You are on page 1of 8

Unit 4

A. Search engine.
A search engine is a software program or script available through the
Internet that searches documents and files for keywords and returns the
results of any files containing those keywords. Today, there are
thousands of different search engines available on the Internet, each
with their own abilities and features. The first search engine ever
developed is considered Archie, which was used to search for FTP files
and the first text-based search engine is considered Veronica. Today, the
most popular and well-known search engine is Google. Other popular search
engines include AOL, Ask.com, Baidu, Bing and Yahoo.
How to access a search engine
For users, a search engine is accessed through a browser on their
computer, smartphone, tablet, or another device. Today, most new browsers
use an Omnibox, which is a text box at the top of the browser that shows
the address and is where you can also search on the Internet . You can
also visit one of the major search engines home page to perform a search.
How a search engine works
Because large search engines contain millions and sometimes billions of
pages, many search engines not only just search the pages but also
display the results depending upon their importance. This importance is
commonly determined by using various algorithms.

B. Smartphones.
A smartphone is a handheld personal computer with a mobile operating
system and an integrated mobile broadband cellular network connection for
voice, SMS, and Internet data communication; most if not all smartphones
also support Wi-Fi. Smartphones are typically pocket-sized, as opposed to
tablets, which are much larger than a pocket. They are able to run a
variety of third-party software components ("apps") from places like the
Google Play Store or Apple App Store, and can receive bug fixes and gain
additional functionality through operating system software updates.
Modern smartphones have a touchscreen color display with a graphical user
interface that covers the front surface and enables the user to use a
virtual keyboard to type and press onscreen icons to activate "app"
features. They integrate and now largely fulfill most people's needs for
a telephone, digital camera and video camera, GPS navigation, a media
player, clock, news, calculator, web browsing, handheld video games,
flashlight, compass, an address book, a note-taking application, digital
messaging, an event calendar, etc. Typical smartphones will include one
or more of the following sensors: magnetometer, proximity sensor,
barometer, gyroscope or accelerometer. Since the early 2010's,
smartphones have adopted integrated virtual assistants, such as Siri,
Google Assistant, Alexa, Cortana, and Bixby. Most smartphones produced
from 2012 onward have high-speed mobile broadband 4G LTE, motion sensors,
and mobile payment features.

In 1999 the Japanese firm NTT DoCoMo released the first smartphones to
achieve mass adoption within a country.Smartphones became widespread in
the late 2000s, following the release of the iPhone. In the third quarter
of 2012, one billion smartphones were in use worldwide. Global smartphone
sales surpassed the sales figures for feature phones in early 2013.
C.E-mail
Electronic Mail (email or e-mail) is a method of exchanging messages
between people using electronic devices. Email first entered substantial
use in the 1960s and by the mid-1970s had taken the form now recognized
as email. Email operates across computer networks, which today is
primarily the Internet. Some early email systems required the author and
the recipient to both be online at the same time, in common with instant
messaging. Today's email systems are based on a store-and-forward model.
Email servers accept, forward, deliver, and store messages. Neither the
users nor their computers are required to be online simultaneously; they
need to connect only briefly, typically to a mail server or a webmail
interface, for as long as it takes to send or receive messages.
Unit 5
A. Using social media effectively
1. Develop a comprehensive social media strategy.While Facebook And
Twitter are the most used social media platforms, a comprehensive social
media strategy should incorporate additional social media platforms where
customers, prospects, employees and candidates could be talking about the
company. Some examples include:Business networking and hiring platforms
such as LinkedinIndustry-specific platforms, e.g. travel
forums,automotive message boardsSpecialty multimedia sharing sites such
as YouTube and PinterestCountry-specific platforms such as Renren.comTo
be able to know which social media platforms to incorporate as part of
its social media strategy, a company needs to systematically track top
platforms where the company and its brands are being discussed.2.
Establish a two-way communication model.Companies who use social media
just to disseminate information to customers may not see high returns
from social media usage. Instead, companies who use social media
platforms as a two-way communication medium tend to have a more
successful social media approach. There are several tactics that can be
used to establish two-way communication, including:Posting questions and
surveys related to the company as well as general topics of
interestsGetting customers, prospects, employees, andcandidates to share
their queries and experiences related to the company and its products, as
well as themes related to the company’s business (e.g., best travel
stories).This can even extend to the sharing of photosand videosSet up
dedicated customer service pages, tabs, or handles, as well as dedicated
candidate query pages, with a promise of highresponsivenessDoing this
requires constant focus on generatingnew ideas and content for social
media, as well as the ability to post content and responses in a highly
efficient and streamlined manner.3. Retain control of content being
posted on behalf of the company.Some companies tend to outsource their
social media asset management to their advertising partners. In such
situations, however, companies should make sure they retain control of
and full editorial rights to what is being posted on their behalf.
Companies can do this by putting in placed automated approval workflows
and escalation processes between their partners and internal teams.4. Set
targets and measure performance.It is critical for companies embarking on
social media initiatives to set targets, measure performance against
those targets, and comparetheir performance against competitors. What is
measured gets improved. Some of the key performance indicators to track
include:Share of social media conversations for the company/brand vis-à-
vis competitorsPositive and negative sentiment for the company/brand vis-
à-vis competitorsMonthly addition in number of social media
followersAverage time taken to respond to comments by social media users
by type of comment (e.g. positive feedback, customer service
issue)Percent of résumés being sourced via social media, and percent of
positions being closed through social media
B. Blogs
A blog is a website using special software to create a series of articles
and pages containing various information they wish to share with the
world.Blog is short for weblog. Weblogs started out as an online means of
journaling. People originally used weblogs (blogs) as online diaries but
today they can be used for lots of different things.Blog posts (entries)
are shown in reverse chronological order on the home page of the blog.

