BTM 200 Notes

Download as pdf or txt
Download as pdf or txt
You are on page 1of 70

Notes BTM200

Pre-Test IT Knowledge
1. Broadband is often referred to as:
 High speed internet
2. _____ Is data that has been organized or presented in a meaningful fashion
 Information
3. VPN stands for
 Virtual private network
4. Cookies are _____ that some Web sites automatically store on _____ when you
visit them
 Small text files – your computer’s hard drive
5. As best recommended practice, how often should one run an active virus scan
on ones computer?
 Once a week
6. ________ Blogs contain links to other sites associated with the creator, with the
intention of either increasing traffic to the site or increasing search engine
rankings
 Spam
7. A computer’s hardware devices are able to communicate with the operating
system using special programs called
 Device drivers
8. What happens to the information on the wiki?
 A “common opinion” forms as anyone can modify what has been
posted
9. _______ Determines how quickly the CPU works
 Clock speed
10. RAM is a ________ type of memory
 Fast
11. _______ Is the actual speed of data transfer that is achieved on a network
 Throughput
12. ________ Refers to a set of instructions that tells a computer what to do
 Software
13. In what unit is the processing speed measured in?
 Hertz
14. Which of the following are major threats to your computer?
 Unauthorized access, tampering, destruction
15. Whereas logic bombs viruses are ________, time bomb viruses are_________
 Viruses that attach themselves to documents that use macros –
triggered when a certain passage of time is met
16. What is another word for “Data Transfer Rate”?
 Throughput
17. When packing more pixels in the same size screen means?
 Each pixel will be larger
18. If you install a device called an_______ on your network, you can share a
broadband internet connection among several computers
 Router
19. How can you prevent spam?
 Before registering on a web site, read the privacy policy and do
not give the site permission to pass your email to 3rd parties.
20. Which of the following is not a characteristics of a strong password?
 Is a word from the dictionary
21. RAM stands for?
 Random Access Memory
22. Which of the following is not a way to fully protect yourself and you computer
when using instant Messenger programs?
 Avoid using instant messaging programs on public computers
23. An_______ is a secure internet pathway that corporations use to protect
sensitive data
 VPN
24. A wide area network (WAN) is __________
 Made up of LANs connected over long distances
25. What is a multipartite virus?
 A virus that designed to infect multiple file types in an effort to
fool the antivirus software that is looking for it.
26. __________ Is an application that is still under development
 Beta version
27. Which of the following can be classified as unintentional threats to
information systems (computers) caused by human errors or negligence?
 Selecting a weak password and revealing your password
28. Which of the following does not protect your computer from physical theft?
 Alarms
29. While your computer is turned on, the operating system is stored in the______
 ROM

Unit 1: computer and information ethics

Introduction
 It is important to understand:
1. The Concordia code of ethics
2. The website, the information on the website
3. Practice for information related of ethical issues
 Identify, assess, and respond to ethical issues associated with information
technologies

Overview
Morals & Ethics computer and information perspective
 Primary issues with technology
 Privacy issues: Most importantly today as it relates to cloud computing.
 Privacy in the digital world:
 Privacy of the person: the right to keep body functions and body
characteristics (such as genetic codes and biometrics) private;
 Privacy of behavior and action: sensitive issues such as sexual
preferences and habits, political activities and religious practices;
 Privacy of communication: aims to avoid the interception of
communications, including mail interception, the use of bugs,
directional microphones, telephone or wireless communication
interception or recording and access to email messages;
 Privacy of data and images: concerns about making sure that
individuals’ data is not automatically available to other individuals and
organisations and that people can “exercise a substantial degree of
control over that data and its use”;
 Privacy of thoughts and feelings: refers to the right not to share their
thoughts or feelings or to have those thoughts or feelings revealed.
Individuals should have the right to think whatever they like;
 Privacy of location, space and time: individuals have the right to
move about in public or semi-public space without being identified,
tracked or monitored;
 Privacy of association: (including group privacy) is concerned with
people’s right to associate with whomever they wish, without being
monitored.

o Intellectual rights: relates to context such as cloud computing and issues like
(cloud computing: the delivery of computing as a service rather than a product,
typically over the internet).
 Patent infringement
 A Canadian patent grants the patentee the right to make use and sell an
invention for the term of the patent.
 Copyright infringement
 Cloud computing involves the storage of data in the cloud rather than
locally
 Property issues
 When data is stored in multiple locations it may be less clear whether
copyright has been infringed
 Trade secrets/ Confidential information
 What will happen to data in the event that the cloud storage service is
terminated
 Should consider what type of duty of confidentiality is owed to the user
by the cloud service provider

o Computer abuse: the use of a computer to do something improper or illegal.


(Ex: creating a face social media account)
 Examples include:
 To expose personally identifiable information (PII)
 Ex: social security number
 Using a computer to modify websites owned by someone else
 Illegally share copyrighted information
 Gaining unauthorized access
 To spy on company information and plans
 Cyber bullying
 Using work computer for personal tasks on company time
 People who commit computer abuse may be violating university policies,
company policies, or federal law.

o Ethics: used as general guidelines morals to manage the law and for people to
follow
 Provide a general set of unwritten guidelines
 No universal agreement
 Most societies use a blend
 Ethical decisions are greatly influenced by personal ethics

o Morals=ethics
 Conforming to established ideas of right and wrong
 Viewed as black and white

o Laws:
 They are formal standards (written) that apply to all
 Enforced by official agencies such as governments
 Note:
 Laws to cover all possibilities is impossible
 Consequently, ethics would be used as general guidelines to manage
the law and for people to follow

 Ethical Systems
o Relativism
 Definition
 No universal mortal truth
 Moral principles dictated by cultural tastes and customs
 What could be right in your culture can be wrong in another. (no right
or wrong)
 Case
 Topless bathing in Europe. This is generally banned on public beaches
in the united states

o Divine command
 Definition
 God is all-knowing. He is the one who sets morals and ethical
standards.
 God’s law is right all should conform to it
 Breaking god’s law is wrong
 Case
 The ten commandments

o Utilitarianism
 Definition
 Actions are judged solely by consequences. In other words, the
outcomes of your actions should be judged
 Actions that lead to, or produce happiness are considered to be
superior to those that generate unhappiness
 The greater good is more important than individual’s happiness.
 Case
 Weapons of mass destruction. It may end war sooner. To that effect,
saves lives and misery that would have otherwise been more

o Virtue
 Definition
 Morals are found internally (within the person)
 Every individual should aim to behave well
 Case
 Volunteers vs court-ordered community service
 Donating money without having your identity announced

o Duty-based (Deontology)
 Definition
 Understanding and adopting a lifestyle in line with moral duties and
rights
 Everyone is expected to follow these moral duties and rights
 Case
 Freedom of religion
 Freedom of speech

Unethical & Amoral Behaviour


 Unethical does not mean necessarily illegal
 Illegal behaviour does not necessarily mean unethical
 Amoral behaviour means no sense of right or wrong and the lack of awareness or
interest in the consequences

The following shape your personal ethics:


 Religion
 Culture bias
 Family
 Life experiences
 Teachers
 Friends
 Reflection

- Ethics & society


 Society has established rules of conduct
 Ignoring them or being inconsistent can have an immediate impact
 Consistent ethical living provides health benefits
 Inconsistent/rejecting ethical decision produce stress and anger

Positive psychology
 Dr. Martin Seligman
 Discover causes of happiness instead of treating dysfunctions
 Identifying personal strengths and values
 Negative (cheating, stealing, selfishness, lying) vs positive (generosity, honesty,
trust)

 Technology challenges
 Technology advances continue to challenge the boundaries for ethics and
moral behaviour
 Examples:
 Social justices: programming ethics into robots. Who should do it?
Who should govern it?
 Intellectual property: 3D printing misuse. Can regulations be imposed?
 Privacy: human implanted data chips. Societal benefit or privacy
violation?
 Property rights: who owns outer space?
 Computer abuse: is organized hacking a mode of terrorism

 What about Artificial intelligence?


 What are the issues?

Readings: Computer Ethics Institute


 Identifying, assessing and responding to ethical issues associated with the
advancement of information technologies in society
 Survey reveals snooping IT staff
 Peeking into confidential files at work is quite common
 The ten commandments of computer ethics
 Highly effective code of ethics for the proper use to information technology
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization
or proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and
respect for your fellow humans.

Morals Identity Chips Utilitarianism Copyright


Ethics Privacy Happiness Protection

Amoral Relativism Censorship Whistle-


No right/wrong No universal Blocking blower
moral truth Illegal activity

Fair Civil
Social Justice diobedience
Refusal

QUIZ 1
Q1: There is clear ownership of mineral rights in outer space
Answer: False

Q2: Cars often have robotic systems


Answer: True

Q3: A person who does not conform to the approved standards of social or
professional behaviour__________
Answer: Commits unethical behaviour
Q4: A ________ is person who reports a business that is engaged in an illegal activity or
an unethical act to a regulatory agency.
Answer: Whistle-blower

Q5: Unethical behaviour is always illegal behavipr


Answer: False

Q6: Microsoft agreed to censor search results and partnered with Baldu.com to
provide English-language search results in China.
Answer: True

Q7: Utilitarianism focuses on adherence to moral duties and rights


Answer: False

Q8: Google moved its Chinese site to Hong Kong in 2010 to avoid censorship
Answer: True

Q9: __________ is the theory that holds that there is no universal moral truth and that
instead moral principles are dictated by cultural tastes and customs
Answer: Relativism

Q10: If you 3D print a faulty bicycle helmet, there are clear cut responsibilities if
someone is hurt using the helmet
Answer: True

Q11: An example of ethical uses of computers and social media is the coordination of
relief efforts after a natural disaster
Answer: True

Q12: _______ is the theory that holds that actions that generate greater happiness are
judged to be better than actions that lead to unhappiness
Answer: Utilitarianism

Q13: Harvard researchers are experimenting with robot swarms which are groups of
robots that ___________
Answer: work together to perform a task without human intervention

Q14: Relativism holds that moral principles are dictated by cultural tastes and
customs
Answer: True

Q15: ________ Is the theory that God is all-knowing and sets moral standards
Answer: Divine Command Theory

Unit 2: Computer Parts


Hardware in the computer
1. Input devices (enter data-> you are communicating with the computer,
keyboard)
2. Output devices (printer and monitor)
3. Processing (processing the information)
4. Storage

 In this unit you learn about the computer parts, how they interact, what are
there functions and features)

Overview (hardware: the CPU and storage)


 Processing: the system unit, microprocessors, and main memory
 Electronic circuitry has remained basically the same over recent years
 A circuit is a closed path followed or capable of being followed by an electric
current
 Vacuum tubes used wire circuits inside them to facilitate the flow of electrons
 Transistors have replaced vacuum tubes

4.1 Microchips, miniaturization, & mobility


 Since the early 1970s, microchips have gotten smaller and smaller yet more
and more powerful and faster
 A transistor is a tiny electronic switch that can be turned “on” or “off’
millions of times per second
 Transistors form part of an integrated circuit: all the parts of an
electronic circuit embedded on a single silicon chip
 Integrated circuits are solid state (no moving parts)
 Silicon: a semiconductor made of clay and sand
 Semiconductor: a material whose electrical properties are intermediate
between a good conductor and a non-conductor of electricity
 Perfect under layer for highly conductive, complex circuits
 Microchips (microprocessors) are made from semiconductors
 Chip: a tiny piece of silicon that contains millions of microminiature
integrated electronic circuits

 Miniaturization
 Microchips
 Store and process data in electronic devices
 Microprocessors
 The miniaturized circuitry of an entire computer processor (“brain”)
on a single chip
 Contains the central processing unit (CPU): which processes data into
information
 The development of microchips and processors has enabled the development
of small, mobile electronic devices
 System unit
 The case that contains the computer’s electronic components used to process
data
 PCs: tower or desktop; monitor is separate
 Laptops: monitor is attached to the system unit, like a clamshell
 Tablets: usually includes a touch-screen interface
 Smartphones: handheld system units

4.2 Representing data electronically


 Data is represented in a computer by binary code
 Binary system: the basic data-representation method for computers
uses just two numbers: 0 and 1, representing the off/on states of
electricity or light pulses
 Measuring capacity
 All data and program instructions in the computer are represented as binary
 Bit: each 0 or 1 is a bit
 Byte: a group of 8 bits= 1 character, digit, or other value
 Kilobyte (KB): 1,000 bytes (1,024) bytes
 Megabyte (MB): 1 million (1,048,576) bytes
 Gigabyte (GB): 1 billion (1,073,741,824) bytes
 Terabyte (TB): 1 trillion (1,009,511,627,776) bytes
 Petabyte (PB): 1 quadrillion bytes
 Exabyte (EB): 1 quintillion bytes

