SlideShare une entreprise Scribd logo
1  sur  10
TECHNOLOGY
NEW TECHNOLOGIES
The information technology and
 communication mainly computers, Internet
 and telecommunications.
NEW TECHNOLOIES
Computers
computer parts



                        screen
  cpu



                         mouse
        keyboard
Computers
• Keyboard
• First the keyboard was in a typewriter and
  we used to send information to the
  computer.
Computers
Screen
The screen shows you the results of what
 you asked and is measured in inches
Computers
Mouse
The mouse is a pointing device used plastic and
 hands
THE VIRUSES
A computer virus is a malware that aims to disrupt
  the normal operation of the computer, without
  the permission or knowledge of the user.
  Viruses, usually replaced by other executable
  files infected with this code.
THE VIRUSES
- How do you get a virus in your computer?
-You can catch a virus with an e-mail, a program, a
     website,downloading applications.


-How does a virus spread?
-A virus spreads when you open progams and files.
THE VIRUSES
• Types of virus:
• Troyan, Worm, Logic boms, Hoak.
• Troyan:This virus consist in hack a
  computer.
• Worm:It has the property of replicate itself.
• Logic Bombs:These are programs that are
  activated when a particular event occurs.

Contenu connexe

Tendances

Information security
 Information security Information security
Information securityJin Castor
 
Computer safety
Computer safetyComputer safety
Computer safetyahentz
 
The Future Of Computers
The Future Of ComputersThe Future Of Computers
The Future Of Computersskyhighphoto83
 
Phishing simulation exercises
Phishing simulation exercisesPhishing simulation exercises
Phishing simulation exercisesJisc
 
2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)Isaac Feliciano
 
Tech In Class
Tech In ClassTech In Class
Tech In Classr jones
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and VirusesAmrit Kaur
 
The Effects Of Ict
The Effects Of IctThe Effects Of Ict
The Effects Of Ictroyjulian
 
The Effects of ICT
The Effects of ICTThe Effects of ICT
The Effects of ICTroyjulian
 
Web browser week5 presentation
Web browser week5 presentationWeb browser week5 presentation
Web browser week5 presentationDeepak John
 

Tendances (16)

Information security
 Information security Information security
Information security
 
Computer safety
Computer safetyComputer safety
Computer safety
 
The Future Of Computers
The Future Of ComputersThe Future Of Computers
The Future Of Computers
 
Izzy
IzzyIzzy
Izzy
 
Phishing simulation exercises
Phishing simulation exercisesPhishing simulation exercises
Phishing simulation exercises
 
2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)
 
Tech In Class
Tech In ClassTech In Class
Tech In Class
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Sowmya
SowmyaSowmya
Sowmya
 
The Effects Of Ict
The Effects Of IctThe Effects Of Ict
The Effects Of Ict
 
The Effects of ICT
The Effects of ICTThe Effects of ICT
The Effects of ICT
 
Levi
LeviLevi
Levi
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Basic Computer Skills
Basic Computer SkillsBasic Computer Skills
Basic Computer Skills
 
Web browser week5 presentation
Web browser week5 presentationWeb browser week5 presentation
Web browser week5 presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

En vedette

En vedette (6)

Favelas
FavelasFavelas
Favelas
 
Sexualidad 5
Sexualidad 5Sexualidad 5
Sexualidad 5
 
Sexualidad 1
Sexualidad 1Sexualidad 1
Sexualidad 1
 
Sexualidad 4
Sexualidad 4Sexualidad 4
Sexualidad 4
 
Con amor tu padre
Con amor tu padreCon amor tu padre
Con amor tu padre
 
To Cochrane or not: that's the question
To Cochrane or not: that's the questionTo Cochrane or not: that's the question
To Cochrane or not: that's the question
 

Similaire à Tecnology def

Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_wargames12
 
Intro speech recognition_dragon_ppt
Intro speech recognition_dragon_pptIntro speech recognition_dragon_ppt
Intro speech recognition_dragon_pptTracy Gilmer
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumHassaan Anjum
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus workschinmay kelkar
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3gpioa
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksJamesBennett15
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on societyPratik Gupta
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfAlefya1
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethicssamina khan
 

Similaire à Tecnology def (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Intro speech recognition_dragon_ppt
Intro speech recognition_dragon_pptIntro speech recognition_dragon_ppt
Intro speech recognition_dragon_ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Pc viruses
Pc virusesPc viruses
Pc viruses
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
ICT Skills.pdf
ICT Skills.pdfICT Skills.pdf
ICT Skills.pdf
 
Isas
IsasIsas
Isas
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Malwares
MalwaresMalwares
Malwares
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3
 
Worm
WormWorm
Worm
 
computer viruses
computer virusescomputer viruses
computer viruses
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 

Tecnology def