Professional Documents
Culture Documents
are called software or programs and they are stored in the computer
Information Technology Devices
memory.
Tech Savvy
People who knows to take advantage of these are often called tech
savvy.
Because technology changes, you must keep up with the changes to
become digital literate.
Digital Literacy
Hardware
Game Console
Laptops
A mobile computing device designed for single player or multiple
Tablets
games.
Servers Gamers often connect game console to TV so that they can view
their gameplay on the TV screen.
Is the computer dedicated to provide in or more services to
Many game console models are internet capable and allows to
other computers or devices on a network
listen to music, watch movies and view photos.
Network
Peripherals
Keyboard
Common to laptops and notebooks. Optical scanner that can read printed barcodes and decode the data
Similar to the touchscreen but the function is similar to the mouse. and send it to the computer.
MICR/Magnetic Ink Character Recognition Device Very common, quick/damage barcode are impossible to read.
Digital Camera
Uses special ink character.
Used by banks. Input device that captures images and video
When the documents are processed, it will translate it to characters. Uses an image sensor chip.
Speed, accuracy and expensive. Versatile, quick, accurate/ high quality – large file size.
OMR/Optimal Mark Reader
Used to capture human mark data from document forms. Pen Input Devices
Commonly used in multiple choice type of questions.
Interact directly to computer using pen.
Commonly used in multiple choice type of questions
Used for pointing, simple text entry, drawing or sketching.
Speed, accuracy and expensive.
Stylus for smartphone.
OCR/Optical Character Reader
Handwritten input can be converted to type text.
Converts images, handwritten or printed texts into machine
encoded text.
Output Devices
Function is like a scanner.
Use the camera and focus on the optical character. Devices that presents to computer output to the user.
Excellent, quick/inaccurate on low quality images. The distinction between ID and OD is their relationship with the
Mouse/Trackball processor.
Gets output or information from the processor.
Easy to use, cheap, common/slow, prone to error.
IO/Input Output Devices
Scanner
Some devices combines both input and output capability.
Light sensing input device that converts printed text and images into
Some includes touchscreen monitor, headset with microphone and
a form that computer can process.
bluetooth device.
Popular type of scanner work similar to copying machine except
Types of Output Produced Different Devices
instead of creating a paper copy of the document, it stores the
document electronically. Visual
Excellent and quick/slow to scan multiple devices and large file size. Audio
Digital
Voice Input
Monitor
Thermal
Dot Matrix
2 Different Types of Non-Impact Printers
Laser Jet
Inkjet
Used in printing where models – plastics, metals, ceramic in printed
forms.
Print Plate
Speakers
Attached to computers.
Reproduce sounds via electronic component called sound card.
Headsets and Ear buds
Turn digital model into something physical. Device that can store, organize and play digital music files.
3D Printing is classified as additive manufacturing. MP3
Stage 3: Printing
Filament
Primary Memory
Smartphones
Wearable Devices
Game Devices
Storage Devices and Media
Handheld game device and game console.
Computer Memory and Storage Media
Computers can store data in memory. Data and information are stored.
Memory is composed of electronic components that store Device
instructions. Save or access the media.
Some forms are permanent, most of it are temporary.
Volatile
Which storage is the best? 2 Types of Optical Disk
IT: Lesson A2
SSD/Solid State Drive
World Wide Web and the Internet
Typically uses plus memory to store data, information and
instruction. 2 Different Things
Web - Global Library of information available to anyone through the
internet.
USB Flash Drive
Internet - Largest computer network connecting millions of
Portable plus memory device. computers and devices around the world.
Easily accessible. Main Difference of the Net and the Web
Memory Card
Net
Removable plus memory.
- Connects with other computers.
1.5 inches in height.
- If you are searching, the net search the network for the specific
computer where the data or information is located.
Optical Disk Web
Search Engine
Browser
Online Social Network/Social Networking Site
Website that encourages members in each online community to Virus/Malware
share interest, stories, photos and videos with other users.
Threats in the digital world.
Popular: Facebook, Twitter and Linked In
Malware/Malicious Software
Steps to Go Green
Green Use
Green Disposal
Software/Program
System Software
Application Software
System Software
Operating System
Relationship Between Hardware, System Software and Application
Software
More on Apps
Wired Communications
Network
Use cables to send communication signals.
The wiring or cables typically are used within buildings or Collection of computers and devices connected together.
underground between buildings. Allow computers to share resources such as hardware, software,
The type of used can either be a telephone wire, coactual cable or a data and information.
fiber optic cable. Sharing resources saves time and money.
A network typically has one or more server and several client Share Data, Information and Software
computers.
Any authorized computer user can access data, information and
Server
software stored in other computers in the network.
Controls access to the resources on the network.
Client
Uses of Technology
Each client computer request resources from the server.
Technology changed the society today as much as the individual
Server computers typically has more power, more storage space
revolution change society in the 18th and 19th centuries
and expanded communication capabilities.
People interact directly with technology in fields such as education,
government, finance, retail, entertainment, travel, manufacturing
Home Network and more.
Most government offices have websites to provide citizens with up- Allows the customer to collect purchases, when ready to complete
to-date information. the sale the customer enters the personal data and the method of
Almost all government agencies and units have websites that payment.
citizens can use to transact business with them. Many mobile apps make shopping experience more convenient,
Data about population, supreme court ruling and more. some enable you to manage your words, use coupons, locate stores
Cashless Transaction or pay for goods and services directly from your phone.
Finance Nowadays , computers and mobile devices are used in any area of
entertainment.
Many people and companies use financial institution like banks or
Audio, video, television show, readings and of course gaming.
some are installing finance software on their personal computers.
If you're busy, you can download anything and watch, listen or read
Used to pay their bills, track personal income and expenses, manage
it in some other time.
investment and evaluate financial plans.
Some websites even support streaming where you can access the
Online Banking vs Finance Software
media content while it downloads.
The difference between using banking institution websites versus Also can create videos, take photos or record audio and upload your
the finance software that they installed in their computer is that all media content to the web to share with others such as an online
their account information is stored on the banks computer instead social network.
of their computer.
The advantage is you can access your financial records from
Healthcare
anywhere in the world.