 Binary coding schemes assign a sign a unique binary code to each character
 ASCII (American standard code for information interchange)
 Requires 7 or 8 bits per character, depending on the version
 8-bit extended ASCII provides 256 characters
 Commonly used for microcomputers
 Unicode
 Requires 16 bits per character
 Handles 65,536 characters—used for Chinese and Japanese
 EBCDIC (extended binary coded decimal interchange code)
 Requires 8 bits per character
 Used for IBM mainframes

 Machine language: the computers “native language”


 A binary-type programming language (0s and 1s) built into the CPU that is run
directly by the computer
 Each CPU type has its own machine language; thus, each computer’s machine
language is brand-dependent
 Language translators: the computer’s system software converts higher level
language instructions and data into machine language so that the processor
can “understand” what to do

4.3 Inside the system unit


 Bay: opening in the computer cabinet for the installation of electrical
equipment
 Power supply: this converts AC to DC to run the computer
 Surge protector: protects the computer from being damaged by power
spikes. Plug your company into one.
 UPS: uninterruptible power supply. Battery-operated device that provides
power for a limited time when there is a blackout.
 Motherboard: main system board of the computer (also systemboard)
 Microprocessor: miniaturized circuitry of a computer processor
 Chipset: groups of interconnected chips on the motherboard that control
information flow between the microprocessor and other system components
connected to the motherboard
 Traditional microcomputer microprocessors are Intel and AMD
 Multicore processors (2,4,6,8) have more than one processor “core” on a
single silicon chip, which allows computers to run faster.
 Special processors are made for portable devices
 A graphics processing unit (GPU) is a specialized processor used to
manipulate three-dimensional (3-D) computer graphics.
 Processing speeds
 Every microprocessor contains a system clock, which controls how
fast all the operations within a computer takes place (the chip’s
processing speed)
 Older CPU processing speeds are in megahertz
o 1 MHz= 1 million cycles per second
 Current CPU processing speeds are in gigahertz
o 1 GHz= 1 billion cycles per second
 The faster a CPU runs, the more power it consumes, and the more heat
it generates

4.4 The central processing unit and the machine cycle


 The CPU, for central processing unit, is the “brain” of the computer; it
follows the instructions of the software (program) to manipulate data into
information
 The CPU consists of two parts— (1) the control unit and (2) the
arithmetic/logic unit (ALU), both of which contain registers, or high-speed
storage areas
 All are linked by a kind of electronic “roadway” called a bus
 The control unit deciphers each instruction stored in the CPU and then carries
out the instruction. It directs the movement of electronic signals between
main memory and the arithmetic/logic unit. It also directs these electronic
signals between main memory and the input and output devices.
 For every instruction, the control unit carries out four basic operations,
known as the machine cycle
1. Fetches an instruction
2. Decodes the instruction
3. Executes the instruction
4. Stores the result
 Each time the central processing unit executes an instruction, it takes a series of
steps. The complete series of steps is call a machine cycle.
 The arithmetic/logic (ALU) performs arithmetic operations and logical
operations and controls the speed of those operations
 Arithmetic operations are the fundamental math operations: addition,
subtraction, multiplication, and division
 Logical operations are comparisons—the ALU compares two pieces of data to
see whether one is equal to (=), or greater than (>), greater than or equal to
(>=), less than (<), less than or equal to (<=), or not equal to the other
 The control unit and the ALU also use registers, special CPU areas that
enhance the computer’s performance
 Registers are high-speed storage areas that temporarily store data during
processing. They may store a program instruction while it is being decoded,
store data while it is being processed by the ALU, or store the results of a
calculation
 All data must be represented in a register before it can be processed
 The number of registers that a CPU has and the size of each (number of bits)
help determine the power and speed of a CPU)
 Buses are electrical data “roadways” through which bits are transmitted
within the CPU and between the CPU and other components of the
motherboard
 In most computers, the bus width is the same as the computer’s word size,
the number of bits that the processor can process at one time. The more bits
in a word, usually the faster the computer.

4.5 Memory
 Two types of storage: primary and secondary
 Primary storage= “memory”, “main memory”, “RAM”; this type of
memory is temporary and volatile
 Secondary storage= hard disks and flash memory units; this type of
memory is relatively permanent and non-volatile
 Memory chips
o RAM
 Random access memory chips are volatile and hold:
 Software instructions
 Data before and after the CPU processes it
o ROM
 Read only memory
 Cannot be written on or erased without special
equipment
 Are loaded at factory with fixed (permanent) start-up
instructions (BIOS), that tell the computer how to load
the operating system
o CMOS
 Complementary metal oxide semiconductor
 Powered by a battery
 Contains time, date, calendar, boot password
o Flash
 Non-volatile memory that can be erased and reprogrammed
more than once
 Doesn’t require a battery
 Used in never PC’s for BIOS instructions

 Speeding up processing:
 Cache
o The CPU works much faster than RAM, so it often must way for info
o Cache temporarily stores instructions and data that the processor
uses frequently to speed up processing
 Level 1 cache is part of the microprocessor
 Holds 8 to 128 KB
 Faster than level 2 cache
 Level 2 cache is external cache
 Holds 64 KB to 16 MB
 Level 3 cache is on the motherboard
 Comes on very high-end computers
 Holds 2 to 8 MB
 Virtual memory
o This type of memory is unused hard disk or optical (CD) space that
the processor uses to extend the capacity of RAM
o The processor goes first to L1 cache, then L2 cache, then RAM, then
virtual memory
o Each type of memory is slower than its predecessor

4.6 Expansion cards, bus lines, & ports


 Expansion cards plug into slots on the motherboard that are connected by buses
to ports that the user can access
 Expansion cards are circuit boards that provide more memory or that
control peripheral devices (for graphics, sound, video, network interface,
wireless connection, etc.)
o Expansion cards: if a computer uses closed architecture, no expansion
cards can be added; if the computer uses open architecture, expansion
cards can be inserted in expansion slots inside the computer,
connected to the motherboard
 Buses connect the expansion cards to ports
 A port is a connection socket or jack on the outside of the computer unit or
device into which are plugged different kinds of cables that connect
peripheral devices
 An expansion bus is not the same as the frontside bus;
 Frontside bus: the bus that connects the CPU within itself and the main
memory
 Expansion bus: buses that connect the CPU with expansion slots on the
motherboard and thus via ports with peripheral devices
 Types of expansion buses:
 PCI: high-speed bus, widely used to connect PC graphic cards, sound cards,
modems, & high-speed network cards
 PCI express: doubles the speed of the original PCI. PCIe is the latest standard
for expansion cards available on mainstream personal computers
 Accelerated graphics: transmits data at twice the speed of a PCI bus and is
designed to support video and 3-D graphics
 Universal Serial Bus (USB): does away with the need to install cards to in
expansion slots. USB devices can connect one to another outside the system
unit, and then the USB bus connects to the PCI bus on the motherboard
 FireWire: resembles the USB bus but is used for more specialized purposes,
such as to connect audio and video equipment to the motherboard
 A port is a socket for some kind of plug, of which there are many types
 Serial port: used to transmit data slowly over long distances
o Sends data sequentially, one bit at a time
o Used to connect older keyboards, mouse, monitors, dial-up modems
 Parallel port: for transmitting data quickly over short distances
o Transmits 8 bytes simultaneously
o Connects printers, external disks, tape backups
 USB port: universal series bus high-speed hardware standard for interfacing
peripheral devices, such as scanners and printers, to computers without a
need for special expansion cards or other hardware modifications to the
computer. USB is replacing many varieties of serial and parallel ports
 Specialized expansion ports
 FireWire: multiple devices, lots of data, fast transmission speeds, DVD drives,
digital video cameras, gaming consoles
 Ethernet: supports a network standard for linking a wired local area network
and connecting it to a DSL or a cable modern for high-speed internet access
 Graphics: connects digital monitors and multimedia digital devices, aka TVs
and DVD players
 ESATA: external serial advanced technology attachment; allows the
attachment of an ESATA hard disk, which has fast data transmission speeds
 Bluetooth: connects devices that use short-range radio waves that transmit
up to 30 feet
 IrDA: transfers data via infrared light waves between directly aligned devices,
as between a smartphone and a desktop computer
 HDMI: high-definition multimedia interface; carries both video and audio
signals and is used for connecting HDTVs, DVD players, and game consoles to
computers, laptops, and other devices
 MIDI: musical instrument digital interface; used to connect electronic musical
instruments to a sound card that convers the signals to digital instructions
that can be saved or manipulated

 UNIT 4B:
 Secondary storage hardware includes devices that permanently hold data
and information as well as programs
 Online, or cloud storage is also available, but we still use secondary storage
hardware

4.7 Secondary storage


 Hard disks: still the major secondary-storage for desktop/tower computers
o Thin, rigid metal, glass, or ceramic platters covered with a substance
that allows data to be helped in the form of magnetized spots
 The more platters, the higher the drive capacity
 Store data in tracks, sectors, and clusters
 Formatting creates a file allocation table that maps files to
clusters
 Drive heads ride on 0.000001 cushion of air
 Important data should always be backed up
o Hard disk types:
 Non-removable hard disk: also known as a fixed disk; is
housed in the microcomputer system unit and is used to store
nearly all programs and most data files. Usually consists of
several metallic or glass platters, from 1 to 5.25 inches in
diameter stacked on a spindle, with data stored on both sides.
 External hard disk: freestanding disk drive (portable); usually
connected via USB
 RAID: redundant array of independent disks; for large
computer systems.
 Optical disks
o CDs (compact disk) and DVDs (digital versatile/video disks) are
optical disks
o DVDs hold more data then CDs do
o Data is written and read using lasers, not a disk read/write head
 CD-ROM is compact disk read only memory; content is pre-
recorded
 CD-R (compact disk-recordable) is used for recording only
once
 CD-RW (compact disk-re-writable) is an erasable optical disk
that can both record and erase data over and over again
 DVD is a CD-style disk with extremely high capacity
 DVD-R, used for recoding only once
 DVD-RW, DVD-RAM, DVD+RW are reusable DVDs
 Blu-ray is an optical disk format used to record, rewrite, and
play back high-definition (HD) video, as well as to store large
amounts of data
 Flash and solid-state storage
o Flash memory and solid-state memory have become the most
important form of mobile secondary storage
o Flash memory has no moving parts; it Is “solid state”. Flash memory
is also non-volatile—it retains data even when the power is turned off
o Flash memory media are available in 3 forms
 Some tablets, laptops, desktops, and servers feature a solid-
state drive (SSD), which uses flash memory to store data,
instructions, and information
 Flash memory cards, are removable and reusable storage
media that are inserted into a flash memory slot in a digital
camera, notebook, smartphone, or other mobile device
 A USB flash drive consists of a finger-size module of reusable
flash memory that plugs into the USB ports
 Smart card: pocket-size card with integrated circuits
o Resembles a credit card but contains a microprocessor and memory
chips
 May function on three levels
1) Credit
2) Debit
3) Personal information
 Storage capacity: around 10 MBs
 Contact smart cards
 Must be swiped through card readers
 Can wear out from use
 Contactless smart cards
 Read when help in front a low-powered laser
 Online secondary storage (cloud storage)
o Allows you to use the internet to back up your data
 Sign up with a vendor and receive access to software and
applications that allow you to upload your data to that
company’s server

4.8 Future developments in processing and storage


 Description of processing technology
o Nanotechnology
 Tiny machines work at a molecular level to make Nano circuits
o Optical computing
 Users lasers and light, not electricity
o DNA computing
 Uses strands of synthetic DNA to store data
o Quantum computing
Based on quantum mechanics and stores information using
particle states
o Better batteries
 Wireless charging of batteries, longer-lasting batteries
 Future development in secondary storage
o Higher density disks
 Perpendicular recording technology: stacking magnetic bits
vertically on the surface of a platter (instead of horizontally, us
usual)
o Molecular electrics—storage at the subatomic level

5.0 Hardware: input and output


 Input hardware
 Devices that translate data into a form the computer can process
 Translates words, numbers, sounds, and pictures into binary 0s and 1s
 Output hardware
 Devices that translate information processed by the computer into a form
humans can understand
 Translates binary code into words, numbers, sounds, and pictures

UNIT 5A: Input Hardware


 The three major types of input hardware are keyboards, pointing devices,
and source data-entry devices.

