SlideShare une entreprise Scribd logo
1  sur  24
Prepared by:
Fernando A. Alvis
    BSEd-I-B
Table of Contents:

History


Advantages and Disadvantages of
 Technology in Education
History
     The first all-electronic computer was
 built in 1943 and was run by vacuum tubes.
 By the late 1950's, semiconductors were in
 use and by the 1960's, computers were found
 at major universities. Home computers
 became common in the 1980's and 1990's,
 when laptops became popular among
 students.

Click here to learn more.
Significance

     Computer technology revolutionized the
 calculation of formulas in mathematics and
 physics as well as brought about the space
 race. Computer technology is now used in
 theoretical modeling and medical research.
Time Frame

    While computer technology changes by
the minute, the past 50 years are considered
to be the modern age of computing. The
first mechanical calculator, the abacus, was
invented around 3000 B.C.
Features
    Computer technology allows for
processing of information faster than the
human brain can calculate. However, such
technology is prone to errors and is at the
mercy of mechanical components which can
wear out and software which can become
corrupted by computer viruses.
Considerations
    Nearly everything in our modern world
is influenced by computer technology.
Timing         of      traffic       signals,
telecommunications, and even time keeping
are controlled by advanced computer
technology. In our everyday lives, a simple
trip to the grocery can result in multiple
interfaces with computer technology.
Benefits

    The benefits of computer technology
include scientific discovery, advanced
communications, and the speed of
processing information.
Different Kinds of Computer Viruses




    click here to learn more.
Resident Viruses

    Resident viruses are the type of viruses
that hang out in the RAM (random access
memory) and steal valuable space, reducing
the performance of your computer. This type
of virus has the ability to infect any
operation       conducted        by      the
system, corrupting files and programs.
Direct Action Viruses
     Direct action viruses are more malicious
 in that the intent is to infect a computer,
 replicate and then execute when activated.
 This type of virus activates when specific
 conditions are met and go to work infecting
 specific file folders and systems, rendering
 the PC useless in most cases. This type of
 virus is always located in the root directory
 and goes to work when the computer is
 booted.
Overwrite Viruses

    Overwrite viruses do just what the name
implies. The virus infects files, deleting or
overwriting specific information and
rendering the file useless to the computer.
Files can be "cleaned" by deleting them and
reloading or re-creating them, but this is
costly and time consuming.
Boot Viruses

    Boot viruses reside on the boot sector or
a hard drive, where the files necessary for
the computer to boot and run reside. Boot
viruses interrupt the computer's ability to
boot, rendering the entire PC useless. Boot
viruses are generally passed by the use of
floppy disks.
Macro Viruses

    Macro viruses hide in the macros of
certain files. A list of instructions can be
programmed into a macro virus and
executed as one action, making them
particularly          nasty           viruses.
Directory Viruses

     Directory viruses are the ones most
 commonly activated when a user opens an
 email attachment with an .exe or .com
 extension. The virus has the unique ability
 to relocate the virus files after activation,
 making         cleaning          impossible.
Polymorphic Viruses

    Polymorphic viruses have the ability to
change their encryption every time they are
activated, making them invisible to virus
scan software, giving them free reign to
replicate             at               will.
Companion Viruses
     Companion viruses look much like resident
viruses or direct action viruses. They are known
as companion viruses because once they get
into the system, they "accompany" the other
files that already exist. In other words, to carry
out their infection routines, companion viruses
can wait in memory until a program is run
(resident viruses) or act immediately by
making copies of themselves (direct action
viruses).
Back to Table of Contents.
Advantage: Potential
     The technology available today has
 made a wealth of knowledge available to
 students, which offers great potential for the
 speed and style of learning. Information is
 presented in so many ways that any type
 learner, whether gifted or disabled, can find
 and use the necessary material. This fact
 relates not only to the Internet, but to all the
 many technological improvements in
 learning, from smart boards to handheld
 dictionaries.
Disadvantage: Loss of Skills
     With this increased access to knowledge
 also     comes    a    probable    loss  of
 communication skills and interactive
 abilities between students and teacher, and
 students to peers. These skills are not as
 necessary in a classroom of computers,
 where individuality is a component of
 learning and is encouraged. Aside from
 learning,     conflict    resolution    and
 socialization used to be two prominent
 reasons children came to school. The
 emphasis now has shifted away from these
 areas.
Advantage: Access to all

