You are on page 1of 14

Lesson 1

Internet - the interconnection of computers on a global scale. It is the biggest network in


the world today, connecting computer from all over the world.
Internet Service Provider (ISP) - Provides internet connection.
Examples are: PLDT DSL, Globe, Smartbro, Converge
World Wide Web (WWW) -The infrastructure or application to support email, and peer-
to- peer
networks for file sharing and telephony.
Website - collection of web pages connected with each other through hyperlinks.
Web pages are simply text documents.
Web Browsers - Are application or software that allows us to see web sites.
A web browser simply interprets the HTML document (e.g. the Web page) and displays
the content as specified in the HTML document.
Web Addresses
There are six of extensions that help to divide the computers on the Internet into
understandable groups or domains.
These six domains include:
○ .com = commercial
○ .gov = government
○ .edu = education
○ .org = organizations
○ .net = networks
○ .mil = military.
There are also extensions for sites
● .jp = Japan,
● .uk = United Kingdom,
● .fr = France
● .ph = Philippines
● .sg = Singapore

How to search the web?


Web Search
1. Go to a search engine
2. Type what you are looking for into the search bar
3. Press the “enter” or “return” key to run your search

Electronic Mail - often abbreviated as email, e.mail or e-mail, is a method of exchanging


digital messages.
E-mail systems are based on a store-and-forward model in which e-mail computer server
systems accept, forward, deliver and store messages on behalf of users, who only need
to connect to the e-mail infrastructure, typically, an e-mail server, with a network-enabled
device (e.g., a personal computer) for the duration of message submission or retrieval.

Header fields
The message header should include at least the following fields:
● From: The e-mail address, and optionally the name of the author(s). In many e-mail
clients not changeable except through changing account settings.
● To: The e-mail address(es), and optionally name(s) of the message's recipient(s).
Indicates primary recipients (multiple allowed), for secondary recipients see Cc: and Bcc:
below.
● Subject: A brief summary of the topic of the message.
● Date: The local time and date when the message was written.
● Message-ID: Also an automatically generated field; used to prevent multiple delivery
and for reference in In-Reply-To: (see below).
Lesson 2 – 3

Data transmission - the transfer of data from one digital device to another. This is
simply when data is sent over a communication medium.
The medium is:
● One computer to another
● Communication devices such as smart phones
● Electronic devices such as a Bluetooth devices

How can data be sent?


Data transmission is mainly used for sending and receiving digital data.
How does the data travel?
The digital signal will originate from the device in the form of separate signals.
These signals can be sent through:
● Copper cable
● Wireless signals
● Fibre optic cable

Types of Transmission
1. Simplex Transmission - This is a one-way transmission
2. Half Duplex Transmission - Communication can occur in both directions but only on
direction at a time
3. Full Duplex Transmission- Communication can occur in both directions at the same
time.
Examples of Communication Systems
- E-mail
- Voice Mail
- Fax
- Smart Phone
- Instant Messaging
- Telecommuting
- Video-conferencing
- E-Commerce
- The Internet
- The Web

5 Basic Components of Data Communication


1. Sender/Data Source
To transfer message from source to destination, someone must be there who will play
role of a
source.
Sender plays part of a source in data communication system. It is simple a device that
sends data message. The device could be in form of a computer, mobile, telephone,
laptop, video camera, or a workstation, etc.
2. Transmitter
Device use to transmit data
3. Transmission Medium
In entire process of data communication, there must be something which could act as a
bridge between sender and receiver. Transmission medium plays that part. It is physical
path by which data or message travels from sender to receiver. Transmission medium
could be guided (with wires) or unguided (without wires), for example, twisted pair
cable, fiber optic cable, radio waves, etc.
4. Receiver
It is destination where finally message sent by source has arrived. It is a device that
receives message. Same as sender, receiver can also be in form of a computer,
telephone mobile, workstation, etc.
5. Message
This is most useful asset of a data communication system. The message simply refers
to data or piece of information which is to be communicated.
A message could be in any form, it may be in form of a text file, an audio file, a video
file, etc.

