SlideShare a Scribd company logo
Prepared by:
Fernando A. Alvis
    BSEd-I-B
Table of Contents:

History


Advantages and Disadvantages of
 Technology in Education
History
     The first all-electronic computer was
 built in 1943 and was run by vacuum tubes.
 By the late 1950's, semiconductors were in
 use and by the 1960's, computers were found
 at major universities. Home computers
 became common in the 1980's and 1990's,
 when laptops became popular among
 students.

Click here to learn more.
Significance

     Computer technology revolutionized the
 calculation of formulas in mathematics and
 physics as well as brought about the space
 race. Computer technology is now used in
 theoretical modeling and medical research.
Time Frame

    While computer technology changes by
the minute, the past 50 years are considered
to be the modern age of computing. The
first mechanical calculator, the abacus, was
invented around 3000 B.C.
Features
    Computer technology allows for
processing of information faster than the
human brain can calculate. However, such
technology is prone to errors and is at the
mercy of mechanical components which can
wear out and software which can become
corrupted by computer viruses.
Considerations
    Nearly everything in our modern world
is influenced by computer technology.
Timing         of      traffic       signals,
telecommunications, and even time keeping
are controlled by advanced computer
technology. In our everyday lives, a simple
trip to the grocery can result in multiple
interfaces with computer technology.
Benefits

    The benefits of computer technology
include scientific discovery, advanced
communications, and the speed of
processing information.
Different Kinds of Computer Viruses




    click here to learn more.
Resident Viruses

    Resident viruses are the type of viruses
that hang out in the RAM (random access
memory) and steal valuable space, reducing
the performance of your computer. This type
of virus has the ability to infect any
operation conducted by the system,
corrupting files and programs.
Direct Action Viruses
     Direct action viruses are more malicious
 in that the intent is to infect a computer,
 replicate and then execute when activated.
 This type of virus activates when specific
 conditions are met and go to work infecting
 specific file folders and systems, rendering
 the PC useless in most cases. This type of
 virus is always located in the root directory
 and goes to work when the computer is
 booted.
Overwrite Viruses

    Overwrite viruses do just what the name
implies. The virus infects files, deleting or
overwriting specific information and
rendering the file useless to the computer.
Files can be "cleaned" by deleting them and
reloading or re-creating them, but this is
costly and time consuming.
Boot Viruses

    Boot viruses reside on the boot sector or
a hard drive, where the files necessary for
the computer to boot and run reside. Boot
viruses interrupt the computer's ability to
boot, rendering the entire PC useless. Boot
viruses are generally passed by the use of
floppy disks.
Macro Viruses

    Macro viruses hide in the macros of
certain files. A list of instructions can be
programmed into a macro virus and
executed as one action, making them
particularly          nasty           viruses.
Directory Viruses

     Directory viruses are the ones most
 commonly activated when a user opens an
 email attachment with an .exe or .com
 extension. The virus has the unique ability
 to relocate the virus files after activation,
 making         cleaning          impossible.
Polymorphic Viruses

    Polymorphic viruses have the ability to
change their encryption every time they are
activated, making them invisible to virus
scan software, giving them free reign to
replicate             at               will.
Companion Viruses
     Companion viruses look much like resident
viruses or direct action viruses. They are known
as companion viruses because once they get
into the system, they "accompany" the other
files that already exist. In other words, to carry
out their infection routines, companion viruses
can wait in memory until a program is run
(resident viruses) or act immediately by
making copies of themselves (direct action
viruses).
Back to Table of Contents.
Advantage: Potential
     The technology available today has
 made a wealth of knowledge available to
 students, which offers great potential for the
 speed and style of learning. Information is
 presented in so many ways that any type
 learner, whether gifted or disabled, can find
 and use the necessary material. This fact
 relates not only to the Internet, but to all the
 many technological improvements in
 learning, from smart boards to handheld
 dictionaries.
Disadvantage: Loss of Skills
     With this increased access to knowledge
 also     comes    a    probable    loss  of
 communication skills and interactive
 abilities between students and teacher, and
 students to peers. These skills are not as
 necessary in a classroom of computers,
 where individuality is a component of
 learning and is encouraged. Aside from
 learning,     conflict    resolution    and
 socialization used to be two prominent
 reasons children came to school. The
 emphasis now has shifted away from these
 areas.
Advantage: Access to all

