SlideShare une entreprise Scribd logo
1  sur  24
Prepared by:
Fernando A. Alvis
    BSEd-I-B
Table of Contents:

History


Advantages and Disadvantages of
 Technology in Education
History
     The first all-electronic computer was
 built in 1943 and was run by vacuum tubes.
 By the late 1950's, semiconductors were in
 use and by the 1960's, computers were found
 at major universities. Home computers
 became common in the 1980's and
 1990's, when laptops became popular among
 students.

Click here to learn more.
Significance

     Computer technology revolutionized the
 calculation of formulas in mathematics and
 physics as well as brought about the space
 race. Computer technology is now used in
 theoretical modeling and medical research.
Time Frame

    While computer technology changes by
the minute, the past 50 years are considered
to be the modern age of computing. The
first mechanical calculator, the abacus, was
invented around 3000 B.C.
Features
    Computer technology allows for
processing of information faster than the
human brain can calculate. However, such
technology is prone to errors and is at the
mercy of mechanical components which can
wear out and software which can become
corrupted by computer viruses.
Considerations
    Nearly everything in our modern world
is influenced by computer technology.
Timing                 of               traffic
signals, telecommunications, and even time
keeping are controlled by advanced
computer technology. In our everyday
lives, a simple trip to the grocery can result
in multiple interfaces with computer
technology.
Benefits

    The benefits of computer technology
include scientific discovery, advanced
communications, and the speed of
processing information.
Different Kinds of Computer Viruses




    click here to learn more.
Resident Viruses

    Resident viruses are the type of viruses
that hang out in the RAM (random access
memory) and steal valuable space, reducing
the performance of your computer. This type
of virus has the ability to infect any
operation       conducted        by      the
system, corrupting files and programs.
Direct Action Viruses
     Direct action viruses are more malicious
 in that the intent is to infect a
 computer, replicate and then execute when
 activated. This type of virus activates when
 specific conditions are met and go to work
 infecting    specific   file    folders   and
 systems, rendering the PC useless in most
 cases. This type of virus is always located in
 the root directory and goes to work when
 the computer is booted.
Overwrite Viruses

    Overwrite viruses do just what the name
implies. The virus infects files, deleting or
overwriting specific information and
rendering the file useless to the computer.
Files can be "cleaned" by deleting them and
reloading or re-creating them, but this is
costly and time consuming.
Boot Viruses

    Boot viruses reside on the boot sector or
a hard drive, where the files necessary for
the computer to boot and run reside. Boot
viruses interrupt the computer's ability to
boot, rendering the entire PC useless. Boot
viruses are generally passed by the use of
floppy disks.
Macro Viruses

    Macro viruses hide in the macros of
certain files. A list of instructions can be
programmed into a macro virus and
executed as one action, making them
particularly          nasty           viruses.
Directory Viruses

     Directory viruses are the ones most
 commonly activated when a user opens an
 email attachment with an .exe or .com
 extension. The virus has the unique ability
 to    relocate  the    virus  files  after
 activation, making cleaning impossible.
Polymorphic Viruses

    Polymorphic viruses have the ability to
change their encryption every time they are
activated, making them invisible to virus
scan software, giving them free reign to
replicate             at               will.
Companion Viruses
     Companion viruses look much like resident
viruses or direct action viruses. They are known
as companion viruses because once they get
into the system, they "accompany" the other
files that already exist. In other words, to carry
out their infection routines, companion viruses
can wait in memory until a program is run
(resident viruses) or act immediately by
making copies of themselves (direct action
viruses).
Back to Table of Contents.
Advantage: Potential
     The technology available today has
 made a wealth of knowledge available to
 students, which offers great potential for the
 speed and style of learning. Information is
 presented in so many ways that any type
 learner, whether gifted or disabled, can find
 and use the necessary material. This fact
 relates not only to the Internet, but to all the
 many technological improvements in
 learning, from smart boards to handheld
 dictionaries.
Disadvantage: Loss of Skills
     With this increased access to knowledge
 also     comes    a   probable     loss   of
 communication skills and interactive
 abilities between students and teacher, and
 students to peers. These skills are not as
 necessary      in    a     classroom      of
 computers, where individuality is a
 component of learning and is encouraged.
 Aside from learning, conflict resolution and
 socialization used to be two prominent
 reasons children came to school. The
 emphasis now has shifted away from these
 areas.
Advantage: Access to all