Data Communication Components

Computer Network - Also referred to as a data network, is a series of interconnected


nodes that can transmit, receive and exchange data, voice and video traffic.

Examples of nodes in a network include servers or modems.

Computer networks commonly help endpoint users share resources and communicate.

The use of computer networks can overcome geographic barriers and enable the sharing
of
information. Computer networks enable the usage and sharing of any number of
applications
and services, including emails, video, audio and plenty of other types of data, over the
internet.

Uses of Computer Network


● file sharing, which enables users to share data files through a network;
● application sharing, which enables users to share applications through a network;
● hardware sharing, which enables users in a network to share hardware devices,
such as
printers and hard drives;
● communication, which can include video, text and voice;
● e-commerce, which enables users to sell and buy products over the internet; and
● gaming, which enables multiple users to play together from various locations.

Advantages of Computer Network


● file sharing, which enables users to share data between users;
● resource sharing, which enables users to share multiple devices, such as copiers
and
printers;
● communication, which enables users to send and receive messages and data in real
time
from multiple devices;
● convenience in that data is accessible through an internet connection;
● cost in that there are reduced hardware costs since networked devices can share
resources; and
● storage, which enables users to access data that's stored remotely or on other
network
devices.

Three Types of Networks


1. Local Area Network
● A Local Area Network spans a relatively small area
● LAN are usually confined to one building or a group of
buildings
● Data travel between network devices via network cables.
● The most common type of Local Area Network is called Ethernet

2. Wide Area Network (WAN)


● A Wide Area Network exist over a large area
● Data travels through telephone or cable lines
● Usually requires a Modem
● The big example of wide area network is internet. On internet we transfer files from
one computer to other. There is ftp, http and https protocols are used to transfer files on
the internet
3. Peer to Peer Network
is created when two or more PCs are connected and share resources without going
through a separate server computer.

What is a network topology?


A topology is a layout of how a network communicates with different devices
Wired and wireless topologies

Three Basic Topologies


1. Star Topology
All computers are connected to a central wiring point such as a hub or a switch which
acts as a server.
Advantages:
● Centralized management of the network, through the use of the central computer,
hub, or switch.
● Easy to add another computer to the network.
● If one computer on the network fails, the rest of the network continues to function
normally.
Disadvantage:
● If the central computer, hub, or switch fails, the entire network goes down and all
computers are disconnected from the network.

2. Ring Topology
Ring topology is a network configuration where device connections create a circular
data path. In this, each device is connected to with its exactly two neighboring devices,
like points on a circle which forms like a ring structure.
Advantages:
● There is no need of server to control the connectivity among the nodes in the
topology.
● Easy to manage.
● Speed to transfer the data is very high in this type of topology.
Disadvantages:
● If one workstation shuts down, it affects whole network or if a node goes down entire
network goes down.
● In order for all the computer to communicate with each other, all computer must be
turned on.

3. Bus Topology
With a bus topology, all devices are connected to a single cable, often called the
backbone. There are terminators at each end of the bus that stops the signal and keeps
it from traveling backwards
Advantages:
● Requires less cable length than a star topology.
● It works very efficient well when there is a small network.
● It is easy to connect or remove devices in this network without affecting any other
device.
Disadvantages:
● Terminators are required at both ends of the backbone cable.
● Difficult to identify the problem if the entire network shuts down.
● A major flaw in the bus topology is that it can’t handle a large amount of data.
Final Lesson
1. Electronic Payment System
E-payment means making payment through electronic media by using credit or debit
cards for the products bought electronically. In e-payment system there is no physical
delivery of cash or cheque.
E-payment systems are widely used in air ticketing, insurance, banking, retail, health
care, online markets and even government institutions.

Types of E-Payment Systems


Electronic Fund Transfer (EFT)
This is a computer-based system that facilitated the transfer of money or the processing
of financial transactions between two financial institutions the same day or overnight.