Types of Blogs
There are various types of blogs around now.
*.Personal blogs – blogs that people write about their personal life
*.Corporate blogs – businesses have blogs to keep customers informed on
what’s new or to share information about their products or services.
*.Media blogs – news type blogs where the author(s) post the latest news
information related to a subject.
*.Topical blogs – blogs that focus on one topic. Basic Computer
Information is a topical blog for example, and so isWeb Page Mistakes.

C. Forum
Definition:
An online community where visitors may read and post topics of common
interest.

Information:

Forums can be a useful for anyone doing business online, both in terms of
reading the content and actively participating in the discussions.Reading
a forum’s archives can be a good way to obtain a basic knowledge about a
topic, and it also provides a historical perspective on trends and
opinions.Participation, whether as a member, moderator, or owner, can
help one achieverecognition within a business community, and may even
generate highly-qualified business leads. Forums differ, however, intheir
treatment of self-promotion; some disallow any hint of self-promotion,
some are geared specifically towards self-promotion, and many fall
somewhere in between, limiting URL’s to an off-the-page member profile.It
is very important to read the terms and conditions of each particular
forum for a basic guideline as to what is acceptable. Additionally, it is
a good idea to read archived posts in order to see the guidelines in
action. Failure to do so can have negative consequences, including
tarnishing your site’s reputation and getting permanently banned from the
community.

D. Ethics and etiquette


Ethics :
Computer ethics is a part of practical philosophy concerned with how
computing professionals should make decisions regarding professional and
social conduct.[1] Margaret Anne Pierce, a professor in the Department of
Mathematics and Computers at Georgia Southern University has categorized
the ethical decisions related to computer technology and usage into three
primary influences:

1.The individual's own personal code.


2.Any informal code of ethical conduct that exists in the work place.
3.Exposure to formal codes of ethics

Computer ethics primarily enforces the ethical implementation and use of


computing resources. It includes methods and procedures to avoid
infringing copyrights, trademarks and the unauthorized distribution of
digital content. Computer ethics also entails the behavior and approach
of a human operator, workplace ethics and compliance with the ethical
standards that surround computer use.

The core issues surrounding computer ethics are based on the scenarios
arising from the use of the Internet, such as Internet privacy, the
publication of copyrighted content and user interaction with websites,
software and related services.

Etiquette :
Online etiquette is ingrained into culture, etiquettein technology is a
fairly recent concept. The rules of etiquette that apply when
communicating over the Internet or social networks or devices are
different from those applying when communicating in person or by audio
(such as telephone) orvideophone(such asSkype video). It is a social code
of network communication.Communicating with others via the Internet
without misunderstandings in theheat of the momentcan be challenging,
mainly becausefacial expressionsandbody languagecannot be interpreted
incyberspace. Therefore, several recommendations to attempt to safeguard
against these misunderstandings have been proposed.

unit 6
A.Motivation
Motivation is the driving force which help causes us to achieve goals.
Motivation is said to be intrinsic or extrinsic. The term is generally
used for humans but, theoretically, it can also be used to describe the
causes for animal behavior as well. This article refers to human
motivation. According to various theories, motivation may be rooted in a
basic need to minimize physical pain and maximize pleasure, or it may
include specific needs such as eating and resting, or a desired object,
goal, state of being, ideal, or it may be attributed to less-apparent
reasons such as altruism, selfishness, morality, or avoiding mortality.
Conceptually, motivation should not be confused with either volition or
optimism. Motivation is related to, but distinct from, emotion
5 Importance of Motivation:
(1) Improves Performance Level
(2) Helps to Change Negative or Indifferent Attitudes of Employees
(3) Reduction in Employee Turnover
(4) Helps to Reduce Absenteeism in the Organisation
(5) Reduction in Resistance to Change