Investors also use computers in online investing and buying and Nearly every area of health care today uses computers.
selling of stocks and bonds. Visiting a family doctor, having lab work on outpatient or an
With online investing, the transaction fee for each trade usually is outpatient test, filling a prescription, the medical staffs around due
much less than when they are using brokers. will be using computers for various purposes.
Computers are used in:
Technology Users
INFORMATION TECHNOLOGY
Wireless Connection - only wired connection is between the internet and - Data sizes typically stated in megabytes equivalent to 1M
communication media (modem) characters and gigabytes equal to 1B characters.
IP (internet protocol) Address- sequence number that uniquely locates the
Wireless Modem – uses a wireless communication technology as cellular
computer.
radio to connect to the internet
- people prefer words than number, the domain name system
-
Also known as wireless dongle small device that connect to the
was created.
computer that enable additional function when attach.
Domain Name System- text based name that corresponds to the IP address
BROADBANS- most popular internet service
of the server.
- fast data transfer speed and always on connection
Top level Domain- identify the types of organization associated by the Web App is an application stored on a web server that you access through a
domain. browser.
Email- (short for electronic mail) is the transmission of messages and files
via computer network.
Capable of doing the IPOS activities by itself. Usually smaller than laptop but larger than a phone.
Intended to be use one person at a time. Thin light mobile computer that has a touch screen.
Mobile or stationary 2 Popular Forms of Tablet
Mobile Computers Slate Tablet
Computers that you can carry from one place to another. Type of tablet that does not contain a physical keyboard.
Include: Laptops, notebooks or tablet. Convertible Table
Stationary Computers
Has screen in its lid and a keyboard on its base with the lid and base
Designed to be set up on specific location. connected via swivel type hinge.
Ex. Desktop and All-in-one PC Can use like a traditional laptop or can rotate or display and fold it
down over the keyboard so it look like a slate tablet.
Personal Computer
Differentiated by the operating system they use. As with laptops, tablets run with batteries or a power supply or
Windows and MacOS leading the market share both. However, batteries in tablet typically last longer than those in
Other OS: Linux and Chrome OS laptop.
Some tablet include stylus, as to alternative interacting with the
touchscreen, some users prefer to purchase a separate physical
Different Mobile PC keyboard that attaches or wirelessly communicates with the tablet
Tablets are useful especially for taking notes where the standard
Laptops
laptop is not practical.
Also called “Notebook Computers” Slate tablets are more durable, they are often used in the medical
It is named Laptop because it has the sign to fit on your lap field and other areas where exposure to germs, heat and humidity
Can be powerful as average Desktop PC thus and other contaminants is greater.
Most laptop today is touchscreen and has built in wireless
communications capabilities.
Handheld Computers
Special Purpose Terminal This is a self-service banking terminal that connects to a host
computer through a network.
Special Purpose Terminals perform specific tasks and contain
Banks place ATM's in public location including grocery stores,
features uniquely designed for use in a particular industry.
convenient stores, retail outlets, shopping malls, other venues, gas
stations and a lot more so that customers can access their bank
3 Widely Use Special Purpose Terminals accounts conveniently.
Digital Cameras
Device that allow users to take photos and story images digitally.
Smart Digital Camera also can communicate wirelessly to other
devices and can include apps.
Mobile computers and devices such as smartphones and tablets
often include at least 1 integrated digital camera.
2 More Types of Camera
A high end digital camera that has interchangeable lenses and uses Acitivity Trackers
a mirror to display on its screen an exact replica of the image to be Smart Watches
photographed Smart Glasses
Heavier and larger that point-and-shoot cameras.
Quite expensive with a variety of available lens sizes and other Activity Tracker
attachments.
Monitors the fitness related activity such as distance walk etc.
Photo Quality
This devices typically sync wirelessly with the web or mobile app on
Resolution computer or mobile device.
Smart Watch
Resolution affects the quality of digital camera photos.
Resolution is the number of horizontal and vertical pixels in a In addition for keeping time, it can communicate wirelessly with a
display. smartphone to make and answer phone calls, read and send
Pixel messages, etc.
Most of them are touchscreen devices.
Pixel is short for picture element. The smallest element in an
Smart Glasses/Smart Eyewear
electronic image.
Digital Camera resolution typically is stated in megapixels or millions Head-mounted eyeglass device that enable the user to view
of pixels. information or take photos and videos that are projected to a small
The greater the number of pixels the camera uses, the better the screen in the user field of vision.
quality of the picture but larger in file size. The device wearer can run an app similar to activity tracker wearing
a smart glass.
Device wearer control the device through voice commands or
Most digital cameras however provide a means to adjust the
touching controls.
resolution.
The actual photograph resolution is known as "optical resolution"
but some manufacturer uses a special formula to add pixels to those Other Mobile Devices
generated by the optical resolution. Hence, the use the term
Messaging Services Devices
"enhance resolution" instead of optical
Ex. The Pager/Beeper
Used by doctors so they can be reach when they are needed.
Replaced by cellphones
Wearable Devices
EBook Readers
Game Console Can be also found in cars, airplane seats and other public locations.
Embeded Computers Cables plug-in to USB ports can recharge many smartphones and
Special purpose computer that functions as the component in a tablets.
larger product.
It is everywhere. Can be found in automobiles, consumer
electronics, home automasion devices, computers and office Several USB Versions
machines.
Ex. Remote Controls of television.
IT: Lesson C2
With the growing use of ear buds and headphones in computers Some technology users become obsessed with computers, mobile
and mobile devices, some users are experiencing hearing loss. devices and the internet.
CVS/Computer Vision Syndrome You are a technology addict if most of your time is devoted in using
technology devices.
A technology related health condition that affects eyesight. Most technology addict has no longer physical and social life.
You may have CVS if you have sore, tired, burning, itching or dry A growing health problem but it can be treated through therapy and
eyes. support groups.
Blurred or double vision after prolong staring at a display device. Technology Overload
Experiencing headache or sore neck
Difficulty in shifting focus between a display device and a document A person suffering from this technology overload feel distressed
when deprived of technology even for a short length of time.
Difficulty focusing on screen image.
A person who feel overwhelm with the amount of technology they
Color fringes or after images when you look away from the display
are required to manage is also suffering from technology overload
device.
