SlideShare une entreprise Scribd logo
1  sur  24
Prepared by:
Fernando A. Alvis
    BSEd-I-B
Table of Contents:

History


Advantages and Disadvantages of
 Technology in Education
History
     The first all-electronic computer was
 built in 1943 and was run by vacuum tubes.
 By the late 1950's, semiconductors were in
 use and by the 1960's, computers were found
 at major universities. Home computers
 became common in the 1980's and
 1990's, when laptops became popular among
 students.

Click here to learn more.
Significance

     Computer technology revolutionized the
 calculation of formulas in mathematics and
 physics as well as brought about the space
 race. Computer technology is now used in
 theoretical modeling and medical research.
Time Frame

    While computer technology changes by
the minute, the past 50 years are considered
to be the modern age of computing. The
first mechanical calculator, the abacus, was
invented around 3000 B.C.
Features
    Computer technology allows for
processing of information faster than the
human brain can calculate. However, such
technology is prone to errors and is at the
mercy of mechanical components which can
wear out and software which can become
corrupted by computer viruses.
Considerations
    Nearly everything in our modern world
is influenced by computer technology.
Timing                 of               traffic
signals, telecommunications, and even time
keeping are controlled by advanced
computer technology. In our everyday
lives, a simple trip to the grocery can result
in multiple interfaces with computer
technology.
Benefits

    The benefits of computer technology
include scientific discovery, advanced
communications, and the speed of
processing information.
Different Kinds of Computer Viruses




    click here to learn more.
Resident Viruses

    Resident viruses are the type of viruses
that hang out in the RAM (random access
memory) and steal valuable space, reducing
the performance of your computer. This type
of virus has the ability to infect any
operation       conducted        by      the
system, corrupting files and programs.
Direct Action Viruses
     Direct action viruses are more malicious
 in that the intent is to infect a
 computer, replicate and then execute when
 activated. This type of virus activates when
 specific conditions are met and go to work
 infecting    specific   file    folders   and
 systems, rendering the PC useless in most
 cases. This type of virus is always located in
 the root directory and goes to work when
 the computer is booted.
Overwrite Viruses

    Overwrite viruses do just what the name
implies. The virus infects files, deleting or
overwriting specific information and
rendering the file useless to the computer.
Files can be "cleaned" by deleting them and
reloading or re-creating them, but this is
costly and time consuming.
Boot Viruses

    Boot viruses reside on the boot sector or
a hard drive, where the files necessary for
the computer to boot and run reside. Boot
viruses interrupt the computer's ability to
boot, rendering the entire PC useless. Boot
viruses are generally passed by the use of
floppy disks.
Macro Viruses

    Macro viruses hide in the macros of
certain files. A list of instructions can be
programmed into a macro virus and
executed as one action, making them
particularly          nasty           viruses.
Directory Viruses

     Directory viruses are the ones most
 commonly activated when a user opens an
 email attachment with an .exe or .com
 extension. The virus has the unique ability
 to    relocate  the    virus  files  after
 activation, making cleaning impossible.
Polymorphic Viruses

    Polymorphic viruses have the ability to
change their encryption every time they are
activated, making them invisible to virus
scan software, giving them free reign to
replicate             at               will.
Companion Viruses
     Companion viruses look much like resident
viruses or direct action viruses. They are known
as companion viruses because once they get
into the system, they "accompany" the other
files that already exist. In other words, to carry
out their infection routines, companion viruses
can wait in memory until a program is run
(resident viruses) or act immediately by
making copies of themselves (direct action
viruses).
Back to Table of Contents.
Advantage: Potential
     The technology available today has
 made a wealth of knowledge available to
 students, which offers great potential for the
 speed and style of learning. Information is
 presented in so many ways that any type
 learner, whether gifted or disabled, can find
 and use the necessary material. This fact
 relates not only to the Internet, but to all the
 many technological improvements in
 learning, from smart boards to handheld
 dictionaries.
Disadvantage: Loss of Skills
     With this increased access to knowledge
 also     comes    a   probable     loss   of
 communication skills and interactive
 abilities between students and teacher, and
 students to peers. These skills are not as
 necessary      in    a     classroom      of
 computers, where individuality is a
 component of learning and is encouraged.
 Aside from learning, conflict resolution and
 socialization used to be two prominent
 reasons children came to school. The
 emphasis now has shifted away from these
 areas.
Advantage: Access to all

