2
Most read
3
Most read
4
Most read
Prepared by:
Fernando A. Alvis
    BSEd-I-B
Table of Contents:

History


Advantages and Disadvantages of
 Technology in Education
History
     The first all-electronic computer was
 built in 1943 and was run by vacuum tubes.
 By the late 1950's, semiconductors were in
 use and by the 1960's, computers were found
 at major universities. Home computers
 became common in the 1980's and
 1990's, when laptops became popular among
 students.

Click here to learn more.
Significance

     Computer technology revolutionized the
 calculation of formulas in mathematics and
 physics as well as brought about the space
 race. Computer technology is now used in
 theoretical modeling and medical research.
Time Frame

    While computer technology changes by
the minute, the past 50 years are considered
to be the modern age of computing. The
first mechanical calculator, the abacus, was
invented around 3000 B.C.
Features
    Computer technology allows for
processing of information faster than the
human brain can calculate. However, such
technology is prone to errors and is at the
mercy of mechanical components which can
wear out and software which can become
corrupted by computer viruses.
Considerations
    Nearly everything in our modern world
is influenced by computer technology.
Timing                 of               traffic
signals, telecommunications, and even time
keeping are controlled by advanced
computer technology. In our everyday
lives, a simple trip to the grocery can result
in multiple interfaces with computer
technology.
Benefits

    The benefits of computer technology
include scientific discovery, advanced
communications, and the speed of
processing information.
Different Kinds of Computer Viruses




    click here to learn more.
Resident Viruses

    Resident viruses are the type of viruses
that hang out in the RAM (random access
memory) and steal valuable space, reducing
the performance of your computer. This type
of virus has the ability to infect any
operation       conducted        by      the
system, corrupting files and programs.
Direct Action Viruses
     Direct action viruses are more malicious
 in that the intent is to infect a
 computer, replicate and then execute when
 activated. This type of virus activates when
 specific conditions are met and go to work
 infecting    specific   file    folders   and
 systems, rendering the PC useless in most
 cases. This type of virus is always located in
 the root directory and goes to work when
 the computer is booted.
Overwrite Viruses

    Overwrite viruses do just what the name
implies. The virus infects files, deleting or
overwriting specific information and
rendering the file useless to the computer.
Files can be "cleaned" by deleting them and
reloading or re-creating them, but this is
costly and time consuming.
Boot Viruses

    Boot viruses reside on the boot sector or
a hard drive, where the files necessary for
the computer to boot and run reside. Boot
viruses interrupt the computer's ability to
boot, rendering the entire PC useless. Boot
viruses are generally passed by the use of
floppy disks.
Macro Viruses

    Macro viruses hide in the macros of
certain files. A list of instructions can be
programmed into a macro virus and
executed as one action, making them
particularly          nasty           viruses.
Directory Viruses

     Directory viruses are the ones most
 commonly activated when a user opens an
 email attachment with an .exe or .com
 extension. The virus has the unique ability
 to    relocate  the    virus  files  after
 activation, making cleaning impossible.
Polymorphic Viruses

    Polymorphic viruses have the ability to
change their encryption every time they are
activated, making them invisible to virus
scan software, giving them free reign to
replicate             at               will.
Companion Viruses
     Companion viruses look much like resident
viruses or direct action viruses. They are known
as companion viruses because once they get
into the system, they "accompany" the other
files that already exist. In other words, to carry
out their infection routines, companion viruses
can wait in memory until a program is run
(resident viruses) or act immediately by
making copies of themselves (direct action
viruses).
Back to Table of Contents.
Advantage: Potential
     The technology available today has
 made a wealth of knowledge available to
 students, which offers great potential for the
 speed and style of learning. Information is
 presented in so many ways that any type
 learner, whether gifted or disabled, can find
 and use the necessary material. This fact
 relates not only to the Internet, but to all the
 many technological improvements in
 learning, from smart boards to handheld
 dictionaries.
Disadvantage: Loss of Skills
     With this increased access to knowledge
 also     comes    a   probable     loss   of
 communication skills and interactive
 abilities between students and teacher, and
 students to peers. These skills are not as
 necessary      in    a     classroom      of
 computers, where individuality is a
 component of learning and is encouraged.
 Aside from learning, conflict resolution and
 socialization used to be two prominent
 reasons children came to school. The
 emphasis now has shifted away from these
 areas.
Advantage: Access to all