     Education is no longer the elitist
 privilege it once was. The information on
 the Internet is there for all who have access,
 without discrimination. People of all social
 strata are able to use technological
 advances, which is a fairly new academic
 development in America.
Disadvantage: Poor remain poor
     While general access is not denied, some
 children may not be exposed to computers and
 other technology because of socio-economic
 status. A child may live in a home without a
 computer, and chances are he will attend a poor
 school district with limited numbers of computers
 available. A student may get to use a computer for
 a short time, or only as a once-a-week activity
 instead of a regular class period. This puts these
 children at a disadvantage in learning
 technological functions. Poor districts are also
 most likely not to be the recipients of other
 technological modes of learning.
Advantages vs. Disadvantages
     The computer age is here; this cannot be
debated. Is it better for children to have
access to computers with all their data at the
loss of interpersonal skills? Is it acceptable
that a student can talk to someone halfway
around the world via instant messaging but
not be able to get along with the student
sitting next to her in a classroom?
Technology can enhance traditional
methods of learning but cannot replace the
human touch.
Back to Table of Contents.

Contenu connexe

Tendances

Cyber interaction and collaboration
Cyber interaction and collaborationCyber interaction and collaboration
Cyber interaction and collaborationalhooti11
 
Professional Writing Presentation
Professional Writing PresentationProfessional Writing Presentation
Professional Writing PresentationKwilliams23
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyalovel
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13mwilson518
 
What is social media
What is social mediaWhat is social media
What is social mediatessausman
 
The Three 100s of Communications in the Digital World
The Three 100s of Communications in the Digital WorldThe Three 100s of Communications in the Digital World
The Three 100s of Communications in the Digital WorldJ T "Tom" Johnson
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentationshannoncmorris
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonPatricia M Watson
 
A critical look at the regulation of computer viruses
A critical look at the regulation of computer virusesA critical look at the regulation of computer viruses
A critical look at the regulation of computer virusesUltraUploader
 
Web 2.0 tools
Web 2.0 toolsWeb 2.0 tools
Web 2.0 toolskecke001
 
Module 2 Application Web 2.0 Erin Bennett
Module 2 Application Web 2.0 Erin BennettModule 2 Application Web 2.0 Erin Bennett
Module 2 Application Web 2.0 Erin BennettErin Bennett
 
Digital Literacy PDLM
Digital Literacy PDLMDigital Literacy PDLM
Digital Literacy PDLMlinzer85
 

Tendances (18)

Cyber interaction and collaboration
Cyber interaction and collaborationCyber interaction and collaboration
Cyber interaction and collaboration
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Professional Writing Presentation
Professional Writing PresentationProfessional Writing Presentation
Professional Writing Presentation
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
Reflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethicallyReflection on integrating the internet safely and ethically
Reflection on integrating the internet safely and ethically
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Faculty and staff training
Faculty and staff trainingFaculty and staff training
Faculty and staff training
 
techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13
 
What is social media
What is social mediaWhat is social media
What is social media
 
The Three 100s of Communications in the Digital World
The Three 100s of Communications in the Digital WorldThe Three 100s of Communications in the Digital World
The Three 100s of Communications in the Digital World
 
M
MM
M
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 
A critical look at the regulation of computer viruses
A critical look at the regulation of computer virusesA critical look at the regulation of computer viruses
A critical look at the regulation of computer viruses
 
Web 2.0 tools
Web 2.0 toolsWeb 2.0 tools
Web 2.0 tools
 
Module 2 Application Web 2.0 Erin Bennett
Module 2 Application Web 2.0 Erin BennettModule 2 Application Web 2.0 Erin Bennett
Module 2 Application Web 2.0 Erin Bennett
 