     Education is no longer the elitist
 privilege it once was. The information on
 the Internet is there for all who have
 access, without discrimination. People of all
 social strata are able to use technological
 advances, which is a fairly new academic
 development in America.
Disadvantage: Poor remain poor
     While general access is not denied, some
 children may not be exposed to computers and
 other technology because of socio-economic
 status. A child may live in a home without a
 computer, and chances are he will attend a poor
 school district with limited numbers of computers
 available. A student may get to use a computer for
 a short time, or only as a once-a-week activity
 instead of a regular class period. This puts these
 children at a disadvantage in learning
 technological functions. Poor districts are also
 most likely not to be the recipients of other
 technological modes of learning.
Advantages vs. Disadvantages
     The computer age is here; this cannot be
debated. Is it better for children to have
access to computers with all their data at the
loss of interpersonal skills? Is it acceptable
that a student can talk to someone halfway
around the world via instant messaging but
not be able to get along with the student
sitting next to her in a classroom?
Technology can enhance traditional
methods of learning but cannot replace the
human touch.
Back to Table of Contents.

Contenu connexe

Tendances

Internet and youth in albania today
Internet and youth in albania todayInternet and youth in albania today
Internet and youth in albania today
Boni Tufa
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
Amplephi
 
techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13
mwilson518
 

Tendances (14)

Online community-tools
Online community-toolsOnline community-tools
Online community-tools
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
 
Advantages and drawbacks of the Internet
Advantages and drawbacks of the InternetAdvantages and drawbacks of the Internet
Advantages and drawbacks of the Internet
 
Professional Writing Presentation
Professional Writing PresentationProfessional Writing Presentation
Professional Writing Presentation
 
EDET 637
EDET 637EDET 637
EDET 637
 
Internet and youth in albania today
Internet and youth in albania todayInternet and youth in albania today
Internet and youth in albania today
 
Protect
ProtectProtect
Protect
 
The effect of computer literacy on university of maiduguri students’ attitude...
The effect of computer literacy on university of maiduguri students’ attitude...The effect of computer literacy on university of maiduguri students’ attitude...
The effect of computer literacy on university of maiduguri students’ attitude...
 
Faculty and staff training
Faculty and staff trainingFaculty and staff training
Faculty and staff training
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
 
Why Web 20
Why Web 20Why Web 20
Why Web 20
 
techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13
 
The Hidden Dangers of Social Networks: You can log-on but you cannot hide
The Hidden Dangers of Social Networks: You can log-on but you cannot hideThe Hidden Dangers of Social Networks: You can log-on but you cannot hide
The Hidden Dangers of Social Networks: You can log-on but you cannot hide
 
E tech (q1-lesson1)
E tech (q1-lesson1)E tech (q1-lesson1)
E tech (q1-lesson1)
 

Similaire à ComTech

Essay About Internet
Essay About InternetEssay About Internet
Essay About Internet
ThesisPapersForSaleM
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
Joy Chakraborty
 
A critical look at the regulation of computer viruses
A critical look at the regulation of computer virusesA critical look at the regulation of computer viruses
A critical look at the regulation of computer viruses
UltraUploader
 

Similaire à ComTech (20)

Computer Technology
Computer TechnologyComputer Technology
Computer Technology
 
ComTech
ComTechComTech
ComTech
 
Essay About Internet
Essay About InternetEssay About Internet
Essay About Internet
 
Essay About Internet
Essay About InternetEssay About Internet
Essay About Internet
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Essay About Surfing The Internet
Essay About Surfing The InternetEssay About Surfing The Internet
Essay About Surfing The Internet
 
Essay About The Internet
Essay About The InternetEssay About The Internet
Essay About The Internet
 
Internet Essay Topics
Internet Essay TopicsInternet Essay Topics
Internet Essay Topics
 
Essay Topic Internet
Essay Topic InternetEssay Topic Internet
Essay Topic Internet
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses
VirusesViruses
Viruses
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computers a boon or a bane.pdf
Computers a boon or a bane.pdfComputers a boon or a bane.pdf
Computers a boon or a bane.pdf
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
 
Computer virus
Computer virusComputer virus
Computer virus
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
A critical look at the regulation of computer viruses
A critical look at the regulation of computer virusesA critical look at the regulation of computer viruses
A critical look at the regulation of computer viruses
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