     Education is no longer the elitist
 privilege it once was. The information on
 the Internet is there for all who have access,
 without discrimination. People of all social
 strata are able to use technological
 advances, which is a fairly new academic
 development in America.
Disadvantage: Poor remain poor
     While general access is not denied, some
 children may not be exposed to computers and
 other technology because of socio-economic
 status. A child may live in a home without a
 computer, and chances are he will attend a poor
 school district with limited numbers of computers
 available. A student may get to use a computer for
 a short time, or only as a once-a-week activity
 instead of a regular class period. This puts these
 children at a disadvantage in learning
 technological functions. Poor districts are also
 most likely not to be the recipients of other
 technological modes of learning.
Advantages vs. Disadvantages
     The computer age is here; this cannot be
debated. Is it better for children to have
access to computers with all their data at the
loss of interpersonal skills? Is it acceptable
that a student can talk to someone halfway
around the world via instant messaging but
not be able to get along with the student
sitting next to her in a classroom?
Technology can enhance traditional
methods of learning but cannot replace the
human touch.
Back to Table of Contents.

More Related Content

PPTX
ComTech
guest4e0549
 
PDF
Walking Cyberhalls
F Blanco
 
PPT
Illegal file sharing
Victoria University
 
PPTX
Twitter for Academics .... in 30 minute
UNCG University Libraries
 
PPT
Second Waving Raving
Nancy Wright White
 
PPT
Illegal file sharing4
Victoria University
 
PPT
Illegal File Sharing
Victoria University
 
PPTX
The Dark Side Of The Web
mshin
 
ComTech
guest4e0549
 
Walking Cyberhalls
F Blanco
 
Illegal file sharing
Victoria University
 
Twitter for Academics .... in 30 minute
UNCG University Libraries
 
Second Waving Raving
Nancy Wright White
 
Illegal file sharing4
Victoria University
 
Illegal File Sharing
Victoria University
 
The Dark Side Of The Web
mshin
 

What's hot (17)

PPT
Professional Writing Presentation
Kwilliams23
 
PPT
Snow, Floods Swine Flu Terrorist Threats Keep Calm and Carry On
Bex Lewis
 
PPTX
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
killersmile1
 
PPTX
Cyber interaction and collaboration
alhooti11
 
PPTX
Delcine of communication Due to technology
shahzaib suleman
 
PPTX
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
andregoron
 
PPTX
LESSON 1, 2 & 3-ETECH 1S
Juvywen
 
PPTX
Faculty and staff training
Mayawanty Mawariasari
 
PPT
Welcome to my Space!
Gabriela Grosseck
 
PPTX
techKNOW leadership for JefCoEd Tech Camp 7.11.13
mwilson518
 
PPT
The Hidden Dangers of Social Networks: You can log-on but you cannot hide
lisbk
 
PPT
Finaly! Untangling Web 2.0
sydneyblackmore
 
PPT
Ethics
michaelpaul13
 
PPTX
What is social media
tessausman
 
PPTX
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
joanagolo4ever
 
PPT
The Three 100s of Communications in the Digital World
J T "Tom" Johnson
 
PPTX
Digital access
KROBA01
 
Professional Writing Presentation
Kwilliams23
 
Snow, Floods Swine Flu Terrorist Threats Keep Calm and Carry On
Bex Lewis
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
killersmile1
 
Cyber interaction and collaboration
alhooti11
 
Delcine of communication Due to technology
shahzaib suleman
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
andregoron
 
LESSON 1, 2 & 3-ETECH 1S
Juvywen
 
Faculty and staff training
Mayawanty Mawariasari
 
Welcome to my Space!
Gabriela Grosseck
 
techKNOW leadership for JefCoEd Tech Camp 7.11.13
mwilson518
 
The Hidden Dangers of Social Networks: You can log-on but you cannot hide
lisbk
 
Finaly! Untangling Web 2.0
sydneyblackmore
 
What is social media
tessausman
 
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
joanagolo4ever
 
The Three 100s of Communications in the Digital World
J T "Tom" Johnson
 
Digital access
KROBA01
 
Ad

Viewers also liked (20)

PDF
Present simple tense dont or doesnt
alejitap2910
 
PPTX
How to take care of computers and secondary storage media
Jojo Carrillo
 
PPTX
Defination & charcterstics of Computer
Vinni Nadageri
 
PDF
Cscu exam-info-and-test-objective
Tiger Virani
 
PPT
Virus part1
Ajay Banyal
 
PDF
What is virus and methods to recover from different types of viruses
Ajay Sharma
 
