SlideShare una empresa de Scribd logo
1 de 13
Hacker Malorie Blackman By Aashika
  Contents About the author  About the book  More about the book  Characters Quiz !                  I hope You Enjoy!
About the author Malorie Blackman has written over 50 novels for children and even adult novels. Her first novel: Not so stupid! Was published in 1990. She has also written Thief! ,Hacker, A.N.T.I.D.O.T.E ,Pig-Heart Boy ,Noughts and Crosses ,Dangerous Reality ,Deadly Dare Mysteries, Dead Gorgeous ,and Tell me no lies. Malorie has worked as a database manager and as a systems programmer. She lives in south London.
About the Book   When Vicky’s father is arrested, accused of stealing over a million pounds from the bank where he works, she is determined to prove his innocence. But how, when all the evidence is hidden in the computer files?   Helped by her brother, Gib and his best friend, Chaucy, Vicky decides to try and hack into the bank’s computers. For if there is one school subject she is good at, it is computing. But even if she does manage to break into the system, can she find the answers before the real thief finds her? MESSAGE: THIS IS THE SYSTEM OPERATOR. WHO IS USING THIS ACCOUNT? PLEASE IDENTIFY YOURSELF…
More about the book   Vicky, a 12 year old girl is accused of cheating in the math test in her school but she didn’t, only that she used her programmable calculator that her parents had bought her for Christmas but everyone was allowed  a calculator. She is sent home with a letter of suspension from the head teacher. When she and her brother, Gib come home there is news that is worse...Her dad was arrested for stealing over a million pounds from the Universal Bank. How will Vicky find all the answers when the thief is closer to her than she thought?
Characters Vicky or Victoria Gib or Richard Gibson Mum Dad Aunt Beth or Elizabeth Sebastian {Her husband} The head teacher, Mrs. Hiff Chaucyor Alexander Chaucer
Just to see if you have listened You guessed it...    A Quiz !
Quiz! Q1:What is the real name of Gib?   Ronald   Richard   Elliot
Q2:Who is Gib’s best friend ?      Sebastian      Chaucy      Vicky
 Q3: Sebastian is who’s husband ?     Elizabeth     Laura     Mum
Q4:Which bank was Vicky’s father working for ?       Barclay’s bank       HSBC       Universal bank
 Q5:What is the name of Vicky’s Head teacher?     Mrs. Irving     Mrs. Hiff     Mrs. Gibson
Thank you for watching      my presentation!    The End

Más contenido relacionado

La actualidad más candente

Defcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slidesDefcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slides
Marina Krotofil
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Tony Nguyen
 
Encryption & steganography in i pv6 source address
Encryption & steganography in i pv6 source addressEncryption & steganography in i pv6 source address
Encryption & steganography in i pv6 source address
IAEME Publication
 

La actualidad más candente (20)

IPTV Security
IPTV SecurityIPTV Security
IPTV Security
 
Defcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slidesDefcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slides
 
Ipsec
IpsecIpsec
Ipsec
 
IoT enabled intelligent fleet management
IoT enabled intelligent fleet managementIoT enabled intelligent fleet management
IoT enabled intelligent fleet management
 
MQTT security
MQTT securityMQTT security
MQTT security
 
IOT
IOT IOT
IOT
 
Chapter 9 PowerPoint
Chapter 9 PowerPointChapter 9 PowerPoint
Chapter 9 PowerPoint
 
Conceptual model for security in next generation network.pptx
Conceptual model for security in next generation network.pptxConceptual model for security in next generation network.pptx
Conceptual model for security in next generation network.pptx
 
Iot how it works
Iot   how it worksIot   how it works
Iot how it works
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
UHF RFID BASED ANIMAL TRACKING SYSTEM
UHF RFID BASED ANIMAL TRACKING SYSTEMUHF RFID BASED ANIMAL TRACKING SYSTEM
UHF RFID BASED ANIMAL TRACKING SYSTEM
 
WinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolWinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage Tool
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Home Smart Home
Home Smart HomeHome Smart Home
Home Smart Home
 
