際際滷

際際滷Share a Scribd company logo
9 th  Grade Computer Science Rotation Mr. Fedder/Mr. Crowley
Why Learn About Computers?
 Im not a techie
True/False:  1950s vs. 2005 Homes are 20 times more expensive. Cars are 15 times more expensive. Computers are 100,000 times more powerful. The development and innovation of computing technology has resulted in the greatest cultural revolution in the history of mankind. You will use computers in some form for the rest of your life.
Factors
Number Scale Time to count to 1 Quadrillion?  1 count per second = 86,400 counts per day 1,000,000,000,000,000  歎   86,400 = 11,574,074,074 days 11,574,074,074  歎   365   =  31,710,000 years (Cenozoic Era) Kilo Mega Giga Tera Peta 1 Billion Millions  1,000,000,000,000,000  QUADRILLION 1 Million Millions  1,000,000,000,000  TRILLION 1 Thousand Millions  1,000,000,000  BILLION 1 Thousand Thousands  1,000,000  MILLION 油 1,000  THOUSAND
Factors - Computers 油 油 油 油 256 $128,000,000  $ 500,000  Cost 56,120,000,000  280,600,000,000 5,000  IPS 250,000,000  4,000,000,000,000  16,000  Storage (bytes) 10,250,000,000 4,000,000,000,000 200  Memory(bytes) 油 油 油 Computer 油 油 油 油 Factor (SC vs. 1950) 2007 Supercomputer 1950 INDUSTRY 油 油 油 油 0.0020  $  1,000  $ 500,000  Cost 1,945,200  9,726,000,000  5,000  IPS 5,000,000  80,000,000,000  16,000  Storage (bytes) 5,000,000  1,000,000,000  200  Memory(bytes) 油 油 油 Computer 油 油 油 油 Factor (PC vs. 1950) 2005  PC 1950 INDUSTRY
IBM Blue Gene - Supercomputer
True/False:  1950 vs. 2005 Homes are 20 times more expensive. Cars are 15 times more expensive. Computers are 100,000 times more powerful. The development and innovation of computing technology has resulted in the greatest cultural revolution in the history of mankind. You will use computers in some form for the rest of your life.
Malicious Software Spyware Viruses   Hardware Software
Malicious Software Spyware   Programs that record your surfing behavior and/or keystrokes and transmit the data to the collectors database. Viruses  - Programs that piggyback on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs too where it can reproduce  (by attaching to other programs) or wreak system havoc.  E-mail Viruses   An E-mail virus is transmitted via e-mail messages and usually replicates automatically by mailing a copy of itself to dozens of people in the victim's e-mail address book.  Worms  - Software that use computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.  Trojan Horses   A software program that claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.
Malicious Software:  Deal with it! Spyware Pay attention to what you click. Dont click on too good to be true ads. Google it!  Check for hoaxes. Get Anti-Spyware software (2) Ad-Aware CounterSpy SpyBot
Viruses   Dont click on  executables ! Dont open suspicious eMail. Install Anti-Virus Software Malicious Software How to Deal? AVG Anti-Virus Anti-Vir
Executable File Extensions MDE - Microsoft Access MDE Database  MSC - Microsoft Common Console Document  MSI - Windows Installer Package  MSP - Windows Installer Patch  MST - Visual Test Source File  OCX - ActiveX Objects  PCD - Photo CD Image  PIF - Shortcut to MS-DOS Program  POT - PowerPoint Templates  PPT - PowerPoint Files  REG - Registration Entries  SCR - Screen Saver  SCT - Windows Script Component  SHB - Document Shortcut File  SYS - System Config/Driver  URL - Internet Shortcut  VB - VBScript File  VBE - VBScript Encoded Script File  VBS - VBScript Script File  WSH - Windows Scripting Host Settings File  XL* - Excel Files and Templates  File types that should be considered suspicious when received in email and should  not  be opened unless you requested or expected the attachment:  MDE - Microsoft Access MDE Database  MSC - Microsoft Common Console Document  MSI - Windows Installer Package  MSP - Windows Installer Patch  MST - Visual Test Source File  OCX - ActiveX Objects  PCD - Photo CD Image  PIF - Shortcut to MS-DOS Program   POT - PowerPoint Templates  PPT - PowerPoint Files  REG - Registration Entries  SCR - Screen Saver   SCT - Windows Script Component  SHB - Document