ComTech

  • 1. Prepared by: Fernando A. Alvis BSEd-I-B
  • 2. Table of Contents: History Advantages and Disadvantages of Technology in Education
  • 3. History The first all-electronic computer was built in 1943 and was run by vacuum tubes. By the late 1950's, semiconductors were in use and by the 1960's, computers were found at major universities. Home computers became common in the 1980's and 1990's, when laptops became popular among students. Click here to learn more.
  • 4. Significance Computer technology revolutionized the calculation of formulas in mathematics and physics as well as brought about the space race. Computer technology is now used in theoretical modeling and medical research.
  • 5. Time Frame While computer technology changes by the minute, the past 50 years are considered to be the modern age of computing. The first mechanical calculator, the abacus, was invented around 3000 B.C.
  • 6. Features Computer technology allows for processing of information faster than the human brain can calculate. However, such technology is prone to errors and is at the mercy of mechanical components which can wear out and software which can become corrupted by computer viruses.
  • 7. Considerations Nearly everything in our modern world is influenced by computer technology. Timing of traffic signals, telecommunications, and even time keeping are controlled by advanced computer technology. In our everyday lives, a simple trip to the grocery can result in multiple interfaces with computer technology.
  • 8. Benefits The benefits of computer technology include scientific discovery, advanced communications, and the speed of processing information.
  • 9. Different Kinds of Computer Viruses click here to learn more.
  • 10. Resident Viruses Resident viruses are the type of viruses that hang out in the RAM (random access memory) and steal valuable space, reducing the performance of your computer. This type of virus has the ability to infect any operation conducted by the system, corrupting files and programs.
  • 11. Direct Action Viruses Direct action viruses are more malicious in that the intent is to infect a computer, replicate and then execute when activated. This type of virus activates when specific conditions are met and go to work infecting specific file folders and systems, rendering the PC useless in most cases. This type of virus is always located in the root directory and goes to work when the computer is booted.
  • 12. Overwrite Viruses Overwrite viruses do just what the name implies. The virus infects files, deleting or overwriting specific information and rendering the file useless to the computer. Files can be "cleaned" by deleting them and reloading or re-creating them, but this is costly and time consuming.
  • 13. Boot Viruses Boot viruses reside on the boot sector or a hard drive, where the files necessary for the computer to boot and run reside. Boot viruses interrupt the computer's ability to boot, rendering the entire PC useless. Boot viruses are generally passed by the use of floppy disks.
  • 14. Macro Viruses Macro viruses hide in the macros of certain files. A list of instructions can be programmed into a macro virus and executed as one action, making them particularly nasty viruses.
  • 15. Directory Viruses Directory viruses are the ones most commonly activated when a user opens an email attachment with an .exe or .com extension. The virus has the unique ability to relocate the virus files after activation, making cleaning impossible.
  • 16. Polymorphic Viruses Polymorphic viruses have the ability to change their encryption every time they are activated, making them invisible to virus scan software, giving them free reign to replicate at will.
  • 17. Companion Viruses Companion viruses look much like resident viruses or direct action viruses. They are known as companion viruses because once they get into the system, they "accompany" the other files that already exist. In other words, to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).
  • 18. Back to Table of Contents.
  • 19. Advantage: Potential The technology available today has made a wealth of knowledge available to students, which offers great potential for the speed and style of learning. Information is presented in so many ways that any type learner, whether gifted or disabled, can find and use the necessary material. This fact relates not only to the Internet, but to all the many technological improvements in learning, from smart boards to handheld dictionaries.
  • 20. Disadvantage: Loss of Skills With this increased access to knowledge also comes a probable loss of communication skills and interactive abilities between students and teacher, and students to peers. These skills are not as necessary in a classroom of computers, where individuality is a component of learning and is encouraged. Aside from learning, conflict resolution and socialization used to be two prominent reasons children came to school. The emphasis now has shifted away from these areas.
  • 21. Advantage: Access to all Education is no longer the elitist privilege it once was. The information on the Internet is there for all who have access, without discrimination. People of all social strata are able to use technological advances, which is a fairly new academic development in America.
  • 22. Disadvantage: Poor remain poor While general access is not denied, some children may not be exposed to computers and other technology because of socio-economic status. A child may live in a home without a computer, and chances are he will attend a poor school district with limited numbers of computers available. A student may get to use a computer for a short time, or only as a once-a-week activity instead of a regular class period. This puts these children at a disadvantage in learning technological functions. Poor districts are also most likely not to be the recipients of other technological modes of learning.
  • 23. Advantages vs. Disadvantages The computer age is here; this cannot be debated. Is it better for children to have access to computers with all their data at the loss of interpersonal skills? Is it acceptable that a student can talk to someone halfway around the world via instant messaging but not be able to get along with the student sitting next to her in a classroom? Technology can enhance traditional methods of learning but cannot replace the human touch.
  • 24. Back to Table of Contents.