     Education is no longer the elitist
 privilege it once was. The information on
 the Internet is there for all who have
 access, without discrimination. People of all
 social strata are able to use technological
 advances, which is a fairly new academic
 development in America.
Disadvantage: Poor remain poor
     While general access is not denied, some
 children may not be exposed to computers and
 other technology because of socio-economic
 status. A child may live in a home without a
 computer, and chances are he will attend a poor
 school district with limited numbers of computers
 available. A student may get to use a computer for
 a short time, or only as a once-a-week activity
 instead of a regular class period. This puts these
 children at a disadvantage in learning
 technological functions. Poor districts are also
 most likely not to be the recipients of other
 technological modes of learning.
Advantages vs. Disadvantages
     The computer age is here; this cannot be
debated. Is it better for children to have
access to computers with all their data at the
loss of interpersonal skills? Is it acceptable
that a student can talk to someone halfway
around the world via instant messaging but
not be able to get along with the student
sitting next to her in a classroom?
Technology can enhance traditional
methods of learning but cannot replace the
human touch.
Back to Table of Contents.

Contenu connexe

Tendances

COMPUTERS IN EDUCATION - UNIT 8 - ROLE OF COMPUTER IN EDUCATION - B.ED - 8620...
COMPUTERS IN EDUCATION - UNIT 8 - ROLE OF COMPUTER IN EDUCATION - B.ED - 8620...COMPUTERS IN EDUCATION - UNIT 8 - ROLE OF COMPUTER IN EDUCATION - B.ED - 8620...
COMPUTERS IN EDUCATION - UNIT 8 - ROLE OF COMPUTER IN EDUCATION - B.ED - 8620...EqraBaig
 
Ict presentation[1][2]
Ict presentation[1][2]Ict presentation[1][2]
Ict presentation[1][2]Seeta Ali
 
computers in our everyday lives
computers in our everyday livescomputers in our everyday lives
computers in our everyday livesKeitumetse Mohale
 
Advantages and disadvantages of computer system
Advantages and disadvantages of computer systemAdvantages and disadvantages of computer system
Advantages and disadvantages of computer systemparag dhok
 
role of ICT in education
role of ICT in educationrole of ICT in education
role of ICT in educationVaibhav Dubey
 
Introduction to information technology
Introduction to information technologyIntroduction to information technology
Introduction to information technologyHaider Ali Malik
 
Concept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptxConcept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptxMDNAFAYAFZAL
 
The importance of computer
The importance of computerThe importance of computer
The importance of computerN.s. Shorna
 
Uses of computer in medical field
Uses of computer in medical fieldUses of computer in medical field
Uses of computer in medical fieldUCP
 
The Internet and Its Importance
The Internet and Its ImportanceThe Internet and Its Importance
The Internet and Its ImportanceChuchi Dilao
 
Input and output devices ppt
Input and output devices pptInput and output devices ppt
Input and output devices pptbjslides
 
Advantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki VermaAdvantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki VermaWikki Verma
 
Using digital devices
Using digital devicesUsing digital devices
Using digital devicesAmina Tariq
 
Social Media in Education
Social Media in EducationSocial Media in Education
Social Media in EducationOnasanya2014
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and softwareDr. Ahmed Al Zaidy
 
The impact of information technology on society
The impact of information technology on societyThe impact of information technology on society
The impact of information technology on societySandra Bloomfield
 

Tendances (20)

COMPUTERS IN EDUCATION - UNIT 8 - ROLE OF COMPUTER IN EDUCATION - B.ED - 8620...
COMPUTERS IN EDUCATION - UNIT 8 - ROLE OF COMPUTER IN EDUCATION - B.ED - 8620...COMPUTERS IN EDUCATION - UNIT 8 - ROLE OF COMPUTER IN EDUCATION - B.ED - 8620...
COMPUTERS IN EDUCATION - UNIT 8 - ROLE OF COMPUTER IN EDUCATION - B.ED - 8620...
 
Ict presentation[1][2]
Ict presentation[1][2]Ict presentation[1][2]
Ict presentation[1][2]
 
computers in our everyday lives
computers in our everyday livescomputers in our everyday lives
computers in our everyday lives
 
Advantages and disadvantages of computer system
Advantages and disadvantages of computer systemAdvantages and disadvantages of computer system
Advantages and disadvantages of computer system
 
role of ICT in education
role of ICT in educationrole of ICT in education
role of ICT in education
 
Introduction to information technology
Introduction to information technologyIntroduction to information technology
Introduction to information technology
 
Information Technology and its Applications
Information Technology and its ApplicationsInformation Technology and its Applications
Information Technology and its Applications
 