5.1 Keyboards
 Keyboards: convert letters, numbers, and characters into electrical signals
o English keyboards differ from foreign language keyboards
 How keyboards work:
o You press a key
o This interrupts the current flowing through the circuits
o Processor determines where the break occurs
o It compares the location of the break with the (x,y) character map for
the language on the keyboard’s ROM chip
o A character is stored in keyboard memory
o The character is then sent to PC and a data stream via wire or wireless
connection
o OS interprets its own operating-system-specific commands and sends
the others to the application for interpretation
o Most keyboards are QWERTY-named for the first six letters on the top
left of the keyboard
o Keyboards are either tactile (physical) or touch screen (virtual)
 Keyboard types
o 104-108 keys desktop standard
o 80-85 keys for laptops
o Wired
 Connect to CPU via a serial or USB port
o Wireless use either
 IR (infrared) technology
 Radio frequency (RF) technology
 Terminal types
o Dumb terminals
 Aka video display terminal (VDT)
 Has display screen and keyboard
 Can do input and output only—no data processing
o Intelligent terminals
 Has screen, processor, keyboard, and memory
 Can perform some independent functions
 Automated teller machine; point of sale terminal; mobile data
terminal

5.2 Pointing device


 Include mouse and its variants, touch screen, and various forms of pen input
 Pointing devices: control the position of the cursor or pointer on the screen
and allow the user to select options displayed on the screen
o Mouse: principal pointing device
o Trackball: a movable ball mounted on top of a stationary device
o Touchpad: used on laptops
o Pointing stick: pressure-sensitive device that allows the user to
control the pointer by directing the stick with one finger
o Touch screens: a video display screen sensitized to receive input
from a finger touch
o Multitouch screens: display screens that allow two or more fingers
or other gestures such as pinching motions to be recognized as input
at any one time.
o Pen input: uses handwriting recognition to translate cursive writing
into data
o Light pen: uses wired connection to a computer terminal
o Digitizer: uses an electronic pen or puck to convert drawings and
photos to digital data
o Digital pen: writing instrument, a microchip in the pen converts the
pen to digital ink, writing is sent as an image file to the computer

5.3 Source data-entry devices


 Scanning and reading devices: source data-entry devices that create machine-
readable data and feel it directly into the computer (no keyboard is used)
o Scanners: use light-sensing equipment to translate images of text,
drawings, and photos into digital form
o Image scanners are used in electronic imaging
o Resolution refers to the image sharpness, measured in dots per inch
(dpi)
o Flatbed scanners work like photocopiers – the image is placed on the
glass surface, then scanned
o Other types are sheet-fed, handheld, and drum

 Bar-code readers
o Photoelectric (optical) scanners that translate bar code symbols into
digital code
 The digital code is then sent to a computer
 The computer looks up the item and displays its name and
associated information
o Bar code types
 1D (regular vertical stripes) holds up to 16 ASCII characters
 2D (different-sized rectangles) can hold 1,000 to 2,000 ASCII
characters
 3D is “bumpy” code that differentiates by symbol height
 Can be used on metal, hard rubber, other tough surfaces

 Radio-frequency identification (RFID)


o Based on an identifying tag bearing a microchip that contains specific
code numbers. These code numbers are read by the radio waves of a
scanner linked to a database.
o Active RFID tags have their own power source and can transmit signals
over a distance to a reader device.
o Passive RFID tags have no battery power of their own and must be
read by some sort of scanner.
o RFID tags of both types are used for a wide range of purposes and are
starting to replace bar codes in many situations.
 Mark recognition readers
o MICR-magnetic ink character recognition
 Uses special magnetized inks
 Must be read by a special scanner that reads this ink
 Used on bank checks
o OMR-optical mark recognition
 Uses a special scanner that reads
 Bubble (pencil) marks
 Used in standardized tests such as the SAT and GRE
o OCR-optical character recognition
 Converts scanned text from images (pictures of the text) to an
editable text format
 Image capture devices
o Digital cameras
 Use a light-sensitive processor chip to capture photographic
images in digital form and store them on a small disk in the
camera or on flash memory cards.
 Most can be connected to a PC by USB; smartphones
include digital cameras.
o Webcams
 Video cameras attached to a computer to record live moving
images then post them to a website in real time.
 Can be attached externally or built into the computer/device.
 Frame-grabber video card
 Can capture and digitize 1 frame at a time
 Full-motion video card
 Can convert analog to digital signals at rates up to 30
frames per second
 Looks like a motion picture
 Audio-input devices
o Record analog sound and translate it into digital files for storage and
processing
o Two ways to digitize audio (often via microphone)
 Sound Board
 An add-on board in a computer that converts analog
sound to digital sound, stores it, and plays it back to
speakers or amp
 MIDI Board
 Stands for Musical Instrument Digital Exchange
 Uses a standard for the interchange between musical
instruments, synthesizers, and computers
 Speech-Recognition Systems
o Use a microphone or telephone as an input device. Converts a person’s
speech into digital signals by comparing against 200,000 or so stored
patterns.
 Used in places where people need their hands free –
warehouses, car radios, stock exchange trades.
 Helpful for people with visual or physical disabilities that
prevent them from using other input devices.
 Sensors
o Input device that collects specific data directly from the environment
and transmits it to a computer.
o Can be used to detect speed, movement, weight, pressure,
temperature, humidity, wind, current, fog, gas, smoke, light, shapes,
images, earthquakes, etc.
 Biometric-Input Devices
o Biometrics is the science of measuring individual body
characteristics, then using them to identify a person through a
fingerprint, hand, eye, voice, or facial characteristics.
o Example: notebook computers equipped with biometric sensors that
read fingerprints, instead of passwords, before allowing access to
networks.
o Airport and building security systems use biometrics.

5.4 The Future of Input


 Data will be input from more and more locations.
 Use of source data entry will increase.
o Better input devices for people with disabilities
o Better speech recognition
o Better touch and gesture-recognition input
o Pattern recognition and improved biometrics
o Brainwave input devices

UNIT 5B: Output Hardware


 Softcopy = data shown on a display screen or is in audio or voice form; it
exists only electronically. This kind of output is not tangible; it cannot be
touched. You can touch disks on which programs are stored, but the software
itself is intangible.
 Hardcopy = tangible output, usually printed. The principal examples are
printouts, whether text or graphics, from printers. Film, including microfilm
and microfiche, is also considered hardcopy output.

5.5 Softcopy Output


 Features of display screens to consider include screen dimension, screen clarity,
and color and resolution standards.
 Screen size & aspect ratio
o The active display area is the size of a computer screen measured
diagonally from corner to corner in inches.
 Desktop computers are commonly 15–30 inches (laptops 12–
18 inches, tablets 8.4–14.1 inches, and smartphones 2.5–4.1
inches).
o The aspect ratio is the proportional relationship of a display screen’s
width and height.
 Standard displays have a 4:3 aspect ratio (4 units wide to 3
units high); wide-screen displays have 16:9 or 16:10.
o Screen Clarity
 Dot pitch (dp) is the amount of space between adjacent pixels
(square picture elements) on screen.
 The closer the pixels, the crisper the image. • Get .25 dp
or better.
 Resolution refers to the image sharpness. • The more pixels,
the better the resolution.
 Expressed in dots per inch (dpi) .
 Color depth (bit depth) is the number of bits stored in a dot
(pixel).
 The higher the number the more true the colors.
 24-bit color depth is better than 8-bit color depth, but it
needs more video card memory.
 Refresh rate is the number of times per second the pixels are
recharged – a higher rate gives less flicker.
 Microcomputers come with graphics cards (video cards) that work with the
screen.
 Graphics cards have their own memory (VRAM), which stores each pixel’s
information.
 The more VRAM, the higher the resolution you can use.
 Desktop publishers, graphics artists, and gamers need lots of VRAM.

Types of Display Devices


 The most common type of display screens, flat-panel displays are made
of two plates of glass separated by a
layer of a substance in which light is manipulated.
 One type of flat-panel display is the liquid crystal display (LCD), in which
molecules of liquid crystal line up in a way that alters their optical properties,
creating images on the screen by transmitting or blocking light.
 Plasma displays: A layer of gas is sandwiched between two glass plates, and
when voltage is applied, the gas releases ultraviolet light, which activates the
pixels on the screen and forms an image. Although expensive, plasma
monitors offer brighter colors and screen sizes up to 150 inches wide;
however, they usually do not last as long as other display types.
 Cathode-ray tube (CRT) and others: Falling out of use.
 Multiple screens: Splitting the monitor display area into multiple screens, to
view different documents at once.

5.6 Hardcopy Output


Printers
 Printers print text and graphics on paper or other hardcopy materials.
 Printer resolution is measured by dpi (dots per inch); 1,200 x 1,200 is the
most common for microcomputers.
 Printers are either impact or nonimpact – impact printers (dot- matrix
printer) print by striking the paper directly; nonimpact printers (such as
laser printers and inkjet printers) do not have direct contact with the
hardcopy medium.
 Like a dot-matrix printer, a laser printer creates images with dots. However,
as in a photocopying machine, these images are produced on a drum, treated
with an electrically charged inklike toner (powder), and then transferred
from drum to paper.
 Laser printers run with software called a page description language (PDL) ,
which tells the printer how to lay out the printed page and supports various
fonts.
 A laser printer comes with one or both types of PDL: PostScript or PCL
(Printer Control Language. In desktop publishing, PostScript is the preferred
PDL.
 Laser printers have their own CPU, ROM, and memory (RAM), usually 16
megabytes (expandable generally up to 512 megabytes for higher-cost
printers).
 When you need to print out graphics-heavy color documents, your printer
will need more memory.
 Inkjet printers spray onto paper small, electrically charged droplets of ink
from four or more nozzles through holes in a matrix at high speed.
 Like laser and dot-matrix printers, inkjet printers form images with little
dots. Inkjet printers commonly have a dpi of 4,800 x 1,200; they spray ink
onto the page a line at a time, in both high-quality black-and-white text and
high-quality color graphics.

Nonimpact printers also include:


 Thermal printers: Low- to medium-resolution printers that use a type of
coated paper that darkens when heat is applied to it; typically used in
business for bar-code label applications and for printing cash register
receipts.
 Thermal wax-transfer printers: Print a wax-based ink onto paper. After it
becomes cool, the wax adheres permanently to the paper. Because of their
waterfastness, these labels find uses in industrial label printing.
 Photo printers: Specialized machines for printing continuous- tone photo
prints, with special paper and color dyes.

Multifunction printers
 Printers that combine several capabilities:
o Printing
o Scanning
o Copying
o Faxing
 Cost less and take up less space than buying the four separate office
machines.
 But if one component malfunctions, so will the other functions

 Plotters: Designed for large-format printing


 Specialized output device designed to produce large high-quality, 3-D
graphics in a variety of colors.
 Used by architects, engineers, and map-makers.
o Pen plotters use one or more colored pens.
o Electrostatic plotters lie partially flat on a table and use toner as
photocopiers do.
o Large-format plotters are large-scale inkjet printers used by graphic
artists.

5.7 Mixed Output: Sound, Voice, & Video


 Mixed Output: Sound, Voice, & Video
 Sound output—produces digitized sounds, even “3-D” sound.
o You need a sound card and sound software.
o Good speakers can improve the sound.
 Voice output—converts digital data into speechlike sounds.
o Used in phone trees, cars, toys and games, GPS systems, and TTS
(text-to-speech) systems for hearing-impaired people.
 Video output—photographic images played quickly enough to appear as
full-motion.
o Requires powerful processor and video card.
o Video files are large, so a lot of storage is needed, too.
o Videoconferencing is a form of video output.

5.8 The Future of Output


 More unusual forms of output
 More data used in (Big Data)
 More realistic output
o Better and cheaper display screens
o Printers that use less ink
o Movie-quality video for PCs
o Increased use of 3D output

5.9 Quality of Life


 Health Matters
 Overuse injuries and repetitive stress injuries:
o Result when muscle groups are forced through fast, repetitive
motions.
o May effect data-entry operators who average 15,000 keystrokes an
hour.
o May effect computer users whose monitor, keyboard, and workstation
are not arranged for comfort.
o Carpal tunnel syndrome: Caused by pressure on the median nerve in
the wrist, through short repetitive movements.
o Eyestrain, headaches, back and neck pains can be problems.
o Electromagnetic fields may be harmful.
 Ergonomics is the methodology of designing a workplace to make working
conditions and equipment safer and more efficient.
o Keyboards must be placed at the correct height depending on each
worker’s size; detachable keyboards are useful.
o Monitor refresh rates must be fast enough to avoid eyestrain.
o Monitor heights must be correct for comfortable viewing; use a tilting
screen.

o Wrist rests may help avoid carpal tunnel syndrome.


 Storage devices
 Bindery code (zero’s and one’s)
 Polarity
 RAM capacitors

 What happens when you turn on your computer?