E-money or E-cash
It is an electronic medium for making payments and is the trend today. It is the creation
of electronic money or tokens, usually by a bank, which buyers and sellers trade for goods
and services.
E-cash includes debit cards, credit cards, automated clearing house

E-Payment Media
1. Credit Card
- Credit cards are the most widely used and convenient method of making online payment.
- By using these cards, customers can purchase goods and services either offline or
online without making immediate payment.
- Payment to the sellers will be made by the customer’s bank.
- Credit card is a financial instrument which can be used more than once to borrow money
or buy goods and services on credit.
- It is a small plastic card bearing the name and the number of the holder.
- It also contains the validity period and other important particulars. The name of the bank
etc.
2. Debit Card
- Debit cards are issued by bank to their customers who have maintained an account in
the bank with sufficient credit balance.
- Each time the customer makes a purchase, an amount equal to the purchase is debited
in his account
- When using a debit card, customers are drawing money from their account
3. Electronic Cheque
- electronic cheques are very similar to ordinary paper cheques except that they are
initiated electronically.
- Digital signatures used for signing and endorsing electronic cheques.
4. E-Wallet
- This is another e-payment system which operates like a carrier e-cash and information
in the same way a real world wallet functions such as carrying real cash.
- The aim is to give customers a single, simple and secure way of carrying currency
electronically.
Security Threats in the E-Commerce Environment
1. Spam E-mails
The spammers usually hack individual or organizational email accounts that you know to
send spam emails to make you believe the spam email is legitimate.
The emails are linked to infected and phishing sites that compromise the computer’s
security and compromise the store.

2. Credit and Debit Card Fraud


Identity theft fraud through credit and debit cards fraud is a serious threat, with an
estimated loss of $24 billion annually. This happens when someone steals credit or debit
card details from unsuspecting victims and then uses those details to make purchases
from e-commerce stores.
The store goes ahead and processes the order, not knowing the card detail are stolen,
resulting in lost revenue from a chargeback.

4. Phishing
Phishing is one of the main ways that hackers use to compromise eCommerce stores.
This type of social engineering entails stealing login and password details by sending out
spam emails under the disguise of a well-known person or organization.
They can even create a phishing profile that resembles the login page of your payment
processor or e-commerce site and send you a message to log in to fix an error. Once
you fall for this and try to log in, they capture your login details and use them to log into
the real e-commerce or payment processor sites.

5. Identity Fraud
Identity fraud involves the unauthorized use of another person’s personal data, such as
social security, driver’s license, and/or credit card numbers, as well as user names and
password, for illegal financial benefit. Criminals can use such data to obtain loans,
purchase merchandise, or obtain other services, such as mobile phone or other utility
services.
Cybercriminals employ many of the techniques described previously, such as spyware,
phishing, data breaches, and credit card theft, for the purpose of identity fraud.

2021 has seen most businesses transition from offline to online operation modes, which
translates to increased safety issues.
An online business is only as safe as its cybersecurity strategy is. Invest in robust and
premium cyber security assistance that fits your needs and budget.
2. Social Media and Electronic Platform for Administrative
Professionals
Social Media as Means of Information Dissemination
In this age of the internet, knowledge can be shared instantly and people are able to
access information quicker and easier than ever before. Social Media is the most
effective tool for sharing and marketing.

Scientists and researchers need to use this tool to their advantage in order to promote
their work and share information with the world. But to promote any kind of item
including academic research, a knowledge of social media and its impact is required.

Changing the Way Scientific Knowledge is Disseminated


With the rise of the internet and social media specifically, people are wanting to be more
and more involved in the work that is being done around the world. People want to know
what is being studied and why it is important for them. The communication of science has
become immensely important in the world of academia and it is likely that it will only
continue to grow.

Understanding this and using it to your advantage will help you share your work with not
only the science community but also the world

Blogging and vlogging have become a new way for scientists to share their work with the
general public. Science news media is a growing industry, with magazines, websites, TV
shows and documentaries. Scientists need to take advantage of these platforms in order
to share their work with more of the world.

