SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Tech in the world today 
by Trey Lierman
I invented, 
xbox,wii,ps3 
And coke and 
don’t forget 
mcdonalds 
I invented 
electricity 
Beats 
and the 
iphone 
and apple 
DESIGN PLAN BUILD TEST EVALUATE 
• Bullet 1 
• Bullet 2 
• Bullet 3 
• Bullet 1 
• Bullet 2 
• Bullet 3 
• Bullet 1 
• Bullet 2 
• Bullet 3 
• Bullet 1 
• Bullet 2 
• Bullet 3 
• Bullet 1 
• Bullet 2 
• Bullet 3 
file://localhost/Users/ 
student/Pictures/Pho 
to%20Booth/Photo 
%20on%202014-11- 
11%20at 
%2012.08.jpg 
I invented, 
xbox,wii,ps3 
And coke and 
don’t forget 
mcdonalds 
I invented 
electricity 
Beats 
and the 
iphone 
and apple
Cloud Computing
Title 
Text 
Fillshttp://www.dant.com/Ariocct.efonntt
• such as viruses, worms, and Trojan horses, collectively 
known as malware. 
• It can also end up on your computer from via email 
attachments and drive-by downloads. 
• It can sneak in when you download free software, 
especially free antivirus software. 
• It lurks in seemingly innocuous ads, and takes 
advantage of
• the correct or acceptable way of communicating on 
the Internet
• Text and lines are like this 
• Hyperlinks like this 
• Visited hyperlinks like this 
Table 
Text box 
With shadow 
Text box Text box 
With shadow
Trey tech
Trey tech

Weitere ähnliche Inhalte

Ähnlich wie Trey tech

DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsnDEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsnFelipe Prado
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_finalPacSecJP
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!InnoTech
 
Rooted2020 emotet is-dead_long_live_emotet_-_victor_acin
Rooted2020 emotet is-dead_long_live_emotet_-_victor_acinRooted2020 emotet is-dead_long_live_emotet_-_victor_acin
Rooted2020 emotet is-dead_long_live_emotet_-_victor_acinRootedCON
 
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensionsZoltan Balazs
 
Do bad things happen on Windows
Do bad things happen on WindowsDo bad things happen on Windows
Do bad things happen on WindowsJesse Moore
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesmkgspsu
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxDrMajidMumtaz
 
Internet hacked google search
Internet hacked   google searchInternet hacked   google search
Internet hacked google searchGordon Kraft
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKINGNAWAZ KHAN
 
Your Thing is pwnd - Security Challenges for the Internet of Things
Your Thing is pwnd - Security Challenges for the Internet of ThingsYour Thing is pwnd - Security Challenges for the Internet of Things
Your Thing is pwnd - Security Challenges for the Internet of ThingsWSO2
 
Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012DefCamp
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Fizaril Amzari Omar
 
Internet security
Internet securityInternet security
Internet securityAntony Mathew
 
Html5: Something wicked this way comes (Hack in Paris)
Html5: Something wicked this way comes (Hack in Paris)Html5: Something wicked this way comes (Hack in Paris)
Html5: Something wicked this way comes (Hack in Paris)Krzysztof Kotowicz
 
Travelling to the far side of Andromeda
Travelling to the far side of AndromedaTravelling to the far side of Andromeda
Travelling to the far side of AndromedaJose Miguel Esparza
 
Malware part 2
Malware part 2Malware part 2
Malware part 2ShouaQureshi
 

Ähnlich wie Trey tech (20)

DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsnDEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
 
Mickey pacsec2016_final
Mickey pacsec2016_finalMickey pacsec2016_final
Mickey pacsec2016_final
 
How to save home PCs for being Zombies ?
How to save home PCs for being Zombies ?How to save home PCs for being Zombies ?
How to save home PCs for being Zombies ?
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!
 
Rooted2020 emotet is-dead_long_live_emotet_-_victor_acin
Rooted2020 emotet is-dead_long_live_emotet_-_victor_acinRooted2020 emotet is-dead_long_live_emotet_-_victor_acin
Rooted2020 emotet is-dead_long_live_emotet_-_victor_acin
 
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
 
Do bad things happen on Windows
Do bad things happen on WindowsDo bad things happen on Windows
Do bad things happen on Windows
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptx
 
Internet hacked google search
Internet hacked   google searchInternet hacked   google search
Internet hacked google search
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Your Thing is pwnd - Security Challenges for the Internet of Things
Your Thing is pwnd - Security Challenges for the Internet of ThingsYour Thing is pwnd - Security Challenges for the Internet of Things
Your Thing is pwnd - Security Challenges for the Internet of Things
 
Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Internet security
Internet securityInternet security
Internet security
 
Html5: Something wicked this way comes (Hack in Paris)
Html5: Something wicked this way comes (Hack in Paris)Html5: Something wicked this way comes (Hack in Paris)
Html5: Something wicked this way comes (Hack in Paris)
 
Travelling to the far side of Andromeda
Travelling to the far side of AndromedaTravelling to the far side of Andromeda
Travelling to the far side of Andromeda
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Hacktivityonly 121013141039-phpapp02
Hacktivityonly 121013141039-phpapp02Hacktivityonly 121013141039-phpapp02
Hacktivityonly 121013141039-phpapp02
 

Mehr von Marq2014

Robots (updated)
Robots (updated)Robots (updated)
Robots (updated)Marq2014
 
The 3 D printer
The 3 D printerThe 3 D printer
The 3 D printerMarq2014
 
Tommy project pp
Tommy project ppTommy project pp
Tommy project ppMarq2014
 
Information Privacy
Information Privacy Information Privacy
Information Privacy Marq2014
 
