BTM 200 Notes
BTM 200 Notes
BTM 200 Notes
Pre-Test IT Knowledge
1. Broadband is often referred to as:
High speed internet
2. _____ Is data that has been organized or presented in a meaningful fashion
Information
3. VPN stands for
Virtual private network
4. Cookies are _____ that some Web sites automatically store on _____ when you
visit them
Small text files – your computer’s hard drive
5. As best recommended practice, how often should one run an active virus scan
on ones computer?
Once a week
6. ________ Blogs contain links to other sites associated with the creator, with the
intention of either increasing traffic to the site or increasing search engine
rankings
Spam
7. A computer’s hardware devices are able to communicate with the operating
system using special programs called
Device drivers
8. What happens to the information on the wiki?
A “common opinion” forms as anyone can modify what has been
posted
9. _______ Determines how quickly the CPU works
Clock speed
10. RAM is a ________ type of memory
Fast
11. _______ Is the actual speed of data transfer that is achieved on a network
Throughput
12. ________ Refers to a set of instructions that tells a computer what to do
Software
13. In what unit is the processing speed measured in?
Hertz
14. Which of the following are major threats to your computer?
Unauthorized access, tampering, destruction
15. Whereas logic bombs viruses are ________, time bomb viruses are_________
Viruses that attach themselves to documents that use macros –
triggered when a certain passage of time is met
16. What is another word for “Data Transfer Rate”?
Throughput
17. When packing more pixels in the same size screen means?
Each pixel will be larger
18. If you install a device called an_______ on your network, you can share a
broadband internet connection among several computers
Router
19. How can you prevent spam?
Before registering on a web site, read the privacy policy and do
not give the site permission to pass your email to 3rd parties.
20. Which of the following is not a characteristics of a strong password?
Is a word from the dictionary
21. RAM stands for?
Random Access Memory
22. Which of the following is not a way to fully protect yourself and you computer
when using instant Messenger programs?
Avoid using instant messaging programs on public computers
23. An_______ is a secure internet pathway that corporations use to protect
sensitive data
VPN
24. A wide area network (WAN) is __________
Made up of LANs connected over long distances
25. What is a multipartite virus?
A virus that designed to infect multiple file types in an effort to
fool the antivirus software that is looking for it.
26. __________ Is an application that is still under development
Beta version
27. Which of the following can be classified as unintentional threats to
information systems (computers) caused by human errors or negligence?
Selecting a weak password and revealing your password
28. Which of the following does not protect your computer from physical theft?
Alarms
29. While your computer is turned on, the operating system is stored in the______
ROM
Introduction
It is important to understand:
1. The Concordia code of ethics
2. The website, the information on the website
3. Practice for information related of ethical issues
Identify, assess, and respond to ethical issues associated with information
technologies
Overview
Morals & Ethics computer and information perspective
Primary issues with technology
Privacy issues: Most importantly today as it relates to cloud computing.
Privacy in the digital world:
Privacy of the person: the right to keep body functions and body
characteristics (such as genetic codes and biometrics) private;
Privacy of behavior and action: sensitive issues such as sexual
preferences and habits, political activities and religious practices;
Privacy of communication: aims to avoid the interception of
communications, including mail interception, the use of bugs,
directional microphones, telephone or wireless communication
interception or recording and access to email messages;
Privacy of data and images: concerns about making sure that
individuals’ data is not automatically available to other individuals and
organisations and that people can “exercise a substantial degree of
control over that data and its use”;
Privacy of thoughts and feelings: refers to the right not to share their
thoughts or feelings or to have those thoughts or feelings revealed.
Individuals should have the right to think whatever they like;
Privacy of location, space and time: individuals have the right to
move about in public or semi-public space without being identified,
tracked or monitored;
Privacy of association: (including group privacy) is concerned with
people’s right to associate with whomever they wish, without being
monitored.
o Intellectual rights: relates to context such as cloud computing and issues like
(cloud computing: the delivery of computing as a service rather than a product,
typically over the internet).
Patent infringement
A Canadian patent grants the patentee the right to make use and sell an
invention for the term of the patent.