Encryption & steganography in i pv6 source address
Encryption & steganography in i pv6 source addressEncryption & steganography in i pv6 source address
Encryption & steganography in i pv6 source address
 
NFC Technology for Smart Wearables
NFC Technology for Smart WearablesNFC Technology for Smart Wearables
NFC Technology for Smart Wearables
 
Windows 1.O
Windows 1.OWindows 1.O
Windows 1.O
 
Snort IDS
Snort IDSSnort IDS
Snort IDS
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 

Destacado

Powerpoint
PowerpointPowerpoint
Powerpoint
Mia Mai
 
Jack london presentation
Jack london presentationJack london presentation
Jack london presentation
aumatell
 
Glossario .. (2)
Glossario .. (2)Glossario .. (2)
Glossario .. (2)
iesMola
 
11b; reproduction
11b; reproduction11b; reproduction
11b; reproduction
kwiley0019
 
Prezentacja bal 2011
Prezentacja bal 2011Prezentacja bal 2011
Prezentacja bal 2011
UEWroclaw
 

Destacado (20)

Noughts and crosses
Noughts and crossesNoughts and crosses
Noughts and crosses
 
Weekly quiz 1.
Weekly quiz 1.Weekly quiz 1.
Weekly quiz 1.
 
White fang
White fangWhite fang
White fang
 
Jack london white fang
Jack london   white fangJack london   white fang
Jack london white fang
 
ratio and proportion
ratio and proportionratio and proportion
ratio and proportion
 
Ratio and proportion
Ratio and proportionRatio and proportion
Ratio and proportion
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Jack london presentation
Jack london presentationJack london presentation
Jack london presentation
 
Conceptual Model for Assessing Recreational Safety Related to Habitat Improve...
Conceptual Model for Assessing Recreational Safety Related to Habitat Improve...Conceptual Model for Assessing Recreational Safety Related to Habitat Improve...
Conceptual Model for Assessing Recreational Safety Related to Habitat Improve...
 
Glossario .. (2)
Glossario .. (2)Glossario .. (2)
Glossario .. (2)
 
Limon4kids
Limon4kidsLimon4kids
Limon4kids
 
4. brfdp lesson 1 & 2
4. brfdp lesson 1 & 24. brfdp lesson 1 & 2
4. brfdp lesson 1 & 2
 
Animals
AnimalsAnimals
Animals
 
11b; reproduction
11b; reproduction11b; reproduction
11b; reproduction
 
Comm 439 TIME FINAL PRESENTATION
Comm 439 TIME FINAL PRESENTATIONComm 439 TIME FINAL PRESENTATION
Comm 439 TIME FINAL PRESENTATION
 
Beginning Farmer Hort 1 Building a sustainable business bfrdp lesson 3
Beginning Farmer Hort 1 Building a sustainable business bfrdp lesson 3Beginning Farmer Hort 1 Building a sustainable business bfrdp lesson 3
Beginning Farmer Hort 1 Building a sustainable business bfrdp lesson 3
 
Nakaz №899
Nakaz №899Nakaz №899
Nakaz №899
 
Prezentacja bal 2011
Prezentacja bal 2011Prezentacja bal 2011
Prezentacja bal 2011
 
Compost Trials 2013
Compost Trials 2013Compost Trials 2013
Compost Trials 2013
 
Velocidad y alcohol
Velocidad y alcoholVelocidad y alcohol
Velocidad y alcohol
 

Similar a Hacker presentation

Familiar Faces - Chapter 28: . . . .Burning
Familiar Faces - Chapter 28: . . . .BurningFamiliar Faces - Chapter 28: . . . .Burning
Familiar Faces - Chapter 28: . . . .Burning
ndainye
 

Similar a Hacker presentation (9)

How To Make Paper In Minecraft Complete Details
How To Make Paper In Minecraft Complete DetailsHow To Make Paper In Minecraft Complete Details
How To Make Paper In Minecraft Complete Details
 
Interview with protagonist - One Hundred Secret Senses
Interview with protagonist - One Hundred Secret SensesInterview with protagonist - One Hundred Secret Senses
Interview with protagonist - One Hundred Secret Senses
 
Magazine ideas
Magazine ideasMagazine ideas
Magazine ideas
 
Hvordan Skrive Et Bra Essay. Online assignment writing service.
Hvordan Skrive Et Bra Essay. Online assignment writing service.Hvordan Skrive Et Bra Essay. Online assignment writing service.
Hvordan Skrive Et Bra Essay. Online assignment writing service.
 