Finn delgado 3 d printing report
Finn delgado 3 d printing reportFinn delgado 3 d printing report
Finn delgado 3 d printing reportMarq2014
 
Adapting to technology by Emily !
Adapting to technology by Emily !Adapting to technology by Emily !
Adapting to technology by Emily !Marq2014
 
Joshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History ProjectJoshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History ProjectMarq2014
 
computer history
computer historycomputer history
computer historyMarq2014
 
Emoji katherine
Emoji katherineEmoji katherine
Emoji katherineMarq2014
 
Wilburn pp4
Wilburn pp4Wilburn pp4
Wilburn pp4Marq2014
 
Brian nguyen
Brian nguyenBrian nguyen
Brian nguyenMarq2014
 
Plagiarism -Jadyn
Plagiarism -JadynPlagiarism -Jadyn
Plagiarism -JadynMarq2014
 
mia mcpeek project in school for a grade
mia mcpeek project in school for a grademia mcpeek project in school for a grade
mia mcpeek project in school for a gradeMarq2014
 
Cyberbullying 3.0
Cyberbullying 3.0Cyberbullying 3.0
Cyberbullying 3.0Marq2014
 
The Evolution of T.V.
The Evolution of T.V.The Evolution of T.V.
The Evolution of T.V.Marq2014
 
Kennedy 3d printers
Kennedy  3d printers Kennedy  3d printers
Kennedy 3d printers Marq2014
 
Quinn 3D printing project
Quinn 3D printing project Quinn 3D printing project
Quinn 3D printing project Marq2014
 
Cyberbullying by Mia
Cyberbullying by MiaCyberbullying by Mia
Cyberbullying by MiaMarq2014
 
Robots in Space
Robots in SpaceRobots in Space
Robots in SpaceMarq2014
 
Emily emerging technology
Emily emerging technology Emily emerging technology
Emily emerging technology Marq2014
 

Mehr von Marq2014 (20)

Robots (updated)
Robots (updated)Robots (updated)
Robots (updated)
 
The 3 D printer
The 3 D printerThe 3 D printer
The 3 D printer
 
Tommy project pp
Tommy project ppTommy project pp
Tommy project pp
 
Information Privacy
Information Privacy Information Privacy
Information Privacy
 
Finn delgado 3 d printing report
Finn delgado 3 d printing reportFinn delgado 3 d printing report
Finn delgado 3 d printing report
 
Adapting to technology by Emily !
Adapting to technology by Emily !Adapting to technology by Emily !
Adapting to technology by Emily !
 
Joshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History ProjectJoshua Coffman and David Bryan's Computer History Project
Joshua Coffman and David Bryan's Computer History Project
 
computer history
computer historycomputer history
computer history
 
Emoji katherine
Emoji katherineEmoji katherine
Emoji katherine
 
Wilburn pp4
Wilburn pp4Wilburn pp4
Wilburn pp4
 
Brian nguyen
Brian nguyenBrian nguyen
Brian nguyen
 
Plagiarism -Jadyn
Plagiarism -JadynPlagiarism -Jadyn
Plagiarism -Jadyn
 
mia mcpeek project in school for a grade
mia mcpeek project in school for a grademia mcpeek project in school for a grade
mia mcpeek project in school for a grade
 
Cyberbullying 3.0
Cyberbullying 3.0Cyberbullying 3.0
Cyberbullying 3.0
 
The Evolution of T.V.
The Evolution of T.V.The Evolution of T.V.
The Evolution of T.V.
 
Kennedy 3d printers
Kennedy  3d printers Kennedy  3d printers
Kennedy 3d printers
 
Quinn 3D printing project
Quinn 3D printing project Quinn 3D printing project
Quinn 3D printing project
 
Cyberbullying by Mia
Cyberbullying by MiaCyberbullying by Mia
Cyberbullying by Mia
 
Robots in Space
Robots in SpaceRobots in Space
Robots in Space
 
Emily emerging technology
Emily emerging technology Emily emerging technology
Emily emerging technology
 

KĂźrzlich hochgeladen

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

KĂźrzlich hochgeladen (20)

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Trey tech

  • 1. Tech in the world today by Trey Lierman
  • 2.
  • 3. I invented, xbox,wii,ps3 And coke and don’t forget mcdonalds I invented electricity Beats and the iphone and apple DESIGN PLAN BUILD TEST EVALUATE • Bullet 1 • Bullet 2 • Bullet 3 • Bullet 1 • Bullet 2 • Bullet 3 • Bullet 1 • Bullet 2 • Bullet 3 • Bullet 1 • Bullet 2 • Bullet 3 • Bullet 1 • Bullet 2 • Bullet 3 file://localhost/Users/ student/Pictures/Pho to%20Booth/Photo %20on%202014-11- 11%20at %2012.08.jpg I invented, xbox,wii,ps3 And coke and don’t forget mcdonalds I invented electricity Beats and the iphone and apple
  • 4.
  • 5.
  • 6.
  • 8.
  • 9.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. • such as viruses, worms, and Trojan horses, collectively known as malware. • It can also end up on your computer from via email attachments and drive-by downloads. • It can sneak in when you download free software, especially free antivirus software. • It lurks in seemingly innocuous ads, and takes advantage of
  • 16. • the correct or acceptable way of communicating on the Internet
  • 17. • Text and lines are like this • Hyperlinks like this • Visited hyperlinks like this Table Text box With shadow Text box Text box With shadow