Shortcut File  SYS - System Config/Driver  URL - Internet Shortcut  VB - VBScript File  VBE - VBScript Encoded Script File  VBS - VBScript Script File  WSH - Windows Scripting Host Settings File  XL* - Excel Files and Templates  ADE - Microsoft Access Project Extension  ADP - Microsoft Access Project  BAS - Visual Basic Class Module  BAT - Batch File  CHM - Compiled HTML Help File  CMD - Windows NT Command Script  COM - MS-DOS Application  CPL - Control Panel Extension  CRT - Security Certificate  DLL - Dynamic Link Library  DO* - Word Documents and Templates  EXE - Application  HLP - Windows Help File  HTA - HTML Applications  INF - Setup Information File  INS - Internet Communication Settings  ISP - Internet Communication Settings  JS - JScript File  JSE - JScript Encoded Script File  LNK - Shortcut  MDB - Microsoft Access Application  ADE - Microsoft Access Project Extension  ADP - Microsoft Access Project  BAS - Visual Basic Class Module  BAT - Batch File   CHM - Compiled HTML Help File  CMD - Windows NT Command Script  COM - MS-DOS Application   CPL - Control Panel Extension  CRT - Security Certificate  DLL - Dynamic Link Library  DO* - Word Documents and Templates  EXE - Application   HLP - Windows Help File  HTA - HTML Applications  INF - Setup Information File  INS - Internet Communication Settings  ISP - Internet Communication Settings  JS - JScript File  JSE - JScript Encoded Script File  LNK - Shortcut  MDB - Microsoft Access Application  MDE - Microsoft Access MDE Database  MSC - Microsoft Common Console Document  MSI - Windows Installer Package  MSP - Windows Installer Patch  MST - Visual Test Source File  OCX - ActiveX Objects  PCD - Photo CD Image  PIF - Shortcut to MS-DOS Program  POT - PowerPoint Templates  PPT - PowerPoint Files  REG - Registration Entries  SCR - Screen Saver  SCT - Windows Script Component  SHB - Document Shortcut File  SYS - System Config/Driver  URL - Internet Shortcut  VB - VBScript File  VBE - VBScript Encoded Script File  VBS - VBScript Script File  WSH - Windows Scripting Host Settings File  XL* - Excel Files and Templates  ADE - Microsoft Access Project Extension  ADP - Microsoft Access Project  BAS - Visual Basic Class Module  BAT - Batch File  CHM - Compiled HTML Help File  CMD - Windows NT Command Script  COM - MS-DOS Application  CPL - Control Panel Extension  CRT - Security Certificate  DLL - Dynamic Link Library  DO* - Word Documents and Templates   EXE - Application  HLP - Windows Help File  HTA - HTML Applications  INF - Setup Information File   INS - Internet Communication Settings  ISP - Internet Communication Settings  JS - JScript File  JSE - JScript Encoded Script File  LNK - Shortcut  MDB - Microsoft Access Application
Phishing Threat
Computer Terms WYSIWYG GUI RAM CD-ROM Bit Folder/File 01001101 = M BYTE NIBBLE
Terms Mega Giga Tera Nano ENIAC IBM DEC Apple RFID Hardware Software CPU Disk/Hard Drive Batch Processing Timesharing MIPS/FLOPS Kilo GUI
1.1 History of Computers Nanocomputer CPU Memory Board
1.1 History of Computers  1940s 1941 1949
1.1 History of Computers  1940s 1800 square feet, 30 tons and consumed 160 kilowatts of electrical power.  1000 times faster than any other calculating machine to date. Performed 5,000 additions (5 KIPS), 357 multiplications or 38 divisions (FLOPS) Programming ENIAC entailed flipping switches and moving plug cords. Developed by John Mauchley and J. Presper Eckert 18 months and $500,000 tax dollars to build. Military Uses: Calculate trajectories Design hydrogen bomb Weather prediction Wind-tunnel design. 17,468 vacuum tubes, 70,000 resistors, 10,000 capacitors, 1,500 relays, 6,000 manual switches and 5 million soldered joints. 1946 - ENIAC ENIAC ENIAC
1.1 History of Computers  1940s 1946 - ENIAC
1.1 History of Computers  1940s 1945 - Vannevar Bush  As we May Think  Bush calls for a new relationship between   thinking man and the sum of our knowledge. Proposes  Memex  - a machine that stores vast amounts of information, where users could: Create information trails Use  Links  b/n related texts and illustrations Store data and use for future reference.
Ad

