You are on page 1of 64

IT: Lesson A No, it needs instruction to control its operation, these instruction

are called software or programs and they are stored in the computer
Information Technology Devices
memory.
Tech Savvy

 People who knows to take advantage of these are often called tech
savvy.
 Because technology changes, you must keep up with the changes to
become digital literate.
Digital Literacy

 Involve 7 current knowledge.


 Understanding of computers, mobile devices, web and other related
technologies.
 Before the term is computer literacy and information literacy.

Digital Technology Devices

Computer  Computers are also described as a data processing device because


its main function is to produce data.
 An electronic device capable of accepting data and converting in
 The processing cycle is known as IPO or IPOS.
some other forms to produce information.
Why IPO and not IPOS?
Basic Characteristics of Computer
Because there are some processing that does not require storage
output.

Hardware

 Computers contain many electric, electronic and mechanical


components.
CPU/Central Processing Unit

 Also known as the computer processor.


 The case is called is the system unit.
Are Computer Capable of Processing on their Own?
 CPU is one of the small components that is house inside the system  Servers are available in a variety of sizes and types for both small
unit. and large business applications.
 Monitor, keyboard, mouse, printers and scanner are also hardware
components of the computer system.
Mobile Devices
 Hardware refers to the physical components of the computer
system.  A computing device small enough to hold in your hands because of
their reduced size. The screens on mobile devices are shall often 3-5
inches.
Different Categories of Computers
 Some mobile devices are internet capable.
 Any device doing the IPO cycle is considered a computer.  You can often exchange information between the internet and a
 Personal Computer, Servers and Gaming Devices mobile device or a computer or a network and a mobile device.
Popular Mobile Device

 Personal Computer  Smartphone


 Developed to be used by a one person at a time.  Digital Cameras
 Portable and Digital Players
 Desktop PC  EBook Readers
 Has the CPU and other hardware house in the system unit.  Wearable Devices

 All in One Desktop PC


 Has the processor installed at the back of the monitor. Game Devices

Game Console
 Laptops
 A mobile computing device designed for single player or multiple
 Tablets
games.

Servers  Gamers often connect game console to TV so that they can view
their gameplay on the TV screen.
 Is the computer dedicated to provide in or more services to
 Many game console models are internet capable and allows to
other computers or devices on a network
listen to music, watch movies and view photos.
Network

 Collection of computers and devices connected together.


 Services provided by servers include storing content and controlling
access to the hardware, software and other resources on a network.
 A server can support from 2 to several thousand connected
computers and devices at the same time.
Data and Information  Decision making is choosing the best among several options,
generally, best decision is always based on good information.

Devices of the Data Processing Cycle

Latest Computer Peripherals and Gadgets

Peripherals

 Pieces of hardware that are plug-in to the computer externally.


 Some of them are called non-essential peripherals because the
Data computer can operate without them.
 Peripherals of hardware plant to the computer externally.
 Collection of unprocessed items which include text, number,  Almost all of the peripheral are connected in the computer
images, audio and video. externally via USB/Universal Serial Bus.
 Anything you collect because you need to do something to it is
considered data
Information 3 Categories of Computer Peripheral

 Is processed data which conveys meaning to users. Input Devices


 These are data that has been a subject to processing.  Devices that converts data and instruction into computer readable
Example: format or so called machine language.
Output Devices

 Reverses the process of input.


 It translates machine language into form of intelligible to the user.
Storage Devices

 Store data processed by the computer.


Input Devices

Keyboard

 Desktop keyboard, laptop, on screen and virtual.


 Keyboards are common, cheap and simple to use.
 Labour intensive and prone to errors.
Why Do We Need Information? Touchscreen

 Information is part of our daily life.  Input output device.


 Can be used as input and output.
Touchpad Barcode Reader

 Common to laptops and notebooks.  Optical scanner that can read printed barcodes and decode the data
 Similar to the touchscreen but the function is similar to the mouse. and send it to the computer.
MICR/Magnetic Ink Character Recognition Device  Very common, quick/damage barcode are impossible to read.
Digital Camera
 Uses special ink character.
 Used by banks.  Input device that captures images and video
 When the documents are processed, it will translate it to characters.  Uses an image sensor chip.
 Speed, accuracy and expensive.  Versatile, quick, accurate/ high quality – large file size.
OMR/Optimal Mark Reader

 Used to capture human mark data from document forms. Pen Input Devices
 Commonly used in multiple choice type of questions.
 Interact directly to computer using pen.
 Commonly used in multiple choice type of questions
 Used for pointing, simple text entry, drawing or sketching.
 Speed, accuracy and expensive.
 Stylus for smartphone.
OCR/Optical Character Reader
 Handwritten input can be converted to type text.
 Converts images, handwritten or printed texts into machine
encoded text.
Output Devices
 Function is like a scanner.
 Use the camera and focus on the optical character.  Devices that presents to computer output to the user.
 Excellent, quick/inaccurate on low quality images.  The distinction between ID and OD is their relationship with the
Mouse/Trackball processor.
 Gets output or information from the processor.
 Easy to use, cheap, common/slow, prone to error.
IO/Input Output Devices
Scanner
 Some devices combines both input and output capability.
 Light sensing input device that converts printed text and images into
 Some includes touchscreen monitor, headset with microphone and
a form that computer can process.
bluetooth device.
 Popular type of scanner work similar to copying machine except
Types of Output Produced Different Devices
instead of creating a paper copy of the document, it stores the
document electronically.  Visual
 Excellent and quick/slow to scan multiple devices and large file size.  Audio
 Digital

Voice Input

 Enable to encode data or instruction using voice


 Convenient, simple/inaccurate and noisy.
Visual Advantages and Disadvantages

Monitor

 Provides visual output from computer for text and graphics.


LCD/Liquid Crystal Display

 Flat screen that uses liquid crystal.


Plasma

 Uses thousands of smart display called pixels.


OLED/Organic Light Emitting Diode

 Uses a laser of organic material sandwich between two conductors.


CRT/Cathode Ray Tube

 Uses cathode ray tube.


Printer

 Prints output bon paper or other materials.


Impact Printers

 Produce text or images by striking an ink ribbon or burning dots


onto coated paper.
Non-impact Printers

 Produce images without actually striking the paper.


2 Different Types of Impact Printers

 Thermal
 Dot Matrix
2 Different Types of Non-Impact Printers

 Laser Jet
 Inkjet
 Used in printing where models – plastics, metals, ceramic in printed
forms.
Print Plate

 Goes up and down.


Print Head

 Moving in any direction.


Plotters

 Used for general design work.


 Typically to generate papers or blueprints.

Audio Output Devices

Speakers

 Attached to computers.
 Reproduce sounds via electronic component called sound card.
Headsets and Ear buds

 Without mic – output


 Provide increasingly cause effective method of communicating with
others.
3D Printer Digital Audio Player

 Turn digital model into something physical.  Device that can store, organize and play digital music files.
 3D Printing is classified as additive manufacturing. MP3

 Popular format for compressing a sound sequence.


3D Printing

Stage 1: Modeling EBook Reader

Stage 2: Slicing  Used primarily for reading EBooks.

Stage 3: Printing

Filament

 Material where models printed from.


Popular EBook Reader  Content are erased when computer is off.

Primary Memory

Smartphones

 Internet capable phone that usually include several apps.


 Can communicate wirelessly.

Wearable Devices

 Small computing device designed to worn.


 Often communicate with smartphone and computer.
 Activity tracker, smart watch, smart glasses.

Game Devices
Storage Devices and Media
 Handheld game device and game console.
Computer Memory and Storage Media

 Computers can store data in memory.  Data and information are stored.
 Memory is composed of electronic components that store Device
instructions.  Save or access the media.
 Some forms are permanent, most of it are temporary.
Volatile
Which storage is the best? 2 Types of Optical Disk

2 Considerations  Compact Disk-Recordable/CD-R


 Compact Disk-Rewritable/CD-RW
 Capacity – How much the data you store.
 Portability – How easily can carry.
Cloud Storage
Hard Disk  An internet service that provides remote storage to computer users.
 The idea is access anywhere and anytime.
 Contains one or more flexible circular plotters that use magnetic
 Icloud – Apple Users, Google Drive – Google Users, One Drive –
particles.
Microsoft Users, Dropbox.
External Hard Drive
 Serves as back-up for your data.
 Separate portable free standing hard disk or can be a SSD.

IT: Lesson A2
SSD/Solid State Drive
World Wide Web and the Internet
 Typically uses plus memory to store data, information and
instruction. 2 Different Things
Web - Global Library of information available to anyone through the
internet.
USB Flash Drive
 Internet - Largest computer network connecting millions of
 Portable plus memory device. computers and devices around the world.
 Easily accessible. Main Difference of the Net and the Web
Memory Card
Net
 Removable plus memory.
- Connects with other computers.
 1.5 inches in height.
- If you are searching, the net search the network for the specific
computer where the data or information is located.
Optical Disk Web

 Consist of flat round portable metal disk. - Connects the people.


Compact Disk - When access to the web, you are looking to the content of that site
which are created by people who built the website.
 DVD/Digital Versatile Disk

ISP/Internet Service Provider


 Can connect in the internet through mobile devices  Software that enable users with an internet connection to access
 Offers users and organizations access to the internet free or for a and view webpages on a computer or a device.
fee. Surfing
 By subscribing to an ISP, you can connect with the internet through
 Moving from one site to another.
your computer and mobile devices.
Web

 Short term for World Wide Web


 Consist of worldwide collection of electronic documents. Popular Browsers:
 Each electronic documents in the web are called webpages.
 Opera
 Firefox
 Chrome
 Safari – Apple
 Explorer – Microsoft Edge

Search Engine

 We use the web to search for specific information including text,


photos, music and videos.
Webpage
 Any idea or concept that we want to seek information, we look for it
 Collection of each electronic documents on the web. in the web using the search engine.
 Contain text, graphic, audio and video.  Software that finds websites, webpages, images, videos, news, maps
Website and other informations related to specific topic.
Most Popular Search Engine:
 Collection of related web pages which are stored on a web server.
Web Server  Google
 Bing
 Computer that delivers requested webpages to your computer.  AOL
Link/Hyperlink  ASK
 Short for hyperlink
 Built-in connection to other documents. Search Bar and Address Bar
 To activate an item associated with a link, just simply tap or click the
link.  These two bars where you can type a web address or a text
reference when you are searching.

Browser
Online Social Network/Social Networking Site
 Website that encourages members in each online community to Virus/Malware
share interest, stories, photos and videos with other users.
 Threats in the digital world.
 Popular: Facebook, Twitter and Linked In
Malware/Malicious Software

 Software that acts without the users knowledge and deliberately


Photo Sharing Site
alters the computers operation.
 Specific type of online social network that allows users to create  Includes, viruses, worms, trojan horses, root kits, spyware, adware,
online photo album and store and share their digital photos. and zombies.
Video Sharing Site/Vlog  Attacks the computer differently.
 Some are harmless, pranks, temporary freeze.
 Enables users to store and share their personal videos.
 Others destroy or corrupt data, instruction and informations stored
in the infected computer or device.
Internet Communications Practices to Protect your Devices

Email  Use virus protection software or anti-virus


 Use firewall
 Can send and receive messages and files from other users via  Unsolicited email – be careful of opening message
computer networks.  Disconnect from the net
Messaging Services  Download software with caution
Real Time Conversation  Close spyware window – popup window
 Scan before using
 Both are online at the same time.  Keep current - install updates in anti-virus
VOIP/Voice Over Internet Protocol  Backup regularly.
 Enables users to speak to other users over the internet. Privacy
 Ex. face time.  The state of being free from public attention.
FTP/File Transfer Protocols Some Techniques to Protect Privacy from Identity Thief
 Allows users to transfers items to other computers through the  Document Shredding
internet.  Be cautious on clicking link
 Do not share local information
Digital Security and Privacy  Do not disclosed confidential information

 To safeguard information, it is important that users protect their


computers and mobile devices.
 Users also should be aware of health risk and environmental issues Health
associated with using computers and devices.
Digital Security
 Prolong use or improper use of computer or mobile device that can  E-waste contains hazardous components that contaminate the air,
lead to injuries and disorders of the hand, wrists, elbow, eyes, neck water, and soil.
and back.  Dismantling processes that do not utilize adequate means, facilities
Ergonomic and trained people and the planet.

 Proper workplace design


 Good posture while using computers Causes of Increase of E-Waste
 Appropriate space work breaks
 Increasing number of users.
Ear buds and Earphones
 Many people own more than one IT device.
 Experience of loss of hearing  Rapid technological advances.
Two Behavioural Health Risk Related to Technology  Most people in the world have access to mobile networks and
services.
 Technology Addiction – When someone become obsessed.
 Technology Overload – Fell distress when deprived of devices.
Measures Implemented to Address E-Waste Challenge
Environmental Concerns or Issues Green Computing
Electronic Waste/E-Waste  Concerned with the efficient and environmentally responsible
design, manufacture operation and disposal of IT-related products.
 Terms for electronic products that reach their useful life.
 Includes reducing the electricity consumed and environmental
 Increasing level of electronic waste and improper disposal impose
waste generated when using computer.
significant risk in environment and human health.
Status of Electronic Waste Around the World
List of Strategies of Countries

Steps to Go Green

Green Use

 Reducing the energy consumption of computers and other


information systems.