 It’s the same question as “what happens when you open your eyes after a
night sleep”?
 Open your eyes is equivalent to pushing the on button on the computer
 Stretching (that’s when you check where your system is working or not)
 Brain then says “what am I going to do for my day… brain then loads the
information from yesterday of what I have planned to do ex: I have to submit
my assignment, I have to go to university school and so on. (its behaving like
an operating system)
 Computer checks out all the systems to see if it works just like our body
 What happens when computer is off?
 Its NOT dead
 It has a little battery inside your computer that keeps a little program called
biase or simose (it has the configuration of the computer) it says this
computer has this CPU with this characteristics
 If its not the same CPU it will give you an error
 It starts off with the hardware, then computer goes through the operating
system, runs the operating system….. then u are ready to use it
 How PC works
 When you first power up a PC, the machine goes through several internal
processes before it's ready for you to use. This is called the boot process, or
booting the PC
 The boot process is controlled by the PC's basic input-output system (BIOS).
 The BIOS is software stored on a flash memory chip.
LED Restart Indexing OLED
Backlit Warm Boost Not a computer No Backlit
function

RAM Mouse Processing SSD


Volatile Input only Computer Electro-magnetic
function

DVD ROM
Laser Mother Board

QUIZ 2

1. Game controllers are output devices


Answer: True

2. On a keyboard, Num lock and Caps Lock are both toggle keys
Answer: True

3. The operating system provides the means for users to interact with a
computer
Answer: True

4. An __________ is an input device that looks like a pen


Answer: Stylus

5. Computers use __________ language consisting of 0s and 1s


Answer: Binary

6. The number of pixels displayed on the screen is known as ____________


Answer: Screen resolution

7. An _________ is where a peripheral device can attach to a computer so that data


can be exchanged between it and the operating system
Answer: Port

8. Which port is the most common port used to connect input and output
devices?
Answer: Universal serial bus (USB)
9. Today’s CPUs run at speeds measured in kilohertz
Answer: False

10. Information is data that has been organized or presented in a meaningful


fashion
Answer: True

11. Each of these is a basic type of a touch screen, except ___________


Answer: Reflective

12. The most common type of monitor is an _________


Answer: Liquid crystal display (LCD)

13. All of the following are ways to avoid injuries when working on computers
except _________
Answer: Placing a monitor at least 12’ from the eyes

14. A unidirectional microphone picks up sounds equally well from all directions
Answer: True

15. Which of the following optical storage media has the greatest storage
capacity?
Answer: DVD

Unit 3: System Software

Introduction
 Operating system is very important because you cannot start doing work,
brows the website, you cant start Microsoft word unless your operating
system is up and running properly
o Operating system manages all your computer hardware, memory and
storage
 It has 3 parts to it
1. Utilities: check what is being processed, how much memory
you have, the speed of the CPU and so on…
2. File management system: allows to manage your files,
storage backup and so on….
3. Management of your application system: application that
you have installed on your computer.
 About managing your computer hardware

Overview
 Unit 3A: system software the power behind the power
 Application software is software that has been developed to solve a
particular problem for users—to perform useful work on specific tasks or to
provide entertainment.
 System software runs at the most basic level of your computer and enables
the application software to interact with the computer and helps the
computer to manage its internal and external resources, as well as manage
the hardware.
 There are three basic components of system software that you need to know
about:
1. Operating systems: An operating system is the principal component
of system software in any computing system.
2. Device drivers: Device drivers help the computer control peripheral
devices.
3. Utility programs: Utility programs are generally used to support,
enhance, or expand existing programs in a computer system.

3.1 The Operating System (what it does)


 The operating system manages the entire computer system.
 The operating system (OS) consists of the low-level, master system of
programs that manage the basic operations of the computer.
o Every general-purpose computer must have OS to run other programs.
o OS allows users to concentrate on applications rather than on
complexities of the computer.
o Each application program is written to run on top of a particular OS.

 The OS manages:
o Booting
o CPU management
o File management
o Task management
o Security management

 Booting
 The process of loading an OS into the computer’s main memory
 Booting involves four steps:
1. Turn the computer on.
2. Diagnostic routines test main memory, CPU, and other hardware.
3. Basic Input/output System (BIOS) programs are copied to main memory.
o BIOS contains instructions for operating the hardware.
o The computer needs those instructions to operate the hardware and
find a copy of the OS.
4. Boot program obtains the OS and loads it into computer’s main memory.
 Cold boot—turn on computer’s “on” system
 Warm boot—restart a computer that is already on
 Boot disk—use a CD or flash drive containing all files to launch OS • Boot
from the cloud

 CPU Management
 CPU is the central processing unit.
 Supervisor (kernel) is the software that manages CPU
o Remains in memory while the computer runs
o Directs other programs not in memory to perform tasks that support
application programs
 Memory Management
o OS keeps track of memory locations to prevent programs and data
from overlapping each other
o Swaps portions of programs and data into the same memory but at
different times
o Keeps track of virtual memory
 Queues, Buffers, Spooling
o Queue: First-in, first-out (FIFO) sequence of data or programs that
waits in line for its turn to be processed
o Buffer: The place where the data or programs sit while they are
waiting
o To spool: The act of placing a print job into a buffer. (Needed because
the CPU is faster than printers. The CPU can work on other tasks while
the print jobs wait.)

 File Management
 A file is either a
o Data File: a named collection of data
o Program File: a program that exists in a computer’s secondary
storage
 Files are located in many places on secondary storage devices; OS locates files
and facilitates access to them
 The file system arranges files in a hierarchical manner
o Top level is directories (folders)
o Subdirectories come below folders
 Find files using their pathname. Example:
C:/MyDocuments/Termpaper/section1.doc

 Task Management
 Computers are required to perform many different tasks at once—to do task
management.
 Task: An operation such as storing, printing, or calculating
 Multitasking: Handling more than one program concurrently
o Example: You do word processing while playing music on your
computer.
o OS directs processor to alternate time on each program until
processing is complete.

 Security Management
 Operating Systems permit users to control access to their computers.
 Users gain access using an ID and password.
 You set the password the first time you boot up a new computer.
 After that, when you boot up, you’ll be prepared to type in your username
and password.

3.2 Other System Software


 Drivers and utility programs add functionality to your computer and help it
perform better.

 Device Drivers
 Specialized software programs that allow input and output devices to
communicate with the rest of the computer system.
 When you buy a computer, many device drivers come with the system
software.
 Device drivers also come with new hardware (on CDs/DVDs) or can be
downloaded from the manufacturer’s website.
 Utilities
 Service programs that perform tasks related to the control and allocation of
computer resources.
o Examples: Backup, virus protection, data recovery, data compression,
file defragmentation, disk cleanup, remove temp files
 Some come with the OS, others can be bought separately (e.g., Norton
SystemWorks, McAfee Utilities).

3.3 Common Features of the User Interface


 User-interface features use graphics to facilitate a person’s interaction with the
computer.

 User Interface
 The user-controllable display screen you use to interact with the computer,
using keyboard or mouse.
 Keyboard & Mouse
 Special-purpose keys: used to enter, delete, edit data, and to execute
commands.
 Function keys (F1, F2, etc.): used to execute commands specific to the
software being used.
 Macros: keyboard shortcuts to activate series of commands.
 Mouse pointer: moved to particular place on screen or to point to little
symbol icons.
 Graphical User Interface (GUI)
 Allows you to use a mouse or keystrokes to select icons and commands from
menus.
 Three main features of GUI are desktop, icons, and menus.
o Desktop: The system’s main interface screen.
o Icons: Small pictorial figures that represent programs, data files, or
procedures.
o Rollover: A small text box that explains the icon when you roll your
mouse over it.
o Menus: Lists of built-in commands and/or options from which to
choose pull-down, cascading, pull-up, pop-up.

 Most operating systems use GUIs with the following:


 Title Bar: runs across the top of the display window and shows the name of
the folder you are in.
 Menu Bar: shows the names of the pull-down menus available.
 Toolbar: Displays menus and icons representing frequently used options or
commands.
 Taskbar: The bar across the bottom of the Windows screen that contains the
Start button and icons that show open files/programs.
 Windows: Rectangular portion of the display screen through which you can
view a file of data or an application program.

3.4 Common Operating Systems


 The main operating systems for general computer users are Windows, Mac OS,
and Unix/Linux.
 Platform
 The particular processor model and operating system on which a computer
system is based.
 Three principle categories of operating systems:
1. Stand-alone
2. Network
3. Embedded

1. Stand-alone operating systems


 Often called a desktop operating system, an operating system that works on a
single desktop or notebook (laptop) computer.
 Two principal stand-alone systems:
o Mac platforms—run Apple Macintosh
o PC platforms—run Microsoft Windows
 Some legacy systems still used—outdated but still functional
o DOS (Disk Operating System) (original Microsoft OS)—hard-to-use
command-driven user interface
 Mac OS X (“Ten”)
 OS that runs on Apple Macintosh computers; is popular for desktop
publishing , graphics, and educational settings
 Pioneered the easy-to-use GUI (based on work done at Xerox)
 Proprietary OS
o Mac OS X from 2000 is based on Unix
o Mac OS 10.8 = Mountain Lion (2011)
o Mac OS 10.9 = Mavericks (2013)
o Apple iOS runs mobile devices
 Microsoft Windows
 Most common operating system for desktop and portable PCs.
 Windows early versions:
o • 95, 98, 2000, ME, XP, Vista
 Windows 7: still most commonly used OS
 Windows 8: Has both desktop (“classic”) and tile views
 Tile view allows gesture manipulation of on-screen items (touch screens)

2. Network operating systems


 Novell’s Open Enterprise Server (OES)
o Used for coordinating microcomputer-based local area networks
(LANs) throughout a company or campus
o Network OS usually located on a main server
 Windows Server
o Designed to run on network servers in businesses of all sizes
o Multiple users share resources, such as data, programs, printers
 (Network operating systems)
 Unix, Solaris, BSD
o Unix is a multitasking operating system with multiple users that has
built- in networking capability and versions for all kinds of computers
o Is particularly stable—used to run backbone of Internet
o Used by large organizations—for airplane design, currency trading
o Versions include Solaris, BSD
o Unix interface is command-line interface
 Linux
o Free (nonproprietary) version of Unix
o Continual improvements from thousands of volunteer programmers
o Linux is open-source software—anyone may make suggested
improvements
 May legally be downloaded and used for free
 May legally be modified for free, as long as modifications aren’t
copyrighted
 Uses command-line-interface or GUI
 Linux vendors give away software but sell services, products
 Is the basis of Google’s Chrome OS
3. Embedded Operating Systems
 Embedded OS—resides on CPU chip
 Specialized system that is part of larger system or machine
 Used in mobile devices: Google Android, BlackBerry, Windows Phone, iOS,
Embedded Linux

OS X Compression API Task Manager


Not mobile Reduce file size Software CPU Computer
operating system interaction RESOURCES

Defragmenter Virtual memory OS Non-responsive


Not to reduce RAM optimization Manager program
folder size Task Manager

Defragment Pinnnig
Manage HD space Start menu

QUIZ 3

1. Pre-emptive multitasking is the term used when the operating system


processes higher-priority tasks before lower-priority tasks
Answer: True

2. Every computer has an operating system


Answer: True

3. The two major types of system software programs are utility programs and
the_______
Answer: Operating system

4. A system restore point is a snapshot of your entire system’s settings


Answer: True

5. Which of the following is the name of a Microsoft Excel file?


Answer: inventory.xisx
6. The ___________ utility automatically creates duplicates of your libraries,
desktops, contacts and favorites to another storage location
Answer: File history

7. All of the following are examples of network operating systems except ________
Answer: MS-DOS

8. Gaming consoles, such as Xbox one and Playstation 4, do not need and
operating system
Answer: False

9. Using hard disk space to temporarily store data or instructions from RAM is
referred to as the
Answer: Virtual memory

10. Which of the following is the first step in the boot process?
Answer: The BIOS is activated by turning on the computer

11. Most desktop and laptop computers run some version of Windows
Answer: True

12. Which of the following capabilities of UNIX is false?


Answer: It is only for super computers

13. Most smartphones use operating systems developed by _________


Answer: Apple and Microsoft

14. CMOS is a special kind of memory that uses a great deal of power
Answer: False

15. All of the following are terms related to part of the boot process except ______
Answer: USB

Unit 4: Application Software

Introduction
 Pay attention to how long does it take for your Microsoft word application to
come up so you can actually edit a fill
 If you wait 10-30seconds then you have a problem
 If your operating systems is open properly then you can open an application
software
 When it comes to application, it is very important that you understand the
different types of application that exist and that you can actually plan to invest extra
time to learn those different applications that will serve you to enhance your career
opportunities even if they are not part of the course
Reading: Unit 3B: application software- getting started
Overview
 People interact with the application software, which interacts with the system
software, which interacts with the computer.

3.5 Application software (where to get it, how to use it)


 Application software comprises the programs that do the work that users are
directly interested in.
 The availability of software depends on how it is licensed or copyrighted by
its creators or owners.
Software can be obtained in a variety of ways:
1. Custom Software
Tailor-made software crafted by an individual or team of programmers for a
particular function or business purpose.
2. Packaged software
Copyrighted, mass-produced software that’s offered for sale in stores or on
the web to a variety of users. [See next slides.]
3. Public-domain software
Software that is not protected by copyright and thus may be duplicated by
anyone at will, with no fear of legal prosecution.
4. Freeware
Copyrighted software that is distributed free of charge
5. Shareware
Copyrighted software that is distributed free for a trial period, but users must
then pay the software developer to continue using it.
6. Rentalware
Online software that users lease for a fee and download whenever they want
it.
7. Web application (web app)
Software that runs on a remote Internet server rather than on a person’s
own personal computer.
 Commercial (packaged) software is copyrighted -- users must get license
from owner and sign a contract in which they agree not to make copies of the
software to give away or resell.