To cope with the feelings of destruction and to control the impact,
Increase sensitivity to light.
the technology can have on work and relationships set aside
technology free time.
Back pain, Muscle Fatigue and Emotional Fatigue
IT: Lesson D
Programs and Applications Operating System/OS
Computer System First program that function when the computer hardware is turned
on
Set of interrelated components that works together to accomplish a
Operating system is a system software
task which is data processing.
Its function is to coordinate all the activities among computer
3 Components
hardware. When the computer is turned on, OS checks all the basic
Hardware peripherals such as mouse, keyboard, monitor and the like are
Software ready to work with the central processing unit.
People Ware or User When you are using any computing device, the operating system is
Components silently working on the background doing all the coordination
between the application and the hardware.
Integral part of the system, the system will not achieve its primary
objective if one component is missing.
Ex. Presentation - You as user Role of the Operating System in the Computing Process
Computer Hardware
Application Software/App Operating System serves as the interface between the user,
application and other programs and the computer.
Consist of programs designed to make users more productive or
In the diagram, the interaction between the user and the
assist them with personal tasks
System Software application software, this because the operating system is already
loaded into the memory of the hardware.
Are those programs that control or maintain the operations of the Simply means you cannot use any application software unless an OS
computer and its peripheral. is already loaded into the memory of the hardware.
There is no direct interaction between the application and the
hardware, everything must be coordinated with the OS.
Develop for specific organization.
The company gets the services of the software developers to create
tailor made custom software.
Usually cost more than the retail software.
The enrolment system of BPSU is an example.
Web Applications
Retail Software/Off the Shell Software Optimized for display in a browser on a mobile device regardless of
screen size or orientation.
Must produce copyrighted software that meets the needs a wide Many app developers are off for delivery because they do not have
variety of users. create a different version for each mobile device to the app store.
Some retail software such as an operating system is preinstalled on Many web apps use a responsive design which means the app
new computers and mobile devices. display properly on any computer.
With online purchases, you may be able to download purchase Device Shareware
programs immediately instead of waiting the software to arrive by
mail. Responsive software that is distributed at no cost for a trial period.
To use a shareware program beyond the period, you send the
payment to the software developer or you might be billed
Custom Software/Proprietary Software automatically unless you cancel at a certain period of time.
Scale down version
Only the basic features of the software is available.
Distributed free, if you want
Installing Software
Installing
Freeware
Process of setting up the software to work with a computer, printer
Copyrighted software provided at no cost by an individual or
and other hardware.
company that retains all rights to the software.
For desktop, all application must be installed
The software developers typically cannot incorporate freeware in
Mobile Apps on the other hand typically install automatically after
applications they intend to sell.
you download the app from the device app store.
The word free in freeware indicates that the software has no
Usually do not need to install web apps before you can use them
charge.
but you may need to install plug-ins before the web app works.
Open Source Software
More on Software
Software provided for use, modification and distribution.
During installation of software or before the first use, the program
This software has no restriction from the copyright holder regarding
or application may ask for registration or activate the software.
modification of the software and its redistribution.
It's fine for the developer if you download the software and modify Software registration typical is optional and usually involves
it according to your needs. submitting your name and other personal information to the
Usually can be downloaded from the web server on the internet software manufacturer developer.
often at no cost. The advantage of the software registration is product support, when
2 Main Advantages you encounter problems with the software, you can report it to the
technical group of the developer.
Users who modified the software share their improvements with
Product Activation
others.
Customers can personalize the software to meet their needs. A technique that some software manufacturer use to ensure that
Public-Domain Software you do not install the software on more computers than legally
licensed.
This software has been donated for public use and has no copyright
License is good only for one device.
restrictions.
Usually the software can be run a preset number of times has
Anyone can copy and distribute public domain software to others at
limited functionality or does not function until you activate it via the
no cost.
internet or by phone.
Some software allow multiple activation.
Additional Information: Registering and activating software also usually entitles you for free
program upgrades.
Thousands of shareware, freeware and public-domain programs are
Many desktop and mobile applications has an automatic update
available on the internet for users to download.
features.
Some of these include communications, graphics and game
programs.
With web apps by contrast, you always access the latest version of
the software.
Software Categories
General Use
Creating a project
Word Processing Software/Word Processor An application that allows users to create visual aids for
presentation to communicate ideas to a group
Allows users to create and manipulate documents containing mostly
Can be viewed as a slideshow that are displayed on a large screen.
text and sometimes graphics.
Features of Presentation Software
Documents can be letters, memos, reports and more.
Major advantage is it enables users to change their written words Predefined presentation formats, it has a preset background with
easily. complimentary colors, text type and graphical accents to the slides.
Also has many features to make documents look professional and Layouts for the title, 2 column slide, slide with clipart, chart, table or
visually appealing that includes 1 font adjustments, change font, a diagram.
font size, font color, add special effects like shadow and more. Enhance option for text, charts and graphics on a slide with 3D
Templates effects, animation and more.
Slide timing is when the presentation automatically displays the
Also has document templates that users can choose like format of
next slide after a preset delay.
resume.
Special effects for the transition between slides, have a choice on
Insertion of graphics
which slide will appear one after another.
Another feature is insertion of graphics, you can easily insert it on Audio and video clips can be inserted to the presentation.
the document. Can view or print a finish presentation in a variety of formats such
Inserted images can also be modified, can add colors and adjust the as outline view, notes page view or reading view.
placement Also incorporates features such as checking spelling, formatting,
researching and creating with web pages from existing slide show.
Spreadsheet Software
Paper size adjustment
An application that allows users to organize data in columns and
You can decide the size of the paper on which to print and specify
rows and perform calculations on the data.
the margin setting.
This column and rows collectively are called a worksheet.
Wordwrap
Its file in a spreadsheet is called a workbook.
Another feature is wordwrap, this feature allow users to type words Characteristics of Spread Sheet Software
in a paragraph continually without pressing the enter key at the end
Includes creating, editing and formatting worksheets.
of each line.
Each worksheet has 1,048,576 rows and 16,384 columns for Excel An application that enables users to enter type text, handwritten
2016. comments, drawings, sketches, photos and links anywhere on a
Rows are numbered and columns use letters. page and then save the page as part of a notebook.