Green Disposal

 Reduction of waste, reuse and refurbishment of hardware and


recycling of out of use peripherals and other items.

Some Effects of E-Waste to People and Environment Green Design


 Designing energy efficient and environmentally sound components,  Is the set of programs that coordinates all the activities among
computers, servers, cooling equipment and data centers. computer hardware.
Green Manufacturing  It directs the interaction of all hardware devices.
 It provides a means for users to communicate with the computer or
 Manufacturing electronic components, computers and other
mobile device and other software.
subsystems with nominal impact on the environment.
 To use an application, computer or mobile device must be running
an operating system.
List of Habits You Need to Change if You Want to Support the Move (Green
Computing)
Application Software/App
 Do not leave your IT devices running overnight.
 Consist of programs designed to make users more productive and or
 Turnoff computers, monitor, printer and other devices when not in
assist them with personal task.
use.
 Browsers are application software that enables users with an
 Use paperless methods to communicate.
internet connection to access and view webpages.
 Buy energy efficient hardware
 Recycle
6 Categories of Application Software

Software/Program

 Consist of series related instructions related instructions organized


for a common purpose that tells the computer what task to perform
and how to perform them.
 Software tells the computer how to do the task
 Software makes your hardware useful.
2 Categories of Software

 System Software
 Application Software

System Software

 Consist of the programs that control or maintain the operations of


the computer and its devices.
 Most known software “operating system”.

Operating System
Relationship Between Hardware, System Software and Application
Software

More on Apps

 Desktop Apps – Installed in the computer.


 Web Apps – Stored on the web server.
 Mobile Apps – From app store to mobile device.
Communications and Network
Installing and Running Programs  Communication technologies are everywhere. Many require that
Installing you subscribe an internet service provider.
 Organizations such as business and schools provides communication
 Process of setting up the program to work with the computer or services to employees, students or customers.
mobile device. Computer Communications
Additional Apps
 Describe as a process of transferring data, instructions and
 Needs to install the software to access the app. information between 2 or more computers.
 The hardware called “communication device” sometimes called
“transmitter” – transfer data, instruction and information from
User Interface
computers, transmission media and vice versa.
 You interact with the program with user interface. Examples of Communication Devices
 Controls how you enter data and instructions and how information
 Modems, wireless access points and routers.
is displayed on screen often work with icons or tiles that link to
Some Communication involves:
programs, media, documents or other objects.
 Cables and wire, others are sent wirelessly through the air.
Wireless Communication

 Send signals through the air or space.


Wi-Fi/Wireless Fidelity

 Uses radio signals to provide high speed connections.


Bluetooth

 Uses short range radio signals to enable computers and devices to


communicate with each other.
Cellular Radio
 In the communication process there is always sender or the source
and the receiver or destination.  Uses cellular network to enable high speed internet connection to
Ex. Workstation – Sender and Server – Receiver. devices such as smartphones.
 Cellular network providers use categories 3g ,4g and 5g to donate to
the note cellular transmission speeds.
 The user and the sender unit use an input device and generates the F.Y.I.
data to be transmitted.
 Wi-Fi and bluetooth are both hot spot technologies
 This data is in digital format.
 Digital data cannot be handled by telecommunication media.
 The cable in the diagram needs to be transform into a different type Hotspot
which is analogue type.
 This conversion process is the function of the communication device  Is a wireless network that provides internet connection to mobile
or transmitter. In the diagram the transmitter is the modem. computer and devices.
 There are two modems in the diagram. The second modems Wi-Fi Hotspot
function is the reverse of the first modem. If the first modem  Provides wireless network connections to users in public locations.
converts digital signal to analogue, the second modem converts the Bluetooth Hotspot
analogue signal to digital so that the user at the receiving end will
understand the message.  Provide location based service to users whose bluetooth enabled
device is within the coverage range.

Wired Communications
Network
 Use cables to send communication signals.
 The wiring or cables typically are used within buildings or  Collection of computers and devices connected together.
underground between buildings.  Allow computers to share resources such as hardware, software,
 The type of used can either be a telephone wire, coactual cable or a data and information.
fiber optic cable.  Sharing resources saves time and money.
 A network typically has one or more server and several client Share Data, Information and Software
computers.
 Any authorized computer user can access data, information and
Server
software stored in other computers in the network.
 Controls access to the resources on the network.
Client
Uses of Technology
 Each client computer request resources from the server.
 Technology changed the society today as much as the individual
 Server computers typically has more power, more storage space
revolution change society in the 18th and 19th centuries
and expanded communication capabilities.
 People interact directly with technology in fields such as education,
government, finance, retail, entertainment, travel, manufacturing
Home Network and more.

 It simply needs a communication device like router, to enable the


home users to connect their devices to the network. Education
 Saves the home user money and provide many conveniences.
 Educators and teaching institutions use technology to assist with
 They are usually small existing within single structure and use
education.
wireless technologies.
Computer Laboratory

 Computers subject are part of the curriculum and most learning


institution has computer laboratory used by both teachers and
Business Networks students.
 In the new normal, most schools are using a course management
 Can be small, such as in a room or building, or widespread,
system sometimes called Learning Management System or LMS.
connecting computers and devices across a city, country, or the
LMS
globe.
 A software that contains tools for class preparation, distribution and
management.
Why do businesses need to network their computers?
 Through this LMS, students can access course materials, grades,
To facilitate communications assessments and a variety of collaboration tools.
Distance Learning Course/Classes
 Using network, employees and customers communicate efficiently
and easily by e-mail.  The delivery of education occurs at one place while the learning
Share Hardware occurs at another location.
 Provide time, distance and place advantages for students who leave
 Each computer and the network can access the hardware on the far from campus or working full-time.
network.

Distance Learning Training


 National and International Companies offer distance learning  To purchase from an online retailer, a customer usually visits the
training because it eliminates the cost of air fare, hotels and meals business store front.
for centralized training sessions. Store Front

 Contains product descriptions, images and a shopping cart


Government Shopping Cart

 Most government offices have websites to provide citizens with up-  Allows the customer to collect purchases, when ready to complete
to-date information. the sale the customer enters the personal data and the method of
 Almost all government agencies and units have websites that payment.
citizens can use to transact business with them.  Many mobile apps make shopping experience more convenient,
 Data about population, supreme court ruling and more. some enable you to manage your words, use coupons, locate stores
Cashless Transaction or pay for goods and services directly from your phone.

 No exchange of cash should take place on transaction.


Entertainment

Finance  Nowadays , computers and mobile devices are used in any area of
entertainment.
 Many people and companies use financial institution like banks or
 Audio, video, television show, readings and of course gaming.
some are installing finance software on their personal computers.
 If you're busy, you can download anything and watch, listen or read
 Used to pay their bills, track personal income and expenses, manage
it in some other time.
investment and evaluate financial plans.
 Some websites even support streaming where you can access the
Online Banking vs Finance Software
media content while it downloads.
 The difference between using banking institution websites versus  Also can create videos, take photos or record audio and upload your
the finance software that they installed in their computer is that all media content to the web to share with others such as an online
their account information is stored on the banks computer instead social network.
of their computer.
 The advantage is you can access your financial records from
Healthcare
anywhere in the world.
 Investors also use computers in online investing and buying and  Nearly every area of health care today uses computers.
selling of stocks and bonds.  Visiting a family doctor, having lab work on outpatient or an
 With online investing, the transaction fee for each trade usually is outpatient test, filling a prescription, the medical staffs around due
much less than when they are using brokers. will be using computers for various purposes.
Computers are used in:

Retail  Accessing patient records


 Monitors patient's vital signs
 Now, every product is available online.  Assist surgeons during operations
 Assist doctors and technician in medical tests. Publishing

 Many publishers of books, magazines, newspapers, music, films and


Science video make their works available online.
 Organizations and individuals publish their thoughts and ideas using
 All branches of science from biology to astronomy to meteorology
any of the three different platform: Blog, Podcast, Wiki.
uses computers to assist them with collecting, analyzing and
Blog
modeling data.
 Scientist also use the internet to communicate with colleagues An informal website consisting of time stop articles or posts in a
around the world. diary or journal format.
 Breakthroughs in surgery, medicine and treatments often result  Usually listed in reverse chronological order.
with the scientist use of computers.  Posts can contain text, photos, links and more.
 Tiny computers now imitate functions of the central nervous  As others who read articles in the blog, they can reply with their
system, retina of the eye and cochlea of the ear. own thoughts.
Cochlea Implant Vlog/Video Blog
 Allows deaf person to distinguish sounds.  A blog that contains a video is called a vlog.
Podcasts
Travel  Popular way to distribute audio or video on the web.
 Podcast is a recorded media that users can download or stream to a
 Whether traveling by car or by plain your goal is to arrive safely at
computer or portable media player.
your destination.
Ex.
 As you make the journey, you may interact with an navigation
system or GPS  Lectures
GPS  Political Messages
 Radio Shows
 Which uses satellite's signal to determine the geographic location.
 Commentaries
 GPS technology also assist people with creating maps, determining
the best route between two points, locating a lost person or stolen
 Podcasters register their podcast so that subscribers can select
object, monitoring a persons movement and a lot more.
content to automatically download when they are connected.
 In preparing for a trip, you may need to reserve a car, hotel or flight.
Wiki
Many websites offer services to the public where you can search for
and compare flights and prices  A collaborative website that allows users to create, add to modify or
 Can also order airline tickets or reserve a rental car. delete the content via their browser.
 Can also print driving directions and maps from the web.  Many Wiki's are open for modification by the general public.
 The difference between the Wiki and the Blog is that users cannot
modify original post made by a blogger.
 You cannot rely so much on data and information on a Wiki because Mobile User
everybody can post or upload anything in a Wiki or they can modify
 Any person who works with computer or mobile devices while away
the previous post.
from a main office, home or school.
 Sales representatives, real estate agent, insurance agents,
Manufacturing journalist, students and more.
Power User
Computer Aided Manufacturing
 A user that requires a capabilities of a powerful computer like
- One technology that is used today in the area of manufacturing is
engineer, scientists, architect, desktop publishers and graphic
computer aided manufacturing.
artists.
- This technology uses computers to assist with the manufacturing process Enterprise User
such as fabrication and assembly.
 Hundreds or thousands of customers who work in or do business
- Industries use .... To reduce product development cost, shorten a products with offices across region.
time to market and stay ahead of the competition.  Each employee or customer that uses computers or mobile devices
and other technology in the enterprise is an enterprise user.
- Often, robots carry out processes in a .... environment.

- .... is used by a variety of industry including oil drilling, power generation,


food production and automobile manufacturing.

Technology Users

 Depending on the hardwares, software and communications


requirements, these users generally can be classified in one of five
categories.
Home User

 Any person who spends time using technology at home.


Small Home/Office User

 Includes employees of companies with fewer than 50 employees as


well as self-employed who work from home.
 Small offices include local low practices, accounting offices, travel
agencies and a lot more.
IT: LESSON B

INFORMATION TECHNOLOGY

Connecting and Communicating Online

Internet- world-wide collection of networks that connects millions of


businesses, government agencies and individuals.

- Developed in the late 1960


THE EVOLUTION OF THE INTERNET

Networking Project – ARPA (Advance Research Project Agencies)

-they want to come up with a network that allows scientist from


different location to share information and work on military or scientific
projects.

-they want to come up with a network that will continue to function


even if some parts are disable or destroy by a disaster.

ARPANET – first net begins in September 19, 1969


WIFI HOTSPOT- provides internet connection to mobile, computer and
- Links scientific and academic researchers across the united- devices.
states.
Tethering – transforms a smartphone into a portable communication device
- 4 location UCLA, UCSB, SRI,UU serve as the host / server
which shares internet access.
(provide service connection) on a network
Internet Service Provider (ISP)- A business that provides individuals and
- 1984 more than 1000 individual computers link as host
organizations access to the internet.
- Today millions of host connects to this network
Wired Connection- physically attach by a cable or wire in a communication - Charge a fixed amounts.
device like a modem. Bandwidth – is the amount of data that travels over a network.

Wireless Connection - only wired connection is between the internet and - Data sizes typically stated in megabytes equivalent to 1M
communication media (modem) characters and gigabytes equal to 1B characters.
IP (internet protocol) Address- sequence number that uniquely locates the
Wireless Modem – uses a wireless communication technology as cellular
computer.
radio to connect to the internet
- people prefer words than number, the domain name system
-
Also known as wireless dongle small device that connect to the
was created.
computer that enable additional function when attach.
Domain Name System- text based name that corresponds to the IP address
BROADBANS- most popular internet service
of the server.
- fast data transfer speed and always on connection
Top level Domain- identify the types of organization associated by the Web App is an application stored on a web server that you access through a
domain. browser.

Mobile App- download from an app store.

DIFFERENT TYPES OF WEBSITE

Search Engine- is software that finds websites, webpages, images, videos,


news, maps, and other information related to a specific topic.

- Allows you to search anything.


