C T !
Wrong ! ! ! ! W R O N G ! ! !
Bibliography
• http://computer.howstuffworks.com/spyware.htm
• http://computer.howstuffworks.com/spyware.htm
• http://computer.howstuffworks.com/spyware.htm
Binary Numbers for 100
What numbers do binary numbers use?
a) 1 and 2b) 0 and 1c) 10 and 20 d) 3 and 4
Binary Numbers for 200Add the following binary numbers.
1011101 +1000000
a)11101010b)1001110c) 10011101d)10011102
Binary Numbers for 300
Determine the two’s compliment of the binary number 01100101.
a)10011010b)11010101c) 01100110d)10011011
Binary Numbers for 400
Which number is not a binary number?a)100b)10101c) 1007d)01010
Binary Numbers for 500
Solve using the formula: 11010011a)2.11b)112c) 211d)12
128 64 32 16 8 4 2 1
Return to the game board
C O R R E C T !C O R R E C T ! ! !
Please try again.
Wrong ! ! ! ! W R O N G ! ! !
Inside Parts of the Computer for 100
• Why does a computer have a power supply?– A- to keep the computer from over heating – B- to hold memory– C- to power the computer– D- to play games
Inside Parts of the Computer for 200
• Why does a computer have a case?– A- to stop kids from touching the cords– B- to prevent the computer from damages– C- to make it look better– D- to make it heavier
Inside Parts of the Computer for 300
• What is the motherboard purpose?– A- holds all the data– B- cools the computer down– C- a disk drive– D- the system main components
Inside Parts of the Computer for 400
• What kind of memory does a computer come with?– A- Random access memory – B-Read only memory– C-hard drive– D-Floppy disk
Inside Parts of the Computer for 500
• What is the main purpose of the Video Card?– A- play videos– B- display output images– C- store music, videos, and pictures– D- play music
Incorrect
Correct
Bibliography
• The website I used was www.tigerdirect.com