Basic unit of the worksheet that holds data is called a cell. Users also can include audio recordings as part of their notes.
Only a fraction of the many rows and columns are visible on screen. Some enable users to sync their notes to the cloud so that they can
Charting which depicts the data in graphical forms is another access the notes on any computer or mobile device.
feature. Also include calendar feature.
Users find note taking software convenient during meetings, class
lectures and conferences in libraries and other settings that
Database Software
previously required pencil or paper for recording thoughts and
Allows users to create, access and manage a data base. discussions.
Database
Collection of data organized in a manner that allows access retrieval Calendar and Contact Management Software
and use of that data.
An application that helps to organize calendar, keep track of
Can be manually or digitally developed.
contacts and share this information with other users.
List of friend’s name, address and contact number written in a
Provides a way for individuals and workgroups to organize, find,
notebook is an example of simple manual database.
view and share appointment and contact information easily.
Phonebook is an example of electronically developed database.
Sometimes available separately, calendar and contact management
With the database stored electronically, the computer stores the software can often exist as a unit and a single program.
data on a storage medium such as a hard drive or optical disk or on
Many email applications include calendar and contact management
cloud storage.
features.
It enables to synchronize information, it means that all of computers
Database Features and mobile devices along with the organizations server or cloud
storage have the latest version of any updated information.
Include modifying database.
Use to sort and retrieve data.
Create forms and reports using the data in the database. Project Management Software
Also run queries to retrieve data. An application that allows users to plan, schedule, track and analyse
Query the events, resources and costs of a project
A request for a specific data from the database. Helps users manage project variables, allowing them to complete
the project on time and within budget.
Accounting Software
An application that helps businesses of all sizes to record and report Provides thundered contracts and documents associated with
all of their financial transactions. buying, selling and renting property, estate planning, marriage and
Business users perform accounting activities related to the general divorce and repairing a wheel or living trust.
ledger, accounts receivable, accounts payable, purchasing, invoicing By answering a series of questions or completing a form, the legal
and payroll functions. software tailors the legal document to specific needs.
Also enables business users to write and print checks, track checking
account activity and update and reconcile balances on demand.
Tax Preparation Software
Most accounting software supports online credit checks, bill
payment, direct deposit and payroll services. An application that can guide an individual, families or small
The cost of accounting software for small businesses ranges from business through the process of filing taxes.
less than 100 to several thousand dollars. In the Philippine settings, web app is available in the ETAX.ph
Accounting software for large businesses can cost several hundred website.
thousand dollars. ETAX
Paint and image editing software for the home or small business Ex. Users reduce the length of the video clip or add special effects.
user provides an easy to use interface.
Audio Editing Software
Is an application that enables users to modify audio clips, produce
It includes various simplified tools that allow you to draw pictures, studio quality soundtracks and add audio to video clips.
shapes and other images as well as modifying existing graphics and Most TV shows or movies are created or enhanced using video and
photos. audio editing software.
This product also include many templates to assist you in adding Many home users work with easy to use video and editing software
images to projects such as greeting cards, banners, calendars, signs, for scale movie making projects.
labels, business cards and letterhead. With these programs hone users can edit home movies, add music
or sounds to the video and share their movies on the web.
Photo Editing and Photo Management Software Some operating systems include video editing and audio editing
Photo Editing Software applications.
Type of Image Editing Software that allows users to edit and
customize digital photos. Multimedia and Websites Authoring
The software allows users to retouch photos, crop images, remove Multimedia Software
red-eye, erase blemishes, restore age photos, add special effects, Allows users to combine text, graphics, audio, video and animation
enhance image quality, change image shapes and a lot more. in an interactive application.
Many applications also provide a means for creating digital photo With this software, users control the placement of text and images
albums. and the duration of sounds, video and animation.
When you buy digital cameras, it usually includes photo editing Once created, multimedia presentations often take the form of
software. interactive computer base presentations or web base presentations
Many digital cameras also include photo editing software so you can designed to facilitate learning, demonstrate product functionality
edit the image directly on the camera. and elicit direct user participation.
Photo Management Software These applications may he distributed on an optical disk over a local
On the other hand is use to view, organize, sort catalog, print and network or via the internet as web apps.
share digital photos.
Some photo editing software includes photo management
Website Authoring Software
This software helps users all skill levels to create related web pages Medical Applications
that includes graphics, video, audio, animations, special effects with Research symptoms, establish fitness or health program, track
interactive content and blog posts. exercise activity, refill prescriptions, count calories or monitor sleep
In addition, it allows users to organize, manage and maintain patterns.
websites.
Often has capabilities of multimedia authoring software. Entertainment Applications
Use this application to listen to music or radio, view photos, watch
Media Player videos or shows, read a book or other publication, organize and
A program that allows you to view images and animations, listen to track fantasy sports teams and play games individually or with
audio and watch video files on your computer or mobile devices. others.
Media players may also enable to organize media files by genre,
artist or other category, create playlist, convert files to different Convenience Applications
formats, connect to and purchase media from an online media store Used normally in driving directions or current location, remotely
start vehicle or unlock the doors, set an alarm or timer, check the
time, calculate a thief, phone as a flashlight or use a personal
or market place, stream radios broadcasting over the internet, assistant that acts on your voice commands.
download podcasts, burn CDs' and transfer media to portable media
players. Education Applications
- Use this to access how to guide, learn or find a particular skill, follow a
Disc Burning Software tutorial, run a simulation, assists children with reading other elementary
Writes text, graphics, audio and video files on a recordable or skills or a support academics.
rewritable disc.
This software enables home users easily backup contents of their Communication
hard drive on an optical disc either a CD or DVD. - One of the main reason people use computers is to communicate and
Make duplicates of music or movies without copyright restrictions. share information with others.
Usually includes photo editing, audio editing and video editing
capabilities.
Lifestyle Applications
Access the latest news or sports course, check the weather forecast,
compose music, research generology, find recipes or near locate
restaurants, gas stations or points of interest.
virus program and keep it updated by purchasing revisions or
upgrades to the software.
Computer Virus
A damaging program that affects a computer or device negatively by
altering the way it works.