- Search Text- describe the item that you are finding.
- Hits- the content of search result depending on the type of
WWW- early 1990 information you are searching.
- Links- the first few links contains more relevant information
- one of the most used services on the internet. than the rest.
- WEBPAGE - Electronic document Subject Directory- classify webpages content.
- WEBSITE - collection of related web pages and associated items
stored in web server - Categorized links arranged by subject.
- WEBSERVER-computer requested web pages into your - General to specific
computer or mobile - Users have difficulty in deciding in which category to choose.
- WEB 2.0 – refers to website that provides means for the users Informational and Research website- contains factual information
to share personal information. Media Sharing Site- enables members to manage and share media such as
Homepage- refers to the first page display on a website photos, videos and music.
Web address- unique address on a web address Bookmarking Site- enables members to organize, tag and share links to
media and other online content.

- TAG –short descriptive label that you assigned the webpages


and other digital content
Mass Media Website- contain newsworthy material, including stories and
articles relating to current events, life, money, politics, weather and sports.

Educational Website- offers exciting, challenging avenues for formal and


informal teaching and learning.
When you enter a web address in a browser, you pull information from a
web server. BUSINESS, GOVERNMENTAL AND ORGANIZATIONAL
Another way to pull content is to subscribe to a web feed (notification) Business website- contains content that increases brand awareness,
provides company background or other information.
Government Website- provides services as well as information and other - Higher bidder purchases the item.
pertinent data to citizen. - E-TAIL- electronic retail – the customer visit electronic
storefront which contain product description images, and
Organizational Website- used by groups for a variety of reason.
shopping cart
Blogs- is an informal website consisting of time stamped articles, or post in a - Shopping cart- allows the customer to collect the purchases,
diary or journal format. information and payment
Job Search Website- list thousands of opening in hundreds of fields,
- Reverse chronological order companies and locations.
- Interest, opinion of the author
- Important means of communication in the business E-commerce- short for electronic commerce, is a business transaction that
- BLOGSPERE- refers to the world wide connection of blogs. occurs over an electronic network such as the internet.
- MICRO BLOGS- allows users to publish shot messages to others
- 3 types of e- commerce website
to read. 100-2oo character.
- Business to consumer – consist of sales of goods and services to
WIKI- is a type of collaborative website that allow users to create, add,
general to the public
modify or delete the website content via a browser.
- Consumer to consumer- when consumers sells directly to
- Register before they can edit a content or add comments another
- Unregistered user can view the content but can’t edit or add a - Business to business – when business provides goods and
comments services to another business.
Health and Fitness- provides date medical fitness, nutrition or exercise Web portal- portal is a website that offers a variety of internet service from
information for public access. a single, convenient location.

Content Aggregation- (curation) sites allows users to collect and compile


content form a variety of website about a particular topic or theme.
Science – contain information about space exploration, astronomy, physics,
earth science, microgravity, robotics and other branches of science. Website Creation and Management- provide tools that support the creation
and maintenance of website.
Entertainment- offers music, videos, shows, performances, events, sports,
games and more an interactive and engaging environment. - Web publishing tools- helps creation and maintenance of the
website.
Banking and Finance- Online banking and online trading enables users to DIGITAL MEDIA ON THE WEB
access their financial records from anywhere in the world, as long as they
have an internet connection. - Includes, graphics, animations or videos.
Graphic – is a visual representation of non- text information.
Travel and Tourism- enables users to research travel options and make
travel arrangement. - THUMBNAIL- small version of a larger images. Display image in
full size
Mapping- enables users to display up-to-date maps by searching for an - Infographic- to present content and news.
address, postal code, phone numbers, or point of interest. -Visual representation of data and information.
Real and Auction- site that offers product on the web.
- communicate quickly, simplify complex concept or Internet Messaging- is a communication service in real time.
present patterns.
- Real time – you and the people you are conversing is online at
same time.
Chat Room- is a website or application that permits users to chat with
others who are online the same time.

Online Discussion- or discussion forum, is an online area in which users have


written discussions about a particular subject.

- Thread – consists of the original article and all the subsequent


reply.
FTP or File Transfer Protocol- is an internet standard that permits file
Animation- is the appearance of motion created by displaying a series of still uploading and downloading to and from other computers on the internet.
images in sequence.
- Uploading –transferring file from your computer to an server in
Audio- includes, music, speech or any other sound the internet
- Downloading – is transferring file from server to computer
- Audio file- compress to reduce their file sizes.
- FTP – upload webpages to webserver
- VCL Media Player- available for downloads.
- FTP SERVER- allows users to upload or download file using FTP
Video- images display motion.
Netiquette- short for internet etiquette, is the code of acceptable behaviors
- Upload, shares video clips users should follow while on the internet.
Virtual Reality- the use of computer to simulate a real or imagine
environment that appears as three-dimensional space.

- Simulate a real or imagine environment


- V-R WORLD- infinite space and depth.
Plug –in- is a program that extends the capability of a browser

TYPES OF INTERNET SERVICE

Email- (short for electronic mail) is the transmission of messages and files
via computer network.

- Original service through internet


- EMAIL PROGRAM- send receive forward, store print deletes
- Email message – can be a simple text or include an attachment.
- Email address- able to use this internet service
Email List- group of email addressed used for mass distribution of a message

- Receive a copy of a message in his/ her mail box.


Lesson C: Evaluating IT Options for Home and Work  Have fewer ports than traditional laptops, they do not have any
optical disk drive and often required the use of special dongles to
Mobile Computers and Desktop
attach cables that connect to external disk place or a network.
Personal Computer (PC) Tablets

 Capable of doing the IPOS activities by itself.  Usually smaller than laptop but larger than a phone.
 Intended to be use one person at a time.  Thin light mobile computer that has a touch screen.
 Mobile or stationary 2 Popular Forms of Tablet
Mobile Computers Slate Tablet
 Computers that you can carry from one place to another.  Type of tablet that does not contain a physical keyboard.
 Include: Laptops, notebooks or tablet. Convertible Table
Stationary Computers
 Has screen in its lid and a keyboard on its base with the lid and base
 Designed to be set up on specific location. connected via swivel type hinge.
 Ex. Desktop and All-in-one PC  Can use like a traditional laptop or can rotate or display and fold it
down over the keyboard so it look like a slate tablet.
Personal Computer

 Differentiated by the operating system they use.  As with laptops, tablets run with batteries or a power supply or
 Windows and MacOS leading the market share both. However, batteries in tablet typically last longer than those in
 Other OS: Linux and Chrome OS laptop.
 Some tablet include stylus, as to alternative interacting with the
touchscreen, some users prefer to purchase a separate physical
Different Mobile PC keyboard that attaches or wirelessly communicates with the tablet
 Tablets are useful especially for taking notes where the standard
Laptops
laptop is not practical.
 Also called “Notebook Computers”  Slate tablets are more durable, they are often used in the medical
 It is named Laptop because it has the sign to fit on your lap field and other areas where exposure to germs, heat and humidity
 Can be powerful as average Desktop PC thus and other contaminants is greater.
 Most laptop today is touchscreen and has built in wireless
communications capabilities.
Handheld Computers

 A computer small enough to fit in one hand. Many handled


Ultrathin Laptop
computers communicate wirelessly with other devices or
 They weigh less than traditional laptop. computers.
 Have longer battery life and generally run the windows operating  Some handled computers have a small or specialize keyboards,
system. others have a touchscreen and includes a stylus for input.
 Many handled computers are often used like parcel delivery people  Determine the specific software to use on the desktop.
 Other examples of handled of computers are the one using of  Know the hardware requirements of the operating system.
warehouse employees.
 Handled computers are specifically tailored for people that required  Look for bundled software.
to move from place to place. This type of computer often send data  Avoid purchasing the least powerful desktop available.
wirelessly to central office computers
 Evaluate all-in-ones as they may be less expensive than traditional.
 Take advantage of the different purchasing options.
Mobile Computer Buying Guide
 Be aware of additional costs.
 Determine which mobile computer form factor fits your need.
 Consider the screen size of the mobile computer (Laptop 11-18
inches, Tablets 7-12 inches). Servers
 Check the input devices like keyboard and mouse if it will fit
your hands.  Computers dedicated to providing one or more services to other
 Consider the possibility of upgrades. computers or devices on a network.
 Check the availability of built-in ports and slots.  Services include storage and controlling access to hardware,
 Consider buying a second battery. Purchase a comfortable and software and other resources on a network.
ergonomic carry case.  A server accesses data, information and programs on other server.
 Make sure the mobile devices is compatible with a projector. In other cases, personal computers, devices or terminals access
data, information and programs on a server.
 Servers can support from to 2 to several thousand connected
Desktop and All-in-Ones computers or devices at the same time.
 Designed to be a stationary location where all its component fit on a  Some servers called "dedicated servers".
desk or table.
 Components that typically occupies space outside of desktop Dedicated Servers
include peripherals devices such as keyboard, mouse and webcam
as input devices and speakers and printers as output devices in  Perform a specific service and can be placed with other dedicated
external hard drive used as storage device and another one is a servers to perform multiple services.
router or modem for communication devices.  Each type of dedicated servers uses software designed specifically
 Desktop can either be a traditional type where the peripherals are to manage its service.
attached to the system unit by a cable or an All-in-One Desktop or  Typically requires a faster processor, more memory and additional
the system unit and the monitor are house in the same case storage.
 Servers typically include a processor, memory, storage and network
connections.
 Depending on its function a server may or may not require a
Buying Guides for Desktop Computer monitor or an input device.
 Some servers are controlled from remote computers, servers can be  "Bank" is one example of enterprise that uses mainframes.
a rack server, blade server or a tower server. Computer Terminal or Terminals

 A terminal is a computer that enables users to send data to and/or


Rack Server
receive information from a server, or host computer.
 Sometimes called a rack mounted server that is housed in a slot  They usually have limited processing power.
(bay) on a metal frame (rack).  The "host computer" processes the data and then if necessary sends
Blade Server information or output back to the terminal
 Terminals may include a monitor and/ or a touchscreen, keyboard
 A server in the form of a single circuit board, or blade.
and memory
 The individual blades insert in a blade server chasis that can hold
Thin Client Terminal/Server
many blades.
 Like a rack server, the chasis fasten in place to flat surface.  Is a terminal that looks like a desktop but has limited capabilities
Tower Server and components
 Thin clients typically do not contain a hard drive, they run programs
 Is a server built into an upright cabinet (tower) that stand alone.
and access data on a network or the internet.
 The tower can be similar in size and shape to a desktop tower but
larger.
 Public locations such as libraries and schools and enterprises
sometimes use a thin clients because they cost less or easier to
Major Corporations maintain, last longer, useless power and less susceptible to malware
attacks than desktops.
 Major corporations use server farms, mainframe computer and
other types of server for business activities to process everyday
transactions. Terminal According to Processing Capability
 These servers increase the capability of the enterprise to billions of
 Dumb Terminal
customers prepare payroll for thousands of employees and millions
 Smart Terminal
of items in the inventory.
 Intelligent Terminal
Server Farm
Dumb Terminal
 A network of several servers together in a single location.
 Has no processing power and serves only to send and receive data,
 Server farms make it possible to combine tye power of multiple
hence the name dumb.
servers.
Smart Terminal
Mainframe
 Has limited data processing capabilities.
 A mainframe is a large, expensive, powerful server that can handle
hundreds or thousands of connected users simultaneously.
 Enterprises use server farms, mainframes or other large servers for Intelligent Terminal
their customers, prepare payroll for thousands of employees,
manage millions of items in inventory.
 Has substantial processing capabilities because it has built-in that authenticates the purchase. Once the transaction is approved the
processor and memory. terminal print the receipt for the customer.
Automated Teller Machine/ATM

Special Purpose Terminal  This is a self-service banking terminal that connects to a host
computer through a network.
 Special Purpose Terminals perform specific tasks and contain
 Banks place ATM's in public location including grocery stores,
features uniquely designed for use in a particular industry.
convenient stores, retail outlets, shopping malls, other venues, gas
stations and a lot more so that customers can access their bank
3 Widely Use Special Purpose Terminals accounts conveniently.