Recommended

My freeware-shareware-programs2205
My freeware-shareware-programs2205
mark scott
Library management system
Library management system
Raaghav Bhatia
Basic computer
Basic computer
Atech System & Graphics Designs
Basic computer
Basic computer
Atech System & Graphics Designs
NI221 - Fundamentals of Computer
NI221 - Fundamentals of Computer
paulcaspe
Empowerment_Technology For Senior High School_2021-2022.pptx
Empowerment_Technology For Senior High School_2021-2022.pptx
MelfeSalimbagat5
General Information About Information Technologies
General Information About Information Technologies
techgajanan
COMPUTER FUNDAMENTALS
COMPUTER FUNDAMENTALS
SilenceQlny
Basic Computer Skills.pptx
Basic Computer Skills.pptx
ssuser504dda
Fundamentals Of Computer
Fundamentals Of Computer
Jack Frost
Computhdfeewfgfeewfjewhewheer_PPT (2).pptx
Computhdfeewfgfeewfjewhewheer_PPT (2).pptx
BRIJESHKRSINGH
Computer
Computer
sk_just2121
A 101025201954-phpapp02
A 101025201954-phpapp02
theiluminados
INTRO TO COMPUTER
INTRO TO COMPUTER
enoch asamoah
Computer Glossary A to Z Terminology, Vocabulary
Computer Glossary A to Z Terminology, Vocabulary
SONU HEETSON
Computer-Basics program for training.pptx
Computer-Basics program for training.pptx
MDASIFJAMAL4
Computer-advanced Basics for training.pptx
Computer-advanced Basics for training.pptx
MDASIFJAMAL4
Basiccccc of Computer engineering for college and school exam or presentation...
Basiccccc of Computer engineering for college and school exam or presentation...
Harsh984801
Basics of Computer hardware and Software
Basics of Computer hardware and Software
vaibhav jindal
computer-gyani ppt mahatwapurn for having fundamental knowledge.pptx
computer-gyani ppt mahatwapurn for having fundamental knowledge.pptx
qetuosfhkzcbm1234567
Computer-Basics for B.ed Second Year.pptx
Computer-Basics for B.ed Second Year.pptx
kplkumar981
Computer An electronic device that stores, retrieves, and processes data, an...
Computer An electronic device that stores, retrieves, and processes data, an...
ChandrakantPatil97
Lesson for computer class for special class.pptx
Lesson for computer class for special class.pptx
BlessGely
Computer basics--computer basics2
Computer basics--computer basics2
Makk Quak
A
A
theiluminados
Computer basics
Computer basics
gopikrishna87
Computer Basics Final.ppt
Computer Basics Final.ppt
Pooja Nanda
Ecdl v5 module 2 print
Ecdl v5 module 2 print
Michael Lew
Networking
Networking
guestf7cf98
Computer Hardware
Computer Hardware
guestf7cf98

More Related Content

Similar to History Days 1 3 (20)