Most anti-virus programs also include protection against other Anti-Spam Programs
malware's such as worms, trojan horses and sypware. Spam
When you purchase a new computer, it may include a trial version of Is an unsolicited email message sent to many recipients at once.
anti-virus software. Consider as internet junk mail.
Many e-mail servers has anti-virus programs installed to check The content of spam ranges from selling a product or service to
incoming and outgoing messages for viruses and malware. promoting business opportunity to advertising offensive materials
and many more.
Spyware, Adware and Other Malware Removers Spam may also contain links or attachments that contain malware.
Spyware
Type of program that secretly collects information about the user An anti-spam program is a filtering program that attempts to remove
without his/her knowledge. the spam before it reaches your inbox or forum.
The collected information is sent to some outside source while the Many anti-spam programs are available at no cost on the web.
user is still online.
Some vendors or employers use spyware to collect information ISP/ Internet Service Provider
about program usage or employees. Often filters spam as a service for their subscribers.
Internet advertising firms often collect information about user web
browsing habits. Web Filters
Spyware can enter your computer when you install a new program. A program that restricts access to certain material on the web.
Some restricts access to specific website, others filter websites that
Adware use certain words or phrases.
Displays an online advertisement in a banner or pop-up or pop Many business use web filtering software to limit employees web
under window on webpages, e-mail messages or other internet access especially during office hours.
services. Some schools, libraries and parents use this software to restrict
Internet advertising firms hide spyware in adware. access to websites that are not educational.
Phishing Filters Functions of these Tools
Phishing File Manager
Is a scam in which a perpetrator sends an official looking email Tool that perform functions related to file management.
message that attempts to obtain your personal and/or financial Some functions are displaying a list of file on a storage medium,
information. organizing files in order, copying, renaming, deleting, moving,
Some phishing messages ask you to reply your information. sorting files.
Others direct you to a phony website or a pop-up or pop under Folder
the window that looks like a legitimate website which then Specific named location on a storage medium that contains related
collects your information. files.
Operating systems typically include a file manager.
Phishing Filters is a program that warns or blocks you from
potentially fraudulent or suspicious websites. Search Tool
Some browsers include phishing filters. A program that attempt to locate a file, an application or any other
items stored on your device.
Pop Up/Pop Under Blockers The search is based on the criteria you specified.
Pop Up Ad Search tools can look through documents, photos, music, calendars,
Is an internet advertisement that suddenly appear in a new window contacts and other items on your computer or on the internet.
on top of the web page. Typically use an index to assist with locating items quickly.
An internet advertisement that is hidden behind the browser
Index
window so that it will be viewed when users close their browser Store a variety of information about the file including its name, date
windows. created, date modified, author name and so on.
When you enter search criteria, instead of looking to every file and
Pop Up Blockers/Pop Under Blocker folder in the storage medium, the search tool looks through the
Is a filtering program that stops pop up or a pop under ads from index first to find a much.
displaying on web pages. Each entry in the index contain a link to the actual file on the storage
Many browser includes this blockers. media for easy retrieval.
Can also be downloaded from the web at no cost.
Image Viewer
Files, Disk and System Management Tools Tool that allows users to display, copy and print the contents of
To perform maintenance type task related to managing a computer, graphics file such as a photo.
its device or its programs, you can use one or more file, disc or Users can see images without having to open them in a paint or
system management tools. image editing program.
Functions provided by these tools include managing files, searching, Many image viewers includes some photo editing capabilities.
viewing images, uninstalling software, compressing files, backing up
files and more. Uninstaller
Is a tool that removes a program as well as any associated entries in Security is one of the purpose of screen saver, if the user is working
system files. at something that is private or confidential and need to leave for a
When you install a program, the operating system records the short while the screen saver will hide whatever is on the display
information it uses to run the software in the system file. screen.
The uninstaller deletes files and folders from the hard drive as well
as remove a program entries from the system files. File Compression
Shrinks the size of the files.
Disk Cleanup Tool A compressed file takes up less storage space than the original file.
Searches for and removes unnecessary files. Compressing file freeze up a room on storage media.
Unnecessary files may include downloaded program file, temporary You may need to compress a file so that it will fit on a small storage
internet file, deleted files, unused programs files. medium such as a USB flash drive.
Attaching a compressed file to an email message for example
Disk Defragmenter reduces the time needed for file transmission.
Tool that reorganizes the files and unused space on a computer hard Uploading and downloading compressed files to and from the
disk so that the operating system accesses data more quickly and internet that reduces the file transmission time.
programs run faster. Compressed files are sometime called zip files.
When an operating system stores data on a disc, it places the data You must uncompress it, to unzip a file, you restore it to its original
on the first available sector. form.
Sector Some operating system include compression and decompression
Storage location on a disc. capabilities.
The operating system attempts to place data in sector that are
contiguous but not always possible.
PC Maintenance Tool
Program that identify and fixes operating system problems, detect
When the contents of the file are scattered across 2 or more non- and repairs drive problems and includes the capability of improving
contiguous sector the file is fragmented. a computer's performance.
Fragmentation Additionally, some personal computer maintenance utilities
Slows down file access and thus the performance of the entire continuously monitor a computer while you use it to identify and
computer. repair problems before they occur.
Defragmenting the disc or reorganizing it so that the files in the
contiguous sectors solves this problem. Back-up and Restore
Operating System usually includes a disc defragmenter. Allows users to copy or back-up selected files or the contents of an
entire storage medium to another storage location.
Screen Saver One drive to another.
A tool that displays moving image or blacks screens if no keyboard During the back-up process, the back-up tool monitors progress and
or mouse activity occurs for a specified time. alerts you if it needs additional media such as another disc.
When you press a key on the keyboard, tap the screen or move the Many back-up programs compress files during the back-up process.
mouse, the screen saver disappears and the screen returns to the By compressing the files, the back-up programs requires less storage
previous state. space for the back-up files than the original files.
Because they are compressed, you usually cannot use back-up files
in their back-up form, in the event you need to use a back-up file a
restore tool that reverses the process and returns back-up files to
their original form.
Back-up tools works with a restore tool, you should back-up files and
disc regularly in the events your originals are lost, damaged or
destroyed.