 Point of Sale/POS Terminals


 ATM Self-Service Kiosk
 Self Service Kiosk
 A self-service kiosk is a freestanding terminal that usually has a
Point of Sale Terminal
touch screen for user interaction.
 Common fixture in most retail or grocery stores.  Users interact with self-service kiosk independently, so their design
 It is used to record purchases, process credit or debit cards and is very user friendly meaning, simple and easy to use.
update inventory.
 Combination of electronic cash register, barcode reader or scanner
Supercomputer
and printer.
Barcode Reader  Fastest, most powerful, and most expensive computer.
 Capable of processing trillions of instructions in a single second.
 Input device that collects data about the products such as the item
 This computer can store more than 20 thousand times, the data and
number, manufacturer, selling price and the complete product
information of an average desktop.
name.
 Applications requiring complex sophisticated mathematical
 The receipt of the item shows on the display of device the name of
computation use supercomputers.
the item and each price print on a receipt.
 Its function includes large scale simulation and applications in
medicine, aerospace, automotive design, online banking, weather
 The process also records the sales and the inventory is updated. Thus
forecasting, nuclear energy research and petroleum exploration.
the output from POS Terminal serves as input to other computers to
Fugaku - Fujitsu
maintain sales records, update inventory, verify credit and perform
other activities associated with sales transactions that are critical to  Fastest supercomputer today.
running the business  It is located in Riken Centre in Kobe, Japan.
 Some POS Terminals are internet capable which allows update to  The specifications is so technical, we just check those that we have a
inventory at a separate location such as powerhouse. little understanding.
 Many POS terminals handle credit cards or debit cards payments. After  Has 7.3 million core or processor.
swiping the card through the reader, POS Terminal connects to a system  Has 4.9 million gigabytes.
 415,530 TFlaps/teraflaps per second processing speed. 1 teraflap is Mobile Devices
equivalent to one trillion floating points operation per second, in
 Called mobile because it can be wear anywhere since the size is
short, it can process approximately 415,000 trillion instruction or
small enough to hold by hand.
calculation per second.
 Popular types are smartphones, digital cameras, media players, e-
book readers and wearable devices.
Cloud Computing

 Is the delivery of on-demand computing services typically over the Smartphones


internet.
 Most popular device.
 Rather buying their own computing infrastructure, companies can
rent access anything from applications to storage from a cloud  Can receive GPS signals to determine user current locations
service provider.  Smartphones are capable of telling your specific location
Ex. Netflix  They can also synchronize data and information with a computer or
other mobile device. Using the same account on your phone or
 All the movies are stored in the cloud.
other mobile devices, you can access your data on any device that
 It is called cloud computing because this type of computing is virtual
you want to use.
meaning anytime just like the cloud.
 Also support voice control so you can speak instruction to the
phone. Siri - Apple, Google Voice -Android.
Features of Advantages of Cloud Computing  Capable of connecting to external devices wirelessly via bluetooth.
 Also serves as wireless access point, smartphones with this
capability can be used as mobile hotspot device for a small network.
 Also has predictive text capability after typing the first 2 letters,
suggestions are displayed on screen allowing to simply choose.

Digital Cameras

 Device that allow users to take photos and story images digitally.
 Smart Digital Camera also can communicate wirelessly to other
devices and can include apps.
 Mobile computers and devices such as smartphones and tablets
often include at least 1 integrated digital camera.
2 More Types of Camera

 Point and Shoot Camera


 SLR Cameras
Point-and-Shoot Camera
 Affordable and lightweight digital camera with lenses built-in to it  Is a small mobile computing device designed to be worn by an
and a screen that display the image to be photographed. individual.
 The quality of images of this type of camera is just acceptable.  Often communicate with other mobile device using bluetooth
SLR Camera/Single Lens Reflects Camera 3 Popular Types of Wearable Devices

 A high end digital camera that has interchangeable lenses and uses  Acitivity Trackers
a mirror to display on its screen an exact replica of the image to be  Smart Watches
photographed  Smart Glasses
 Heavier and larger that point-and-shoot cameras.
 Quite expensive with a variety of available lens sizes and other Activity Tracker
attachments.
 Monitors the fitness related activity such as distance walk etc.
Photo Quality
 This devices typically sync wirelessly with the web or mobile app on
Resolution computer or mobile device.
Smart Watch
 Resolution affects the quality of digital camera photos.
 Resolution is the number of horizontal and vertical pixels in a  In addition for keeping time, it can communicate wirelessly with a
display. smartphone to make and answer phone calls, read and send
Pixel messages, etc.
 Most of them are touchscreen devices.
 Pixel is short for picture element. The smallest element in an
Smart Glasses/Smart Eyewear
electronic image.
 Digital Camera resolution typically is stated in megapixels or millions  Head-mounted eyeglass device that enable the user to view
of pixels. information or take photos and videos that are projected to a small
 The greater the number of pixels the camera uses, the better the screen in the user field of vision.
quality of the picture but larger in file size.  The device wearer can run an app similar to activity tracker wearing
a smart glass.
 Device wearer control the device through voice commands or
 Most digital cameras however provide a means to adjust the
touching controls.
resolution.
 The actual photograph resolution is known as "optical resolution"
but some manufacturer uses a special formula to add pixels to those Other Mobile Devices
generated by the optical resolution. Hence, the use the term
 Messaging Services Devices
"enhance resolution" instead of optical
 Ex. The Pager/Beeper
 Used by doctors so they can be reach when they are needed.
 Replaced by cellphones
Wearable Devices
 EBook Readers
 Game Console  Can be also found in cars, airplane seats and other public locations.
 Embeded Computers  Cables plug-in to USB ports can recharge many smartphones and
 Special purpose computer that functions as the component in a tablets.
larger product.
 It is everywhere. Can be found in automobiles, consumer
electronics, home automasion devices, computers and office Several USB Versions
machines.
 Ex. Remote Controls of television.

IT: Lesson C2

Ports and Connectors

 Computers and mobile devices connect to peripheral devices


through ports or using wireless technologies.
Port

 Is a point that which a peripheral device connects to a computer or


mobile device. Once connected the peripheral device can send data
and receive information from the device.
 Most computers and mobile devices has ports. Some ports have  Newer versions such as USB 3.1 Gen1 and USB 3.1 Gen2 than the
micro o mini version for mobile devices because of their smaller earlier ones.
device.  Newer versions are backward compatible which means they support
Connector older USB devices as well as newer ones.
USB Hubs
 Joins a cable to a port. Connectors has two ends, on is attached in
the computer device and one is in the peripheral device.  Device that plugs in the USB port and contains multiple USB ports.
USB Port  Some USB hubs are wireless that is a receiver plugs in a USB port on
the computer and the USB hub communicates wirelessly with the
 Can connect up to 127 different peripheral devices together with a receiver.
single connector. Port Replicators
 Devices that connect to USB port includes: card reader, digital
cameras, external hard drive, scanner, printer, USB flashdrive,  An external device that replicates or copy the different ports of the
webcam and a lot more. mobile device.
 Almost all of the peripherals now can be connected to computer
devices via USB port.
 Port replicators sometimes disable ports on the mobile computer to Ex. Smartphones, digital cameras, computers, watch and terminals.
prevent conflicts among the devices on the computer and on the
Credit and debit cards also use NFC technology.
replicator.
 For successful communication, the devices either touch or are
Docking Station within an each or two of each other.
 Similar to a port replicator but it has more functionality.
Hardware Protection
 Aside from providing connections to peripheral devices, it contains a
power connection.  Users rely on computers and mobile devices to create, store and
 Also includes slots for memory cards, optical disk drive and other manage important information. Thus, security measure must be
devices. implemented to protect computers and devices from theft and
Wireless Device Connections failure.
Target of Computer Thieves
 Aside from cables, peripherals can also be connected to computer
via wireless technology such as bluetooth, WI-FI and NFC.  Companies, schools and other organizations that house many
Bluetooth computers are at risk of hardware theft.
 Mobile users are susceptible to hardware theft because of the size
 Bluetooth technology uses short-range radio signals to transmit
and weight of their computers. The size of the computer makes
data between two bluetooth enabled devices.
them easy to steal.
 Bluetooth devices have to be within about 33 feet of each other but
 Thieves may target laptops of company executive so that they can
the range can be extended by additional equipment.
use the stolen computer to access confidential company
 If you have a computer that is not bluetooth enables, you can
information illegally.
purchase bluetooth wireless port adaptor that will convert an
existing port to a bluetooth port.
Security Measure for Hardware Theft.
WI-FI/Wireless Fidelity
Physical Access Controls
 Wi-Fi uses radio signals that conform to 802.11 standards, which
were developed by the Institute of Electrical and Electronics Use of padlocks, lock doors and windows that is usually adequate to
Engineers (IEEE). protect the equipment.
 Computers and devices that have the appropriate Wi-Fi capability Alarm System
can communicate via radio waves with other Wi-Fi computers or
devices  Many businesses, schools and home owners install alarm systems
NFC/Near Field Communications for additional security.

 Uses close-range radio signals to transmit data between two NFC-


enabled devices.
 Computer lab and other facilities with large number of semi- Random Events
frequent users often use alarm systems.
 Like electrical power problems and errors in programs or apps.
Cables

- Can also be used to protect computer hardware.


2 Possible Consequences of Hardware Failure
- Cables for laptops are available or you can buy them. The idea is to lock
the equipment in a desk, cabinet or floor to protect the computer from  Loss of Data Software/Information
being stolen.  Hardware need to be prepared or replace with a new one.

Common Causes of System Failure


Security Apps
Electrical Power Variation
 Another option that users can implement to safeguard their devices
is by installing security applications.  May cause loss of data and loss of equipment.
 A user can install a security or device tracking app on their mobile  If computers and mobile devices are connected to a network, a
computers and devices. single power disturbance can damage multiple devices at once.
 Some security apps has shut down the computer and sound an
Electrical Disturbances that can Cause Damage
alarm if the computer moves beyond a specified distance.
 Device tracking apps can determine the location of a lost or stolen Under Voltage
computer. Other devices can be configured to photograph the thief
when they use the computer.  Occurs when the voltage drops to 90% or less of the normal volts.
 Some computers and mobile devices have built-in finger print  When under voltage last for 1 minute, a brownout occurs.
readers which can be used to verify the user identity or allowing  Complete power failure is called Blackout.
access.  Can cause data loss but generally it cause equipment damage.
Please Note:
Overvoltage/Power Surge
 This type of security does not prevent theft, but it renders the
computer or device useless if it is stolen.  Occurs when the incoming electrical supply or voltage of 110% or
Hardware Failure more of the normal volts.
Spike
 Another concern related to computing devices is hardware failure.
 Hardware can fail on a variety of reasons.  Momentary overvoltage called spike, occurs when increase in power
Aging Hardware last less than 1 millisecond - 1000 of a second.
 Uncontrollable disturbances such as lighting volts can cause spikes.
 Those hardware that are nearing obsolescence.
 Overvoltage can cause immediate and permanent damage to RSI/Repetitive Strain Injury
hardware.
 An injury or disorder of the muscles, nerves, tendons, ligaments and
joints.
Protecting Device from Power Disturbances  Technology related RSI include Tendonitis and Carpal Tunnel
Syndrome/CTS.
Surge Protector/Surge Suppressor
Tendonitis
 Uses electrical components to provide stable current flow and
 Inflammation of a tendon due to repeated motion or stress on that
minimize the chances of an overvoltage breaching the computer
tendon.
and other electronic equipment.
Carpal Tunnel Syndrome
 Are plug-in to the power source and the computer and other
devices are plug-in to the surge protector.  Inflammation of the nerve that connects the forearm to the palm of
 This device absorbs small overvoltage generally without damage to the hand.
the computer and equipment  Repeated or forceful bending of the wrist can cause tendonitis of
 To protect the computer and other equipment from large the wrist or CTS.
overvoltage such as cause by lightning strike, some surge protectors
stop working completely when overvoltage reaches a certain level. Symptoms of Wrist Tendonitis
 Also protect the computer from under voltage but no surge
protectors are 100% effective.  Extreme pain that extends from the forearm to the hand along with
tingling among the fingers.
 Large power surges can bypass the protector, so repeated small
Symptoms of CTS
overvoltage can weaken a surge protector permanently so some
experts recommend replacing a surge protector every 2 to 3 years.  Burning pain and the nerve is compressed along with numbness and
UPS/Uninterruptible Power Supply tingling in the thumb and the first two fingers.
Factors that Cause these Disorder
 Device that contain surge protection circuits and one or more
batteries that can provide power during a temporary or permanent  Prolong typing
loss of power.  Prolong mouse usage
 A UPS connects your computer and a power source.  Continual shifting between the mouse and the keyboard.
If untreated these disorders can lead to permanent physical damage.
Technology Health Risk Helpful Tips: Prevent Technology Related RSI
 The wide spread use of technology is led to some important user  Take frequent breaks to exercise your and arms.
health concerns.  Do not rest your wrists on the edge of a desk.
 Pro-active and minimize your chance of risks.  Place the mouse at least six inched from the edge of the desk.
 Minimize the number of time you switch between the mouse and  Applied science devoted to incorporating comfort, efficiency and
the keyboard. safety into the design of items in the workplace.
 Keep your forearms and wrists level so that your wrists do not bend.  Ergonomic studies has shown that use of correct type and
 Avoid using the heel as a pivot point while typing or using the configuration of chair, keyboard display and work surfaces helps
mouse. users work comfortably and efficiently and help protect their
 Keep your shoulders, arms, hands, wrists relaxed while you work. wealth.
 Maintain good posture.
 Stop working if you experience pain or fatigue.
Other Risk with the Use of Technology Behavioral Health Risk

Hearing Loss Technology Addiction

 With the growing use of ear buds and headphones in computers  Some technology users become obsessed with computers, mobile
and mobile devices, some users are experiencing hearing loss. devices and the internet.
CVS/Computer Vision Syndrome  You are a technology addict if most of your time is devoted in using
technology devices.
 A technology related health condition that affects eyesight.  Most technology addict has no longer physical and social life.
 You may have CVS if you have sore, tired, burning, itching or dry  A growing health problem but it can be treated through therapy and
eyes. support groups.
 Blurred or double vision after prolong staring at a display device. Technology Overload
 Experiencing headache or sore neck
 Difficulty in shifting focus between a display device and a document  A person suffering from this technology overload feel distressed
when deprived of technology even for a short length of time.
 Difficulty focusing on screen image.
 A person who feel overwhelm with the amount of technology they
 Color fringes or after images when you look away from the display
are required to manage is also suffering from technology overload
device.
 To cope with the feelings of destruction and to control the impact,
 Increase sensitivity to light.
the technology can have on work and relationships set aside

technology free time.
Back pain, Muscle Fatigue and Emotional Fatigue

 Lower back pain is sometimes caused by poor posture.