     Education is no longer the elitist
 privilege it once was. The information on
 the Internet is there for all who have
 access, without discrimination. People of all
 social strata are able to use technological
 advances, which is a fairly new academic
 development in America.
Disadvantage: Poor remain poor
     While general access is not denied, some
 children may not be exposed to computers and
 other technology because of socio-economic
 status. A child may live in a home without a
 computer, and chances are he will attend a poor
 school district with limited numbers of computers
 available. A student may get to use a computer for
 a short time, or only as a once-a-week activity
 instead of a regular class period. This puts these
 children at a disadvantage in learning
 technological functions. Poor districts are also
 most likely not to be the recipients of other
 technological modes of learning.
Advantages vs. Disadvantages
     The computer age is here; this cannot be
debated. Is it better for children to have
access to computers with all their data at the
loss of interpersonal skills? Is it acceptable
that a student can talk to someone halfway
around the world via instant messaging but
not be able to get along with the student
sitting next to her in a classroom?
Technology can enhance traditional
methods of learning but cannot replace the
human touch.
Back to Table of Contents.

More Related Content

PPTX
Sports
PPTX
Technology in sports
PPT
Characteristics of computer.ppt tamoor
PPTX
Quality Assurance and Quality Management Concepts
PPTX
Surah Al-Fatiha
PPTX
Latest advancement in computer
PPT
Calendar (1)
PPTX
Pharmaceutical Jurisprudence (BP505T) Unit-2 Sale, Labeling, Packing of Drugs...
Sports
Technology in sports
Characteristics of computer.ppt tamoor
Quality Assurance and Quality Management Concepts
Surah Al-Fatiha
Latest advancement in computer
Calendar (1)
Pharmaceutical Jurisprudence (BP505T) Unit-2 Sale, Labeling, Packing of Drugs...

What's hot (20)

PPTX
PPTX
Introduction to information technology lecture 1
PPT
An introduction to Computer Technology
PPT
Use of Computers in Education
PPTX
Os ppt
PPTX
PRESENTATION ON COMPUTER SYSTEM
PPTX
PPT
Types-of-computer-ppt
PPTX
Information communication technology & cyber law presentation
PPT
Fundamentals Of Computer
PPTX
computer related health hazards
PDF
01 INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY.pdf
PPT
Basic computer fundamentals
PPTX
1st Generation Computers
PPT
COMPUTER SYSTEM
PPTX
Input and Output Devices.
PPTX
Computers and the workplace
PPTX
What is Computer | Computer Full Form | Computer Definition
PDF
Computer technology power point
PPTX
Input devices presentation
Introduction to information technology lecture 1
An introduction to Computer Technology
Use of Computers in Education
Os ppt
PRESENTATION ON COMPUTER SYSTEM
Types-of-computer-ppt
Information communication technology & cyber law presentation
Fundamentals Of Computer
computer related health hazards
01 INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY.pdf
Basic computer fundamentals
1st Generation Computers
COMPUTER SYSTEM
Input and Output Devices.
Computers and the workplace
What is Computer | Computer Full Form | Computer Definition
Computer technology power point
Input devices presentation
Ad

Viewers also liked (20)