Basic Computer Skills.pptx
Basic Computer Skills.pptx
ssuser504dda
Fundamentals Of Computer
Fundamentals Of Computer
Jack Frost
Computhdfeewfgfeewfjewhewheer_PPT (2).pptx
Computhdfeewfgfeewfjewhewheer_PPT (2).pptx
BRIJESHKRSINGH
Computer
Computer
sk_just2121
A 101025201954-phpapp02
A 101025201954-phpapp02
theiluminados
INTRO TO COMPUTER
INTRO TO COMPUTER
enoch asamoah
Computer Glossary A to Z Terminology, Vocabulary
Computer Glossary A to Z Terminology, Vocabulary
SONU HEETSON
Computer-Basics program for training.pptx
Computer-Basics program for training.pptx
MDASIFJAMAL4
Computer-advanced Basics for training.pptx
Computer-advanced Basics for training.pptx
MDASIFJAMAL4
Basiccccc of Computer engineering for college and school exam or presentation...
Basiccccc of Computer engineering for college and school exam or presentation...
Harsh984801
Basics of Computer hardware and Software
Basics of Computer hardware and Software
vaibhav jindal
computer-gyani ppt mahatwapurn for having fundamental knowledge.pptx
computer-gyani ppt mahatwapurn for having fundamental knowledge.pptx
qetuosfhkzcbm1234567
Computer-Basics for B.ed Second Year.pptx
Computer-Basics for B.ed Second Year.pptx
kplkumar981
Computer An electronic device that stores, retrieves, and processes data, an...
Computer An electronic device that stores, retrieves, and processes data, an...
ChandrakantPatil97
Lesson for computer class for special class.pptx
Lesson for computer class for special class.pptx
BlessGely
Computer basics--computer basics2
Computer basics--computer basics2
Makk Quak
A
A
theiluminados
Computer basics
Computer basics
gopikrishna87
Computer Basics Final.ppt
Computer Basics Final.ppt
Pooja Nanda
Ecdl v5 module 2 print
Ecdl v5 module 2 print
Michael Lew
Basic Computer Skills.pptx
Basic Computer Skills.pptx
ssuser504dda
Fundamentals Of Computer
Fundamentals Of Computer
Jack Frost
Computhdfeewfgfeewfjewhewheer_PPT (2).pptx
Computhdfeewfgfeewfjewhewheer_PPT (2).pptx
BRIJESHKRSINGH
A 101025201954-phpapp02
A 101025201954-phpapp02
theiluminados
INTRO TO COMPUTER
INTRO TO COMPUTER
enoch asamoah
Computer Glossary A to Z Terminology, Vocabulary
Computer Glossary A to Z Terminology, Vocabulary
SONU HEETSON
Computer-Basics program for training.pptx
Computer-Basics program for training.pptx
MDASIFJAMAL4
Computer-advanced Basics for training.pptx
Computer-advanced Basics for training.pptx
MDASIFJAMAL4
Basiccccc of Computer engineering for college and school exam or presentation...
Basiccccc of Computer engineering for college and school exam or presentation...
Harsh984801
Basics of Computer hardware and Software
Basics of Computer hardware and Software
vaibhav jindal
computer-gyani ppt mahatwapurn for having fundamental knowledge.pptx
computer-gyani ppt mahatwapurn for having fundamental knowledge.pptx
qetuosfhkzcbm1234567
Computer-Basics for B.ed Second Year.pptx
Computer-Basics for B.ed Second Year.pptx
kplkumar981
Computer An electronic device that stores, retrieves, and processes data, an...
Computer An electronic device that stores, retrieves, and processes data, an...
ChandrakantPatil97
Lesson for computer class for special class.pptx
Lesson for computer class for special class.pptx
BlessGely
Computer basics--computer basics2
Computer basics--computer basics2
Makk Quak
Computer Basics Final.ppt
Computer Basics Final.ppt
Pooja Nanda
Ecdl v5 module 2 print
Ecdl v5 module 2 print
Michael Lew

More from guestf7cf98 (10)

Networking
Networking
guestf7cf98
Computer Hardware
Computer Hardware
guestf7cf98
Lynching
Lynching
guestf7cf98
Aeneidintro
Aeneidintro
guestf7cf98
Perfect Passive Participles
Perfect Passive Participles
guestf7cf98
Networking
Networking
guestf7cf98
Computer Hardware
Computer Hardware
guestf7cf98
FCS Computer Hardware
FCS Computer Hardware
guestf7cf98
History Days 4 5
History Days 4 5
guestf7cf98
History Days 4 5
History Days 4 5
guestf7cf98
Computer Hardware
Computer Hardware
guestf7cf98
Perfect Passive Participles
Perfect Passive Participles
guestf7cf98
Computer Hardware
Computer Hardware
guestf7cf98
FCS Computer Hardware
FCS Computer Hardware
guestf7cf98
History Days 4 5
History Days 4 5
guestf7cf98
History Days 4 5
History Days 4 5
guestf7cf98
Ad

Recently uploaded (20)

9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Josef Weingand
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
Daily Lesson Log MATATAG ICT TEchnology 8
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
MPU+: A Transformative Solution for Next-Gen AI at the Edge, a Presentation...
MPU+: A Transformative Solution for Next-Gen AI at the Edge, a Presentation...
Edge AI and Vision Alliance
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Josef Weingand
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
Daily Lesson Log MATATAG ICT TEchnology 8
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
MPU+: A Transformative Solution for Next-Gen AI at the Edge, a Presentation...
MPU+: A Transformative Solution for Next-Gen AI at the Edge, a Presentation...
Edge AI and Vision Alliance
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
Ad