System failure
Any event or action that could cause a loss of or damage to Software used by criminals.
computing device, software, data, information, or processing
capability. Categories of Cyber Crime Perpetrators
Accidental Hacker
Intentional - A deliberate act that is against the law. Someone who accesses the computer or a network
Some intruders do not disrupt a computer or device functionality, they Hackers enjoy analyzing the workings of the operating system and
merely access data, information or programs on the computer or mobile other programs.
device then sign out.
Their main objectives is to find some loopholes in the systems and
Some intruders leave evidence of their presence. finds cause of such problems.
More Common Digital Security Risk Most of them are programmers, hacking for them means additional
learnings and further knowledge.
Internet and network attacks
Can be categorized as black hat, white hat and grey hat hacke.rs
Unauthorized access and use
Black Hat Hackers
Hardware theft
Those that creates malware which they use to gain access to a
Software theft
secured computer system.
Information Theft
Typically, they are motivated by their own financial or personal Grey hat hacking is still considered illegal since the hackers attacks
gains. the system without having the owners permission to do so.
White Hat Hackers Also, someone who accesses the computer or network illegally.
Often referred to as ethical hackers. Having gain an authorize access, crackers destroy vital data, deny
access by legitimate users or cause some other problems for their
Make the choice to use their knowledge and abilities for good targets.
instead of evil.
Crackers can be easily identified because their actions are malicious.
In some cases, they are paid employees or contractors that are
hired to work for companies as security experts. Both hackers and crackers have advance computer and network
skills.
Usually referred as penetration tester whose job is to find
vulnerabilities in the computer infrastructure by hacking into it. Script Kiddie
Typically use the same hacking techniques that black hat hacker use. Has the same intent as the cracker but does not have the technical
skills and knowledge that is why they use the term kiddie.
The main difference is that white hat hacks into the computer
system with permission with the systems owner making the process
This people search for do it yourself or pre-written hacking and
legal.
cracking programs, modify these programs to break into computers
Grey Hat Hackers and networks.
Falls between the white hats and the black hats This programs include step by step instructions on how to use it.
Most of the time, they look for vulnerabilities on computer system Corporate Spy
without the owner knowing or having their permission.
Have excellent computer and networking skills.
If the grey hat finds an issue, they will usually report them to the
system owner and will sometimes ask for a small fee to repair the They are hired by competitors to break into the system of their own
issue. organization, meaning the employer of the spy instill its proprietary
If the systems owner doesn't respond to them or comply with the data and information.
request, grey hats will sometimes threaten to post the newly
discovered vulnerability online for the whole world to see. These spy's also help identify security risk in their own organization.
Grey hats are not inherently malicious in their intentions. Corporate Espionage
They're simply looking to get something back for their discoveries. Practice to gain a competitive advantage.
Unethical Employees Different Threats
Unethical Employees may break into their employers computers for Internet and Network Attacks
a variety of reasons.
Information transferred over the networks are more prone to a
Some simply wants to exploit security weakness, others seek higher degree of security risk than those information that are kept
financial gains from selling confidential information, disgruntled on an organizations premises
employees may want to take revenge.
In organization, Network Administrator usually tech measures to
Cyber Extortionist protect a network from security risk.
Someone who demands payment to stop an attack on organizations Internet and Network Attacks Includes:
technology infrastructure.
Malware
Threaten to expose confidential information, exploit security flaw or
Botnet
launch an attach that will compromise your organizations network if
they are not paid a sum of money. DoS Attack (Denial of Service Attack)
May targets the air traffic control system, electricity generating Consist of programs that act without the users knowledge and
companies or telecommunications infrastructure. deliberately alters the operation of computers and mobile devices.
Program that hides in a computer or mobile device and allows When users take some action like opening emails or downloading
someone from a remote location to take full control of the files or software, their device becomes infected with the malware.
computer or device.
Cyber criminals ultimately breaks the security of several users
Botnets computers.
Botnets are networks of hijacked computer devices used to carry The attacker organizes all the infected machines into a network of
out various scams and cyber-attacks. bots that they can remotely manage and control.
Comes from the word "robot" and "network". Often the cyber criminal will seek to infect and control thousands or
millions of computers.
Zombies
How Do Hackers Control a Botnet?
Computers in botnets.
A botnet has a command and control center, this is the server
Owners of these zombies are unaware that their computers or source of all botnet instruction and leadership. This is the bot
devices is being controlled remotely ban an outsider. herders main server and each of the zombie computers gets
Botnets Process commands from it.
Expose To protect the master identity, botnets are operated via remote
programming.
Hackers starts by looking for and finding loop holes in a website
application or human behavior. What are Botnets used for?
The goals is to set the user app for being unknowingly exposed to a Financial Theft
malware infection. Information Theft
Hackers do this through social engineering, visiting infected sites or Sabotage of services
through emails and other online messages.
Selling access to other criminals.
Social Engineers
DoS Attack/Denial of Service Attack
Targets the user via sweet and persuasive talks until they get their
Is an assault whose purpose is to disrupt computer access to an
trust.
Internet service.
Perpetrators carry out a DoS attack in variety of ways. 2 Common Types of Spoofing Schemes
Being able to stop operations temporarily numerous websites. Occurs when an intruder computer fools network to believe its IP
address is associated with a trusted source.
The damage caused by DDoS attack usually is extensive, retailers
lose sales from customer, new websites and search engines lose Perpetrators trick their victims into interacting with the phony
website.
revenue from advertisers and time sensitive information may be
delayed. Email Spoofing
Repeated attacks could destroy reputations of organization causing Occurs when the senders address or other components of an email
of greater loss. header are altered so it appears that the email message is
originated from a different sender.
Backdoor
Commonly used in virus hoaxes, scam and phishing scams spoof.
Program or set of instruction in a program that allows users to
bypass security controls when accessing a program, computer or How To Protect Against Internet and Network Attack
network.
Use of anti-virus software
Once perpetrators gain access to ones computer, they often install a
backdoor or modify an existing program to include a back door Be suspicious of unsolicited email attachments.
which allows to continue to access computer remotely without the Scan removable media for malware before using it.
users knowledge.
Implement firewall solutions.