Symptoms of Technology Addict
 To alleviate back pain, muscle fatigue and emotional fatigue, take a
15 to 30 minutes break every 2 hours - stand up, work around,  Always craves computer time.
stretch and relax.
 Overjoyed when using a computer or mobile device.
 To help prevent this injuries is to be sure your workplace is designed
ergonomically.  Unable to stop using technology.
Ergonomics  Irritable when not using technology.
 Neglects family and friends.
 Having problems at work or at school.

IT: Lesson D
Programs and Applications Operating System/OS

Computer System  First program that function when the computer hardware is turned
on
 Set of interrelated components that works together to accomplish a
 Operating system is a system software
task which is data processing.
 Its function is to coordinate all the activities among computer
3 Components
hardware. When the computer is turned on, OS checks all the basic
 Hardware peripherals such as mouse, keyboard, monitor and the like are
 Software ready to work with the central processing unit.
 People Ware or User  When you are using any computing device, the operating system is
Components silently working on the background doing all the coordination
between the application and the hardware.
 Integral part of the system, the system will not achieve its primary
objective if one component is missing.
Ex. Presentation - You as user Role of the Operating System in the Computing Process

- Computer being the Hardware

- MS Power Point as the software

Computer Hardware

 Capable of doing a variety of task because of software.


 The capability and limitations of hardware is dependent on the
program and applications stored in its memory.
Software

 Series of related instruction that tells the computer how to perform


tasks.
2 General Categories of Software System and Application

Application Software/App  Operating System serves as the interface between the user,
application and other programs and the computer.
 Consist of programs designed to make users more productive or
 In the diagram, the interaction between the user and the
assist them with personal tasks
System Software application software, this because the operating system is already
loaded into the memory of the hardware.
 Are those programs that control or maintain the operations of the  Simply means you cannot use any application software unless an OS
computer and its peripheral. is already loaded into the memory of the hardware.
 There is no direct interaction between the application and the
hardware, everything must be coordinated with the OS.
 Develop for specific organization.
 The company gets the services of the software developers to create
tailor made custom software.
 Usually cost more than the retail software.
 The enrolment system of BPSU is an example.
Web Applications

 Web app is an application that you access on the web server


through a browser.
 Users typically interact with web app directly by visiting website.
 Many websites provide free access to their apps.
 You may be able to use part of the web app free and pay for access
to a more comprehensive program or pay a fee when a certain
action occurs.
Mobile Application/Mobile App

 This are applications should download from a mobile device app


stores sometimes called a market place.
 Others can be downloaded from the internet.
 Some mobile apps are preinstalled on a new mobile computer or
 OS is also coordinating the transfer of data among the different device.
input, output and memory devices.  Many mobile applications are free but others have a minimal cost.

Acquiring Software Mobile Web

Retail Software/Off the Shell Software  Optimized for display in a browser on a mobile device regardless of
screen size or orientation.
 Must produce copyrighted software that meets the needs a wide  Many app developers are off for delivery because they do not have
variety of users. create a different version for each mobile device to the app store.
 Some retail software such as an operating system is preinstalled on  Many web apps use a responsive design which means the app
new computers and mobile devices. display properly on any computer.
 With online purchases, you may be able to download purchase Device Shareware
programs immediately instead of waiting the software to arrive by
mail.  Responsive software that is distributed at no cost for a trial period.
 To use a shareware program beyond the period, you send the
payment to the software developer or you might be billed
Custom Software/Proprietary Software automatically unless you cancel at a certain period of time.
Scale down version
 Only the basic features of the software is available.
 Distributed free, if you want
Installing Software

Installing
Freeware
 Process of setting up the software to work with a computer, printer
 Copyrighted software provided at no cost by an individual or
and other hardware.
company that retains all rights to the software.
 For desktop, all application must be installed
 The software developers typically cannot incorporate freeware in
 Mobile Apps on the other hand typically install automatically after
applications they intend to sell.
you download the app from the device app store.
 The word free in freeware indicates that the software has no
 Usually do not need to install web apps before you can use them
charge.
but you may need to install plug-ins before the web app works.
Open Source Software
More on Software
 Software provided for use, modification and distribution.
 During installation of software or before the first use, the program
 This software has no restriction from the copyright holder regarding
or application may ask for registration or activate the software.
modification of the software and its redistribution.
 It's fine for the developer if you download the software and modify  Software registration typical is optional and usually involves
it according to your needs. submitting your name and other personal information to the
 Usually can be downloaded from the web server on the internet software manufacturer developer.
often at no cost.  The advantage of the software registration is product support, when
2 Main Advantages you encounter problems with the software, you can report it to the
technical group of the developer.
 Users who modified the software share their improvements with
Product Activation
others.
 Customers can personalize the software to meet their needs.  A technique that some software manufacturer use to ensure that
Public-Domain Software you do not install the software on more computers than legally
licensed.
 This software has been donated for public use and has no copyright
 License is good only for one device.
restrictions.
 Usually the software can be run a preset number of times has
 Anyone can copy and distribute public domain software to others at
limited functionality or does not function until you activate it via the
no cost.
internet or by phone.
 Some software allow multiple activation.
Additional Information:  Registering and activating software also usually entitles you for free
program upgrades.
 Thousands of shareware, freeware and public-domain programs are
 Many desktop and mobile applications has an automatic update
available on the internet for users to download.
features.
 Some of these include communications, graphics and game
programs.
 With web apps by contrast, you always access the latest version of
the software.

Software Categories

General Use

Activities Involve in the Project Preparation

Creating a project

 Starting data entry or input.


 Typing
Editing

 Making changes to its existing content.


Productivity Applications  Cutting, pasting and copying
Formatting
 Programs that is used for day-to-day activity.
 Helps to become more effective and efficient while performing your  Changing the appearance of the project.
daily task either at work or a school or even at home.  It is important because the overall look of the project significantly
 Includes word processing, presentation, spreadsheet, data base, can affect its capability to communicate information clearly.
note taking, calendar, contact management, project management,  Includes changing font and font styles.
accounting and many more.  These three steps was remain on computer memory
 Variety of manufacturers offer productivity applications in each of Saving
these areas, ranging from desktop to mobile applications.
 To keep the project for future use, it is require to save it.
 When file was saved, the computer transfer the project from the
Developing Projects memory to a local storage medium such as USB flash drive.
Distribute the project  Other tools to assist in writing process includes spelling checker,
grammar checker and format checker.
 Create project because someone needs it like requirements in class.
Format Checker
 Project can be submitted in softcopy or electronically via email or
posting for others to view.  Identifies extraneous spaces, capitalization errors and more.

Different Productivity Applications Presentation Software

Word Processing Software/Word Processor  An application that allows users to create visual aids for
presentation to communicate ideas to a group
 Allows users to create and manipulate documents containing mostly
 Can be viewed as a slideshow that are displayed on a large screen.
text and sometimes graphics.
Features of Presentation Software
 Documents can be letters, memos, reports and more.
 Major advantage is it enables users to change their written words  Predefined presentation formats, it has a preset background with
easily. complimentary colors, text type and graphical accents to the slides.
 Also has many features to make documents look professional and  Layouts for the title, 2 column slide, slide with clipart, chart, table or
visually appealing that includes 1 font adjustments, change font, a diagram.
font size, font color, add special effects like shadow and more.  Enhance option for text, charts and graphics on a slide with 3D
Templates effects, animation and more.
 Slide timing is when the presentation automatically displays the
 Also has document templates that users can choose like format of
next slide after a preset delay.
resume.
 Special effects for the transition between slides, have a choice on
Insertion of graphics
which slide will appear one after another.
 Another feature is insertion of graphics, you can easily insert it on  Audio and video clips can be inserted to the presentation.
the document.  Can view or print a finish presentation in a variety of formats such
 Inserted images can also be modified, can add colors and adjust the as outline view, notes page view or reading view.
placement  Also incorporates features such as checking spelling, formatting,
researching and creating with web pages from existing slide show.
Spreadsheet Software
Paper size adjustment
 An application that allows users to organize data in columns and
 You can decide the size of the paper on which to print and specify
rows and perform calculations on the data.
the margin setting.
 This column and rows collectively are called a worksheet.
Wordwrap
 Its file in a spreadsheet is called a workbook.
 Another feature is wordwrap, this feature allow users to type words Characteristics of Spread Sheet Software
in a paragraph continually without pressing the enter key at the end
 Includes creating, editing and formatting worksheets.
of each line.
 Each worksheet has 1,048,576 rows and 16,384 columns for Excel  An application that enables users to enter type text, handwritten
2016. comments, drawings, sketches, photos and links anywhere on a
 Rows are numbered and columns use letters. page and then save the page as part of a notebook.
 Basic unit of the worksheet that holds data is called a cell.  Users also can include audio recordings as part of their notes.
 Only a fraction of the many rows and columns are visible on screen.  Some enable users to sync their notes to the cloud so that they can
 Charting which depicts the data in graphical forms is another access the notes on any computer or mobile device.
feature.  Also include calendar feature.
 Users find note taking software convenient during meetings, class
lectures and conferences in libraries and other settings that
Database Software
previously required pencil or paper for recording thoughts and
 Allows users to create, access and manage a data base. discussions.
Database

 Collection of data organized in a manner that allows access retrieval Calendar and Contact Management Software
and use of that data.
 An application that helps to organize calendar, keep track of
 Can be manually or digitally developed.
contacts and share this information with other users.
 List of friend’s name, address and contact number written in a
 Provides a way for individuals and workgroups to organize, find,
notebook is an example of simple manual database.
view and share appointment and contact information easily.
 Phonebook is an example of electronically developed database.
 Sometimes available separately, calendar and contact management
 With the database stored electronically, the computer stores the software can often exist as a unit and a single program.
data on a storage medium such as a hard drive or optical disk or on
 Many email applications include calendar and contact management
cloud storage.
features.
 It enables to synchronize information, it means that all of computers
Database Features and mobile devices along with the organizations server or cloud
storage have the latest version of any updated information.
 Include modifying database.
 Use to sort and retrieve data.
 Create forms and reports using the data in the database. Project Management Software
 Also run queries to retrieve data.  An application that allows users to plan, schedule, track and analyse
Query the events, resources and costs of a project
 A request for a specific data from the database.  Helps users manage project variables, allowing them to complete
the project on time and within budget.

Note Taking Software

Accounting Software
 An application that helps businesses of all sizes to record and report  Provides thundered contracts and documents associated with
all of their financial transactions. buying, selling and renting property, estate planning, marriage and
 Business users perform accounting activities related to the general divorce and repairing a wheel or living trust.
ledger, accounts receivable, accounts payable, purchasing, invoicing  By answering a series of questions or completing a form, the legal
and payroll functions. software tailors the legal document to specific needs.
 Also enables business users to write and print checks, track checking
account activity and update and reconcile balances on demand.
Tax Preparation Software
 Most accounting software supports online credit checks, bill
payment, direct deposit and payroll services.  An application that can guide an individual, families or small
 The cost of accounting software for small businesses ranges from business through the process of filing taxes.
less than 100 to several thousand dollars.  In the Philippine settings, web app is available in the ETAX.ph
 Accounting software for large businesses can cost several hundred website.
thousand dollars. ETAX