Concept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptxConcept need and importance of internet in Education.pptx
Concept need and importance of internet in Education.pptx
 
Importance of computer
Importance of computer Importance of computer
Importance of computer
 
The importance of computer
The importance of computerThe importance of computer
The importance of computer
 
Uses of computer in medical field
Uses of computer in medical fieldUses of computer in medical field
Uses of computer in medical field
 
Impact of computers on society
Impact of computers on societyImpact of computers on society
Impact of computers on society
 
The Internet and Its Importance
The Internet and Its ImportanceThe Internet and Its Importance
The Internet and Its Importance
 
Input and output devices ppt
Input and output devices pptInput and output devices ppt
Input and output devices ppt
 
Advantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki VermaAdvantages of Information Technology – Wikki Verma
Advantages of Information Technology – Wikki Verma
 
Tools Of ICT
Tools Of ICTTools Of ICT
Tools Of ICT
 
Using digital devices
Using digital devicesUsing digital devices
Using digital devices
 
Social Media in Education
Social Media in EducationSocial Media in Education
Social Media in Education
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and software
 
The impact of information technology on society
The impact of information technology on societyThe impact of information technology on society
The impact of information technology on society
 

En vedette

MediaMosa and webservices
MediaMosa and webservicesMediaMosa and webservices
MediaMosa and webservicesMediaMosa
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet securityhimeag
 
Consumer electronics seminar
Consumer electronics seminarConsumer electronics seminar
Consumer electronics seminarSai Ram
 
Central processing unit
Central processing unitCentral processing unit
Central processing unitmariolinov
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAnnies Minu
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technologyguest7453829
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus tayyaba rashid
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014Shwana M
 

En vedette (20)

Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
MediaMosa and webservices
MediaMosa and webservicesMediaMosa and webservices
MediaMosa and webservices
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Computer security 101
Computer security 101Computer security 101
Computer security 101
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Consumer electronics seminar
Consumer electronics seminarConsumer electronics seminar
Consumer electronics seminar
 
Virus part1
Virus part1Virus part1
Virus part1
 
Computer virus
Computer virusComputer virus
Computer virus
 
Central processing unit
Central processing unitCentral processing unit
Central processing unit
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technology
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
Generations of Computer
Generations of ComputerGenerations of Computer
Generations of Computer
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 

Similaire à Computer Technology

computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer VandalismAditya Singh
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Vatsal Unadkat
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Computer virus
Computer virusComputer virus
Computer virusDark Side
 
Computers a boon or a bane.pdf
Computers a boon or a bane.pdfComputers a boon or a bane.pdf
Computers a boon or a bane.pdfHome
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...theijes
 
A critical look at the regulation of computer viruses
A critical look at the regulation of computer virusesA critical look at the regulation of computer viruses
A critical look at the regulation of computer virusesUltraUploader
 
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesUsers’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesSolomon Sunday Oyelere
 

Similaire à Computer Technology (20)

ComTech
ComTechComTech
ComTech
 
Essay About Internet
Essay About InternetEssay About Internet
Essay About Internet
 
Essay About Internet
Essay About InternetEssay About Internet
Essay About Internet
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Essay About Surfing The Internet
Essay About Surfing The InternetEssay About Surfing The Internet
Essay About Surfing The Internet
 
Essay About The Internet
Essay About The InternetEssay About The Internet
Essay About The Internet
 
Internet Essay Topics
Internet Essay TopicsInternet Essay Topics
Internet Essay Topics
 
Essay Topic Internet
Essay Topic InternetEssay Topic Internet
Essay Topic Internet
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses
VirusesViruses
Viruses
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computers a boon or a bane.pdf
Computers a boon or a bane.pdfComputers a boon or a bane.pdf
Computers a boon or a bane.pdf
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
 
Computer virus
Computer virusComputer virus
Computer virus
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
A critical look at the regulation of computer viruses
A critical look at the regulation of computer virusesA critical look at the regulation of computer viruses
A critical look at the regulation of computer viruses
 
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesUsers’ Perception of the Effects of Viruses
Users’ Perception of the Effects of Viruses
 

Dernier

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Dernier (20)