PPTX
Central processing unit
mariolinov
 
PDF
Dos & donts in ict 2
Zuheda
 
PPTX
Computer viruses
Ali Al Sarraf
 
PPSX
Care of the computer parts
gimandes
 
PPT
Proper Care Of Computers
LUZ PINGOL
 
PPTX
Computer Technology
guest5fd01d
 
PPTX
Cause and effects of computer virus
tayyaba rashid
 
PPTX
Computer virus
Mark Anthony Maranga
 
PPTX
Computer viruses
Annies Minu
 
PDF
01 - Introduction to Computer
Programming Techniques and Algorithms
 
PPTX
Computer Viruses
Annies Minu
 
PPT
Computer virus
Rahul Baghla
 
PPTX
Impact of information tech on hospitality industry
Pranav Juwatkar
 
PPTX
role of information technology and use of PMS in hospitality industry
Vinay Kumar
 
Present simple tense dont or doesnt
alejitap2910
 
How to take care of computers and secondary storage media
Jojo Carrillo
 
Defination & charcterstics of Computer
Vinni Nadageri
 
Cscu exam-info-and-test-objective
Tiger Virani
 
Virus part1
Ajay Banyal
 
What is virus and methods to recover from different types of viruses
Ajay Sharma
 
Central processing unit
mariolinov
 
Dos & donts in ict 2
Zuheda
 
Computer viruses
Ali Al Sarraf
 
Care of the computer parts
gimandes
 
Proper Care Of Computers
LUZ PINGOL
 
Computer Technology
guest5fd01d
 
Cause and effects of computer virus
tayyaba rashid
 
Computer virus
Mark Anthony Maranga
 
Computer viruses
Annies Minu
 
01 - Introduction to Computer
Programming Techniques and Algorithms
 
Computer Viruses
Annies Minu
 
Computer virus
Rahul Baghla
 
Impact of information tech on hospitality industry
Pranav Juwatkar
 
role of information technology and use of PMS in hospitality industry
Vinay Kumar
 
Ad

Similar to Computer Technology (18)

PPTX
Computer Technology
guest48bbfb
 
PDF
Essay About Internet
Online Paper Writing Services Haynes
 
PDF
Essay About Internet
ThesisPapersForSaleM
 
PDF
Essay About The Internet
Paper Writing Service Superiorpapers
 
PDF
Internet Essay Topics
Paper Writer Service
 
PDF
computer virus Report
rawaabdullah
 
PDF
Essay About Surfing The Internet
Buy Resume Paper Saginaw Valley State University
 
PDF
Essay Topic Internet
Paper Writing Service Cheap
 
PPTX
03-08-2025 UPDATED INFORMATION ASSURANCE.pptx
ROSARIEDELAPAZ
 
PPTX
Computer Vandalism
Aditya Singh
 
PDF
Computers a boon or a bane.pdf
Home
 
PPTX
Viruses
AMunoz0584
 
PPT
Computer Virus
izzul
 
PPTX
Societal Impacts Of IT (Class X)
Vatsal Unadkat
 
PDF
A critical look at the regulation of computer viruses
UltraUploader
 
PDF
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
theijes
 
DOCX
Computer viruses by joy chakraborty
Joy Chakraborty
 
PPTX
current-and-future-trends-of-media-information-240818200331-b9730310.pptx
ChrisTian609473
 
Computer Technology
guest48bbfb
 
Essay About Internet
ThesisPapersForSaleM
 
Essay About The Internet
Paper Writing Service Superiorpapers
 
Internet Essay Topics
Paper Writer Service
 
computer virus Report
rawaabdullah
 
Essay About Surfing The Internet
Buy Resume Paper Saginaw Valley State University
 
Essay Topic Internet
Paper Writing Service Cheap
 
03-08-2025 UPDATED INFORMATION ASSURANCE.pptx
ROSARIEDELAPAZ
 
Computer Vandalism
Aditya Singh
 
Computers a boon or a bane.pdf
Home
 
Viruses
AMunoz0584
 
Computer Virus
izzul
 
Societal Impacts Of IT (Class X)
Vatsal Unadkat
 
A critical look at the regulation of computer viruses
UltraUploader
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
theijes
 
Computer viruses by joy chakraborty
Joy Chakraborty
 
current-and-future-trends-of-media-information-240818200331-b9730310.pptx
ChrisTian609473
 

Recently uploaded (20)

PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 

Computer Technology

  • 1. Prepared by: Fernando A. Alvis BSEd-I-B
  • 2. Table of Contents: History Advantages and Disadvantages of Technology in Education
  • 3. History The first all-electronic computer was built in 1943 and was run by vacuum tubes. By the late 1950's, semiconductors were in use and by the 1960's, computers were found at major universities. Home computers became common in the 1980's and 1990's, when laptops became popular among students. Click here to learn more.
  • 4. Significance Computer technology revolutionized the calculation of formulas in mathematics and physics as well as brought about the space race. Computer technology is now used in theoretical modeling and medical research.
  • 5. Time Frame While computer technology changes by the minute, the past 50 years are considered to be the modern age of computing. The first mechanical calculator, the abacus, was invented around 3000 B.C.
  • 6. Features Computer technology allows for processing of information faster than the human brain can calculate. However, such technology is prone to errors and is at the mercy of mechanical components which can wear out and software which can become corrupted by computer viruses.
  • 7. Considerations Nearly everything in our modern world is influenced by computer technology. Timing of traffic signals, telecommunications, and even time keeping are controlled by advanced computer technology. In our everyday lives, a simple trip to the grocery can result in multiple interfaces with computer technology.
  • 8. Benefits The benefits of computer technology include scientific discovery, advanced communications, and the speed of processing information.
  • 9. Different Kinds of Computer Viruses click here to learn more.
  • 10. Resident Viruses Resident viruses are the type of viruses that hang out in the RAM (random access memory) and steal valuable space, reducing the performance of your computer. This type of virus has the ability to infect any operation conducted by the system, corrupting files and programs.
  • 11. Direct Action Viruses Direct action viruses are more malicious in that the intent is to infect a computer, replicate and then execute when activated. This type of virus activates when specific conditions are met and go to work infecting specific file folders and systems, rendering the PC useless in most cases. This type of virus is always located in the root directory and goes to work when the computer is booted.
  • 12. Overwrite Viruses Overwrite viruses do just what the name implies. The virus infects files, deleting or overwriting specific information and rendering the file useless to the computer. Files can be "cleaned" by deleting them and reloading or re-creating them, but this is costly and time consuming.
  • 13. Boot Viruses Boot viruses reside on the boot sector or a hard drive, where the files necessary for the computer to boot and run reside. Boot viruses interrupt the computer's ability to boot, rendering the entire PC useless. Boot viruses are generally passed by the use of floppy disks.
  • 14. Macro Viruses Macro viruses hide in the macros of certain files. A list of instructions can be programmed into a macro virus and executed as one action, making them particularly nasty viruses.
  • 15. Directory Viruses Directory viruses are the ones most commonly activated when a user opens an email attachment with an .exe or .com extension. The virus has the unique ability to relocate the virus files after activation, making cleaning impossible.
  • 16. Polymorphic Viruses Polymorphic viruses have the ability to change their encryption every time they are activated, making them invisible to virus scan software, giving them free reign to replicate at will.
  • 17. Companion Viruses Companion viruses look much like resident viruses or direct action viruses. They are known as companion viruses because once they get into the system, they "accompany" the other files that already exist. In other words, to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).
  • 18. Back to Table of Contents.
  • 19. Advantage: Potential The technology available today has made a wealth of knowledge available to students, which offers great potential for the speed and style of learning. Information is presented in so many ways that any type learner, whether gifted or disabled, can find and use the necessary material. This fact relates not only to the Internet, but to all the many technological improvements in learning, from smart boards to handheld dictionaries.
  • 20. Disadvantage: Loss of Skills With this increased access to knowledge also comes a probable loss of communication skills and interactive abilities between students and teacher, and students to peers. These skills are not as necessary in a classroom of computers, where individuality is a component of learning and is encouraged. Aside from learning, conflict resolution and socialization used to be two prominent reasons children came to school. The emphasis now has shifted away from these areas.
  • 21. Advantage: Access to all Education is no longer the elitist privilege it once was. The information on the Internet is there for all who have access, without discrimination. People of all social strata are able to use technological advances, which is a fairly new academic development in America.
  • 22. Disadvantage: Poor remain poor While general access is not denied, some children may not be exposed to computers and other technology because of socio-economic status. A child may live in a home without a computer, and chances are he will attend a poor school district with limited numbers of computers available. A student may get to use a computer for a short time, or only as a once-a-week activity instead of a regular class period. This puts these children at a disadvantage in learning technological functions. Poor districts are also most likely not to be the recipients of other technological modes of learning.
  • 23. Advantages vs. Disadvantages The computer age is here; this cannot be debated. Is it better for children to have access to computers with all their data at the loss of interpersonal skills? Is it acceptable that a student can talk to someone halfway around the world via instant messaging but not be able to get along with the student sitting next to her in a classroom? Technology can enhance traditional methods of learning but cannot replace the human touch.
  • 24. Back to Table of Contents.