 Software license types:


o Site licenses - allow software to be used on all computers at a specific
location
o Concurrent-user licenses—allow a number of copies to be used at
one time
o Multiple-user license—specifies number of people who may use the
software
o Single-user license—limits software to one user at a time
 Pirated software: Software obtained illegally in violation of copyright
 Abandonware: Software that is no longer being sold or supported by its
publisher (but may still not be legally copied)

 Tutorials & Documentation


o Tutorial: Instruction book or program that helps you learn to use the
product by taking you through a series of steps
o Documentation: All information that describes a product to users,
including a user guide or reference manual that provides a narrative
and graphical description of the program
 Types of Application Software
o May be classified as entertainment, personal, education/references,
productivity, and specialized uses
 Productivity software: Purpose is to make users more productive at
particular tasks.
o Word processing, spreadsheets, database managers
o May be bundled in office suite

3.6 Data files and program files


 Data files: Data files contain data, such as words, number, pictures, and
sounds—for example (extensions):
 Program files: Program files contain software instructions that execute, or
run, when the program is opened.
o Source program files: Source program files contain high-level
computer instructions in the original form written by the computer
programmer.
o Executable files: To be made useful to the computer for processing, a
source program file must be translated into an executable file, which
contains the instructions that tell the computer how to perform a
particular task. You use an executable file by running it, as when you
select the spreadsheet program Microsoft Excel from your on-screen
menu and open it.
 Exchanging files
o Importing: getting data from another source and then converting it
into a format compatible with the program in which you are currently
working
o Exporting: transforming data into a format that can be used in
another program and then transmitting it
 Data compression is a method of removing repetitive elements from a data
file so that it requires less storage space and therefore less time to transmit.
Later the data is decompressed—the repeated patterns are restored.
o Lossless compression uses mathematical techniques to replace
repetitive patterns of bits with a kind of coded summary. During
decompression, the coded summaries are replaced with the original
patterns of bits -- the data that comes out is exactly the same as what
went in. Lossless techniques are used when it’s important that nothing
be lost—for instance, for computer data, database records,
spreadsheets, and word processing files.
o Lossy compression techniques permanently discard some data
during compression. Lossy data compression involves a certain loss of
accuracy in exchange for a high degree of compression. Examples of
two lossy compression file formats are .jpeg and .mpeg, used for
graphics files and sound files.

3.7 Word processing software


 Word Processing uses computers to create, edit, format, print, and store
text.
o Microsoft Word best known
o Others: Corel WordPerfect, Apple iWork Pages, Google Apps, Zoho
Writer
o Word processing allows you to delete, insert, and replace text
o Additional features: creating, formatting, printing, saving
 Cursor: movable symbol to show where to enter text
 Scrolling: moving quickly up, down, or sideways
 Word wrap: automatically continues text to next line
 Head hierarchy: Outline View puts tags on headings within a document to
organize it according to head level
 Footnote numbering can be done automatically
 Editing: Making alterations in content
 Inserting: adding text to documents
 Deleting: removing text from documents
 Find & Replace
o Find: lets you go straight to any text in your document
o Replace: lets you automatically replace it with something else
 Cut, Copy, & Paste
o Select the text you want to move
o Copy (or cut) to clipboard, then paste in new location
 Spelling Checker: tests for incorrectly spelled words
o [Note: Do not rely on spelling and grammar checkers to be 100%
accurate!]
 Grammar Checker: highlights poor grammar, wordiness, incomplete
sentences, and awkward phrases
 Thesaurus: offers suggestions for alternative words with the same meaning

 Formatting Documents with the Help of Templates


o Formatting: determining appearance of a document
o A template is a preformatted “form” that provides basic tools for
structuring a final document—text, layout, page design, etc.
o Every word processing program comes with standard templates (for
letters, memos, etc.)
 Aspects of Formatting
 Font
o The typeface and size of the text you use
o Also lets you specify underlined, italic, or bold and color
 Spacing & Columns
o Choose the line spacing (single- or double-spaced, or other)
o Choose single-column or multi-columned text for your document
 Margins & Justification
o Indicate width of left, right, top, and bottom margins
o Justify text left, right, or center
 Headers, footers, page numbers
o A header is text printed at the very top of the page
o A footer is text (like page number) at the page bottom
 Other Formatting
o You can specify borders, shading, tables, and footnotes
o You can also import graphics, such as clip art
 Default Settings
o These are the settings automatically used by the program unless you
change them
 Output: Printing, Faxing, or Emailing Documents
o Print individual pages, the whole document, or several copies
o You can fax or email finished documents
o Previewing: gives you a look at how document will look when
printed, before you print
 Saving documents: store a document as an electronic file on, e.g., hard disk,
CD or flash drive. [SAVE your work often!!!!!!!!!!!]
 Word processing allows formatting of documents in HTML (for the web)

3.8 Spreadsheet program


 A spreadsheet program uses rectangular grids for laying out linked, usually
financial, data in a very organized fashion.
 Spreadsheets are used to create tables and financial schedules.
o Enter data and formulas into rows and columns on screen
o Microsoft Excel, Corel Quattro Pro, Lotus 1-2-3, Apple iWork Numbers
 Organized into columns and rows on a worksheet
o Labels are descriptive text
o Cells are where a row and a column meet
o Cell address is the position of the cell
o Range is a group of adjacent cells
o Values are numbers or dates entered into a cell
o Cell pointer shows where data is to be entered

 Formulas, Functions, Recalculation, What-If Analysis


 Formulas are instructions for calculations
o Define mathematically how one cell relates to another
o Example: @SUM(A5:A15) sums the values of the cells A5, A6, A7, and
so forth up through cell A15
 Functions are built-in formulas, such as SUM()
 Recalculation is the process of re-computing values
 What-if analysis allows users to see what happens to totals when one or
more numbers change in cells
o Worksheet templates—custom-designed for particular work
o Multidimensional spreadsheets—link one to another
 Analytical Graphics: Worksheet and workbook data can be displayed in
graphic form.
o Spreadsheet programs allow you to automatically create graphs
o Graphical forms make numeric data easier to analyze
o Examples of types of analytical graphics:
 Column charts
 Bar charts
 Line graphs
 Pie charts
 Scatter charts

3.9 Database software


 A database is a collection of data that is organized so that its contents can easily
be accessed, managed, and updated.
 Database: Structured collection of interrelated files in a computer system.
 Database software sets up and controls the structure of a database and access
to data.
 Principal microcomputer databases: Microsoft Access, FileMaker Pro
 Benefits of databases:
o Data redundancy is minimized.
o Data is integrated and stored in a structured fashion.
o Data in databases has more integrity.
o Data may include text, numbers, and graphics.
 The main type of microcomputer database program is the relational database.
 Relational database: Data organized into related tables
o Each table contains rows (records) & columns (fields)
o Key is field used to sort data
 Most frequent key field is social security number
 Tables with the same key field are linked together
 Querying and displaying records
o Database software offers a quick way to locate records
 Saving, Formatting, Printing, Copying, Transmitting
o Can save results, format them in different ways, print as reports, copy
to other documents, & transmit as email

3.10 Software suites and integrated packages


 Software suite: Collection of individual programs bundled together in a
single package.
o Most popular are productivity suites (office suites), professional-
level application programs frequently used in business—usually word
processing, spreadsheet, database management, and presentation
programs.
o Best-known productivity suite is Microsoft Office. Others are Apple
iWork, Corel WordPerfect Office, Lotus SmartSuite, and StarOffice.
o Cloud suites, or online office suites, include Microsoft Web Apps,
Google Docs, and Zoho.
 Integrated package: Single program for microcomputers that combines the
functionality of word processing, spreadsheet, and database management.
 Personal information manager: Software that helps you keep track of and
manage information used on a daily basis, such as addresses, telephone
numbers, appointments, to-do lists, and miscellaneous notes.
o Microsoft Outlook, Lotus Notes

3.11 Specialty application software


 Some special applications:
o Presentation graphics
o Financial
o Desktop publishing
o Drawing & painting
o Video/audio editing
o Animation
o Multimedia authoring
o Web page design/authoring
o Project management
o Portable Document Format (PDF)
o Computer-aided design
 Presentation Graphics Software
 Uses graphics, animation, sound, data, and information to make visual
presentations
 Some packages: Microsoft PowerPoint, Corel Presentations, Harvard Graphics
 Includes design and content templates
o Allows presentation to be dressed up with clip art, sound clips, special
visual effects, animation, and video clips

 Financial Software
 Ranges from personal-finance managers to entry-level accounting programs
to business financial-management packages
 Personal-finance programs include Quicken, Moneydance, YNAB
 Common features of financial software
o Track income & expenses
o Allow checkbook management
o Do financial reporting
o Offer tax categories to assist with tax recordkeeping
o May offer financial planning & portfolio management
o Tax, accounting, investment software also available

 Desktop Publishing
 Involves mixing text & graphics to produce high-quality output for
commercial printing
 Uses a mouse, scanner, printer, and DTP software
 Professional DTP programs: QuarkXPress, Adobe InDesign
 Has the following features
o Mix of text with graphics
o Offers varied type & layout styles
o Allows import of files from other programs
 Becoming a DTP professional requires training

 Drawing Programs
 Graphics software used to design & illustrate objects & products
 Create vector images—created from geometrical formulas
 Examples: CorelDRAW, Adobe Illustrator
 Painting Programs
 Graphics programs that allow users to simulate painting on-screen
 Produce bit-mapped or raster images (tiny dots)

 Common Graphics File Formats


 .bmp (BitMaP) – used on PCs (Native to MS Windows)
 .gif (Graphic Interchange Format) – format used in web pages
 .jpeg (Joint Photographic Experts Group) – used in high-resolution images,
especially photos
 .tiff (Tagged Image File Formats) – used on PCs & Macs for high- resolution
images to print
 .png (Portable Network Graphics) – used as alternative to .gif

 Video-Editing Software
 Allows import to and editing of video footage on computer
 Some video editing packages: Adobe Premiere Elements, Corel Video Studio,
Sony Pictures Digital Vegas, Apple Final Cut Express, Pinnacle Studio DV, &
Ulead VideoStudio
 Audio-Editing Software
 Allows import to and editing of sound files on computer
 Sound editing packages: Windows Sound Recorder, Sony Pictures Sound
Forge, Audacity (freeware), Felt Tip Software’s Sound Studio (shareware),
GoldWave, & WavePad.
 Animation Software
 Simulates movement by rapidly displaying a series of still pictures, or frames
 Computer animation: Creation of moving images by means of computer
 GIF animation: First format to be widely used for web pages
 Packages: GIF Construction Professional, 3D GIF Designer, Easy GIF Animator
 Multimedia Authoring Software
 Combines text, graphics, video, animation, and sound in an integrated way to
create stand- alone multimedia applications
 Content can be put on CDs/DVDs or delivered via the web
 Two examples: Adobe Director & Macromedia Authorware
 Web Page Design/Authoring Software
 Used to create web pages with sophisticated multimedia features.
 Packages: Adobe Dreamweaver, Seamonkey, Coffee Cup, RealMac Rapid
Weaver, etc.
 Packages also provided by internet access
providers; free
& easy to use.
 Project Management Software
 A program used to plan and schedule the people, costs, and resources
required to complete a project on time
 Packages: Mindjet MindManager, MatchWare MindView, Microsoft Project,
etc.
 Portable Document Format (PDF)
 Multiplatform file format developed by Adobe Systems that allows
documents to be used with any operating system.
 Captures text, graphic, and formatting information from a variety of
applications on different platforms, making it possible to send documents
and have them appear on the recipient’s monitor as they were intended to be
viewed.
 Today, used for virtually any data that needs to be exchanged among
applications and users
 Computer-Aided Design (CAD)
 Programs intended for 2D and 3D design of products, structures, civil
engineering drawings, and maps.
o Examples include Autodesk, AutoCAD, TurboCAD, Alibre Design, and
PowerCADD.
o CAD programs help design buildings, cars, planes, electronic devices,
roadways, bridges, subdivisions.
o CAD/CAM programs: allow CAD programs to be input into computer-
aided manufacturing systems that make products.

What is so important about Excel and Access?