A rootkit can be a backdoor, some worms lives backdoors which
have been used to spread other worms or to distribute spam from Backup regularly.
the unsuspecting victim computers.
Firewall
Programmers often build back backdoors into programs during
Is a hardware and/or software that protects a network's resources
system development.
from intrusion by users on another network, such as the internet.
Spoofing
A network security device that monitors incoming and outgoing
A technique intruders use to make their network or internet network traffic, it permits and blocks data packets based on a set of
transmission appear legitimate to a victim computer or network. security rules.
Its purpose is to establish a barrier between your internal network Safeguard Against Unauthorized Access and Use
and incoming traffic from external sources such as the internet in
AUP/Acceptable Use Policy
order to block such malicious traffic like viruses and hackers.
Outlines the activities for which the computer and network may or
Can either be software or hardware, it's best to have both
may not be used.
Software Firewall
Unauthorized Access and Use To minimize the chance that a perpetrator initially may access or an
employee accidentally may access confidential information on a
Unauthorized Access computer.
Is the use of a computer or network without permission. A security measure that define who can access a computer, when
Unauthorized Use they can access it and what actions they can take while accessing it.
Is the use of computer or its data for unapproved or possibly illegal The computer device or network should maintain an audit trail.
activities. Audit Trail
Home and business users can be a target of unauthorized access Records in a file both successful and unsuccessful access attempts.
and use.
Unsuccessful access attempts can have 2 meanings: A user
Includes a variety of a activities, an employee using an organizations mistyping his/her password or a perpetrator trying thousands of
computer send personal email messages. passwords.
User Names and Passwords Examples: Budgets, cards, smartcards and keys.
A unique combination of characters such as letters or numbers that Authenticates a persons identity by translating a personal
identifies one specific user. characteristics such as fingerprint into a digital code that is
compared with a digital code stored on a computer or a mobile
Password device verifying a physical and behavioral characteristics.
Private combination of characters associated with the user name Different Biometric Devices Commonly Used in the Organization
that allows access to certain computer resources.
Fingerprint Reader/Fingerprint Scanner
Passphrase
Captures curves and indentions of a fingerprint.
Instead of passwords, some organization use passphrases to
authenticate users. Organization used fingerprint readers to secure doors, computers
and software.
Is a private combination of words often containing mixed
capitalization and punctuation associated with a user name that With the cost of fingerprint reader becomes cheaper, some home
allows access to certain computer resources. and business install finger print readers to authenticate users before
they can access a personal computer.
Often can be to 100 characters in length ate more secured than
passwords, yet can be easy to remember because they contain The reader can also be setup to perform different functions for
words. different fingers.
PIN/Personal Identification Number Using fingerprint, users can unlock a computer or device, sign in to
programs and websites and in some devices, test their blood
Sometimes called "passcode". pressures and heart rate.
A numeric password either assigned by the company or selected by Face Recognition System
a user.
Captures a live face image and compares it with the stored image to
PIN's provide an additional type of security. determine if the person is a legitimate user.
Select PIN's careful and protect them as you do the other password. Some building use face recognition system to secures access to
Possessed Objects rooms.
Any item that you must possess or care with you in order to gain Law enforcements, surveillance systems, and airports use face
access to computer or computer facility. recognition to protect the public.
Some mobile devices use face recognition system to unlock the These patterns are as unique as the fingerprint.
device.
Quite expensive and are used by government security organizations,
Hand Geometry System the military and financial institutions that deal with highly sensitive
data.
Measures the shape and size of a persons hand.
Retinal Scanners
Because Hand Geometry System can be expensive they are often
used by larger companies to track workers time and attendance or Works similarly instead scam patterns of blood vessels in the back of
as security device. the retina.
Compares a persons live speech with their stored voice pattern. Also known as "Two Factor Verification".
Larger organizations used this as time and attendance devices. A computer or mobile device uses to separate methods one after
the other to verify the identity of the user.
Many companies is also use this technology for access to sensitive
files and networks. ATM's usually requires a two-step verification. First step is the
insertion of the ATM card to the machine and the second step is
Some financial services, use this to secure phone banking entering the pin code of the card.
transactions.
Digital Forensics
Signature Verification System
Also called "Cyber Forensics"
Recognizes the shape of your hand-written signature for as well as
measures the pressure exerted and the motion used to write the The discovery, collection and analysis of evidence found on
signature. computers and networks.
Use a specialized pen and tablet. Digital forensics involves the examination of media, programs, data
and log files of computers, mobile devices, servers and networks.
Often are used to reduce fraud in financial institutions.
A Digital Forensic Examiner must have knowledge of the law,
Iris Recognition System technical experience with many types of hardware and software
High security areas use Iris Recognition System. products, superior communications skills, familiarity with corporate
structures and policies, willingness to learn and update skills and
The camera uses iris recognition technology to read patterns in the problem solving.
iris of the eye.
IT: Lesson E2 Some companies escort their employee for the premises
immediately.
Software Theft
Many manufacturers incorporate an activation process into their
Occurs when someone steals software media, intentionally erasing programs to ensure the software is not installed on more computer
software or programs, illegally registers or activate the program or than legally licensed.
illegally copies the programs. Users provide software products identification number.
License Agreements
A perpetrator copies software from manufacturers, software piracy A legal agreement that permits a user to install a software on
or simply piracy is unauthorized and illegal duplication of multiple computers usually at a volume a discount.
copyrighted software.
Piracy Information Theft
Most common form of software theft. Occurs when someone steals personal or confidential information.
Both business and home users can fall victim into information theft.
Often is link to other types of cybercrime.
Safeguards Against Software Thefts Safeguards Against Information Theft
Owners should keep original software boxes and media. Organization implementing the user identification and
All computer user should back-up their files and drive regularly. authentication control.
These controls are the best suited for protecting information for Advantage of Encryption
computers located on the organization premise.
Even if the information is stolen during the transmission process, it
Organization and individuals use 3 popular techniques.
will be useless for the hackers because they will not understand or
3 Popular Techniques
get any meaning from the stolen data.
Encryption
VPN
Virtual Private Network
Digital Certificates
Commonly described as network within network.
It is a private network between a public network which is the
internet.