B.evaluating effectiveness

C.Adaptability
Adaptability (Latin: adaptō "fit to, adjust") is a feature of a system or
of a process. This word has been put to use as a specialised term in
different disciplines and in business operations. Word definitions of
adaptability as a specialised term differ little from dictionary
definitions. According to Andresen and Gronau[1] adaptability in the
field of organizational management can in general be seen as an ability
to change something or oneself to fit to occurring changes. In ecology,
adaptability has been described as the ability to cope with unexpected
disturbances in the environment.
With respect to business and manufacturing systems and processes
adaptability has come to be seen increasingly as an important factor for
their efficiency and economic success. In contrast, adaptability and
efficiency are held to be in opposition to each other in biological and
ecological systems, requiring a trade-off, since both are important
factors in the success of such systems.[2] To determine the adaptability
of a process or a system, it should be validated concerning some
criteria.
D.Technical issues
Many students are not provided with the high bandwidth or the strong
internet connection that online courses require, and thus fail to catch
up with their virtual classmates: Their weak monitors make it hard to
follow the Course Management System and their learning experience becomes
problematic. Moreover, most of them live off campus and find it difficult
to keep in tune with the technical requirements of the chosen course.
Some of them don't even own computers and seek help in Learning Resource
Centers for technical assistance. The only solution to this problem is
knowing exactly what kind of technological support they will need for

a certain course before enrolling in it, as well as properly equipping


themselves for the course's successful completion.

E.Time management
Time management is the process of planning and exercising conscious
control over the amount of time spent on specific activities, especially
to increase effectiveness, efficiency or productivity. It is a juggling
act of various demands of study, social life, employment, family, and
personal interests and commitments with the finiteness of time. Using
time effectively gives the person "choice" on spending/ managing
activities at their own time and expediency.[1]

It is a meta-activity with the goal to maximize the overall benefit of a


set of other activities within the boundary condition of a limited amount
of time, as time itself cannot be managed because it is fixed. Time
management may be aided by a range of skills, tools, and techniques used
to manage time when accomplishing specific tasks, projects, and goals
complying with a due date. Initially, time management referred to just
business or work activities, but eventually the term broadened to include
personal activities as well. A time management system is a designed
combination of processes, tools, techniques, and methods. Time management
is usually a necessity in any project development as it determines the
project completion time and scope.
Unit 7
A. Threat :
Definition - What doesThreat mean?
A threat, in the context of computer security, refers to anything that
has the potential to cause serious harm to a computer system. A threat is
something that may or may not happen, but has the potential to cause
serious damage. Threats can lead to attacks on computer systems, networks
and more.

Techopedia explainsThreat:
Threats are potentials for vulnerabilities to turn into attacks on
computer systems, networks, and more. They can put individuals’ computer
systems and business computers at risk, so vulnerabilities have to be
fixed so that attackers cannot infiltrate the system and cause
damage.Threats can include everything from viruses, trojans, back doors
to outright attacks from hackers. Often, the term blended threat is more
accurate, as the majority of threats involve multiple exploits. For
example, a hacker might use a phishing attack to gain information abouta
network and break into a network.
B.Desktop And Mobile Security
Mobile Security:

Mobile security, or also mobile device security has become increasingly


important in mobile computing. Of particular concern is the security of
personal and business information now stored on smartphones.

More and more users and businesses use smartphones to communicate, but
also to plan and organize their users' work and also private life. Within
companies, these technologies are causing profound changes in the
organization of information systems and therefore they have become the
source of new risks. Indeed, smartphones collect and compile an
increasing amount of sensitive information to which access must be
controlled to protect the privacy of the user and the intellectual
property of the company.

All smartphones, as computers, are preferred targets of attacks. These


attacks exploit weaknesses inherent in smartphones that can come from the
communication mode—like Short Message Service (SMS, aka text messaging),
Multimedia Messaging Service (MMS), wifi, Bluetooth and GSM, the de facto
global standard for mobile communications. There are also exploits that
target software vulnerabilities in the browser or operating system. And
some malicious software relies on the weak knowledge of an average user.
According to a finding by McAfee in 2008, 11.6% users had heard of
someone else being affected by mobile malware, but only 2.1% had personal
experience on such problem.[1] However, this number is expected to grow.