Copyright infringement
Cloud computing involves the storage of data in the cloud rather than
locally
Property issues
When data is stored in multiple locations it may be less clear whether
copyright has been infringed
Trade secrets/ Confidential information
What will happen to data in the event that the cloud storage service is
terminated
Should consider what type of duty of confidentiality is owed to the user
by the cloud service provider
o Ethics: used as general guidelines morals to manage the law and for people to
follow
Provide a general set of unwritten guidelines
No universal agreement
Most societies use a blend
Ethical decisions are greatly influenced by personal ethics
o Morals=ethics
Conforming to established ideas of right and wrong
Viewed as black and white
o Laws:
They are formal standards (written) that apply to all
Enforced by official agencies such as governments
Note:
Laws to cover all possibilities is impossible
Consequently, ethics would be used as general guidelines to manage
the law and for people to follow
Ethical Systems
o Relativism
Definition
No universal mortal truth
Moral principles dictated by cultural tastes and customs
What could be right in your culture can be wrong in another. (no right
or wrong)
Case
Topless bathing in Europe. This is generally banned on public beaches
in the united states
o Divine command
Definition
God is all-knowing. He is the one who sets morals and ethical
standards.
God’s law is right all should conform to it
Breaking god’s law is wrong
Case
The ten commandments
o Utilitarianism
Definition
Actions are judged solely by consequences. In other words, the
outcomes of your actions should be judged
Actions that lead to, or produce happiness are considered to be
superior to those that generate unhappiness
The greater good is more important than individual’s happiness.
Case
Weapons of mass destruction. It may end war sooner. To that effect,
saves lives and misery that would have otherwise been more
o Virtue
Definition
Morals are found internally (within the person)
Every individual should aim to behave well
Case
Volunteers vs court-ordered community service
Donating money without having your identity announced
o Duty-based (Deontology)
Definition
Understanding and adopting a lifestyle in line with moral duties and
rights
Everyone is expected to follow these moral duties and rights
Case
Freedom of religion
Freedom of speech
Positive psychology
Dr. Martin Seligman
Discover causes of happiness instead of treating dysfunctions
Identifying personal strengths and values
Negative (cheating, stealing, selfishness, lying) vs positive (generosity, honesty,
trust)
Technology challenges
Technology advances continue to challenge the boundaries for ethics and
moral behaviour
Examples:
Social justices: programming ethics into robots. Who should do it?
Who should govern it?
Intellectual property: 3D printing misuse. Can regulations be imposed?
Privacy: human implanted data chips. Societal benefit or privacy
violation?
Property rights: who owns outer space?
Computer abuse: is organized hacking a mode of terrorism
Fair Civil
Social Justice diobedience
Refusal
QUIZ 1
Q1: There is clear ownership of mineral rights in outer space
Answer: False
Q3: A person who does not conform to the approved standards of social or
professional behaviour__________
Answer: Commits unethical behaviour
Q4: A ________ is person who reports a business that is engaged in an illegal activity or
an unethical act to a regulatory agency.
Answer: Whistle-blower
Q6: Microsoft agreed to censor search results and partnered with Baldu.com to
provide English-language search results in China.