 Fundamental of business technology
o Hardware (operating system)
o Software (application system)
o Networking
 Excel Spreadsheet
o Raw data
o In this course we do more in Excel than in access
o You have to learn how to do some important functions and
how to do a table
o You need to understand how to use the chart
 Access Databases
o Take data and relate it to each other
o Database you don’t see it but you use it all the time

SAAS Open source Spreadsheet Office


Available on Free to disturb "What if analysis Productivity
demand

Adobe Databases Training Compressed


Multimedia Access Simulation .MP4
development programs

Authoring .WAV
Software Uncompressed
Webpage
QUIZ 4
1. __________ Software is used to perform calculations and numerical analyses
Answer: Spreadsheet

2. The intersection of a row and column in a spreadsheet program is known as


a ____________
Answer: Cell

3. Using applications on smartphones and tablets to buy and sell products is


known as _________ commerce
Answer: Mobile

4. Most word processing programs come with a find-and-replace tool that


enables you to locate and replace specific text
Answer: True

5. ____________Software helps run the computer and coordinates instructions


between other software and the hardware devices
Answer: System
6. A CD stores the same number of songs in uncompressed format as in MP3
format
Answer: False

7. When using a spreadsheet, the expression =D8-D17 is called a ____________


Answer: Formula

8. Using your mobile devices to make purchases is more risky than making
purchases with your computer on the web
Answer: False

9. Which is true about web-based application software?


Answer: It stored completely on a web server instead of your hard drive

10. All web-based word processing applications are as fully featured as installed
versions
Answer: True

11. Which of the following is NOT an example of a general productivity software


application
Answer: Image editing

12. Multimedia software include all of the following EXCEPT ___________


Answer: Utility software

13. To remove red eye from a digital image, you would use software such as
____________
Answer: Adobe Photoshop Elements

14. All of the following are examples of databases software EXCEPT____________


Answer: OneNote

15. All of the following are examples of software suits EXCEPT _______________
Answer: Microsoft OneNote
Unit 5: Communication and Networks

Introduction
 What does it take for you in terms of hardware, software for you to connect
from your computer and have access to your browser?
 In other words, once you have your computer, what do you need?
 Important to understand how having the browser and connecting to the
Internet having the world under your fingertip is made possible.

Overview
Reading: Chapter 6 – communications, networks & cyberthreats the wired and
wireless world
 Digital convergence is the gradual merger of computing and communications
into a new information environment, in which the same information is
exchanged among many kinds of equipment, using the language of computers.
 At the same time, there has been a convergence of several important
industries—computers, telecommunications, consumer electronics,
entertainment, mass media— producing new electronic products that
perform multiple functions.

6.1 from the analog to the digital age


 Digital
o Computers use digital signals—0s and 1s, off and on.
o All the data that a computer processes is a series of 0s and 1s.
o Each signal is a bit.
 Analog
o But most phenomena in life are analog.
o Analog signals use wave variations, continuously changing.
o Sound, light, and temperature are analog forms.
o Traditional TV and radio use analog signals.
o Humans’ vision operates in analog mode.
 But analog data can be converted into digital form. Even though digital data is
not as exact as analog data, it is easier to manipulate.
 For data transmission over telephone lines and cables, modems are needed to
convert analog data into digital data that computers can use.
 Modem is short for modulate/demodulate. Modems modulate (convert) a
computer’s digital data to analog data, transmit it, then demodulate
(reconvert) it back to digital data for the receiving computer.
 Modems can convert data by modulating either a analog wave’s amplitude or
its frequency.

6.2 Networks
 Network: system of interconnected computers, telephones, and/or other
communications devices that can communicate with one another and share
applications and data.
 Benefits of Networks
o Share peripheral devices, such as printers, scanners, disk drives
o Share software
o Share data and information
o Better communications
o Accessing databases
o Centralized communications
o Security of information, because of improved backup systems

 Types of networks: WANs, MANs, & Others


 Wide area network (WAN): Communications network that covers a wide
geographic area, such as a country or the world. Most long-distance and
regional telephone companies are WANs. WANs are used to connect local
area networks. The best example of a WAN is the Internet.
 Metropolitan area network (MAN): Communications network covering a
city or a suburb. Many cellphone systems are MANs.
 Local area network (LAN): Connects computers and devices in a limited
geographic area, such as one office, one building, or a group of buildings close
together. LANs are the basis for most office networks, and the organization
that runs the LAN owns it. WANs and MANs generally use a common carrier
—a telecommunications company that hires itself out to the public to provide
communications transmission services—for at least part of its connections.
(A home area network is a LAN.)

 Network Architecture: How Networks Are Structured


1. Client/Server
 Consists of clients, which are computers that request data, and servers, which
are computers that supply data.
o File servers act like a network-based shared disk drive.
o Database servers store data but don’t store programs.
o Print servers connect one or more printers and schedule and control
print jobs.
o Mail servers manage email.
2. Peer-to-Peer (P2P)
 All computers on the network are “equal” and communicate directly with one
another, without relying on servers.

 Intranets, Extranets, & VPNs: Use the Internet as their base


 Intranets—use infrastructure and standards of the Internet and the web, but
for an organization’s internal use only.
 Extranets—similar to intranets but allows use by selected outside entities,
such as suppliers.
 VPNs (virtual private networks): use a public network (usually the Internet)
plus intranets and extranets to connect an organization’s various sites) but
on a private basis, via encryption and authentication; regular Internet users
do not have access to the VPN’s data and information.
 All use firewalls for security, a system of hardware and/or software that protects
the system from intruders.
 Network Components — all networks have several things in common:
 Wired = twisted-pair, coaxial cable, fiber-optic cable
 Wireless = infrared, microwave, radio, Wi-Fi, satellite
 Hosts and Nodes: Client/server network has a host computer, which controls
the network; a node is any device attached to the network.
 Packets—fixed-length blocks of data for transmission, reassembled after
transmission.
 Protocols—set of conventions, or rules, governing the exchange of data
between hardware and/or software components in the network; built into
the hardware or software you are using.
 The protocol in your communications software specifies how receiver
devices will acknowledge sending devices, a matter called handshaking.
Handshaking establishes the fact that the circuit is available and operational.
It also establishes the level of device compatibility and the speed of
transmission.
 In addition, protocols specify the type of electronic connections used, the
timing of message exchanges, and error-detection techniques.
 Each packet, or electronic message, carries four types of information that will
help it get to its destination;
1. The sender’s address (IP)
2. The intended receiver’s address
3. How many packets the complete message has been broken into
4. The number of this particular packet. The packets carry the data in
the protocols that the Internet uses—that is, TCP/IP

 Network linking devices:


 Switch—Device that connects computers to a network; sends only to
intended recipients; operates back and forth at the same time.
 Bridge—Interface device that connects same type of networks.
 Gateway—Interface device that connects dissimilar networks.
 Router—Device that directs messages among several networks, wired or
and/or wireless.
 Backbone—Main Internet highway that connects all networks in an
organization; includes switches, gateways, routers, etc.
 NIC (Network interface card)—inserted in a slot on the motherboard,
enables computer to operate as part of a network.
 NOS (network operating system)—the system software that manages
network activity.

 Network topology: The layout (shape) of a network


 Star – all nodes are connected through a central network switch
 Ring – all nodes are connected in a continuous loop
 Bus – all nodes are connected to a single wire or cable
 Tree – a bus network of star networks
 Mesh – messages sent to the destination can take any possible shortest,
easiest route to reach its destination. There must be at least two paths to any
individual computer to create a mesh network. (Wireless networks are often
implemented as a mesh, and the Internet is a mesh.)

 Ethernet
 Network standard for linking all devices in a local area network that
describes how data can be sent between computers and other networked
devices usually in close proximity.
o Ethernet deals with LAN collisions; Ethernet is a LAN technology that
can be used with almost any kind of computer and that describes how
data can be sent between computers and other networked devices
usually in close proximity.
o The Ethernet communications protocol is embedded in software and
hardware devices intended for building a local area network (LAN),
and it is commonly used in star topologies.

6.3 Wired communication media


 Communications media are the means of interchanging or transmitting and
receiving information.
 Twisted-Pair Wire (dial-up connections)
o 2 strands of insulated copper wire twisted around each other
o Twisting reduces interference (crosstalk) from electrical signals
o Data rates are 1 – 128 megabits per second (slow)
 Coaxial Cable
o Insulated copper wire wrapped in a metal shield and then in an
external plastic cover
o Used for cable TV and cable Internet electric signals
o Carries voice and data up to 200 megabits per second

 Fiber-optic cable
 Dozens or hundreds of thin strands of glass or plastic that transmit pulses of
light, not electricity
 Can transmit up to 2 gigabits per second (very fast)
 Have lower error rate than twisted-pair or coax
 More expensive than twisted-pair or coax
 Lighter and more durable than twisted-pair or coax
 More difficult to tap into than twisted-pair or coax

 Wired connections media for the home:


 Ethernet
o Connect to PC’s Ethernet network interface card (NIC)
o For several PCs, get a switch to connect them all
o 10 or 100 megabits per second
 HomePNA
o Uses existing telephone wiring and jacks
o Requires HomePNA NIC in your PC
o Speeds of about 320 megabits per second
 Homeplug
o Uses existing home electrical lines
o Speeds of 200 megabits per second

6.4 Wireless communications media


 Electromagnetic spectrum of radiation is the basis of all
telecommunications signals, wired and wireless.
 Radio-frequency (RF) spectrum is the part of the electromagnetic
spectrum that carries most communications signals.
 Bandwidth: range (band) of frequencies that a transmission medium can
carry in a given period of time
o Analog bandwidth is expressed in hertz, digital bandwidth usually in
bits per second (bps)
o Narrowband (voiceband): used for regular telephone
communications
 Transmission rate 1.5 megabits per second or less
o Broadband: For high-speed data and high-quality audio and video;
wide band of frequencies
 Transmission rate 1.5 megabits per second to 1 gigabit per
second or more
o TC/IP (Ch. 2) is the protocol for getting wired devices connected to
the Internet
o WAP (wireless application protocol): Wireless handheld devices
such as cellphones use the Wireless Application Protocol for
connecting wireless users to the Web. Just as the protocol TCP/IP was
designed to provide a wired connection to your Internet access
provider, WAP is a standard designed to link nearly all mobile devices
telecommunications carriers’ wireless networks and content
providers.

 Five Types of Wireless Communications Media


 Infrared Transmission
o Sends signals using infrared light (TV remotes)
o Frequencies are too low to see (1-16 megabits per second)
 Broadcast Radio
o AM/FM, CB, ham, cellphones, police radio
o Sends data over long distances using a transmitter and a receiver (up
to 2 megabits per second)
 Cellular Radio
o Form of broadcast radio
o Widely used in cellphones and wireless modems
o Transmits voice and digital messages
 Microwave Radio
o Superhigh-frequency radio transmit voice and data at 45 megabits per
second
o Requires line-of-sight transmitters and receivers
o More than 1⁄2 of today’s telephones systems use microwave
 Communications Satellites
o Microwave relay stations in orbit around the earth
o Basis for Global Positioning Systems (GPS)
o Communications Satellites (continued)
o Can be placed at different heights: GEO, MEO, LEO
 GEO- geostationary earth orbit
o 22,300 miles above earth; travel at the same
speed as the earth and so appear to us to be
stationary
o Always above equator
o Transmission delay (latency) can make
conversations difficult; not good for applications
requiring real-time user input
 MEO – medium-earth orbit
o 5,000 – 10,000 miles up
 LEO – low-earth orbit
o 200 – 1,000 miles up
o Has no signal delay

 Long-Distance Wireless: One-Way Communication


 GPS (Global Positioning System)
o 24 to 32 MEO satellites continuously transmitting timed radio signals
to identify Earth locations
o Each satellite circles earth twice each day at 11,000 miles up
o GPS receivers pick up transmissions from up to 4 satellites and
pinpoint the receiver’s location
o Accurate within 3 – 50 feet, with a norm of 10 feet accuracy
o Not all services based on GPS technology are reliable
 One-way Pagers: radio receivers that receive data sent from a special radio
transmitter
o Radio transmitter sends out signals over the special frequency;
pagers are tuned to that frequency
o When a particular pager hears its own code, it receives and displays
the message
o Often used in hospitals and areas where smartphones are not allowed

 Long-Distance Wireless: Two-Way Communication


 1G: First-Generation Cellular Service
o Analog cellphones
o Designed for voice communication using a system of hexagonal
ground- area cells around transmitter-receiver cell towers
o Good for voice – less effective for data because of handing off
 2G: Second-Generation Cellular Service
o Uses digital signals
o First digital voice cellular network
 3G: Third-Generation Cellular Service
o Broadband technology
o Carries data at high speeds: 144 kilobits per second up to 3.1 megabits
per second
o Accepts e-mail with attachments
o Displays color video and still pictures
o Plays music
 4G: Fourth-Generation Cellular Service
o A nationwide 4G network is in development; up to 100
megabits/second
o Enables faster Internet surfing
 Includes LTE (Long Term Evolution), an international standard widely
adopted in the United States and several countries in Europe and Asia. LTE
supports data transfer rates of up to 100 megabits per second over cellular

