SlideShare a Scribd company logo
Computer Issues:  Security, Privacy, Health, & Environmental
Security What is more valuable, the hardware or the data? How valuable is it?
Authentication How do you prove to a computer who you are? What you know What you have Who you are
Security - Physical Lock the building Lock the room Secure the pc
Security – Data Protection Passwords Firewalls Encryption Virus protection Smart computer use – don’t click on junk!
Privacy What information does the government collect? What information does private industry collect?
Health How have computers improved our health? How have computers made our health worse?
Health - Topics Carpal Tunnel Syndrome Eyestrain Internet Addiction
Environmental Issues How have computers improved the environment? How have computers made the environment worse?
Environmental Topics Recycling Energy Star Using less paper Using less electricity
Assignment Technology Topics Assignment

More Related Content

PPT
Webgraphicorganizerkaur
PPT
Webgraphicorganizerkaur
PPT
Webgraphicorganizerkaur
PDF
Beyond Speed: Rethinking the Network
PDF
Understand Ethics and Security in the Programming Process
PPT
Safe and ethical use page power point
PPTX
Technology
PDF
Technology in Urban Forestry
Webgraphicorganizerkaur
Webgraphicorganizerkaur
Webgraphicorganizerkaur
Beyond Speed: Rethinking the Network
Understand Ethics and Security in the Programming Process
Safe and ethical use page power point
Technology
Technology in Urban Forestry

What's hot (6)

PDF
Wearables london - Reflections on 3 years as a Wearables analyst - James Hayw...
PDF
Slides 008 - Alan Final Med Comm PPP for NHA conference 100515 ad
PPT
Unity Overview
PPTX
Question 1.3pptx
PPTX
2011 4-define-ethics-and-law
PPTX
Cybersecurity Risk Perception and Communication
Wearables london - Reflections on 3 years as a Wearables analyst - James Hayw...
Slides 008 - Alan Final Med Comm PPP for NHA conference 100515 ad
Unity Overview
Question 1.3pptx
2011 4-define-ethics-and-law
Cybersecurity Risk Perception and Communication
Ad

Viewers also liked (12)

PPT
Security privacy health environmental
PPTX
Algebra 6 Point 10
PPTX
Algebra 6 Point 8
PPTX
Chapter 19
PPTX
Algebra 6 Point 6
PPTX
Chapter 2 notes new book
PPT
Cartoon
PPT
Cyberbullying class 97
PPTX
Week 2 applying for jobs
PPTX
Plumbing night 1 legal forms of business
PPTX
Plumbing night 2 types of plumbing businesses
PPTX
Investments handout
Security privacy health environmental
Algebra 6 Point 10
Algebra 6 Point 8
Chapter 19
Algebra 6 Point 6
Chapter 2 notes new book
Cartoon
Cyberbullying class 97
Week 2 applying for jobs
Plumbing night 1 legal forms of business
Plumbing night 2 types of plumbing businesses
Investments handout
Ad

Similar to Security privacy health environmental (20)

PPTX
PPTX
Computer Ethics_Satyajit Patil.pptx
PPT
Ppt lesson 17
PPTX
2nd-SEM-Presentation-LESSON1keybarding.pptx
PPT
Maintaining Your Computer.pptdffaggfgdgfgdf
PPT
Data security
PPT
1. Introduction to computers in year.ppt
PPTX
Security Basics
PPTX
ten important crimes of Computer Crimes.pptx
PPTX
Chapter 1 a
PPT
chapter 1 security.ppt
DOC
Computer security and_privacy
PPTX
Computer security and safety ethic and privacy Lecture 10.pptx
PPTX
Lecture 10.pptx For dpt computer security
PPT
Chapter 6 effects of ict on society
PPTX
4.-Computer-Security for grade 10 preparation.pptx
PPTX
Computer-Basics and other details of computer.pptx
PPT
Computer
PDF
Unit14-Computer Security and ethics -downloaded.pdf
PPTX
Computer security & ethics
Computer Ethics_Satyajit Patil.pptx
Ppt lesson 17
2nd-SEM-Presentation-LESSON1keybarding.pptx
Maintaining Your Computer.pptdffaggfgdgfgdf
Data security
1. Introduction to computers in year.ppt
Security Basics
ten important crimes of Computer Crimes.pptx
Chapter 1 a
chapter 1 security.ppt
Computer security and_privacy
Computer security and safety ethic and privacy Lecture 10.pptx
Lecture 10.pptx For dpt computer security
Chapter 6 effects of ict on society
4.-Computer-Security for grade 10 preparation.pptx
Computer-Basics and other details of computer.pptx
Computer
Unit14-Computer Security and ethics -downloaded.pdf
Computer security & ethics

More from herbison (18)

PPTX
Wiki assignment
PPTX
Wiki assignment
PPTX
Algebra 6 Point 7
PPTX
Algebra 6 Point 5
PPTX
Algebra 6 Point 3
PPTX
Algebra 6 Point 4
PPTX
Algebra 6 Point 2
PPTX
Algebra 6 Point 1
PPTX
Algebra 7 Point 5
PPTX
Algebra 7 Point 3
PPTX
Algebra 7 Point 4
PPTX
Algebra 7 Point 1
PPTX
Algebra 7 Point 2
PPTX
Algebra 7 Point 6
PPTX
Algebra 5 Point 7
PPTX
Algebra 5 Points 1 And 2
PPTX
Algebra 5 Point 5
PPTX
Algebra 5 Point 6
Wiki assignment
Wiki assignment
Algebra 6 Point 7
Algebra 6 Point 5
Algebra 6 Point 3
Algebra 6 Point 4
Algebra 6 Point 2
Algebra 6 Point 1
Algebra 7 Point 5
Algebra 7 Point 3
Algebra 7 Point 4
Algebra 7 Point 1
Algebra 7 Point 2
Algebra 7 Point 6
Algebra 5 Point 7
Algebra 5 Points 1 And 2
Algebra 5 Point 5
Algebra 5 Point 6

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
Teaching material agriculture food technology
PDF
cuic standard and advanced reporting.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation theory and applications.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Modernizing your data center with Dell and AMD
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Teaching material agriculture food technology
cuic standard and advanced reporting.pdf
The AUB Centre for AI in Media Proposal.docx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation theory and applications.pdf
Machine learning based COVID-19 study performance prediction
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
Modernizing your data center with Dell and AMD
Network Security Unit 5.pdf for BCA BBA.
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced methodologies resolving dimensionality complications for autism neur...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Mobile App Security Testing_ A Comprehensive Guide.pdf

Security privacy health environmental