Answer: True
Q8: Google moved its Chinese site to Hong Kong in 2010 to avoid censorship
Answer: True
Q9: __________ is the theory that holds that there is no universal moral truth and that
instead moral principles are dictated by cultural tastes and customs
Answer: Relativism
Q10: If you 3D print a faulty bicycle helmet, there are clear cut responsibilities if
someone is hurt using the helmet
Answer: True
Q11: An example of ethical uses of computers and social media is the coordination of
relief efforts after a natural disaster
Answer: True
Q12: _______ is the theory that holds that actions that generate greater happiness are
judged to be better than actions that lead to unhappiness
Answer: Utilitarianism
Q13: Harvard researchers are experimenting with robot swarms which are groups of
robots that ___________
Answer: work together to perform a task without human intervention
Q14: Relativism holds that moral principles are dictated by cultural tastes and
customs
Answer: True
Q15: ________ Is the theory that God is all-knowing and sets moral standards
Answer: Divine Command Theory
In this unit you learn about the computer parts, how they interact, what are
there functions and features)
Miniaturization
Microchips
Store and process data in electronic devices
Microprocessors
The miniaturized circuitry of an entire computer processor (“brain”)
on a single chip
Contains the central processing unit (CPU): which processes data into
information
The development of microchips and processors has enabled the development
of small, mobile electronic devices
System unit
The case that contains the computer’s electronic components used to process
data
PCs: tower or desktop; monitor is separate
Laptops: monitor is attached to the system unit, like a clamshell
Tablets: usually includes a touch-screen interface
Smartphones: handheld system units
Binary coding schemes assign a sign a unique binary code to each character
ASCII (American standard code for information interchange)
Requires 7 or 8 bits per character, depending on the version
8-bit extended ASCII provides 256 characters
Commonly used for microcomputers
Unicode
Requires 16 bits per character
Handles 65,536 characters—used for Chinese and Japanese
EBCDIC (extended binary coded decimal interchange code)
Requires 8 bits per character
Used for IBM mainframes
4.5 Memory
Two types of storage: primary and secondary
Primary storage= “memory”, “main memory”, “RAM”; this type of
memory is temporary and volatile
Secondary storage= hard disks and flash memory units; this type of
memory is relatively permanent and non-volatile
Memory chips
o RAM
Random access memory chips are volatile and hold:
Software instructions
Data before and after the CPU processes it
o ROM
Read only memory
Cannot be written on or erased without special
equipment
Are loaded at factory with fixed (permanent) start-up
instructions (BIOS), that tell the computer how to load
the operating system
o CMOS
Complementary metal oxide semiconductor
Powered by a battery
Contains time, date, calendar, boot password
o Flash
Non-volatile memory that can be erased and reprogrammed
more than once
Doesn’t require a battery
Used in never PC’s for BIOS instructions
Speeding up processing:
Cache
o The CPU works much faster than RAM, so it often must way for info
o Cache temporarily stores instructions and data that the processor
uses frequently to speed up processing
Level 1 cache is part of the microprocessor
Holds 8 to 128 KB
Faster than level 2 cache
Level 2 cache is external cache
Holds 64 KB to 16 MB
Level 3 cache is on the motherboard
Comes on very high-end computers
Holds 2 to 8 MB
Virtual memory
o This type of memory is unused hard disk or optical (CD) space that
the processor uses to extend the capacity of RAM
o The processor goes first to L1 cache, then L2 cache, then RAM, then
virtual memory
o Each type of memory is slower than its predecessor
UNIT 4B:
Secondary storage hardware includes devices that permanently hold data
and information as well as programs
Online, or cloud storage is also available, but we still use secondary storage
hardware
5.1 Keyboards
Keyboards: convert letters, numbers, and characters into electrical signals
o English keyboards differ from foreign language keyboards
How keyboards work:
o You press a key
o This interrupts the current flowing through the circuits
o Processor determines where the break occurs
o It compares the location of the break with the (x,y) character map for
the language on the keyboard’s ROM chip
o A character is stored in keyboard memory
o The character is then sent to PC and a data stream via wire or wireless
connection
o OS interprets its own operating-system-specific commands and sends
the others to the application for interpretation
o Most keyboards are QWERTY-named for the first six letters on the top
left of the keyboard
o Keyboards are either tactile (physical) or touch screen (virtual)
Keyboard types
o 104-108 keys desktop standard
o 80-85 keys for laptops
o Wired
Connect to CPU via a serial or USB port
o Wireless use either
IR (infrared) technology
Radio frequency (RF) technology
Terminal types
o Dumb terminals
Aka video display terminal (VDT)
Has display screen and keyboard
Can do input and output only—no data processing
o Intelligent terminals
Has screen, processor, keyboard, and memory
Can perform some independent functions
Automated teller machine; point of sale terminal; mobile data
terminal
Bar-code readers
o Photoelectric (optical) scanners that translate bar code symbols into
digital code
The digital code is then sent to a computer
The computer looks up the item and displays its name and
associated information
o Bar code types
1D (regular vertical stripes) holds up to 16 ASCII characters
2D (different-sized rectangles) can hold 1,000 to 2,000 ASCII
characters
3D is “bumpy” code that differentiates by symbol height
Can be used on metal, hard rubber, other tough surfaces
Multifunction printers
Printers that combine several capabilities:
o Printing
o Scanning
o Copying
o Faxing
Cost less and take up less space than buying the four separate office
machines.