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

Computer Technology

  • 1. Prepared by: Fernando A. Alvis BSEd-I-B
  • 2. Table of Contents: History Advantages and Disadvantages of Technology in Education
  • 3. History The first all-electronic computer was built in 1943 and was run by vacuum tubes. By the late 1950's, semiconductors were in use and by the 1960's, computers were found at major universities. Home computers became common in the 1980's and 1990's, when laptops became popular among students. Click here to learn more.
  • 4. Significance Computer technology revolutionized the calculation of formulas in mathematics and physics as well as brought about the space race. Computer technology is now used in theoretical modeling and medical research.
  • 5. Time Frame While computer technology changes by the minute, the past 50 years are considered to be the modern age of computing. The first mechanical calculator, the abacus, was invented around 3000 B.C.
  • 6. Features Computer technology allows for processing of information faster than the human brain can calculate. However, such technology is prone to errors and is at the mercy of mechanical components which can wear out and software which can become corrupted by computer viruses.
  • 7. Considerations Nearly everything in our modern world is influenced by computer technology. Timing of traffic signals, telecommunications, and even time keeping are controlled by advanced computer technology. In our everyday lives, a simple trip to the grocery can result in multiple interfaces with computer technology.
  • 8. Benefits The benefits of computer technology include scientific discovery, advanced communications, and the speed of processing information.
  • 9. Different Kinds of Computer Viruses click here to learn more.
  • 10. Resident Viruses Resident viruses are the type of viruses that hang out in the RAM (random access memory) and steal valuable space, reducing the performance of your computer. This type of virus has the ability to infect any operation conducted by the system, corrupting files and programs.
  • 11. Direct Action Viruses Direct action viruses are more malicious in that the intent is to infect a computer, replicate and then execute when activated. This type of virus activates when specific conditions are met and go to work infecting specific file folders and systems, rendering the PC useless in most cases. This type of virus is always located in the root directory and goes to work when the computer is booted.
  • 12. Overwrite Viruses Overwrite viruses do just what the name implies. The virus infects files, deleting or overwriting specific information and rendering the file useless to the computer. Files can be "cleaned" by deleting them and reloading or re-creating them, but this is costly and time consuming.
  • 13. Boot Viruses Boot viruses reside on the boot sector or a hard drive, where the files necessary for the computer to boot and run reside. Boot viruses interrupt the computer's ability to boot, rendering the entire PC useless. Boot viruses are generally passed by the use of floppy disks.
  • 14. Macro Viruses Macro viruses hide in the macros of certain files. A list of instructions can be programmed into a macro virus and executed as one action, making them particularly nasty viruses.
  • 15. Directory Viruses Directory viruses are the ones most commonly activated when a user opens an email attachment with an .exe or .com extension. The virus has the unique ability to relocate the virus files after activation, making cleaning impossible.
  • 16. Polymorphic Viruses Polymorphic viruses have the ability to change their encryption every time they are activated, making them invisible to virus scan software, giving them free reign to replicate at will.
  • 17. Companion Viruses Companion viruses look much like resident viruses or direct action viruses. They are known as companion viruses because once they get into the system, they "accompany" the other files that already exist. In other words, to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).
  • 18. Back to Table of Contents.
  • 19. Advantage: Potential The technology available today has made a wealth of knowledge available to students, which offers great potential for the speed and style of learning. Information is presented in so many ways that any type learner, whether gifted or disabled, can find and use the necessary material. This fact relates not only to the Internet, but to all the many technological improvements in learning, from smart boards to handheld dictionaries.
  • 20. Disadvantage: Loss of Skills With this increased access to knowledge also comes a probable loss of communication skills and interactive abilities between students and teacher, and students to peers. These skills are not as necessary in a classroom of computers, where individuality is a component of learning and is encouraged. Aside from learning, conflict resolution and socialization used to be two prominent reasons children came to school. The emphasis now has shifted away from these areas.
  • 21. Advantage: Access to all Education is no longer the elitist privilege it once was. The information on the Internet is there for all who have access, without discrimination. People of all social strata are able to use technological advances, which is a fairly new academic development in America.
  • 22. Disadvantage: Poor remain poor While general access is not denied, some children may not be exposed to computers and other technology because of socio-economic status. A child may live in a home without a computer, and chances are he will attend a poor school district with limited numbers of computers available. A student may get to use a computer for a short time, or only as a once-a-week activity instead of a regular class period. This puts these children at a disadvantage in learning technological functions. Poor districts are also most likely not to be the recipients of other technological modes of learning.
  • 23. Advantages vs. Disadvantages The computer age is here; this cannot be debated. Is it better for children to have access to computers with all their data at the loss of interpersonal skills? Is it acceptable that a student can talk to someone halfway around the world via instant messaging but not be able to get along with the student sitting next to her in a classroom? Technology can enhance traditional methods of learning but cannot replace the human touch.
  • 24. Back to Table of Contents.