Using Twitter
It is a microblogging system that enables real-time interaction between posters and
followers. The advantage to using twitter is the ability to post links to other websites and
tag certain themes to attract readers to your posts. For example, if you post a link to your
recently published paper, you can write a short blurb giving readers information
about the topic, and then you can tag (#hastag) #science, #research, #biology.

Basically, by tagging certain keywords, interested people are more likely going to see
your post.

Using Instagram
Instagram is similar to Twitter, in that it is another microblogging platform, but it largely
focuses on pictures and short video content. It has been flooded with content creators
and influencers that post gorgeous photos and attempt to sell followers products they are
paid to promote.

Using Facebook
The main advantage to Facebook is the ability to create groups and pages. By doing this,
you can create a sort of community of people to collaborate on projects, discuss news,
and learn together.
Using LinkedIn
LinkedIn is now a social networking platform that enables users to connect with other
professionals and share information that they find interesting and relevant.
The advantage of using LinkedIn for knowledge dissemination is that the people who are
likely to engage with your work and posts are those with the goal of professionalism.
The disadvantage is that it is not a very wide-reaching platform, in that you are not going
to reach a diverse group of readers.

Effectively Sharing your Work on Social Media


Regardless of the platform you use, the advantage of sharing your work on social media
is that it spreads easily. If you use the platforms correctly, your work can become
extremely popular and it is possible that you could gain opportunities that you never knew
existed, like speaking at conferences, or on podcasts, or writing for magazines.

Benefits of Using Social Media Marketing


1. You reach large audiences
2. You have a direct connection with your audience
Social media is one of the few marketing strategies that allow you to connect directly with
your audience. You know who is interested in your business because they choose to
follow your social media account.
3. You can create organic content
These platforms enable you to post photos, videos, and more, depending upon the social
media network. It’s a great way to put your brand out in front of people interested in your
business and help them get more familiar with it.
5. You build your brand
Social media also helps you build your brand because it enables sharing. You can share,
retweet, and re-pin content on these platforms. This means that followers can share your
content with their friends and family, which helps expose your brand to more people.
6. You can join social media networks for free
One of the biggest advantages of social media marketing is that it is entirely free to start.
None of the largest platforms have signup fees of any sort, so the only investment you’ll
need to make is in the form of time.

Disadvantages of Social Media


1. You can receive negative feedback
People use social media to post content they love, but they also use it to share
experiences they didn’t love. If someone had a poor experience with your business, it
opens a door of opportunity for them to share their poor experience with others.
2. You open up the potential for embarrassment
It’s easy for posts to go viral on social media. People keep a close eye on the good and
the bad on social media. If you aren’t careful about the content you post, you can end up
embarrassing your company and getting caught in an awkward situation.
3. You have to wait to see results
Social media marketing’s success is predicated on the campaign’s overall success.
Posting one piece of content doesn’t determine the success of your campaign. You must
post multiple pieces of content over a period of time to determine the true success of your
campaign.

3. Creating Google Account


What is a web domain?
Simply put, a domain name (or just 'domain') is the name of a website. It's what comes
after “www.” in a web address

Create a Google Account


A Google account gives you access to many Google products. With a Google account
you can do things like:
• Send and receive email using Gmail
• Find your new favorite video on YouTube
• Download apps from Google Play

4. Pointers to Consider Before Creating a Website


Identifying and Understanding Your Target Audience
A target audience is a broad group of consumers within a defined target market, such as
demographics and psychographic traits shared by the typical customers of a business.
A potential target audience could look like this:
􀀀 Gender: Male
􀀀 Age: 25-40 years old
􀀀 Annual Income: $40,000-80,0000
􀀀 Location: United States
􀀀 Interests: Business and Technology
􀀀 Attitudes: Optimistic and Ambitious
􀀀 Challenges: Lack of Time and Resources

Why should you define your target audience?


Your target audience is the backbone of your business. They are the pillar of your
business. They dictate almost all of your business, product, and marketing decisions that
you make. From the channel you use to the information you share, your target audience
is a priority.