Graduate Admission Essay Format
Graduate Admission Essay FormatGraduate Admission Essay Format
Graduate Admission Essay Format
 
44 Good Writing Ideas JournalBuddies.Com
44 Good Writing Ideas  JournalBuddies.Com44 Good Writing Ideas  JournalBuddies.Com
44 Good Writing Ideas JournalBuddies.Com
 
CBCA, Book of the Year Shortlist , Younger Readers
CBCA,  Book of the Year Shortlist , Younger ReadersCBCA,  Book of the Year Shortlist , Younger Readers
CBCA, Book of the Year Shortlist , Younger Readers
 
Essay On My Hobby In English For Class 3
Essay On My Hobby In English For Class 3Essay On My Hobby In English For Class 3
Essay On My Hobby In English For Class 3
 
Familiar Faces - Chapter 28: . . . .Burning
Familiar Faces - Chapter 28: . . . .BurningFamiliar Faces - Chapter 28: . . . .Burning
Familiar Faces - Chapter 28: . . . .Burning
 

Hacker presentation

  • 2. Contents About the author About the book More about the book Characters Quiz ! I hope You Enjoy!
  • 3. About the author Malorie Blackman has written over 50 novels for children and even adult novels. Her first novel: Not so stupid! Was published in 1990. She has also written Thief! ,Hacker, A.N.T.I.D.O.T.E ,Pig-Heart Boy ,Noughts and Crosses ,Dangerous Reality ,Deadly Dare Mysteries, Dead Gorgeous ,and Tell me no lies. Malorie has worked as a database manager and as a systems programmer. She lives in south London.
  • 4. About the Book When Vicky’s father is arrested, accused of stealing over a million pounds from the bank where he works, she is determined to prove his innocence. But how, when all the evidence is hidden in the computer files? Helped by her brother, Gib and his best friend, Chaucy, Vicky decides to try and hack into the bank’s computers. For if there is one school subject she is good at, it is computing. But even if she does manage to break into the system, can she find the answers before the real thief finds her? MESSAGE: THIS IS THE SYSTEM OPERATOR. WHO IS USING THIS ACCOUNT? PLEASE IDENTIFY YOURSELF…
  • 5. More about the book Vicky, a 12 year old girl is accused of cheating in the math test in her school but she didn’t, only that she used her programmable calculator that her parents had bought her for Christmas but everyone was allowed a calculator. She is sent home with a letter of suspension from the head teacher. When she and her brother, Gib come home there is news that is worse...Her dad was arrested for stealing over a million pounds from the Universal Bank. How will Vicky find all the answers when the thief is closer to her than she thought?
  • 6. Characters Vicky or Victoria Gib or Richard Gibson Mum Dad Aunt Beth or Elizabeth Sebastian {Her husband} The head teacher, Mrs. Hiff Chaucyor Alexander Chaucer
  • 7. Just to see if you have listened You guessed it... A Quiz !
  • 8. Quiz! Q1:What is the real name of Gib? Ronald Richard Elliot
  • 9. Q2:Who is Gib’s best friend ? Sebastian Chaucy Vicky
  • 10. Q3: Sebastian is who’s husband ? Elizabeth Laura Mum
  • 11. Q4:Which bank was Vicky’s father working for ? Barclay’s bank HSBC Universal bank
  • 12. Q5:What is the name of Vicky’s Head teacher? Mrs. Irving Mrs. Hiff Mrs. Gibson
  • 13. Thank you for watching my presentation! The End