 Short-Range Wireless: Two-Way Communication


 Local Area Networks
o Range 100 – 228 feet
o Include Wi-Fi (802.11) type networks
o Wi-Fi n is the latest and fastest Wi-Fi technology
 Personal Area Networks
o Range 30 – 33 feet
o Use Bluetooth, ultra wideband, and wireless USB
 Home Automation networks
o Range 100 – 150 feet
o Use Insteon, ZigBee, and Z-Wave standards

 Two-Way Communication Short-Range Wireless: Wi-Fi b, a, g, & n for local area


networks (LANs)
 Named for variations on the IEEE 802.11 standard
 Data ranges: 11 megabits per second up to 228 feet
 Wireless devices must use the same communications standard to
communicate. Many products conform to the 802.11a, 802.11b, 802.11g, or
802.11n wireless standards. People have Wi-Fi networks in their homes, and
go online through wireless hot spots at cafes and other establishments,
including airports and hotels.
 Be sure the Wi-Fi connection is secure against cyberspying. Also, Wi-Fi
connections can be made without your knowledge, so disable your Wi-Fi
software, instead of leaving it on to auto connect, whenever you’re not using
it. This can keep you from unknowingly connecting to a fraudulent network.
 Use cellphone security software!
 WiMax is similar to Wi-Fi but has a greater range (10 – 30 miles).
 Personal Area Wireless
o Bluetooth
 Short-range wireless standard to link cellphones, computers,
and peripherals at distances usually up to 33 ft.
 Often used with headsets
 Transmits up to 24 Mbps per second
 When Bluetooth devices come into range of each other, they
negotiate. If they have information to exchange, they form a
temporary wireless network.
o Ultra Wideband (UWB)
 Operates in 480 megabits - 1.6 gigabits per second, range up to
30 ft.
 Uses a low power source to send out millions of bursts of radio
waves each second
o Wireless USB
 USB is the most used interface on PCs
 Range of 32 ft. and maximum data rate of 110 - 480 megabits
per second; used in game controllers, printers, scanners, digital
cameras, MP3 players, hard disks, and flash drives

 Short-Range Wireless for Home


 Insteon
o Combines electronic power line and wireless technology
o Can send data at 13.1 kilobits per second with 150 ft. range
 ZigBee
o Entirely wireless sensor technology
o Can send data at 128 kilobits per second with 250 ft. range
 Z-Wave
o Entirely wireless power-efficient technology
o Can send data at 127 kilobits per second to range of 100 ft.

 UNIT 6B: Cyberthreats: Trolls, Spies, & Hackers & Thieves


 The ongoing dilemma of the Digital Age is balancing convenience against
security.
 Security consists of safeguards for protecting information technology against
unauthorized access, system failures, and disasters that can result in damage
or loss.

6.5 Cyberintruders (trolls, spies, hackers, and thieves)


 Trolls aren’t necessarily destructive, but they can be disruptive on online
comment boards. A troll is a person who posts intentionally offensive,
incendiary, or off-topic comments online, to upset people.
 Many companies have extensive data-collection efforts that constantly track
(spy on) our personal activities.

 Malicious hackers break into computers for malicious purposes.


 Script kiddies are technically unsophisticated teenagers who use
downloadable software for perform break-ins.
 Hacktivists are hacker activists who break into systems for a political or a
socially motivated purpose.
 Black-hat hackers break into computers to steal or destroy information or
to use it for illegal profit.
 Cyberterrorists attack computer systems so as to bring physical, political or
financial harm to groups, companies, or nations.
 Benignhackers(thrill-seekerhackers)illegallyaccesscomputersystems simply
for the challenge of it, not to damage or steal anything; their reward is the
achievement of breaking in.
 Benevolent hackers (ethical hackers or white-hat hackers) are usually
computer professionals who break into computer systems and networks with
the knowledge of their owners to expose security flaws that can then be fixed.
 Thieves may be a company’s employees or suppliers or professionals.
o Employees
o Outside partners & suppliers
o Hardware thieves
o Con artists, scammers, & counterfeiters

6.6 Cyberattacks and Malware


 Networks and computer systems are susceptible to attacks by all kinds of
malware.
 Some common cyberthreats are denial-of-service attacks; viruses; worms;
Trojan horses; rootkits and backdoors; blended threats; zombies;
ransomware; and time, logic, and email bombs.

 Cyberthreats:
 Denial of Service Attack
o Consists of making repeated requests of a computer or network
device, thereby overloading it and denying access to legitimate users.
o Used to target particular companies or individuals.
 Virus
o Deviant program that hides in a file or a program on a disk, flash
memory drive, in an e-mail, or in a web link and that causes
unexpected effects such as destroying or corrupting data.
o Usually attached to an executable file that you must run or open (to
activate the virus).
 Worms
o A program that copies itself repeatedly into a computer’s memory or
disk drive.
o May copy itself so much it crashes the infected computer.
 Trojan Horses
o Programs that pretend to be a useful program such as a free game or a
screensaver but that carry viruses or malicious instructions that
damage your computer or install a backdoor or spyware.
o Backdoors and spyware allow others to access your computer without
your knowledge.
 Rootkits
o In many computer operating systems, the “root” is an account for
system administration. A “kit” is the malware secretly introduced into
the computer. A rootkit gives an attacker “super powers” over
computers—for example, the ability to steal sensitive personal
information.
 Blended Threats
o A blended threat is a more sophisticated attack that bundles some of
the worst aspects of viruses, worms, Trojan horses, and other
malware into one single threat. Blended threats can use server and
Internet vulnerabilities to initiate, then transmit and also spread an
attack. Blended threats are designed to use multiple modes of
transport—email, flash drives, networks, and so on.
 Zombies & Bots
o A botmaster uses malware to hijack hundreds to many thousands of
computers and is able to remotely control them all, including the
ability to update the malware and to introduce other programs such as
spyware. Hijacked computers are called zombies.
o A botnet (robot network) is a network of computers in which each
computer has been implanted with instructions to wait for commands
from the person controlling the botnet.
 Ransomeware
o A botnet may be used to install ransomeware, which holds the data on
a computer or the use of the computer hostage until a payment is
made. Ransomware encrypts the target’s files, and the attacker tells
the victim to make a payment of a specified amount to a special
account to receive the decryption key.
 Time, Logic, & Email Bombs: A time bomb is malware programmed to “go
off” at a particular time or date. A logic bomb is “detonated” when a specific
event occurs—for example, all personnel records are erased when an
electronic notation is made that a particular person was fired. Email bombs
overwhelm a person’s email account by surreptitiously subscribing it to
dozens or even hundreds of mailing lists.
 Phone Malware: Worms and viruses and other malware are attacking
smartphones. The most common type of cellphone infection occurs when a
cellphone downloads an infected file from a PC or the Internet, but phone-to-
phone viruses are also on the rise.
o Infected files usually show up disguised as applications such as games,
security patches, add-on functionalities, and free stuff. Future
possibilities include cellphone spyware—so someone can see every
number you call and listen to your conversations—and viruses that
steal financial information, which will become more serious as
smartphones are used as common payment devices.
 Cellphone Malware
o Spread via Internet downloads, MMS attachments, and Bluetooth
transfers
o Usually show up disguised as applications such as games, security
patches, add-on functionalities, erotica, and free programs
o Protect your phone:
 Turn off Bluetooth discoverable mode
 Check security updates to learn about filenames to watch out
for
 Install security software
 How they spread
o Via e-mail attachments
o By infected disks and flash drives
o By clicking on infiltrated websites
o By downloading infected files from websites
o Through infiltrated Wi-Fi hotspots
o From one infected PC on a LAN to another
 What can you do about it?
o Install antivirus and firewall software
and subscribe to the manufacturer’s automatic antivirus update
service
 Online Safety
 Use antivirus software, and keep it current
 Install a firewall to monitor network traffic and filter out undesirable types of
traffic and undesirable sites
 Don’t use the same password for multiple sites
 Don’t give out any password information
 Use robust passwords:
o Minimum 8 characters with letters, numbers, characters
o 4cats is not a good password; f0UrK@tTz is safer
o Use biometric identification
o Use encryption
 Install antispyware software
 Encrypt financial and personal records so only you can read them
 Back up your data, so if your PC is attacked and must be reformatted, you can
restore your data
 Never download from a website you don’t trust
 Consider biometric authentication
 Encryption
o Process of altering readable data into unreadable form to prevent
unauthorized access
o Uses powerful mathematical ciphers to create coded messages that
are difficult to break
o Unencrypted messages are known as plain text
o Encrypted text is known as cybertext
o You use an encryption key to encrypt and decrypt codded messages

6.7 Concerns about private and identity theft


 The proliferation of networks and databases have put privacy under great
pressure.
 Privacy is the right of people not to reveal information about themselves.
 Some threats to privacy:
o Name migration
o Résumé rustling & online snooping
o Government prying & spying
 Identity (ID) theft, or theft of identity (TOI), is a crime in which thieves
hijack your name and identity and use your information and credit rating to
get cash or buy things.
o Wallet or purse theft
o Mail theft
o Mining the trash
o Telephone solicitation
o Insider access to database
o Outsider access to database
 If ID theft happens, contact:
o Credit card companies
o Your bank
o Department of Automotive Vehicles
o Utility companies
o Phone companies
o Local police
o Federal Trade Commission
o Other organizations you belong to
PAN Fiber-optics WAN IP
Bluetooth Broadband Computer Wireless device
networks

Sharing LAN SSID Wireless range


Homegroup Computers Network extender
Amplify signal

Modem Device manager


Internet what network
adapters

QUIZ 5

1. The internet is a WAN


Answer: True

2. P2P networks are most commonly used in home networks


Answer: True

3. A printer connected to a wireless network is considered to be a node on that


network
Answer: True

4. ______is any device connected to a network such as a computer, printer, or game


console
Answer: Node

5. A computer ________ is two or more computers connected using software and


hardware so that they can communicate with each other
Answer: Network

6. A network that spans a large physical distance is called a


Answer: WAN

7. For the nodes on a network to communicate with each other and access the
network, each node needs a
Answer: Network adapter
8. Normal telephone cable is a type of
Answer: Twisted-pair cable

9. On a network, an ___________ helps prevent data packets from colliding with each
other
Answer: Switch

10. The unique number assigned to a network adapter by the manufacturer is


referred to as the _________
Answer: MAC

11. Which transmission medium transmits data the fastest


Answer: Fiber-optic cable

12. Current wired Ethernet networks in the U.S, are based on the IEEE 802.11ac
standard
Answer: False

13. Which of the following is not a standard for wireless fidelity Ethernet networks
Answer: 802.11ac

14. Which of the following is NOT a common network architecture type


Answer: Intraoffice area network (IAN)

15. Which of the following is NOT a type of UTP cable you would use I a wired
Ethernet network
Answer: Cat 7B

Unit 6: Assessing Hardware & Software

Introduction
 In this activity you need to PRACTICE!
o Assessing your hardware
o Finding if its good enough for you
o And what kind of things you can do to make it better

Overview- for PC Users


6A: How to Test Hardware Function
 What to Check?: Major Components
 Screen
 Keyboard
 CPU
 GPU
 Hard Drive
 RAM
 Checking Screen for Dead Pixels
 Screen is made of very small pixels (dots)
 They display Three Basic colors: Red, Green, Blue
 Sometimes the malfunction: They display one color or don’t turn on
 You can test using online tool : CheckPixels
 You check for either bad colors of for black points on the screen
 You can check offline using “IsMyLcdOK” downloadable software

 Checking the keyboard


 Many People don’t consider the keyboard
 Extremely important in a laptop (if keyboard has an issue the whole laptop
needs to be repaired)
 You can check using an online tool: KeyboardTester or using any offline tool

 Checking HDD (Hard disk drive) / SSD (Solid state drive) Health
 Contains the operating system and all files and information
 Important for hard drive to be 100% health
 For hard drive use HDSentitel
 For SSD you can use SSDlife
 Check manufacturer on what qualifies changing the hard drive

 Checking the CPU and GPU: GPU First


 These are the main components to do all the processing
 You can test both using Furmark
 ForlowendPC’s(no dedicated GPU) run at 1280x720
 For others run at 1280x720 or 1920x1080
 If screen flickers or distorts while running the test then there is an issue with
the GPU

 Checking the CPU and GPU: CPU Second


 To test the CPU, run CPU burner and Select Start to run the test
 There is a problem with the CPU is you experience:
o Sudden shut down
o Flickering
o PC hanging up completely
 Causes might be:
o Faulty Hardware
o Inefficient cooling

 Checking The RAM


 RAM is the #1 component to increase PC performance
 Errors in RAM lead to:
o Blue Screen of death (BSOD)
o Booting Problems
 To check RAM use Memtest86+
 Takes 30 minutes to complete
 Must be done at boot up
 Requires creating a USB or CD bootable media

 Other Hardware Checks to Consider


 USB ports
 Headphone Jack
 Microphone Jack
 DVI
 HDMI
 Ethernet

6B: How to Test Hardware Performance


 Why would you test this?
 Looking to upgrade to a different part
 Feeling like the computer is slow but all hardware is working fine
 Identifying bottlenecks
 Benchmarking your computer to others
 Understanding the quality of your hardware

 Check your computer performance / hardware


 Click Start
 Control Panel
 System
 System & Security
 General
 You will be able to see processor speed and RAM (but you won’t know how
well they perform)

 Benchmark you computer using User Benchmark


 Download and Install User Benchmark
 Run the software
 Select all components
 Make sure to close any background applications / software so as to free up
CPU and RAM processing

 Benchmark you computer using User Benchmark: Headline Results


 Once Completed the test will give you three category score: Gaming, Desktop
and Workstation
 You get a percentage relative to the top performing hardware and its ability
to handle demanding related software

 Benchmark you computer using User Benchmark: High Level Summary


 PC Status gives your PC’s performance relative to other PC’s with the same
hardware
 Processor gives the # of cores and what the computer can handle. Gaming
score shows the CPU’s capability to handle games with the appropriate
hardware

 Benchmark you computer using User Benchmark: High Level Summary 2


 Graphics compares your GPU to an industry leading card (in this case GTX
1070) and compares the performance in relation as well as identifying the
appropriate games
 Boot Drive highlights the speed of booting the computer and loading
applications, in most cases an SSD will yield an extreme jump in performance

 Benchmark you computer using User Benchmark: High Level Summary 3


 Memory showcases the overall RAM available and evaluates its adequacy
relative to overall PC components and tasks required
 OS version checks that the computer is running the most functional and
efficient version of windows.