Identifying your target audience can help you develop and understand the languages
being used by them. This will open up your business for well-aligned content production
and creation, an understanding of the timing of the actions and also the identification of
changes and improvements to apply to your products or services.
1. Start with what you know already
Basics like demographics (age, income, education levels, family status, etc.) come in
handy and can help you begin to shape how you identify your audience. Collect data
about the age, education level, income, and so on about your target prospects. You can
be specific on what you want to collect data about. You might be surprised how
demographic data can help drive purchase decisions
2. Research
You are learning from your customer base. You can even carry out primary research if
you want to pick valuable data straight from the mouths of your customers.

Here are some ideas on how to carry out primary research:


• Interview your consumers. This is an excellent way to gather direct information that
can serve as user-generated content and valuable testimonials for your website and
products or services.
• Conduct a focus group. While this is an expensive alternative, it does allow you to
collect more reliable information. This involves gathering a few of your ideal customers
and learning from them. Use this approach if you have enough money.
• Distribute surveys using tools like Google Docs, TypeForm, or SurveyMonkey. You
can encourage participation by giving giveaways.

What is the Purpose of the Website?


1. The Purpose of Informative/Practical Information Websites
The purpose of an information centric website is to convey specific, helpful information
to a specific user/audience so that the reader learns something new or understands a
topic better.

These websites are geared around more actionable information and may contain “how
to’s”, tips and tricks, fix and repair, guidance, support information, directions, instructions,
etc.

2. The Purpose of Entertainment Websites


These websites showcase entertaining information for visitors. Online magazines, gossip
oriented websites, celebrity news, sports coverage, movies, the arts, humorous websites,
etc.

These websites are designed to be easy to navigate and frequently updated in order to
keep users coming back for more information. They can be made more engaging by using
dynamic content, such as videos, podcasts, slideshows, etc.

3. The Purpose of E-Commerce Websites


The purpose of e-commerce websites is to sell products to users. The most successful
websites are carefully optimized to achieve a high percentage of purchases. To achieve
success e-commerce websites need to integrate all of the latest online closing & upsell
techniques available which have been proven to increase the chances that a visitor will
purchase.

4. The Purpose of Blogs


The purpose of a blog is to provide a regularly updated website or web page, typically
one run by an individual or small group, that is written in an informal or conversational
style. Blogs can be started up very easily online using a number of free services, such
as wordpress.com.
There are many personal and professional blogs out there that are entertaining to read
and which give a very personal insight into a person’s life. Blogs can be for entertainment
purposes or used as an online journal or used by companies to keep their customers
abreast of what is going on. The hallmark of a blog is that it’s very easy for an untrained
person to maintain with little to no technical knowledge.

5. The Purpose of Social Media Websites


The purpose of social media websites are to make it very easy to share and connect with
friends, family, co-workers, acquaintances and even strangers. Social media websites
make quick and easy work out of building up a network of connections so as to keep in
touch, share daily experiences, photos, interests, preferences, etc.

Social networks can be used for both personal and commercial purposes. Businesses
use social networks to build direct connections with their customers which allows them to
get feedback on their products and services and allows them to learn more about what
their customers really need and want.

5. Naming Your Website and Filename


1. Stick with .com
While it can be tempting to come up with clever blog names using new extensions, .com
is still the most established and credible domain name extension.
2. Make your Domain Name Easy to Pronounce and Spell
If you’re planning to use your domain name to create a professional business email
address, then it definitely should be easy to understand and spell for any listener.
3. Keep it Unique and Brandable
Your blog domain name must be unique, so you can stand out in your readers’ minds. It’s
smart to research other blogs in your niche and find out what domain names they’re using.
4. Avoid Hyphens
If you’re planning to use your domain name to create a professional business email
address, then it definitely should be easy to understand and spell for any listener.
5. Research Your Domain Name
Before you register a domain name, try to find out if there is already a registered business
using the same name. You can perform a trademark search to see if there is already a
similar or exact name already trademarked.

You might also like