History Days 1 3

  • 1. 9 th Grade Computer Science Rotation Mr. Fedder/Mr. Crowley
  • 2. Why Learn About Computers?
  • 3. Im not a techie
  • 4. True/False: 1950s vs. 2005 Homes are 20 times more expensive. Cars are 15 times more expensive. Computers are 100,000 times more powerful. The development and innovation of computing technology has resulted in the greatest cultural revolution in the history of mankind. You will use computers in some form for the rest of your life.
  • 6. Number Scale Time to count to 1 Quadrillion? 1 count per second = 86,400 counts per day 1,000,000,000,000,000 歎 86,400 = 11,574,074,074 days 11,574,074,074 歎 365 = 31,710,000 years (Cenozoic Era) Kilo Mega Giga Tera Peta 1 Billion Millions 1,000,000,000,000,000 QUADRILLION 1 Million Millions 1,000,000,000,000 TRILLION 1 Thousand Millions 1,000,000,000 BILLION 1 Thousand Thousands 1,000,000 MILLION 油 1,000 THOUSAND
  • 7. Factors - Computers 油 油 油 油 256 $128,000,000 $ 500,000 Cost 56,120,000,000 280,600,000,000 5,000 IPS 250,000,000 4,000,000,000,000 16,000 Storage (bytes) 10,250,000,000 4,000,000,000,000 200 Memory(bytes) 油 油 油 Computer 油 油 油 油 Factor (SC vs. 1950) 2007 Supercomputer 1950 INDUSTRY 油 油 油 油 0.0020 $ 1,000 $ 500,000 Cost 1,945,200 9,726,000,000 5,000 IPS 5,000,000 80,000,000,000 16,000 Storage (bytes) 5,000,000 1,000,000,000 200 Memory(bytes) 油 油 油 Computer 油 油 油 油 Factor (PC vs. 1950) 2005 PC 1950 INDUSTRY
  • 8. IBM Blue Gene - Supercomputer
  • 9. True/False: 1950 vs. 2005 Homes are 20 times more expensive. Cars are 15 times more expensive. Computers are 100,000 times more powerful. The development and innovation of computing technology has resulted in the greatest cultural revolution in the history of mankind. You will use computers in some form for the rest of your life.
  • 10. Malicious Software Spyware Viruses Hardware Software
  • 11. Malicious Software Spyware Programs that record your surfing behavior and/or keystrokes and transmit the data to the collectors database. Viruses - Programs that piggyback on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs too where it can reproduce (by attaching to other programs) or wreak system havoc. E-mail Viruses An E-mail virus is transmitted via e-mail messages and usually replicates automatically by mailing a copy of itself to dozens of people in the victim's e-mail address book. Worms - Software that use computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. Trojan Horses A software program that claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.
  • 12. Malicious Software: Deal with it! Spyware Pay attention to what you click. Dont click on too good to be true ads. Google it! Check for hoaxes. Get Anti-Spyware software (2) Ad-Aware CounterSpy SpyBot
  • 13. Viruses Dont click on executables ! Dont open suspicious eMail. Install Anti-Virus Software Malicious Software How to Deal? AVG Anti-Virus Anti-Vir
  • 14. Executable File Extensions MDE - Microsoft Access MDE Database MSC - Microsoft Common Console Document MSI - Windows Installer Package MSP - Windows Installer Patch MST - Visual Test Source File OCX - ActiveX Objects PCD - Photo CD Image PIF - Shortcut to MS-DOS Program POT - PowerPoint Templates PPT - PowerPoint Files REG - Registration Entries SCR - Screen Saver SCT - Windows Script Component SHB - Document Shortcut File SYS - System Config/Driver URL - Internet Shortcut VB - VBScript File VBE - VBScript Encoded Script File VBS - VBScript Script File WSH - Windows Scripting Host Settings File XL* - Excel Files and Templates File types that should be considered suspicious when received in email and should not be opened unless you requested or expected the attachment: MDE - Microsoft Access MDE Database MSC - Microsoft Common Console Document MSI - Windows Installer Package MSP - Windows Installer Patch MST - Visual Test Source File OCX - ActiveX Objects PCD - Photo CD Image PIF - Shortcut to MS-DOS Program POT - PowerPoint Templates PPT - PowerPoint Files REG - Registration Entries SCR - Screen Saver SCT - Windows Script Component