PPTX
Types of Virus & Anti-virus
PPTX
MediaMosa and webservices
PPT
Isys20261 lecture 02
PDF
Computer security 101
PPTX
Viruses and internet security
PPT
Viruses (Lecture) IT Slides # 3
PPTX
Virus-Awareness
PPT
Consumer electronics seminar
PPT
Virus part1
PPTX
Computer virus
PPTX
Central processing unit
PPTX
Computer viruses
PPTX
Computer viruses
PPT
Computer virus
PPTX
Computer Technology
PPTX
Cause and effects of computer virus
PPTX
Generations of Computer
PPTX
Virus and antivirus
PPTX
Computer Viruses
PPTX
virus 2014 more design 2014
Types of Virus & Anti-virus
MediaMosa and webservices
Isys20261 lecture 02
Computer security 101
Viruses and internet security
Viruses (Lecture) IT Slides # 3
Virus-Awareness
Consumer electronics seminar
Virus part1
Computer virus
Central processing unit
Computer viruses
Computer viruses
Computer virus
Computer Technology
Cause and effects of computer virus
Generations of Computer
Virus and antivirus
Computer Viruses
virus 2014 more design 2014
Ad

Similar to Computer Technology (20)

PPTX
ComTech
PDF
PDF
Essay About Internet
PDF
computer virus Report
PDF
Essay About Surfing The Internet
PDF
Essay About The Internet
PDF
Internet Essay Topics
PDF
Essay Topic Internet
PPTX
03-08-2025 UPDATED INFORMATION ASSURANCE.pptx
PPTX
Computer Vandalism
PPT
Computer Virus
PPTX
Viruses
PPTX
Societal Impacts Of IT (Class X)
DOCX
Computer viruses by joy chakraborty
DOCX
Computer virus
PDF
Computers a boon or a bane.pdf
PDF
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
PPTX
_1ST-DAY_1ST-DAY._1ST-DAY._1ST-DAY..pptx
PPTX
Computer virus
PDF
Threats of Computer System and its Prevention
ComTech
Essay About Internet
computer virus Report
Essay About Surfing The Internet
Essay About The Internet
Internet Essay Topics
Essay Topic Internet
03-08-2025 UPDATED INFORMATION ASSURANCE.pptx
Computer Vandalism
Computer Virus
Viruses
Societal Impacts Of IT (Class X)
Computer viruses by joy chakraborty
Computer virus
Computers a boon or a bane.pdf
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
_1ST-DAY_1ST-DAY._1ST-DAY._1ST-DAY..pptx
Computer virus
Threats of Computer System and its Prevention

Recently uploaded (20)

PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
Complications of Minimal Access-Surgery.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
IGGE1 Understanding the Self1234567891011
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
Hazard Identification & Risk Assessment .pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Complications of Minimal Access-Surgery.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Weekly quiz Compilation Jan -July 25.pdf
Uderstanding digital marketing and marketing stratergie for engaging the digi...
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
IGGE1 Understanding the Self1234567891011
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Hazard Identification & Risk Assessment .pdf
AI-driven educational solutions for real-life interventions in the Philippine...
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Unit 4 Computer Architecture Multicore Processor.pptx
Introduction to pro and eukaryotes and differences.pptx
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
202450812 BayCHI UCSC-SV 20250812 v17.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS

Computer Technology

  • 1. Prepared by: Fernando A. Alvis BSEd-I-B
  • 2. Table of Contents: History Advantages and Disadvantages of Technology in Education
  • 3. History The first all-electronic computer was built in 1943 and was run by vacuum tubes. By the late 1950's, semiconductors were in use and by the 1960's, computers were found at major universities. Home computers became common in the 1980's and 1990's, when laptops became popular among students. Click here to learn more.
  • 4. Significance Computer technology revolutionized the calculation of formulas in mathematics and physics as well as brought about the space race. Computer technology is now used in theoretical modeling and medical research.
  • 5. Time Frame While computer technology changes by the minute, the past 50 years are considered to be the modern age of computing. The first mechanical calculator, the abacus, was invented around 3000 B.C.
  • 6. Features Computer technology allows for processing of information faster than the human brain can calculate. However, such technology is prone to errors and is at the mercy of mechanical components which can wear out and software which can become corrupted by computer viruses.
  • 7. Considerations Nearly everything in our modern world is influenced by computer technology. Timing of traffic signals, telecommunications, and even time keeping are controlled by advanced computer technology. In our everyday lives, a simple trip to the grocery can result in multiple interfaces with computer technology.
  • 8. Benefits The benefits of computer technology include scientific discovery, advanced communications, and the speed of processing information.
  • 9. Different Kinds of Computer Viruses click here to learn more.
  • 10. Resident Viruses Resident viruses are the type of viruses that hang out in the RAM (random access memory) and steal valuable space, reducing the performance of your computer. This type of virus has the ability to infect any operation conducted by the system, corrupting files and programs.
  • 11. Direct Action Viruses Direct action viruses are more malicious in that the intent is to infect a computer, replicate and then execute when activated. This type of virus activates when specific conditions are met and go to work infecting specific file folders and systems, rendering the PC useless in most cases. This type of virus is always located in the root directory and goes to work when the computer is booted.
  • 12. Overwrite Viruses Overwrite viruses do just what the name implies. The virus infects files, deleting or overwriting specific information and rendering the file useless to the computer. Files can be "cleaned" by deleting them and reloading or re-creating them, but this is costly and time consuming.
  • 13. Boot Viruses Boot viruses reside on the boot sector or a hard drive, where the files necessary for the computer to boot and run reside. Boot viruses interrupt the computer's ability to boot, rendering the entire PC useless. Boot viruses are generally passed by the use of floppy disks.
  • 14. Macro Viruses Macro viruses hide in the macros of certain files. A list of instructions can be programmed into a macro virus and executed as one action, making them particularly nasty viruses.
  • 15. Directory Viruses Directory viruses are the ones most commonly activated when a user opens an email attachment with an .exe or .com extension. The virus has the unique ability to relocate the virus files after activation, making cleaning impossible.
  • 16. Polymorphic Viruses Polymorphic viruses have the ability to change their encryption every time they are activated, making them invisible to virus scan software, giving them free reign to replicate at will.
  • 17. Companion Viruses Companion viruses look much like resident viruses or direct action viruses. They are known as companion viruses because once they get into the system, they "accompany" the other files that already exist. In other words, to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).
  • 18. Back to Table of Contents.
  • 19. Advantage: Potential The technology available today has made a wealth of knowledge available to students, which offers great potential for the speed and style of learning. Information is presented in so many ways that any type learner, whether gifted or disabled, can find and use the necessary material. This fact relates not only to the Internet, but to all the many technological improvements in learning, from smart boards to handheld dictionaries.
  • 20. Disadvantage: Loss of Skills With this increased access to knowledge also comes a probable loss of communication skills and interactive abilities between students and teacher, and students to peers. These skills are not as necessary in a classroom of computers, where individuality is a component of learning and is encouraged. Aside from learning, conflict resolution and socialization used to be two prominent reasons children came to school. The emphasis now has shifted away from these areas.
  • 21. Advantage: Access to all Education is no longer the elitist privilege it once was. The information on the Internet is there for all who have access, without discrimination. People of all social strata are able to use technological advances, which is a fairly new academic development in America.
  • 22. Disadvantage: Poor remain poor While general access is not denied, some children may not be exposed to computers and other technology because of socio-economic status. A child may live in a home without a computer, and chances are he will attend a poor school district with limited numbers of computers available. A student may get to use a computer for a short time, or only as a once-a-week activity instead of a regular class period. This puts these children at a disadvantage in learning technological functions. Poor districts are also most likely not to be the recipients of other technological modes of learning.
  • 23. Advantages vs. Disadvantages The computer age is here; this cannot be debated. Is it better for children to have access to computers with all their data at the loss of interpersonal skills? Is it acceptable that a student can talk to someone halfway around the world via instant messaging but not be able to get along with the student sitting next to her in a classroom? Technology can enhance traditional methods of learning but cannot replace the human touch.
  • 24. Back to Table of Contents.