Encryption
Data transmission using VPN is faster and more secured because the
data exchanged is just between the user and the service provider.
No other traffic enters the network.
VPN services establishes secured and encrypted connections to
provide greater privacy than even a secured Wi-Fi hotspots.
Plain Text – When you create a message
Encryption – Process to Cypher Text Digital Signature
Cipher Text – Message with no meaning An encrypted code that a person, website or organization attached
Decryption – Process to plain text to an electronic message to verify the identity of the message
sender.
Plain Text – To be understood by the receiver
Often are used to ensure that an impostor is not participating in an
internet transaction.
It can help to prevent email forgery.
Also can verify the content of the message has not changes.
Digital signature is different from E-signature. Failure
E-Signature
Aging hardware, natural or non-made disasters, or random events
Is a signature created digitally. such as electrical power problems, and even cross in programs or
When you create and E-Sig, the system is actually creating an apps.
encrypted code for that signature which is sent together with your
message.
Backup
Digital Certificate
Ultimate safeguard that the company use to avoid those disasters.
A notice that guarantees a user or a website is legitimate.
To protect against data loss caused by hardware, software,
E-commerce application commonly use Digital Certificates.
information theft or system failure, user should backup computer
When you access a websites especially for financial transactions, it is
files regularly.
recommended that you check the website that has a digital
A backup file is a duplicate of a file, program or media that can be
certificate.
used if the original is lost, damaged or destroyed.
They are normally displayed at the bottom part of the homepage of
To backup file means to copy that file.
the site.
Offsite Backup
The extra copy is allocated away from where you typically store or
use your mobile computer or mobile device.
Minimizes the chance that a single disaster such as fire would
destroy both the original and the backup media.
An offsite location can be a safe deposit box at the bank, briefcase
kept away from the location of the computers or cloud storage or
cloud backup.
Certificate Authority
Types of Backup
Is a trusted third party that takes responsibility for verifying the
senders identity before issuing a certificate. Full Backup
Individuals and companies can purchase digital certificates from one
Copies all the files from the computer to the media.
of more than 35 online certificate authority providers.
Advantage, fastest recovery method.
Disadvantage, requires the longest backup time.
Hardware Theft Differential
Act of stealing digital equipment. Copies on the files that have changed since the last full backup.
Vandalism Advantage, fast backup method, requires minimal storage space to
backup.
Involves defacing or destroying digital equipment.
Disadvantage, recovery is time consuming because the last full
backup plus the differential makeup are both needed.
Incremental Backup o Perpetrators sometimes connect to wireless networks of
other people to gain free internet access.
Copies only the files that have changed since the last full or
o Others may try to wirelessly access confidential data.
incremental backup.
Advantage, fastest backup method, requires minimal storage space
to backup, only most recent changes are saved. Ethics and Society
Disadvantage, recovery is most time consuming because the last full
Ethics
backup and all incremental backup since the last full backup are
needed. The standards that determine whether an action is good or bad are
Selective known as ethics.
Technology Ethics
Users choose which folders and files to include in a backup.
Advantage, this is a fast backup method and provides great Are the moral guidelines that governs the use of computers, mobile
flexibility. devices, information system and related technologies.
Disadvantage, it is difficult to manage individual file backups. Least
manageable of all backup methods.
Continuous Information Accuracy
All data is backup whenever a change is made. The concern today because many users access information maintain
by other people or company.
The only real time backup.
Users should evaluate the value of a webpage before relying on its
Advantage, very fast recovery of data.
content.
Disadvantage, very expensive and requires a great amount of
Ex. Delivery driver – Old GPS.
storage.
Cloud
Cookie is a small text file that web server stores on your computers.
Green Computing
Cookie files typically contain data about you such as username,
People use and often waste resources such as electricity and paper location or viewing preferences. These cookies may obtain their
while using technology. values when a user files in an online form requesting personal
Involves reducing the electricity and environmental waste while information.
using computers, mobile devices and other related technologies. Online shopping sites generally use accession cookie to keep track
An organization can implement a variety of measures to reduce the items on users shopping cart.
electrical waste. Many commercial sites send a cookie to your browsers. Your
Includes: computer hard drive stores the cookies.
A website can react data only form its own cookie files stored on
Use of sleep modes and other power management features. your hard drive.
Buying computers and devices with low consumption processors It cannot access or view any other data on your hard drive including
and power supplies. another cookie file.
Information Privacy
Phishing A program that displays an online advertisement in a banner, a
popup ad window on webpages, email messages or other internet
Scam in which a perpetrator send an official looking email message
services.
that attempts to obtain your personal or financial information.
Sometimes spyware is hidden in hardware.
These messages look legitimate and often request for private
To remove spyware and adware, obtain spyware removers, adware
information like ATM PIN.
removers or malware removers that can detect spyware and
The only way to protect yourself from phishing scam is never to give
adware.
personal information to anybody especially by a phone, email or
website.
Click Jacking Social Engineering
An object that can be tapped or clicked like a button or an image or Define as gaining unauthorized access too or obtaining confidential
a link on a website, popup ad or pop under ad or an email message information by taking advantage of the trusting human nature of
contains malicious program. dome victims and naivety of others
Whenever the user tap or clicks the disguise object, a variety of Some social engineers trick their victim into revealing confidential
malicious event may occur. information such as username and password.
Techniques include pretending to be administered or other
authoritative figure.
Spyware and Adware
Social engineers also obtain information from users who do not
Spyware destroy or conceal information properly.
To protect yourself, verify the identity of any person or organization
Is a program placed on the computer or mobile device to secretly
requesting persona and confidential information.
collects information about the user and then communicates the
Ensure that only authorized people can see your screen
information it collects to some outside source while the user is
Shred all sensitive or confidential documents.
online.
After using a public computer, clear the cache in the browser.
Some vendors or employees use spyware to collect information
about program usage of employees.
Internet advertising firms often collect information about users web Employee Monitoring
browsing habits.
Includes the use of computer, mobile devices or cameras to observe
Spyware can enter your computer when you install a new program
record and review and employee’s use of a technology suing a
through a malware or a graphic on a webpage or in an email
communication.
message.
It is legal for employees to use this program.
Content Filtering
Privacy Loss