 The software helps to shorten the process of tax preparation and


Personal Finance Software filing.
 Accessible wherever you are because it is a web app.
 Simplified accounting application that helps home users and small
 Some tax preparation programs also allow you to file your tax forms
or home office users to balance their check books, pay deals, track
electronically, a process called E-filing.
personal income and expenses, verify account balances, transfer
funds, track investments and evaluate financial plans.
 It helps determine where and for what purpose you are spending Document Management Software
money so that you can manage your finances.
 Most personal finance software includes financial planning features  An application that provides means for sharing, distributing and
such as analysing home and personal loans, preparing income taxes searching through documents by converting them into a format that
and managing retirement savings. can be viewed by any user.
 Other features include managing home inventory and setting up  The converted document which mirrors the original documents
budgets. appearance can be viewed and printed without the software that
created the original document.
 Most of this application also offer a variety of online services such as
online banking and online investing.  Some document management software allows users to edit
documents and add comments to the converted document.
 Many businesses use document management software to share and
Legal Software distribute company brochures, literature and other documents
electronically.
 An application that assists in the preparation of legal documents
 Home users distribute flyers, announcements and graphics
and provides legal information to individuals, families and small
electronically.
businesses.
 Popular electronic file image format that document management
software uses to save converted documents is PDF (Portable  Some CAD software even can generate materials list for building
Document Format). designs.
 Home and small business users work with less sophisticated design
and modeling software.
PDF  Usually contains thousands of pre-drawn plans that users can
customize to meet their needs.
 Developed by Adobe Systems
 To view and print PDF file you need an Adobe Reader Software Ex. Home Design Landscaping Software
which can be downloaded freely from Adobe's Website.
 Many productivity software like word processor and spreadsheet DTP/Desktop Publishing Software
programs provide a method of saving a project as a PDF.  This software is an application that enables to designers to create a
 This enables other users to view your document without requiring sophisticated publication that contains text, graphics and many
the application that created the project. colors.
Ex. Excel file - PDF file - PDF Reader  Professional DTP software is ideal for the production of high-quality
color projects such and textbook, corporate news letters, marketing
IT: Lesson D2 literature, product catalog, annual reports and a lot more.
Programs and Applications  Designers and graphics artist can print finish publication on color
printer, take them to professional printer or post them on the web in
Graphics and Multimedia Software a format that can be viewed on those without DTP software.
 Power users such as engineers, architects, desktop publisher and  Home and small business users create newsletters, brochures, flyers,
graphics often used sophisticated software that allows them to work advertisements, postcards, greeting cards, business cards, web
with graphics and media. pages using personal desktop publishing software.
 Many of these applications incorporates user friendly interfaces or  Although many word processing programs has DTP features, home
scale down versions, making it possible for the home and small and small business users often refer to create projects using DTP
businesses or business users to create projects using these types of software because of its enhance features.
programs.  Also include paint, image editing software and photo editing and
photo management software so that users can add images to their
Different Graphics and Media Applications publications.
CAD Software/Computer Aided Design
 Cad Software is a type of application that assists professionals and Paint/Image Editing Software
designers in creating projects required for their field.  Graphic Artist, Multimedia professional, technical illustrators and
desktop publishers use paint software and image editing software to
Ex. Engineers - Design plan for vehicles for security systems. create and modify graphics such as those use in DTP projects and
Architecture - Design for floor plans web pages.
Paint Software/Illustration Software
3 Dimensional CAD Programs  An application that allows users to draw pictures, shapes and other
 Allow designers to rotate designs of 3D objects to view them from graphics with various on screen tools such as a pen, brush,
any angle. eyedropper and paint bucket.
Image Editing Software functionality.
 An application that provides capabilities old paint software and also  Many online photo storage services enable you to create scrapbooks
includes the capability to enhance and modify existing photos and where you can select photos, add captions, select backgrounds and
images. more.
 Modifications can include adjusting or enhancing image colors,
adding special effects such as shadows and glows, creating Audio Video Editing Software
animations and image stitching. Video Editing Software
 An application that allows professionals to modify segment of a
Image Stitching video called a clip.
 Combining multiple images into a larger image.  Video editing software typically includes audio editing capabilities.

 Paint and image editing software for the home or small business Ex. Users reduce the length of the video clip or add special effects.
user provides an easy to use interface.
Audio Editing Software
 Is an application that enables users to modify audio clips, produce
 It includes various simplified tools that allow you to draw pictures, studio quality soundtracks and add audio to video clips.
shapes and other images as well as modifying existing graphics and  Most TV shows or movies are created or enhanced using video and
photos. audio editing software.
 This product also include many templates to assist you in adding  Many home users work with easy to use video and editing software
images to projects such as greeting cards, banners, calendars, signs, for scale movie making projects.
labels, business cards and letterhead.  With these programs hone users can edit home movies, add music
or sounds to the video and share their movies on the web.
Photo Editing and Photo Management Software  Some operating systems include video editing and audio editing
Photo Editing Software applications.
 Type of Image Editing Software that allows users to edit and
customize digital photos. Multimedia and Websites Authoring
 The software allows users to retouch photos, crop images, remove Multimedia Software
red-eye, erase blemishes, restore age photos, add special effects,  Allows users to combine text, graphics, audio, video and animation
enhance image quality, change image shapes and a lot more. in an interactive application.
 Many applications also provide a means for creating digital photo  With this software, users control the placement of text and images
albums. and the duration of sounds, video and animation.
 When you buy digital cameras, it usually includes photo editing  Once created, multimedia presentations often take the form of
software. interactive computer base presentations or web base presentations
 Many digital cameras also include photo editing software so you can designed to facilitate learning, demonstrate product functionality
edit the image directly on the camera. and elicit direct user participation.
Photo Management Software  These applications may he distributed on an optical disk over a local
 On the other hand is use to view, organize, sort catalog, print and network or via the internet as web apps.
share digital photos.
 Some photo editing software includes photo management
Website Authoring Software
 This software helps users all skill levels to create related web pages Medical Applications
that includes graphics, video, audio, animations, special effects with  Research symptoms, establish fitness or health program, track
interactive content and blog posts. exercise activity, refill prescriptions, count calories or monitor sleep
 In addition, it allows users to organize, manage and maintain patterns.
websites.
 Often has capabilities of multimedia authoring software. Entertainment Applications
 Use this application to listen to music or radio, view photos, watch
Media Player videos or shows, read a book or other publication, organize and
 A program that allows you to view images and animations, listen to track fantasy sports teams and play games individually or with
audio and watch video files on your computer or mobile devices. others.
 Media players may also enable to organize media files by genre,
artist or other category, create playlist, convert files to different Convenience Applications
formats, connect to and purchase media from an online media store  Used normally in driving directions or current location, remotely
start vehicle or unlock the doors, set an alarm or timer, check the
time, calculate a thief, phone as a flashlight or use a personal
or market place, stream radios broadcasting over the internet, assistant that acts on your voice commands.
download podcasts, burn CDs' and transfer media to portable media
players.  Education Applications
- Use this to access how to guide, learn or find a particular skill, follow a
Disc Burning Software tutorial, run a simulation, assists children with reading other elementary
 Writes text, graphics, audio and video files on a recordable or skills or a support academics.
rewritable disc.
 This software enables home users easily backup contents of their Communication
hard drive on an optical disc either a CD or DVD. - One of the main reason people use computers is to communicate and
 Make duplicates of music or movies without copyright restrictions. share information with others.
 Usually includes photo editing, audio editing and video editing
capabilities.

Personal Interest Applications


 Some applications focuses on single service while other provide
several services and a single application.
 Most of the programs in this category are relatively inexpensive,
many are free.

Lifestyle Applications
 Access the latest news or sports course, check the weather forecast,
compose music, research generology, find recipes or near locate
restaurants, gas stations or points of interest.
virus program and keep it updated by purchasing revisions or
upgrades to the software.

Computer Virus
 A damaging program that affects a computer or device negatively by
altering the way it works.

Take note of the following:


 Virus is a program
 Virus do not generate by chance - intentionally developed to harm
hardware, data or software.
 Written by skilled programmer called Virus Author.
 The virus can replicate itself - The number of virus being cleaned are
numerous.
 You will not know that your file is infected until you run an antivirus
or you can no longer open it - Virus has the capability to conceal
Security Tools itself.
 To protect your computers and mobile devices you can use on or  Some virus are event driven - Ex. Friday the 13th virus - Activated
more security tools. when the computer date is 13 and the day is Friday.
 Security tools includes personal firewalls, antivirus programs,  Payload is the term used to indicate the delivery or execution of the
malware removers and internet filters. destruction brought about by the virus.
 Although some of this tools are included in the operating system, Signs of Virus Infection
you can also purchase stand alone programs that offer  When you hear unusual sound played randomly in your device or an
improvements or added functionality. images or messages that suddenly appear on the computer screen
Firewall then there is a probability that there is virus.
 Detects and protect a personal computer and its data from  If the available memory is below the expected - Ex. 16gb flashdrive
unauthorized intrusion. (1 file) = 5gb available.
 Constantly monitor all transmission to and from a computer or  When the previously saved file is missing or a file you did not make
mobile device and may inform a user for attempted intrusions. suddenly appears on your device or when the size of the file change
 Attackers can include hackers, these attacks may destroy your data, without doing anything.
steal information, damage your computer or carry out other  When a program file stop working or file is corrupted.
malicious actions.  When system properties change and the computer becomes slower
than usual.
Anti-virus Programs
 Protects the computer against viruses by identifying and removing
any computer virus found in memory, on storage media or on How Anti-virus Works?
incoming files.  Scan for programs that attempt to modify a computer start-up files,
 To protect computer from virus attacks, users should install an anti- the operating system and other read only programs.
 Many anti-virus programs automatically scan files, downloaded from Spyware Remover
the web, email attachments, open files and all files of removable  Type of program that detects and deleted spyware and similar
media inserted in the computer or mobile device. programs.
 It attempts to remove the malware. Adware Remover
 if the anti-virus program cannot remove the infection, it often  Program that detects and deletes adware.
quarantine the infected file. Malware Remover
 Detect and deletes spyware, adware and other malware.
Quarantine
 A separate area of a hard drive that holds the infected file till the Internet Filters
infection can be removed.  Filters are programs that remove or block certain items from being
 This step ensures other files will not become infected. played.
 Quarantine files remain on your computer or mobile device until  For widely used internet filters are anti-spam programs, web filters,
you delete them or restore them. phishing filters and pop under blockers.

 Most anti-virus programs also include protection against other Anti-Spam Programs
malware's such as worms, trojan horses and sypware. Spam
 When you purchase a new computer, it may include a trial version of  Is an unsolicited email message sent to many recipients at once.
anti-virus software.  Consider as internet junk mail.
 Many e-mail servers has anti-virus programs installed to check  The content of spam ranges from selling a product or service to
incoming and outgoing messages for viruses and malware. promoting business opportunity to advertising offensive materials
and many more.
Spyware, Adware and Other Malware Removers  Spam may also contain links or attachments that contain malware.
Spyware
 Type of program that secretly collects information about the user  An anti-spam program is a filtering program that attempts to remove
without his/her knowledge. the spam before it reaches your inbox or forum.
 The collected information is sent to some outside source while the  Many anti-spam programs are available at no cost on the web.
user is still online.
 Some vendors or employers use spyware to collect information ISP/ Internet Service Provider
about program usage or employees.  Often filters spam as a service for their subscribers.
 Internet advertising firms often collect information about user web
browsing habits. Web Filters
 Spyware can enter your computer when you install a new program.  A program that restricts access to certain material on the web.
 Some restricts access to specific website, others filter websites that
Adware use certain words or phrases.
 Displays an online advertisement in a banner or pop-up or pop  Many business use web filtering software to limit employees web
under window on webpages, e-mail messages or other internet access especially during office hours.
services.  Some schools, libraries and parents use this software to restrict
 Internet advertising firms hide spyware in adware. access to websites that are not educational.
Phishing Filters Functions of these Tools
Phishing File Manager
 Is a scam in which a perpetrator sends an official looking email  Tool that perform functions related to file management.
message that attempts to obtain your personal and/or financial  Some functions are displaying a list of file on a storage medium,
information. organizing files in order, copying, renaming, deleting, moving,
 Some phishing messages ask you to reply your information. sorting files.
 Others direct you to a phony website or a pop-up or pop under Folder
the window that looks like a legitimate website which then  Specific named location on a storage medium that contains related
collects your information. files.
 Operating systems typically include a file manager.
 Phishing Filters is a program that warns or blocks you from
potentially fraudulent or suspicious websites. Search Tool
 Some browsers include phishing filters.  A program that attempt to locate a file, an application or any other
items stored on your device.
Pop Up/Pop Under Blockers  The search is based on the criteria you specified.
Pop Up Ad  Search tools can look through documents, photos, music, calendars,
 Is an internet advertisement that suddenly appear in a new window contacts and other items on your computer or on the internet.
on top of the web page.  Typically use an index to assist with locating items quickly.
 An internet advertisement that is hidden behind the browser