SHB - Document Shortcut File SYS - System Config/Driver URL - Internet Shortcut VB - VBScript File VBE - VBScript Encoded Script File VBS - VBScript Script File WSH - Windows Scripting Host Settings File XL* - Excel Files and Templates ADE - Microsoft Access Project Extension ADP - Microsoft Access Project BAS - Visual Basic Class Module BAT - Batch File CHM - Compiled HTML Help File CMD - Windows NT Command Script COM - MS-DOS Application CPL - Control Panel Extension CRT - Security Certificate DLL - Dynamic Link Library DO* - Word Documents and Templates EXE - Application HLP - Windows Help File HTA - HTML Applications INF - Setup Information File INS - Internet Communication Settings ISP - Internet Communication Settings JS - JScript File JSE - JScript Encoded Script File LNK - Shortcut MDB - Microsoft Access Application ADE - Microsoft Access Project Extension ADP - Microsoft Access Project BAS - Visual Basic Class Module BAT - Batch File CHM - Compiled HTML Help File CMD - Windows NT Command Script COM - MS-DOS Application CPL - Control Panel Extension CRT - Security Certificate DLL - Dynamic Link Library DO* - Word Documents and Templates EXE - Application HLP - Windows Help File HTA - HTML Applications INF - Setup Information File INS - Internet Communication Settings ISP - Internet Communication Settings JS - JScript File JSE - JScript Encoded Script File LNK - Shortcut MDB - Microsoft Access Application MDE - Microsoft Access MDE Database MSC - Microsoft Common Console Document MSI - Windows Installer Package MSP - Windows Installer Patch MST - Visual Test Source File OCX - ActiveX Objects PCD - Photo CD Image PIF - Shortcut to MS-DOS Program POT - PowerPoint Templates PPT - PowerPoint Files REG - Registration Entries SCR - Screen Saver SCT - Windows Script Component SHB - Document Shortcut File SYS - System Config/Driver URL - Internet Shortcut VB - VBScript File VBE - VBScript Encoded Script File VBS - VBScript Script File WSH - Windows Scripting Host Settings File XL* - Excel Files and Templates ADE - Microsoft Access Project Extension ADP - Microsoft Access Project BAS - Visual Basic Class Module BAT - Batch File CHM - Compiled HTML Help File CMD - Windows NT Command Script COM - MS-DOS Application CPL - Control Panel Extension CRT - Security Certificate DLL - Dynamic Link Library DO* - Word Documents and Templates EXE - Application HLP - Windows Help File HTA - HTML Applications INF - Setup Information File INS - Internet Communication Settings ISP - Internet Communication Settings JS - JScript File JSE - JScript Encoded Script File LNK - Shortcut MDB - Microsoft Access Application
  • 16. Computer Terms WYSIWYG GUI RAM CD-ROM Bit Folder/File 01001101 = M BYTE NIBBLE
  • 17. Terms Mega Giga Tera Nano ENIAC IBM DEC Apple RFID Hardware Software CPU Disk/Hard Drive Batch Processing Timesharing MIPS/FLOPS Kilo GUI
  • 18. 1.1 History of Computers Nanocomputer CPU Memory Board
  • 19. 1.1 History of Computers 1940s 1941 1949
  • 20. 1.1 History of Computers 1940s 1800 square feet, 30 tons and consumed 160 kilowatts of electrical power. 1000 times faster than any other calculating machine to date. Performed 5,000 additions (5 KIPS), 357 multiplications or 38 divisions (FLOPS) Programming ENIAC entailed flipping switches and moving plug cords. Developed by John Mauchley and J. Presper Eckert 18 months and $500,000 tax dollars to build. Military Uses: Calculate trajectories Design hydrogen bomb Weather prediction Wind-tunnel design. 17,468 vacuum tubes, 70,000 resistors, 10,000 capacitors, 1,500 relays, 6,000 manual switches and 5 million soldered joints. 1946 - ENIAC ENIAC ENIAC
  • 21. 1.1 History of Computers 1940s 1946 - ENIAC
  • 22. 1.1 History of Computers 1940s 1945 - Vannevar Bush As we May Think Bush calls for a new relationship between thinking man and the sum of our knowledge. Proposes Memex - a machine that stores vast amounts of information, where users could: Create information trails Use Links b/n related texts and illustrations Store data and use for future reference.