But if one component malfunctions, so will the other functions
DVD ROM
Laser Mother Board
QUIZ 2
2. On a keyboard, Num lock and Caps Lock are both toggle keys
Answer: True
3. The operating system provides the means for users to interact with a
computer
Answer: True
8. Which port is the most common port used to connect input and output
devices?
Answer: Universal serial bus (USB)
9. Today’s CPUs run at speeds measured in kilohertz
Answer: False
13. All of the following are ways to avoid injuries when working on computers
except _________
Answer: Placing a monitor at least 12’ from the eyes
14. A unidirectional microphone picks up sounds equally well from all directions
Answer: True
15. Which of the following optical storage media has the greatest storage
capacity?
Answer: DVD
Introduction
Operating system is very important because you cannot start doing work,
brows the website, you cant start Microsoft word unless your operating
system is up and running properly
o Operating system manages all your computer hardware, memory and
storage
It has 3 parts to it
1. Utilities: check what is being processed, how much memory
you have, the speed of the CPU and so on…
2. File management system: allows to manage your files,
storage backup and so on….
3. Management of your application system: application that
you have installed on your computer.
About managing your computer hardware
Overview
Unit 3A: system software the power behind the power
Application software is software that has been developed to solve a
particular problem for users—to perform useful work on specific tasks or to
provide entertainment.
System software runs at the most basic level of your computer and enables
the application software to interact with the computer and helps the
computer to manage its internal and external resources, as well as manage
the hardware.
There are three basic components of system software that you need to know
about:
1. Operating systems: An operating system is the principal component
of system software in any computing system.
2. Device drivers: Device drivers help the computer control peripheral
devices.
3. Utility programs: Utility programs are generally used to support,
enhance, or expand existing programs in a computer system.
The OS manages:
o Booting
o CPU management
o File management
o Task management
o Security management
Booting
The process of loading an OS into the computer’s main memory
Booting involves four steps:
1. Turn the computer on.
2. Diagnostic routines test main memory, CPU, and other hardware.
3. Basic Input/output System (BIOS) programs are copied to main memory.
o BIOS contains instructions for operating the hardware.
o The computer needs those instructions to operate the hardware and
find a copy of the OS.
4. Boot program obtains the OS and loads it into computer’s main memory.
Cold boot—turn on computer’s “on” system
Warm boot—restart a computer that is already on
Boot disk—use a CD or flash drive containing all files to launch OS • Boot
from the cloud
CPU Management
CPU is the central processing unit.
Supervisor (kernel) is the software that manages CPU
o Remains in memory while the computer runs
o Directs other programs not in memory to perform tasks that support
application programs
Memory Management
o OS keeps track of memory locations to prevent programs and data
from overlapping each other
o Swaps portions of programs and data into the same memory but at
different times
o Keeps track of virtual memory
Queues, Buffers, Spooling
o Queue: First-in, first-out (FIFO) sequence of data or programs that
waits in line for its turn to be processed
o Buffer: The place where the data or programs sit while they are
waiting
o To spool: The act of placing a print job into a buffer. (Needed because
the CPU is faster than printers. The CPU can work on other tasks while
the print jobs wait.)
File Management
A file is either a
o Data File: a named collection of data
o Program File: a program that exists in a computer’s secondary
storage
Files are located in many places on secondary storage devices; OS locates files
and facilitates access to them
The file system arranges files in a hierarchical manner
o Top level is directories (folders)
o Subdirectories come below folders
Find files using their pathname. Example:
C:/MyDocuments/Termpaper/section1.doc
Task Management
Computers are required to perform many different tasks at once—to do task
management.
Task: An operation such as storing, printing, or calculating
Multitasking: Handling more than one program concurrently
o Example: You do word processing while playing music on your
computer.
o OS directs processor to alternate time on each program until
processing is complete.
Security Management
Operating Systems permit users to control access to their computers.
Users gain access using an ID and password.
You set the password the first time you boot up a new computer.
After that, when you boot up, you’ll be prepared to type in your username
and password.
Device Drivers
Specialized software programs that allow input and output devices to
communicate with the rest of the computer system.
When you buy a computer, many device drivers come with the system
software.
Device drivers also come with new hardware (on CDs/DVDs) or can be
downloaded from the manufacturer’s website.