 Benchmark you computer using User Benchmark: Processor


 Shows specific CPU model as well as how many benchmarks have been run
and average performance, as well as the # of cores , threads and clock speed
(base and average)
 Your performance is displayed on the right
 The performance is compared to an industry leading CPU while your
percentile is compared to how well your CPU performed compared to other
similar CPU’s

 Benchmark you computer using User Benchmark: Graphics Card


 Showcased the graphics card of the computer as well as the overall size of the
graphics card and similar #’s to that of the processor
 Scores are interpreted in the same way as those for processors. (ie your score
is relative to leading GPU and percentile is relative to same GPU)

 Benchmark you computer using User Benchmark: Hard Drive Score


 Drive shows the exact model, # of user benchmarks and the average
benchmark score
 Important parameters are Size (GB) , Max speed and RPM (for HDD)
 Score is relative to industry leader
 Percentile is relative to other Hard Drives

 How to Speed Up your computer using windows tool


 Uninstall redundant programs
 Reduce the programs that unnecessarily automatically start
 Purge unnecessary files
 Troubleshoot windows
 Check windows event viewer
 How to Speed Up your computer using Good Practices
 Keep PC physically clean by removing dust and any dirt obstacles in the way
of the ventilation and on the screen
 Shut Down the PC every so often in order to prevent application build up and
slowdowns

 Upgrading your PC to increase speed


 Look at the bottlenecks, these are usually the least performing hardware on
the computer
 You can use user benchmark to compare your existing hardware to potential
hardware upgrades

Overview- For MAC Users


 I Have a MAC !
 There are other ways to test your hardware / performance
 You can also test hardware functionality
 You won’t be able to use the same tools as PC

 Testing CPU
 We recommend Geekbench 4 for Testing CPU
 After running it you will get 2 score, a single-core score and a multi-core
score.
 The single-cores core shows what the performance is like under one core
 The multi-core score displays the performance under heavy load using all
cores on the computer

 Testing GPU
 Maxon’s Cinebench is a free software will use OpenGL to test the graphics
card
 The results are displayed as frames per second (FPS) – the higher the better

 Testing Hard Disk & SSD


 You can use BlackMagic Disk Speed Test
 Once you run the app you will provided with the Write and Read speeds for
your computer
 Can be used to compare them to more modern hardware and components.
 Other Tools
 You can download NovaBench from the App Store
 The tool will return overall RAM as well as Ram speed & Score
 Overall System Specifications
 CPU Score & Operations per second
 Graphics Test: Score and 3D frames per second
 Hardware test: Hard Drive & SSD capacity and Write Speed.

 Testing Your Mac’s Functionality


 You can easily use an all purpose tool built in to the mac itself: Apple
Diagnostics
 Enter it by pressing and holding “D” on the keyboard until a prompt for
language shows up
 Once language is selected a progress bar will appear

 Testing Your Mac’s Functionality


 The test should take around 2 to 3 minutes
 Once complete, you will get a list of any hardware issues along with reference
error codes that can help further diagnose the computer

SSD Devices RAID mb/s


Non-volatile Task manager Backup Transfer Rate

Millisecond RAM MHZ GPU


Hard Drive Volatile CPU Video
performance

USB 3.0 HDMI


Not video port Video port

QUIZ 6

1. Video cards are designed with their own RAM storage


Answer: True

2. Which of the following activities is carried out by the ALU


Answer: Performs arithmetic calculations

3. A_______ enables the computer to drive the speaker system


Answer: Sound card

4. RAM is an example of _____________ storage


Answer: Volatile

5. The rule of thumb that predicts that the number of translators on a CPU will
double every 2 years is called ________ law
Answer: Moore’s

6. _______ provides high-speed information processing by enabling a new set of


instructions to start before the previous set is finished
Answer: Hyerthreading

7. RAID 0 automatically duplicates your data and saves it on two identical drives
Answer: False

8. Running the disk defragmenter utility will ________


Answer: Clean out your start-up folder

9. The CPU consists of which two parts?


Answer: The control unit and the arithmetic logic unit

10. Running the disk clean-up utility is a quick way to __________


Answer: Clear out unnecessary files

11. Which of the following is not a permanent storage option?


Answer: Random access memory

12. To securely erase data, the U.S. department of defense suggests tat data be _______
Answer: Overwritten multiple times

13. Which of the following does not determine processor power?


Answer: Speed of the motherboard

14. Hybrid drives are a combination of a mechanical hard drive and an SSD drive
Answer: True

15. In most current systems, ________ is the type of RAM used


Answer: DDR3

Unit 7: Security
Introduction
 Important to understand security issues, not only who can hack and steal
information from you, or data, identity theft, or wtv….
 What is also important is how can you make sure that if something happens
to your computer like a fire, data is also stored and backed up properly

Overview: Reading Unit 9A


 UNIT 9A: Security, Privacy & Surveillance Concerns
 Technology is now used to develop predictive search apps — applications
that know what you want before you do. Some people, however, see the new
technology as just the latest intrusion into our private lives, mining digital
personal information about us whose uses we cannot always foresee
9.1 Security Issues
 Errors, Accidents, & Natural Hazards
 Human errors
o Humans often are not good at assessing their own information •
Human emotions affect performance; people get frustrated
o Human perceptions are slower than the equipment
o Information overload may also be a problem
 Procedural errors
o When people fail to follow established procedures, errors can occur
Software errors
 Software bug:
o An error in a program that causes it not to work properly
 “Dirty data” problems
o Incomplete, outdated, or otherwise inaccurate data
 Electromechanical problems
o Mechanical systems can wear out or become damaged
o They can also be badly designed or constructed
o Power failures and surges can damage equipment
 Natural hazards can lead to disasters
 Computer Crimes
o Two types of computer crime:
 Illegal act perpetrated against computers or
telecommunications (computer is the target)
 Use of computers or telecommunications to accomplish an
illegal act (computer is the tool)
o Theft of hardware
Theft of software
o Theft of intellectual property (piracy) • Theft of time and services
o Theft of information (e.g., medical info, credit card info)
o Internet-related fraud (e.g., Wi-Fi phishing, or evil twin attack)
o Crimes of malice: crashing entire systems
 Attacks on power-control systems and attacks on the Internet

9.2 Security Safeguards


 Security is a system of safeguards for protecting information technology against
disasters, system failures, and unauthorized access that can result in damage or
loss.
 Computer security’s five components:
o Deterrents to computer crime
o Identification and access
o Encryption
o Protection of software and data
o Disaster recovery plans
 Deterrents to computer crime
 Enforcing laws
 CERT: The Computer Emergency Response Team
o Provides round-the-clock information on international computer
security threats
 Tools to fight fraudulent and unauthorized online uses
o Rule-based detection software
o Predictive-statistical-model software
o Employee Internet management software
o Internet filtering software
o Electronic surveillance

 Identification and access


 Verify legitimate right of access by what you have, what you know, and who
you are
o What you have: cards, keys, signatures, badges
o What you know: PINs and passwords; callback provision
o Who you are: biometrics (such as hand geometry, fingerprint scans,
iris recognition, face recognition, voice recognition)

 Encryption
 The process of altering readable data into unreadable form to prevent
unauthorized access
 Advantage: encrypting data that is available over the Internet keeps thieves
and crackers from reading it
 Disadvantage: encrypting data may prevent law-enforcement officials from
reading the data criminals are sending to one another

 Protection of software and data


 Restrict access to online files; use transaction logs
 Use audit controls to track who used what programs and servers, which files
were opened, and so on
 Use people controls—screen applicants; do background checks; monitor
Internet, email, and computer usage; use shredders for discarded documents
and materials

 Disaster-recovery plans
 Method of restoring information-processing operations that have been halted
by destruction or accident
 Back up everything; put mainframes in different locations
 Plans range in price and complexity
 Automatically store data redundantly in two or more places
 Have an off-site computer-based data storage center with independent power
supply
9.3 Privacy and Surveillance
 The rise of Big Data has led to continuing threats to privacy from three giant
sources:
 From business organizations
 From governments, local to federal
 From foreign governments and criminal groups

 Business & Cyberspying


 Almost everything we do online is being scooped up and recorded for use by
marketers, and it’s difficult to know what parts of our own lives still belong to
us.
 Whatever the impact on your personal privacy, it seems unlikely that you can
claim ownership of a lot of data that’s being collected about you. At work, for
instance, you basically have no rights.

 Government & Cyberspying


 Governments at all levels spy on their citizens, sometimes encouraged by the
law, sometimes in spite of the law, often unknown to us.
o Local police, national ID cards, National Security Agency (NSA), FBI,
drones, and so on

 Spying, Hacking, & Cyberwarfare by Foreign Governments & Groups


 The world is so interconnected that it is a constant struggle for technology
managers to keep us secure against cyberinvasions of all sorts.
 Governments get involved in cyberwarfare —warfare involving computers
and the Internet in which one nation attacks another’s information systems.

Cyber crime Worm Flash drive Surfing habits


Advance fee fraud File transport Boot sector Spyware

Adware Michel angelo Packet analyzer White Hat


Debit card Hackers
Grayware Time bomb
information Security
vulnerabilities

Polymorphic Quarentining
virus Secure Area
Change code
Quiz 7

1. You should use the same password for each system or website you need to access
Answer: False

2. A time bomb virus can be triggered on a certain date.


Answer: True

3. You can block logical ports from invaders and make your computer invisible to
others on the internet by installing ________
Answer: A firewall

4. Which of the following is formally defined as any criminal action perpetrated


primarily through the use of a computer?
Answer: Cybercrime

5. The terms virus and worm actually mean the same thing.
Answer: False

6. Some of the cache memory of a CPU is __________.


Answer: inside the CPU, itself

7. A macro virus is a virus that is attached to a file such as a Word document or Ecel
workbook.
Answer: True

8. How do optical discs store data?


Answer: A laser burns tiny pits onto a platter

9. Running the CPU at a faster speed than the manufacturer recommends is called
______
Answer: Overclocking

10. A zombie is another person’s computer controlled by a hacker


Answer: True

11. Which of the following ports is NOT used to connect to a video card?
Answer: USB

12. A worm does NOT require human interaction to spread to other computers.
Answer: True

13. There are ______ levels of cache memory in the intel i7 processor
Answer: Three
14. In most current systems, __________ is the type of RAM used
Answer: DDR3

15. Which of the following is not a permanent storage option?


Answer: Random access memory

Unit 8: Business Productivity

Excel vs Access
o Microsoft access
o Create tables and fields
o Relationships
o Forms
o Reports
o Microsoft excel
o Main screen
o Files
o Home toolbar
o Insert toolbar
o Page layout toolbar
o Data toolbar
o Review and view toolbar
o Using the IF function
o Pivot table
o Graphs
o Excel and access are both applications of Microsoft. Excel is used for
spreadsheets, whereas, access is used for database purposes.
o Excel
 Helps in creating charts, graphs using spreadsheets
 Financial analysts use excel a lot
 Excel helps in tracking, feeding inputs, finding out outputs, and
helps in data manipulation
o Access
 Used for collecting and sorting data
 Preferred to excel when the small business owners need to deal
with a lot of reports and queries
o Microsoft excel vs access
 Important applications
 Their usage is used to different sets of people
 Excel has more flexibility while access is more rigid on how we
can use it
 Difference between the two: scope of use. Microsoft excel can
be used as a spreadsheet application. Microsoft access can be
used as a database application.

You might also like