Digital Literacy PDLM
Digital Literacy PDLMDigital Literacy PDLM
Digital Literacy PDLM
 

En vedette

SharePoint och PowerShell
SharePoint och PowerShellSharePoint och PowerShell
SharePoint och PowerShellmirontoli
 
Revised+Presentation+For+Project
Revised+Presentation+For+ProjectRevised+Presentation+For+Project
Revised+Presentation+For+Projectestraros
 
Що таке Derevo.info
Що таке Derevo.infoЩо таке Derevo.info
Що таке Derevo.infoMMedia
 
Korean Missile Crisis
Korean Missile CrisisKorean Missile Crisis
Korean Missile Crisisguestf02da6
 
City Realty Vinings V8
City Realty Vinings V8City Realty Vinings V8
City Realty Vinings V8laurakcity
 
Videoleti инструкция
Videoleti инструкцияVideoleti инструкция
Videoleti инструкцияSergey Tumashev
 
Идеология общения обучения flipped webinar
Идеология общения  обучения  flipped webinarИдеология общения  обучения  flipped webinar
Идеология общения обучения flipped webinarSergey Tumashev
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

En vedette (9)

SharePoint och PowerShell
SharePoint och PowerShellSharePoint och PowerShell
SharePoint och PowerShell
 
Revised+Presentation+For+Project
Revised+Presentation+For+ProjectRevised+Presentation+For+Project
Revised+Presentation+For+Project
 
Що таке Derevo.info
Що таке Derevo.infoЩо таке Derevo.info
Що таке Derevo.info
 
Korean Missile Crisis
Korean Missile CrisisKorean Missile Crisis
Korean Missile Crisis
 
City Realty Vinings V8
City Realty Vinings V8City Realty Vinings V8
City Realty Vinings V8
 
Videoleti инструкция
Videoleti инструкцияVideoleti инструкция
Videoleti инструкция
 
Идеология общения обучения flipped webinar
Идеология общения  обучения  flipped webinarИдеология общения  обучения  flipped webinar
Идеология общения обучения flipped webinar
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similaire à Computer Technology (20)

Computer Technology
Computer TechnologyComputer Technology
Computer Technology
 
ComTech
ComTechComTech
ComTech
 
Essay About Internet
Essay About InternetEssay About Internet
Essay About Internet
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Essay About Internet
Essay About InternetEssay About Internet
Essay About Internet
 
Essay About Surfing The Internet
Essay About Surfing The InternetEssay About Surfing The Internet
Essay About Surfing The Internet
 
Essay About The Internet
Essay About The InternetEssay About The Internet
Essay About The Internet
 
Internet Essay Topics
Internet Essay TopicsInternet Essay Topics
Internet Essay Topics
 
Essay Topic Internet
Essay Topic InternetEssay Topic Internet
Essay Topic Internet
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses
VirusesViruses
Viruses
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
 
Computer virus
Computer virusComputer virus
Computer virus
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
Computers a boon or a bane.pdf
Computers a boon or a bane.pdfComputers a boon or a bane.pdf
Computers a boon or a bane.pdf
 
Technology In The Classroom
Technology In The ClassroomTechnology In The Classroom
Technology In The Classroom
 

Dernier

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Dernier (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Computer Technology