Utilities
Service programs that perform tasks related to the control and allocation of
computer resources.
o Examples: Backup, virus protection, data recovery, data compression,
file defragmentation, disk cleanup, remove temp files
Some come with the OS, others can be bought separately (e.g., Norton
SystemWorks, McAfee Utilities).
User Interface
The user-controllable display screen you use to interact with the computer,
using keyboard or mouse.
Keyboard & Mouse
Special-purpose keys: used to enter, delete, edit data, and to execute
commands.
Function keys (F1, F2, etc.): used to execute commands specific to the
software being used.
Macros: keyboard shortcuts to activate series of commands.
Mouse pointer: moved to particular place on screen or to point to little
symbol icons.
Graphical User Interface (GUI)
Allows you to use a mouse or keystrokes to select icons and commands from
menus.
Three main features of GUI are desktop, icons, and menus.
o Desktop: The system’s main interface screen.
o Icons: Small pictorial figures that represent programs, data files, or
procedures.
o Rollover: A small text box that explains the icon when you roll your
mouse over it.
o Menus: Lists of built-in commands and/or options from which to
choose pull-down, cascading, pull-up, pop-up.
Defragment Pinnnig
Manage HD space Start menu
QUIZ 3
3. The two major types of system software programs are utility programs and
the_______
Answer: Operating system
7. All of the following are examples of network operating systems except ________
Answer: MS-DOS
8. Gaming consoles, such as Xbox one and Playstation 4, do not need and
operating system
Answer: False
9. Using hard disk space to temporarily store data or instructions from RAM is
referred to as the
Answer: Virtual memory
10. Which of the following is the first step in the boot process?
Answer: The BIOS is activated by turning on the computer
11. Most desktop and laptop computers run some version of Windows
Answer: True
14. CMOS is a special kind of memory that uses a great deal of power
Answer: False
15. All of the following are terms related to part of the boot process except ______
Answer: USB
Introduction
Pay attention to how long does it take for your Microsoft word application to
come up so you can actually edit a fill
If you wait 10-30seconds then you have a problem
If your operating systems is open properly then you can open an application
software
When it comes to application, it is very important that you understand the
different types of application that exist and that you can actually plan to invest extra
time to learn those different applications that will serve you to enhance your career
opportunities even if they are not part of the course
Reading: Unit 3B: application software- getting started
Overview
People interact with the application software, which interacts with the system
software, which interacts with the computer.
Financial Software
Ranges from personal-finance managers to entry-level accounting programs
to business financial-management packages
Personal-finance programs include Quicken, Moneydance, YNAB
Common features of financial software
o Track income & expenses
o Allow checkbook management
o Do financial reporting
o Offer tax categories to assist with tax recordkeeping
o May offer financial planning & portfolio management
o Tax, accounting, investment software also available
Desktop Publishing
Involves mixing text & graphics to produce high-quality output for
commercial printing
Uses a mouse, scanner, printer, and DTP software
Professional DTP programs: QuarkXPress, Adobe InDesign
Has the following features
o Mix of text with graphics
o Offers varied type & layout styles
o Allows import of files from other programs
Becoming a DTP professional requires training
Drawing Programs
Graphics software used to design & illustrate objects & products
Create vector images—created from geometrical formulas
Examples: CorelDRAW, Adobe Illustrator
Painting Programs
Graphics programs that allow users to simulate painting on-screen
Produce bit-mapped or raster images (tiny dots)
Video-Editing Software
Allows import to and editing of video footage on computer
Some video editing packages: Adobe Premiere Elements, Corel Video Studio,
Sony Pictures Digital Vegas, Apple Final Cut Express, Pinnacle Studio DV, &
Ulead VideoStudio
Audio-Editing Software
Allows import to and editing of sound files on computer
Sound editing packages: Windows Sound Recorder, Sony Pictures Sound
Forge, Audacity (freeware), Felt Tip Software’s Sound Studio (shareware),
GoldWave, & WavePad.