Index
window so that it will be viewed when users close their browser  Store a variety of information about the file including its name, date
windows. created, date modified, author name and so on.
 When you enter search criteria, instead of looking to every file and
Pop Up Blockers/Pop Under Blocker folder in the storage medium, the search tool looks through the
 Is a filtering program that stops pop up or a pop under ads from index first to find a much.
displaying on web pages.  Each entry in the index contain a link to the actual file on the storage
 Many browser includes this blockers. media for easy retrieval.
 Can also be downloaded from the web at no cost.
Image Viewer
Files, Disk and System Management Tools  Tool that allows users to display, copy and print the contents of
 To perform maintenance type task related to managing a computer, graphics file such as a photo.
its device or its programs, you can use one or more file, disc or  Users can see images without having to open them in a paint or
system management tools. image editing program.
 Functions provided by these tools include managing files, searching,  Many image viewers includes some photo editing capabilities.
viewing images, uninstalling software, compressing files, backing up
files and more. Uninstaller
 Is a tool that removes a program as well as any associated entries in  Security is one of the purpose of screen saver, if the user is working
system files. at something that is private or confidential and need to leave for a
 When you install a program, the operating system records the short while the screen saver will hide whatever is on the display
information it uses to run the software in the system file. screen.
 The uninstaller deletes files and folders from the hard drive as well
as remove a program entries from the system files. File Compression
 Shrinks the size of the files.
Disk Cleanup Tool  A compressed file takes up less storage space than the original file.
 Searches for and removes unnecessary files.  Compressing file freeze up a room on storage media.
 Unnecessary files may include downloaded program file, temporary  You may need to compress a file so that it will fit on a small storage
internet file, deleted files, unused programs files. medium such as a USB flash drive.
 Attaching a compressed file to an email message for example
Disk Defragmenter reduces the time needed for file transmission.
 Tool that reorganizes the files and unused space on a computer hard  Uploading and downloading compressed files to and from the
disk so that the operating system accesses data more quickly and internet that reduces the file transmission time.
programs run faster.  Compressed files are sometime called zip files.
 When an operating system stores data on a disc, it places the data  You must uncompress it, to unzip a file, you restore it to its original
on the first available sector. form.
Sector  Some operating system include compression and decompression
 Storage location on a disc. capabilities.
 The operating system attempts to place data in sector that are
contiguous but not always possible.
PC Maintenance Tool
 Program that identify and fixes operating system problems, detect
 When the contents of the file are scattered across 2 or more non- and repairs drive problems and includes the capability of improving
contiguous sector the file is fragmented. a computer's performance.
Fragmentation  Additionally, some personal computer maintenance utilities
 Slows down file access and thus the performance of the entire continuously monitor a computer while you use it to identify and
computer. repair problems before they occur.
 Defragmenting the disc or reorganizing it so that the files in the
contiguous sectors solves this problem. Back-up and Restore
 Operating System usually includes a disc defragmenter.  Allows users to copy or back-up selected files or the contents of an
entire storage medium to another storage location.
Screen Saver  One drive to another.
 A tool that displays moving image or blacks screens if no keyboard  During the back-up process, the back-up tool monitors progress and
or mouse activity occurs for a specified time. alerts you if it needs additional media such as another disc.
 When you press a key on the keyboard, tap the screen or move the  Many back-up programs compress files during the back-up process.
mouse, the screen saver disappears and the screen returns to the  By compressing the files, the back-up programs requires less storage
previous state. space for the back-up files than the original files.
 Because they are compressed, you usually cannot use back-up files
in their back-up form, in the event you need to use a back-up file a
restore tool that reverses the process and returns back-up files to
their original form.
 Back-up tools works with a restore tool, you should back-up files and
disc regularly in the events your originals are lost, damaged or
destroyed.
 System failure

IT: Lesson E Computer Crime vs. Cyber Crime

Digital Security, Ethics and Privacy Computer Crime

 An illegal act involving the use of a computer or related devices


Main Reason and Advantage of Digital Storage
Cyber Crime
 The availability of data, informations and programs when needed.
 Internet-based illegal acts such as distributing malicious software or
 Can access information when connected to the net. committing identity theft.

7 Digital Security Risk Crime Ware

 Any event or action that could cause a loss of or damage to  Software used by criminals.
computing device, software, data, information, or processing
capability. Categories of Cyber Crime Perpetrators

Breaches to Digital Security Typically fall in one of these basic categories

 Accidental Hacker

 Intentional - A deliberate act that is against the law.  Someone who accesses the computer or a network

 Some intruders do not disrupt a computer or device functionality, they  Hackers enjoy analyzing the workings of the operating system and
merely access data, information or programs on the computer or mobile other programs.
device then sign out.
 Their main objectives is to find some loopholes in the systems and
 Some intruders leave evidence of their presence. finds cause of such problems.

More Common Digital Security Risk  Most of them are programmers, hacking for them means additional
learnings and further knowledge.
 Internet and network attacks
 Can be categorized as black hat, white hat and grey hat hacke.rs
 Unauthorized access and use
Black Hat Hackers
 Hardware theft
 Those that creates malware which they use to gain access to a
 Software theft
secured computer system.
 Information Theft
 Typically, they are motivated by their own financial or personal  Grey hat hacking is still considered illegal since the hackers attacks
gains. the system without having the owners permission to do so.

 Often associated with cyber spying. Cracker

White Hat Hackers  Also, someone who accesses the computer or network illegally.

 Often referred to as ethical hackers.  Having gain an authorize access, crackers destroy vital data, deny
access by legitimate users or cause some other problems for their
 Make the choice to use their knowledge and abilities for good targets.
instead of evil.
 Crackers can be easily identified because their actions are malicious.
 In some cases, they are paid employees or contractors that are
hired to work for companies as security experts.  Both hackers and crackers have advance computer and network
skills.
 Usually referred as penetration tester whose job is to find
vulnerabilities in the computer infrastructure by hacking into it. Script Kiddie

 Typically use the same hacking techniques that black hat hacker use.  Has the same intent as the cracker but does not have the technical
skills and knowledge that is why they use the term kiddie.
 The main difference is that white hat hacks into the computer
system with permission with the systems owner making the process
 This people search for do it yourself or pre-written hacking and
legal.
cracking programs, modify these programs to break into computers
Grey Hat Hackers and networks.

 Falls between the white hats and the black hats  This programs include step by step instructions on how to use it.

 Most of the time, they look for vulnerabilities on computer system Corporate Spy
without the owner knowing or having their permission.
 Have excellent computer and networking skills.
 If the grey hat finds an issue, they will usually report them to the
system owner and will sometimes ask for a small fee to repair the  They are hired by competitors to break into the system of their own
issue. organization, meaning the employer of the spy instill its proprietary
 If the systems owner doesn't respond to them or comply with the data and information.
request, grey hats will sometimes threaten to post the newly
discovered vulnerability online for the whole world to see.  These spy's also help identify security risk in their own organization.

 Grey hats are not inherently malicious in their intentions. Corporate Espionage

 They're simply looking to get something back for their discoveries.  Practice to gain a competitive advantage.
Unethical Employees Different Threats

 Unethical Employees may break into their employers computers for Internet and Network Attacks
a variety of reasons.
 Information transferred over the networks are more prone to a
 Some simply wants to exploit security weakness, others seek higher degree of security risk than those information that are kept
financial gains from selling confidential information, disgruntled on an organizations premises
employees may want to take revenge.
 In organization, Network Administrator usually tech measures to
Cyber Extortionist protect a network from security risk.

 Someone who demands payment to stop an attack on organizations Internet and Network Attacks Includes:
technology infrastructure.
 Malware
 Threaten to expose confidential information, exploit security flaw or
 Botnet
launch an attach that will compromise your organizations network if
they are not paid a sum of money.  DoS Attack (Denial of Service Attack)

Cyber Terrorist  Backdoors

 Someone who uses the internet or network to destroy or damage  Spoofing


computers for political reasons. Malware/Malicious Software

 May targets the air traffic control system, electricity generating  Consist of programs that act without the users knowledge and
companies or telecommunications infrastructure. deliberately alters the operation of computers and mobile devices.

Cyber Warfare  Virus, Worm, Trojan Horse, Rootkit, Adware, Spyware

 Describe an attack whose goal ranges from disabling a governments Worm


computer network to crippling.
 Programs that copies itself repeatedly.
 Requires a team of highly skilled individuals, millions of dollars and
several years of planning. Trojan Horse

 Program that hides within or looks like legitimate program.

 Does not replicate itself to other computers or devices.


Rootkits Infect

 Program that hides in a computer or mobile device and allows  When users take some action like opening emails or downloading
someone from a remote location to take full control of the files or software, their device becomes infected with the malware.
computer or device.
 Cyber criminals ultimately breaks the security of several users
Botnets computers.

 Also called Zombie Army. Control

 Botnets are networks of hijacked computer devices used to carry  The attacker organizes all the infected machines into a network of
out various scams and cyber-attacks. bots that they can remotely manage and control.

 Comes from the word "robot" and "network".  Often the cyber criminal will seek to infect and control thousands or
millions of computers.
Zombies
How Do Hackers Control a Botnet?
 Computers in botnets.
 A botnet has a command and control center, this is the server
 Owners of these zombies are unaware that their computers or source of all botnet instruction and leadership. This is the bot
devices is being controlled remotely ban an outsider. herders main server and each of the zombie computers gets
Botnets Process commands from it.

Expose  To protect the master identity, botnets are operated via remote
programming.
 Hackers starts by looking for and finding loop holes in a website
application or human behavior. What are Botnets used for?

 The goals is to set the user app for being unknowingly exposed to a  Financial Theft
malware infection.  Information Theft

 Hackers do this through social engineering, visiting infected sites or  Sabotage of services
through emails and other online messages.
 Selling access to other criminals.
Social Engineers
DoS Attack/Denial of Service Attack
 Targets the user via sweet and persuasive talks until they get their
 Is an assault whose purpose is to disrupt computer access to an
trust.
Internet service.
 Perpetrators carry out a DoS attack in variety of ways. 2 Common Types of Spoofing Schemes

DDos Attack/Distributed DoS Attack  IP and Email spoofing

 A zombie army is used to attack computer or computer networks. IP Spoofing

 Being able to stop operations temporarily numerous websites.  Occurs when an intruder computer fools network to believe its IP
address is associated with a trusted source.
 The damage caused by DDoS attack usually is extensive, retailers
lose sales from customer, new websites and search engines lose  Perpetrators trick their victims into interacting with the phony
website.
revenue from advertisers and time sensitive information may be
delayed. Email Spoofing

 Repeated attacks could destroy reputations of organization causing  Occurs when the senders address or other components of an email
of greater loss. header are altered so it appears that the email message is
originated from a different sender.
Backdoor
 Commonly used in virus hoaxes, scam and phishing scams spoof.
 Program or set of instruction in a program that allows users to
bypass security controls when accessing a program, computer or How To Protect Against Internet and Network Attack
network.
 Use of anti-virus software
 Once perpetrators gain access to ones computer, they often install a
backdoor or modify an existing program to include a back door  Be suspicious of unsolicited email attachments.
which allows to continue to access computer remotely without the  Scan removable media for malware before using it.
users knowledge.
 Implement firewall solutions.
 A rootkit can be a backdoor, some worms lives backdoors which
have been used to spread other worms or to distribute spam from  Backup regularly.
the unsuspecting victim computers.
Firewall
 Programmers often build back backdoors into programs during
 Is a hardware and/or software that protects a network's resources
system development.
from intrusion by users on another network, such as the internet.
Spoofing
 A network security device that monitors incoming and outgoing
 A technique intruders use to make their network or internet network traffic, it permits and blocks data packets based on a set of
transmission appear legitimate to a victim computer or network. security rules.
 Its purpose is to establish a barrier between your internal network Safeguard Against Unauthorized Access and Use
and incoming traffic from external sources such as the internet in
AUP/Acceptable Use Policy
order to block such malicious traffic like viruses and hackers.
 Outlines the activities for which the computer and network may or
 Can either be software or hardware, it's best to have both
may not be used.
Software Firewall

 Is a program installed on each computer and regulates traffic


 Should specify the acceptable use of technology by employees for
through port numbers and applications.
personal reasons.
Physical Firewall
 AUP also need to specify the personal activities if any, that are
 A piece of equipment installed between your network and gateway. allowed for company time.

Gateway Other Techniques Use Against Unauthorized Access and Use

 Is the communication lines between networks. Access Control

Unauthorized Access and Use  To minimize the chance that a perpetrator initially may access or an
employee accidentally may access confidential information on a
Unauthorized Access computer.
 Is the use of a computer or network without permission.  A security measure that define who can access a computer, when
Unauthorized Use they can access it and what actions they can take while accessing it.

 Is the use of computer or its data for unapproved or possibly illegal  The computer device or network should maintain an audit trail.
activities. Audit Trail
 Home and business users can be a target of unauthorized access  Records in a file both successful and unsuccessful access attempts.
and use.
 Unsuccessful access attempts can have 2 meanings: A user
 Includes a variety of a activities, an employee using an organizations mistyping his/her password or a perpetrator trying thousands of
computer send personal email messages. passwords.
User Names and Passwords Examples: Budgets, cards, smartcards and keys.

User Name/User ID/Log-on Name/Sign-in Name Biometric Devices

 A unique combination of characters such as letters or numbers that  Authenticates a persons identity by translating a personal
identifies one specific user. characteristics such as fingerprint into a digital code that is
compared with a digital code stored on a computer or a mobile
Password device verifying a physical and behavioral characteristics.
 Private combination of characters associated with the user name Different Biometric Devices Commonly Used in the Organization
that allows access to certain computer resources.
Fingerprint Reader/Fingerprint Scanner
Passphrase
 Captures curves and indentions of a fingerprint.
 Instead of passwords, some organization use passphrases to
authenticate users.  Organization used fingerprint readers to secure doors, computers
and software.
 Is a private combination of words often containing mixed
capitalization and punctuation associated with a user name that  With the cost of fingerprint reader becomes cheaper, some home
allows access to certain computer resources. and business install finger print readers to authenticate users before
they can access a personal computer.
 Often can be to 100 characters in length ate more secured than
passwords, yet can be easy to remember because they contain  The reader can also be setup to perform different functions for
words. different fingers.

PIN/Personal Identification Number  Using fingerprint, users can unlock a computer or device, sign in to
programs and websites and in some devices, test their blood
 Sometimes called "passcode". pressures and heart rate.
 A numeric password either assigned by the company or selected by Face Recognition System
a user.
 Captures a live face image and compares it with the stored image to
 PIN's provide an additional type of security. determine if the person is a legitimate user.
 Select PIN's careful and protect them as you do the other password.  Some building use face recognition system to secures access to
Possessed Objects rooms.

