Productivity software makes people more efficient and effective in their daily activities. This software is becoming more popular and more in demand to learn for employment. The three popular applications are word processing, spreadsheet, and database. All three programs are very useful programs
Productivity Software Examples
Productivity software is a tool such as Excel, PowerPoint, Word, Kid Pix, publisher, and many more. These programs enhance a teacher’s lesson plan and allow the teacher to take their students beyond textbooks and boring lectures. For example, Excel is a productivity tool that can be very helpful in teaching situation dealing with math and science. Excel possesses the ability to change numerical data and put it in the form of a graph in a matter of seconds. This technique allows the teacher to show the difference in the results of an experiment or survey using a graph or chart. This visual picture is just as important as the numerical data. Some children are visual learners and they may not be able to comprehend the difference of the data without seeing it in a chart or graph.
Now, it is true that a teacher does not need a computer program to make a graph, but drawing the graph would be very time consuming and would take away from class time that could be better spent learning other important lessons. The time issue in the situation is a prefect example of why productivity tools are so important. They allow us to increase the amount of information that teachers teach their students in less time than ever before. PowerPoint is another great example of productivity software. A teacher could stand up in front of the classroom and lecture to a group of tenth graders and hope that they pick out the important details from her lecture, but this is highly unlikely. Specifying verbatim what they want the student to write down is tedious and also very time consuming.
On the other hand, PowerPoint enables teachers to make slides of their notes and project them onto a screen so that everyone can copy word for word what the teacher wants them to learn. So what is the difference between using a regular projector with individual transparencies and PowerPoint? The answer is time and efficiency. The teacher no longer has to spend ample time moving the transparency down so that the children in the back can see what is at the bottom of the page, or take time to put down away, get out another, and readjust the projector so that it isn’t blurry. All of those time taking frustrations vanish when using PowerPoint. A teacher is able to go through her slides quickly with ease. She could even add pictures or links to show and support the data that she is teaching to the class.
The PowerPoint system is also a lot easier to read because it can be made in large fonts without the worry of wasting transparences, which also allows everyone to view and read the teacher important facts. Inspiration and Kidspiration are another great example of how children can us technology to interact and learn a curriculum. These two programs allow teachers to design their own activity for their students to finish. By performing the activity themselves they are not only learning the information required, but they are interacting with the information which will make a much longer lasting impression on the students.
Students can site and memorize material until their head turns blue, but until they minds are stimulated and have a desire to learn these facts or tools for life, they will not completely understand the information. Productivity tools stimulate a students mind using color, pictures, graphs, activities and so much more. It is not what a child learns in a lesson, but what he or she takes out of it and is able to apply to everyday life, and Productivity software enhances the impression of the lesson on the student.
Productivity Software List
A worm is a computer program that has the ability to copy itself from machine to machine. Worms use up computer processing time and network bandwidth when they replicate, and often carry payloads that do considerable damage. A worm called Code Red made huge headlines in 2001. Experts predicted that this worm could clog the Internet so effectively that things would completely grind to a halt.
A worm usually exploits some sort of security hole in a piece of software or the operating system. For example, the Slammer worm (which caused mayhem in January 2003) exploited a hole in Microsoft's SQL server. Wired magazine took a fascinating look inside Slammer's tiny (376 byte) program.
Worms normally move around and infect other machines through computer networks. Using a network, a worm can expand from a single copy incredibly quickly. The Code Red worm replicated itself more than 250,000 times in approximately nine hours on July 19, 2001 [Source: Rhodes].
The Code Red worm slowed down Internet traffic when it began to replicate itself, but not nearly as badly as predicted. Each copy of the worm scanned the Internet for Windows NT or Windows 2000 servers that did not have the Microsoft security patch installed. Each time it found an unsecured server, the worm copied itself to that server. The new copy then scanned for other servers to infect. Depending on the number of unsecured servers, a worm could conceivably create hundreds of thousands of copies.
The Code Red worm had instructions to do three things:
Upon successful infection, Code Red would wait for the appointed hour and connect to the www.whitehouse.gov domain. This attack would consist of the infected systems simultaneously sending 100 connections to port 80 of www.whitehouse.gov (126.96.36.199).
The U.S. government changed the IP address of www.whitehouse.gov to circumvent that particular threat from the worm and issued a general warning about the worm, advising users of Windows NT or Windows 2000 Web servers to make sure they installed the security patch.
A worm called Storm, which showed up in 2007, immediately started making a name for itself. Storm used social engineering techniques to trick users into loading the worm on their computers. And boy, was it effective -- experts believe between 1 million and 50 million computers have been infected [source: Schneier]. Anti-virus makers adapted to Storm and learned to detect the virus even as it went through many forms, but it was easily one of the most successful viruses in Internet history and could someday rear its head again. At one point, the Storm worm was believed to be responsible for 20 percent of the Internet's spam mail [source: Kaplan].
When the worm is launched, it opens a back door into the computer, adds the infected machine to a botnet and installs code that hides itself. Botnets are small peer-to-peer groups, rather than a larger, more easily identified network. Experts think the people controlling Storm rent out their micro-botnets to deliver spam or adware, or for denial-of-service attacks on Web sites.
Viruses of all kinds were a major threat in the early years of the Internet's growth. They're still out there, but since the mid-2000s anti-virus software has gotten better and Web browsers and operating systems have become more secure. Will the big threat of the 2010s be levied against smartphones rather than PCs?