Animation Software
Simulates movement by rapidly displaying a series of still pictures, or frames
Computer animation: Creation of moving images by means of computer
GIF animation: First format to be widely used for web pages
Packages: GIF Construction Professional, 3D GIF Designer, Easy GIF Animator
Multimedia Authoring Software
Combines text, graphics, video, animation, and sound in an integrated way to
create stand- alone multimedia applications
Content can be put on CDs/DVDs or delivered via the web
Two examples: Adobe Director & Macromedia Authorware
Web Page Design/Authoring Software
Used to create web pages with sophisticated multimedia features.
Packages: Adobe Dreamweaver, Seamonkey, Coffee Cup, RealMac Rapid
Weaver, etc.
Packages also provided by internet access
providers; free
& easy to use.
Project Management Software
A program used to plan and schedule the people, costs, and resources
required to complete a project on time
Packages: Mindjet MindManager, MatchWare MindView, Microsoft Project,
etc.
Portable Document Format (PDF)
Multiplatform file format developed by Adobe Systems that allows
documents to be used with any operating system.
Captures text, graphic, and formatting information from a variety of
applications on different platforms, making it possible to send documents
and have them appear on the recipient’s monitor as they were intended to be
viewed.
Today, used for virtually any data that needs to be exchanged among
applications and users
Computer-Aided Design (CAD)
Programs intended for 2D and 3D design of products, structures, civil
engineering drawings, and maps.
o Examples include Autodesk, AutoCAD, TurboCAD, Alibre Design, and
PowerCADD.
o CAD programs help design buildings, cars, planes, electronic devices,
roadways, bridges, subdivisions.
o CAD/CAM programs: allow CAD programs to be input into computer-
aided manufacturing systems that make products.
Authoring .WAV
Software Uncompressed
Webpage
QUIZ 4
1. __________ Software is used to perform calculations and numerical analyses
Answer: Spreadsheet
8. Using your mobile devices to make purchases is more risky than making
purchases with your computer on the web
Answer: False
10. All web-based word processing applications are as fully featured as installed
versions
Answer: True
13. To remove red eye from a digital image, you would use software such as
____________
Answer: Adobe Photoshop Elements
15. All of the following are examples of software suits EXCEPT _______________
Answer: Microsoft OneNote
Unit 5: Communication and Networks
Introduction
What does it take for you in terms of hardware, software for you to connect
from your computer and have access to your browser?
In other words, once you have your computer, what do you need?
Important to understand how having the browser and connecting to the
Internet having the world under your fingertip is made possible.
Overview
Reading: Chapter 6 – communications, networks & cyberthreats the wired and
wireless world
Digital convergence is the gradual merger of computing and communications
into a new information environment, in which the same information is
exchanged among many kinds of equipment, using the language of computers.
At the same time, there has been a convergence of several important
industries—computers, telecommunications, consumer electronics,
entertainment, mass media— producing new electronic products that
perform multiple functions.
6.2 Networks
Network: system of interconnected computers, telephones, and/or other
communications devices that can communicate with one another and share
applications and data.
Benefits of Networks
o Share peripheral devices, such as printers, scanners, disk drives
o Share software
o Share data and information
o Better communications
o Accessing databases
o Centralized communications
o Security of information, because of improved backup systems
Ethernet
Network standard for linking all devices in a local area network that
describes how data can be sent between computers and other networked
devices usually in close proximity.
o Ethernet deals with LAN collisions; Ethernet is a LAN technology that
can be used with almost any kind of computer and that describes how
data can be sent between computers and other networked devices
usually in close proximity.
o The Ethernet communications protocol is embedded in software and
hardware devices intended for building a local area network (LAN),
and it is commonly used in star topologies.
Fiber-optic cable
Dozens or hundreds of thin strands of glass or plastic that transmit pulses of
light, not electricity
Can transmit up to 2 gigabits per second (very fast)
Have lower error rate than twisted-pair or coax
More expensive than twisted-pair or coax
Lighter and more durable than twisted-pair or coax
More difficult to tap into than twisted-pair or coax
Cyberthreats:
Denial of Service Attack
o Consists of making repeated requests of a computer or network
device, thereby overloading it and denying access to legitimate users.
o Used to target particular companies or individuals.
Virus
o Deviant program that hides in a file or a program on a disk, flash
memory drive, in an e-mail, or in a web link and that causes
unexpected effects such as destroying or corrupting data.
o Usually attached to an executable file that you must run or open (to
activate the virus).