  • 1. Prepared by: Fernando A. Alvis BSEd-I-B
  • 2. Table of Contents: History Advantages and Disadvantages of Technology in Education
  • 3. History The first all-electronic computer was built in 1943 and was run by vacuum tubes. By the late 1950's, semiconductors were in use and by the 1960's, computers were found at major universities. Home computers became common in the 1980's and 1990's, when laptops became popular among students. Click here to learn more.
  • 4. Significance Computer technology revolutionized the calculation of formulas in mathematics and physics as well as brought about the space race. Computer technology is now used in theoretical modeling and medical research.
  • 5. Time Frame While computer technology changes by the minute, the past 50 years are considered to be the modern age of computing. The first mechanical calculator, the abacus, was invented around 3000 B.C.
  • 6. Features Computer technology allows for processing of information faster than the human brain can calculate. However, such technology is prone to errors and is at the mercy of mechanical components which can wear out and software which can become corrupted by computer viruses.
  • 7. Considerations Nearly everything in our modern world is influenced by computer technology. Timing of traffic signals, telecommunications, and even time keeping are controlled by advanced computer technology. In our everyday lives, a simple trip to the grocery can result in multiple interfaces with computer technology.
  • 8. Benefits The benefits of computer technology include scientific discovery, advanced communications, and the speed of processing information.
  • 9. Different Kinds of Computer Viruses click here to learn more.
  • 10. Resident Viruses Resident viruses are the type of viruses that hang out in the RAM (random access memory) and steal valuable space, reducing the performance of your computer. This type of virus has the ability to infect any operation conducted by the system, corrupting files and programs.
  • 11. Direct Action Viruses Direct action viruses are more malicious in that the intent is to infect a computer, replicate and then execute when activated. This type of virus activates when specific conditions are met and go to work infecting specific file folders and systems, rendering the PC useless in most cases. This type of virus is always located in the root directory and goes to work when the computer is booted.
  • 12. Overwrite Viruses Overwrite viruses do just what the name implies. The virus infects files, deleting or overwriting specific information and rendering the file useless to the computer. Files can be "cleaned" by deleting them and reloading or re-creating them, but this is costly and time consuming.
  • 13. Boot Viruses Boot viruses reside on the boot sector or a hard drive, where the files necessary for the computer to boot and run reside. Boot viruses interrupt the computer's ability to boot, rendering the entire PC useless. Boot viruses are generally passed by the use of floppy disks.
  • 14. Macro Viruses Macro viruses hide in the macros of certain files. A list of instructions can be programmed into a macro virus and executed as one action, making them particularly nasty viruses.
  • 15. Directory Viruses Directory viruses are the ones most commonly activated when a user opens an email attachment with an .exe or .com extension. The virus has the unique ability to relocate the virus files after activation, making cleaning impossible.
  • 16. Polymorphic Viruses Polymorphic viruses have the ability to change their encryption every time they are activated, making them invisible to virus scan software, giving them free reign to replicate at will.
  • 17. Companion Viruses Companion viruses look much like resident viruses or direct action viruses. They are known as companion viruses because once they get into the system, they "accompany" the other files that already exist. In other words, to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).
  • 18. Back to Table of Contents.
  • 19. Advantage: Potential The technology available today has made a wealth of knowledge available to students, which offers great potential for the speed and style of learning. Information is presented in so many ways that any type learner, whether gifted or disabled, can find and use the necessary material. This fact relates not only to the Internet, but to all the many technological improvements in learning, from smart boards to handheld dictionaries.
  • 20. Disadvantage: Loss of Skills With this increased access to knowledge also comes a probable loss of communication skills and interactive abilities between students and teacher, and students to peers. These skills are not as necessary in a classroom of computers, where individuality is a component of learning and is encouraged. Aside from learning, conflict resolution and socialization used to be two prominent reasons children came to school. The emphasis now has shifted away from these areas.
  • 21. Advantage: Access to all Education is no longer the elitist privilege it once was. The information on the Internet is there for all who have access, without discrimination. People of all social strata are able to use technological advances, which is a fairly new academic development in America.
  • 22. Disadvantage: Poor remain poor While general access is not denied, some children may not be exposed to computers and other technology because of socio-economic status. A child may live in a home without a computer, and chances are he will attend a poor school district with limited numbers of computers available. A student may get to use a computer for a short time, or only as a once-a-week activity instead of a regular class period. This puts these children at a disadvantage in learning technological functions. Poor districts are also most likely not to be the recipients of other technological modes of learning.
  • 23. Advantages vs. Disadvantages The computer age is here; this cannot be debated. Is it better for children to have access to computers with all their data at the loss of interpersonal skills? Is it acceptable that a student can talk to someone halfway around the world via instant messaging but not be able to get along with the student sitting next to her in a classroom? Technology can enhance traditional methods of learning but cannot replace the human touch.
  • 24. Back to Table of Contents.