 Any item that you must possess or care with you in order to gain  Law enforcements, surveillance systems, and airports use face
access to computer or computer facility. recognition to protect the public.
 Some mobile devices use face recognition system to unlock the  These patterns are as unique as the fingerprint.
device.
 Quite expensive and are used by government security organizations,
Hand Geometry System the military and financial institutions that deal with highly sensitive
data.
 Measures the shape and size of a persons hand.
Retinal Scanners
 Because Hand Geometry System can be expensive they are often
used by larger companies to track workers time and attendance or  Works similarly instead scam patterns of blood vessels in the back of
as security device. the retina.

Voice Verification System Two-step Verification

 Compares a persons live speech with their stored voice pattern.  Also known as "Two Factor Verification".

 Larger organizations used this as time and attendance devices.  A computer or mobile device uses to separate methods one after
the other to verify the identity of the user.
 Many companies is also use this technology for access to sensitive
files and networks.  ATM's usually requires a two-step verification. First step is the
insertion of the ATM card to the machine and the second step is
 Some financial services, use this to secure phone banking entering the pin code of the card.
transactions.
Digital Forensics
Signature Verification System
 Also called "Cyber Forensics"
 Recognizes the shape of your hand-written signature for as well as
measures the pressure exerted and the motion used to write the  The discovery, collection and analysis of evidence found on
signature. computers and networks.

 Use a specialized pen and tablet.  Digital forensics involves the examination of media, programs, data
and log files of computers, mobile devices, servers and networks.
 Often are used to reduce fraud in financial institutions.
 A Digital Forensic Examiner must have knowledge of the law,
Iris Recognition System technical experience with many types of hardware and software
 High security areas use Iris Recognition System. products, superior communications skills, familiarity with corporate
structures and policies, willingness to learn and update skills and
 The camera uses iris recognition technology to read patterns in the problem solving.
iris of the eye.
IT: Lesson E2  Some companies escort their employee for the premises
immediately.
Software Theft
 Many manufacturers incorporate an activation process into their
 Occurs when someone steals software media, intentionally erasing programs to ensure the software is not installed on more computer
software or programs, illegally registers or activate the program or than legally licensed.
illegally copies the programs.  Users provide software products identification number.
License Agreements

 The right to use the software.


Most Common Type of License
Physical Stealing of Software
Single Users License Agreement
 A perpetrator physical steals the media that contains the software
or steals the hardware that contains the media where the software  Also called “End User License Agreement or “EULA”.
is installed.  The license agreement provides specific condition for use of the
Intentionally Erasing Software software.
 This terms are usually displayed when you installed the software.
 Perpetrator erases the media that contains the software.
 Use of the software constitutes acceptance of the terms on the
Illegal Registration or Activation
users part.
 A perpetrator illegally obtain registration numbers or activation Network License
codes.
 A legal agreement that allows multiple user to access the software
 A program called “keygen”, short for key generator. on the server simultaneously.
Keygen  The network license fee usually based on the number of users or the
 Creates registration numbers and sometimes activation codes. number of computers attached to the network.
Illegal Copying Site License

 A perpetrator copies software from manufacturers, software piracy  A legal agreement that permits a user to install a software on
or simply piracy is unauthorized and illegal duplication of multiple computers usually at a volume a discount.
copyrighted software.
Piracy Information Theft

 Most common form of software theft.  Occurs when someone steals personal or confidential information.
 Both business and home users can fall victim into information theft.
 Often is link to other types of cybercrime.
Safeguards Against Software Thefts Safeguards Against Information Theft
 Owners should keep original software boxes and media.  Organization implementing the user identification and
 All computer user should back-up their files and drive regularly. authentication control.
 These controls are the best suited for protecting information for Advantage of Encryption
computers located on the organization premise.
 Even if the information is stolen during the transmission process, it
 Organization and individuals use 3 popular techniques.
will be useless for the hackers because they will not understand or
3 Popular Techniques
get any meaning from the stolen data.
 Encryption
 VPN
Virtual Private Network
 Digital Certificates
 Commonly described as network within network.
 It is a private network between a public network which is the
internet.
Encryption

 Is the process of converting that is readable by humans into


encoded characters to prevent unauthorized access.

 Data transmission using VPN is faster and more secured because the
data exchanged is just between the user and the service provider.
 No other traffic enters the network.
 VPN services establishes secured and encrypted connections to
provide greater privacy than even a secured Wi-Fi hotspots.
 Plain Text – When you create a message

 Encryption – Process to Cypher Text Digital Signature
 Cipher Text – Message with no meaning  An encrypted code that a person, website or organization attached
 Decryption – Process to plain text to an electronic message to verify the identity of the message
sender.
 Plain Text – To be understood by the receiver
 Often are used to ensure that an impostor is not participating in an
internet transaction.
 It can help to prevent email forgery.
 Also can verify the content of the message has not changes.
 Digital signature is different from E-signature. Failure
E-Signature
 Aging hardware, natural or non-made disasters, or random events
 Is a signature created digitally. such as electrical power problems, and even cross in programs or
 When you create and E-Sig, the system is actually creating an apps.
encrypted code for that signature which is sent together with your
message.
Backup
Digital Certificate
 Ultimate safeguard that the company use to avoid those disasters.
 A notice that guarantees a user or a website is legitimate.
 To protect against data loss caused by hardware, software,
 E-commerce application commonly use Digital Certificates.
information theft or system failure, user should backup computer
 When you access a websites especially for financial transactions, it is
files regularly.
recommended that you check the website that has a digital
 A backup file is a duplicate of a file, program or media that can be
certificate.
used if the original is lost, damaged or destroyed.
 They are normally displayed at the bottom part of the homepage of
 To backup file means to copy that file.
the site.
Offsite Backup

 The extra copy is allocated away from where you typically store or
use your mobile computer or mobile device.
 Minimizes the chance that a single disaster such as fire would
destroy both the original and the backup media.
 An offsite location can be a safe deposit box at the bank, briefcase
kept away from the location of the computers or cloud storage or
cloud backup.
Certificate Authority
Types of Backup
 Is a trusted third party that takes responsibility for verifying the
senders identity before issuing a certificate. Full Backup
 Individuals and companies can purchase digital certificates from one
 Copies all the files from the computer to the media.
of more than 35 online certificate authority providers.
 Advantage, fastest recovery method.
 Disadvantage, requires the longest backup time.
Hardware Theft Differential

 Act of stealing digital equipment.  Copies on the files that have changed since the last full backup.
Vandalism  Advantage, fast backup method, requires minimal storage space to
backup.
 Involves defacing or destroying digital equipment.
 Disadvantage, recovery is time consuming because the last full
backup plus the differential makeup are both needed.
Incremental Backup o Perpetrators sometimes connect to wireless networks of
other people to gain free internet access.
 Copies only the files that have changed since the last full or
o Others may try to wirelessly access confidential data.
incremental backup.
 Advantage, fastest backup method, requires minimal storage space
to backup, only most recent changes are saved. Ethics and Society
 Disadvantage, recovery is most time consuming because the last full
Ethics
backup and all incremental backup since the last full backup are
needed.  The standards that determine whether an action is good or bad are
Selective known as ethics.
Technology Ethics
 Users choose which folders and files to include in a backup.
 Advantage, this is a fast backup method and provides great  Are the moral guidelines that governs the use of computers, mobile
flexibility. devices, information system and related technologies.
 Disadvantage, it is difficult to manage individual file backups. Least
manageable of all backup methods.
Continuous Information Accuracy

 All data is backup whenever a change is made.  The concern today because many users access information maintain
by other people or company.
 The only real time backup.
 Users should evaluate the value of a webpage before relying on its
 Advantage, very fast recovery of data.
content.
 Disadvantage, very expensive and requires a great amount of
Ex. Delivery driver – Old GPS.
storage.
Cloud

 Files are backup to the cloud as changed Intellectual Property Rights


 Advantage, cloud backup provider maintains backup hardware.
 Refers to unique and original works, such as ideas, inventions, art
 Files may be retrieved anywhere with an internet connection on any
writings, processes, company and product names and logos.
device.
 Disadvantage, it requires internet connection.  Rights to which creators are entitled for their work.
 Certain issues arise surrounding IP today because many of these
works are available digitally and can be easily redistributed or
Wireless Security attend without the creators permission.
 Wireless communication is provided in a lot of establishments for
their clients.
 Wireless access provide many conveniences to users.
Copyright
 Also possess additional security risk.
 Some of these include free internet access from private networks.
 Gives authors, artist and other creators of original work exclusive  Refers to the right of individuals or companies to deny or restrict
rights to duplicate, publish and sell their materials. collection used and dissemination of information about it.
 A copyright protects any tangible form of expression.  Organization often used huge data bases to store records such as
 Common infringement of copyright is piracy. employee records, medical records, financial records and more.
Piracy  Websites often collect data about you so that they can customize
advertisements and send you personalized email messages.
 People illegally copies software movies and music
 Many areas are not clear cut with respect to the law because
copyright law give the public “fair use” to copyright material. Techniques That Most Company Use to Collect Personal Information
Fair Use
Electronic Profile
 Allows use for educational and critical purposes.
 Registration form, member ship form, subscription and a lot more.
 In all of these forms, you are disclosing a lot of personal
Code of Conduct information.
 This forms usually stores the information provided in the database.
 Is a written guideline that helps determine whether a specification is
 Electronic profiles may include personal details such as age, phone
ethical or unethical or allowed or not allowed.
number, marital status and more.
 IT Code of Conduct distributes the standards to employees and
 Direct marketing supporters claim that using information in this
students
way, lowers overall selling cost which lowers the product prices.
Ex. Employees may use technology for purposes in which they have been
authorized.
Cookies

 Cookie is a small text file that web server stores on your computers.
Green Computing
 Cookie files typically contain data about you such as username,
 People use and often waste resources such as electricity and paper location or viewing preferences. These cookies may obtain their
while using technology. values when a user files in an online form requesting personal
 Involves reducing the electricity and environmental waste while information.
using computers, mobile devices and other related technologies.  Online shopping sites generally use accession cookie to keep track
 An organization can implement a variety of measures to reduce the items on users shopping cart.
electrical waste.  Many commercial sites send a cookie to your browsers. Your
Includes: computer hard drive stores the cookies.
 A website can react data only form its own cookie files stored on
 Use of sleep modes and other power management features. your hard drive.
 Buying computers and devices with low consumption processors  It cannot access or view any other data on your hard drive including
and power supplies. another cookie file.

Information Privacy
Phishing  A program that displays an online advertisement in a banner, a
popup ad window on webpages, email messages or other internet
 Scam in which a perpetrator send an official looking email message
services.
that attempts to obtain your personal or financial information.
 Sometimes spyware is hidden in hardware.
 These messages look legitimate and often request for private
 To remove spyware and adware, obtain spyware removers, adware
information like ATM PIN.
removers or malware removers that can detect spyware and
 The only way to protect yourself from phishing scam is never to give
adware.
personal information to anybody especially by a phone, email or
website.
Click Jacking Social Engineering

 An object that can be tapped or clicked like a button or an image or  Define as gaining unauthorized access too or obtaining confidential
a link on a website, popup ad or pop under ad or an email message information by taking advantage of the trusting human nature of
contains malicious program. dome victims and naivety of others
 Whenever the user tap or clicks the disguise object, a variety of  Some social engineers trick their victim into revealing confidential
malicious event may occur. information such as username and password.
 Techniques include pretending to be administered or other
authoritative figure.
Spyware and Adware
 Social engineers also obtain information from users who do not
Spyware destroy or conceal information properly.
 To protect yourself, verify the identity of any person or organization
 Is a program placed on the computer or mobile device to secretly
requesting persona and confidential information.
collects information about the user and then communicates the
 Ensure that only authorized people can see your screen
information it collects to some outside source while the user is
 Shred all sensitive or confidential documents.
online.
 After using a public computer, clear the cache in the browser.
 Some vendors or employees use spyware to collect information
about program usage of employees.
 Internet advertising firms often collect information about users web Employee Monitoring
browsing habits.
 Includes the use of computer, mobile devices or cameras to observe
 Spyware can enter your computer when you install a new program
record and review and employee’s use of a technology suing a
through a malware or a graphic on a webpage or in an email
communication.
message.
 It is legal for employees to use this program.
Content Filtering

 One of the more controversial issue in the internet is its widespread


Adware availability of objectionable materials.
 The process of restricting access to certain material.
 Many businesses use contain filtering to limit employee’s web
access.
Web Filtering Software

 Is a program that restricts access to specify websites.


 Some also filters the use of specific words.
 Other allow you to filter email messages, chat rooms and programs.
 Many internet security programs include a firewall, anti-virus
program and filtering capabilities combined.

Privacy Loss

 Common point of some of these loss includes information collected


and store about individuals should be limited.
 When information is collected from the individual, the individual
should know that the data is being collected and have the
opportunity to determine the accuracy of the data.

You might also like