Worms
o A program that copies itself repeatedly into a computer’s memory or
disk drive.
o May copy itself so much it crashes the infected computer.
Trojan Horses
o Programs that pretend to be a useful program such as a free game or a
screensaver but that carry viruses or malicious instructions that
damage your computer or install a backdoor or spyware.
o Backdoors and spyware allow others to access your computer without
your knowledge.
Rootkits
o In many computer operating systems, the “root” is an account for
system administration. A “kit” is the malware secretly introduced into
the computer. A rootkit gives an attacker “super powers” over
computers—for example, the ability to steal sensitive personal
information.
Blended Threats
o A blended threat is a more sophisticated attack that bundles some of
the worst aspects of viruses, worms, Trojan horses, and other
malware into one single threat. Blended threats can use server and
Internet vulnerabilities to initiate, then transmit and also spread an
attack. Blended threats are designed to use multiple modes of
transport—email, flash drives, networks, and so on.
Zombies & Bots
o A botmaster uses malware to hijack hundreds to many thousands of
computers and is able to remotely control them all, including the
ability to update the malware and to introduce other programs such as
spyware. Hijacked computers are called zombies.
o A botnet (robot network) is a network of computers in which each
computer has been implanted with instructions to wait for commands
from the person controlling the botnet.
Ransomeware
o A botnet may be used to install ransomeware, which holds the data on
a computer or the use of the computer hostage until a payment is
made. Ransomware encrypts the target’s files, and the attacker tells
the victim to make a payment of a specified amount to a special
account to receive the decryption key.
Time, Logic, & Email Bombs: A time bomb is malware programmed to “go
off” at a particular time or date. A logic bomb is “detonated” when a specific
event occurs—for example, all personnel records are erased when an
electronic notation is made that a particular person was fired. Email bombs
overwhelm a person’s email account by surreptitiously subscribing it to
dozens or even hundreds of mailing lists.
Phone Malware: Worms and viruses and other malware are attacking
smartphones. The most common type of cellphone infection occurs when a
cellphone downloads an infected file from a PC or the Internet, but phone-to-
phone viruses are also on the rise.
o Infected files usually show up disguised as applications such as games,
security patches, add-on functionalities, and free stuff. Future
possibilities include cellphone spyware—so someone can see every
number you call and listen to your conversations—and viruses that
steal financial information, which will become more serious as
smartphones are used as common payment devices.
Cellphone Malware
o Spread via Internet downloads, MMS attachments, and Bluetooth
transfers
o Usually show up disguised as applications such as games, security
patches, add-on functionalities, erotica, and free programs
o Protect your phone:
Turn off Bluetooth discoverable mode
Check security updates to learn about filenames to watch out
for
Install security software
How they spread
o Via e-mail attachments
o By infected disks and flash drives
o By clicking on infiltrated websites
o By downloading infected files from websites
o Through infiltrated Wi-Fi hotspots
o From one infected PC on a LAN to another
What can you do about it?
o Install antivirus and firewall software
and subscribe to the manufacturer’s automatic antivirus update
service
Online Safety
Use antivirus software, and keep it current
Install a firewall to monitor network traffic and filter out undesirable types of
traffic and undesirable sites
Don’t use the same password for multiple sites
Don’t give out any password information
Use robust passwords:
o Minimum 8 characters with letters, numbers, characters
o 4cats is not a good password; f0UrK@tTz is safer
o Use biometric identification
o Use encryption
Install antispyware software
Encrypt financial and personal records so only you can read them
Back up your data, so if your PC is attacked and must be reformatted, you can
restore your data
Never download from a website you don’t trust
Consider biometric authentication
Encryption
o Process of altering readable data into unreadable form to prevent
unauthorized access
o Uses powerful mathematical ciphers to create coded messages that
are difficult to break
o Unencrypted messages are known as plain text
o Encrypted text is known as cybertext
o You use an encryption key to encrypt and decrypt codded messages
QUIZ 5
7. For the nodes on a network to communicate with each other and access the
network, each node needs a
Answer: Network adapter
8. Normal telephone cable is a type of
Answer: Twisted-pair cable
9. On a network, an ___________ helps prevent data packets from colliding with each
other
Answer: Switch
12. Current wired Ethernet networks in the U.S, are based on the IEEE 802.11ac
standard
Answer: False
13. Which of the following is not a standard for wireless fidelity Ethernet networks
Answer: 802.11ac
15. Which of the following is NOT a type of UTP cable you would use I a wired
Ethernet network
Answer: Cat 7B
Introduction
In this activity you need to PRACTICE!