Desktop Security:

Desktop security is not just a matter of protecting your own machine and
the data on it. When a machine is compromised, one of the most common
outcomes is that it is used to launch attempts to break in to, or disrupt
service on, other systems located at Penn or anywhere on the Internet.
Given the automated tools currently available to find machines that can
be compromised and then exploit them, this is a serious concern.

If a machine is found to have been compromised such that it has or could


become the source of attacks on others, Penn's Information Security
Office will require that the machine be taken off the network, in accord
with the procedures outlined in the Policy on Computer Disconnection from
PennNet. In addition, many desktop computers may be subject to the terms
of Penn's Computer Security Policy and thus must be maintained with
adequate security precautions in order to comply with this policy.

C.Cyber Security
Cybersecurity is the body of technologies, processes and practices
designed to protect networks, computers, programs and data from attack,
damage or unauthorized access. In a computing context, security includes
both cybersecurity and physical security.
Ensuring cybersecurity requires coordinated efforts throughout an
information system. Elements of cybersecurity include:

1.Application security
2.Information security
3.Network security
4.Disaster recovery / business continuity planning
5.Operational security
6.End-user education

One of the most problematic elements of cybersecurity is the quickly and


constantly evolving nature of security risks. The traditional approach
has been to focus most resources on the most crucial system components
and protect against the biggest known threats, which necessitated leaving
some less important system components undefended and some less dangerous
risks not protected against. Such an approach is insufficient in the
current environment. Adam Vincent, CTO-public sector at Layer 7
Technologies (a security services provider to federal agencies including
Defense Department organizations), describes the problem

unit8
A.Mooc
A massive open online course (MOOC) is a free Web-based distance learning
program that is designed for the participation of large numbers of
geographically dispersed students.

A MOOC may be patterned on a college or university course or may be less


structured. Although MOOCs don't always offer academic credits, they
provide education that may enable certification, employment or further
studies.

The word MOOC was coined in 2008 by Dave Cormier, from the University of
Prince Edward Island for a course offered by the University of Manitoba,
"Connectivism and Connective Knowledge." There were 25 tuition-paying
students from university and 2,300 non-paying students from the general
public who took the course online. There were RSS feeds for material and
participation was facilitated through a variety of venues including
Moodle (a learning management system), blog posts, Second Life and real-
time online meetings.
B.open Educational resources
Open educational resources (OER) are freely accessible, openly licensed
text, media, and other digital assets that are useful for teaching,
learning, and assessing as well as for research purposes. There is no
universal usage of open file formats in OER.
The term OER designs publicly accessible materials and resources for any
user to use, re-mix, improve and redistribute under some licenses.
The development and promotion of open educational resources is often
motivated by a desire to provide an alternate or enhanced educational
paradigm.

Definitions

"OER are teaching, learning, and research resources that reside in the
public domain or have been released under an intellectual property
license that permits their free use and re-purposing by others. Open
educational resources include full courses, course materials, modules,
textbooks, streaming videos, tests, software, and any other tools,
materials, or techniques used to support access to knowledge."
C.Mobile Apps
A mobile app is a computer program designed to run on a mobile device
such as a phone/tablet or watch.
Mobile applications often stand in contrast to desktop applications that
run on desktop computers, and with web applications which run in mobile
web browsers rather than directly on the mobile device.
The term "app" is a shortening of the term "software application". It has
become very popular, and in 2010 was listed as "Word of the Year" by the
American Dialect Society.In 2009, technology columnist David Pogue said
that newer smartphones could be nicknamed "app phones" to distinguish
them from earlier less-sophisticated smartphones.

Most such devices are sold with several apps bundled as pre-installed
software, such as a web browser, email client, calendar, mapping program,
and an app for buying music or other media or more apps. Some pre-
installed apps can be removed by an ordinary uninstall process, thus
leaving more storage space for desired ones. Where the software does not
allow this, some devices can be rooted to eliminate the undesired apps.

Apps that are not preinstalled are usually available through distribution
platforms called app stores. They began appearing in 2008 and are
typically operated by the owner of the mobile operating system, such as
the Apple App Store, Google Play, Windows Phone Store, and BlackBerry App
World. However, there are independent app stores, such as Cydia, GetJar
and F-Droid. Some apps are free, while others must be bought. Usually,
they are downloaded from the platform to a target device, but sometimes
they can be downloaded to laptops or desktop computers. For apps with a
price, generally a percentage, 20-30%, goes to the distribution provider
(such as iTunes), and the rest goes to the producer of the app.The same
app can therefore cost a different price depending on the mobile
platform.

Apps can also be installed manually, for example by running an Android


application package on Android devices.

You might also like