o Assessing your hardware
o Finding if its good enough for you
o And what kind of things you can do to make it better
Checking HDD (Hard disk drive) / SSD (Solid state drive) Health
Contains the operating system and all files and information
Important for hard drive to be 100% health
For hard drive use HDSentitel
For SSD you can use SSDlife
Check manufacturer on what qualifies changing the hard drive
Testing CPU
We recommend Geekbench 4 for Testing CPU
After running it you will get 2 score, a single-core score and a multi-core
score.
The single-cores core shows what the performance is like under one core
The multi-core score displays the performance under heavy load using all
cores on the computer
Testing GPU
Maxon’s Cinebench is a free software will use OpenGL to test the graphics
card
The results are displayed as frames per second (FPS) – the higher the better
QUIZ 6
5. The rule of thumb that predicts that the number of translators on a CPU will
double every 2 years is called ________ law
Answer: Moore’s
7. RAID 0 automatically duplicates your data and saves it on two identical drives
Answer: False
12. To securely erase data, the U.S. department of defense suggests tat data be _______
Answer: Overwritten multiple times
14. Hybrid drives are a combination of a mechanical hard drive and an SSD drive
Answer: True
Unit 7: Security
Introduction
Important to understand security issues, not only who can hack and steal
information from you, or data, identity theft, or wtv….
What is also important is how can you make sure that if something happens
to your computer like a fire, data is also stored and backed up properly
Encryption
The process of altering readable data into unreadable form to prevent
unauthorized access
Advantage: encrypting data that is available over the Internet keeps thieves
and crackers from reading it
Disadvantage: encrypting data may prevent law-enforcement officials from
reading the data criminals are sending to one another
Disaster-recovery plans
Method of restoring information-processing operations that have been halted
by destruction or accident
Back up everything; put mainframes in different locations
Plans range in price and complexity
Automatically store data redundantly in two or more places
Have an off-site computer-based data storage center with independent power
supply
9.3 Privacy and Surveillance
The rise of Big Data has led to continuing threats to privacy from three giant
sources:
From business organizations
From governments, local to federal
From foreign governments and criminal groups
Polymorphic Quarentining
virus Secure Area
Change code
Quiz 7
1. You should use the same password for each system or website you need to access
Answer: False
3. You can block logical ports from invaders and make your computer invisible to
others on the internet by installing ________
Answer: A firewall
5. The terms virus and worm actually mean the same thing.
Answer: False
7. A macro virus is a virus that is attached to a file such as a Word document or Ecel
workbook.
Answer: True
9. Running the CPU at a faster speed than the manufacturer recommends is called
______
Answer: Overclocking
11. Which of the following ports is NOT used to connect to a video card?
Answer: USB
12. A worm does NOT require human interaction to spread to other computers.
Answer: True
13. There are ______ levels of cache memory in the intel i7 processor
Answer: Three
14. In most current systems, __________ is the type of RAM used
Answer: DDR3
Excel vs Access
o Microsoft access
o Create tables and fields
o Relationships
o Forms
o Reports
o Microsoft excel
o Main screen
o Files
o Home toolbar
o Insert toolbar
o Page layout toolbar
o Data toolbar
o Review and view toolbar
o Using the IF function
o Pivot table
o Graphs
o Excel and access are both applications of Microsoft. Excel is used for
spreadsheets, whereas, access is used for database purposes.
o Excel
Helps in creating charts, graphs using spreadsheets
Financial analysts use excel a lot
Excel helps in tracking, feeding inputs, finding out outputs, and
helps in data manipulation
o Access
Used for collecting and sorting data
Preferred to excel when the small business owners need to deal
with a lot of reports and queries
o Microsoft excel vs access
Important applications
Their usage is used to different sets of people
Excel has more flexibility while access is more rigid on how we
can use it
Difference between the two: scope of use. Microsoft excel can
be used as a spreadsheet application. Microsoft access can be
used as a database application.