You are on page 1of 38

Marquee Series Microsoft Office

2016
Information Technology CONCEPTS
The Information  Computer Software
Processing Cycle  Networks
Input
CHECKPOINT 2
Processing  The Internet
Output
 Security Issues
Storage  Email Etiquette and
CHECKPOINT 1 Computer Ethics
System Unit Ports CHECKPOINT 3

© Paradigm Publishing, Inc. 2 Concepts


The Information Processing Cycle
 The information processing cycle can be divided into four
segments:
1. Input
2. Processing
3. Output
4. Storage

© Paradigm Publishing, Inc. 3 Concepts


Input
 A keyboard is primarily used for typing text.
 A mouse is a pointing device used to issue
commands and select text or files.
 With a touchpad, move your forefinger
across the pad to position the cursor, then
use your thumb to press the button located
at the bottom of the pad.
 A touch screen allows you to select an item
and input commands by physically touching
a specific area of the monitor.

© Paradigm Publishing, Inc. 4 Concepts


Input…continued
 A scanner works like a photocopier to transfer
pictures or text into the computer.
 Better detail can be achieved with a digitizing
pen and drawing tablet.
 A joystick is an input device used to move
objects on a computer screen and is a
common input device for computer gaming.
 A digital camera captures images in a digital
format and often contains an output device
for viewing those images.
 A webcam is a digital camera that can be
controlled remotely over the Internet.

© Paradigm Publishing, Inc. 5 Concepts


Input…continued
 With a microphone you can add a “sound
bite” to a computerized slide presentation
or speak to a friend over the Internet.
 A bar code reader scans a UPC, and
resulting input can be used to check a
patient’s identity and medication
requirements.
 Flash drives are small, easy-to-handle,
portable storage devices that many people
use to carry important data with them
wherever they go.

© Paradigm Publishing, Inc. 6 Concepts


Processing
 A processor chip performs the
calculations in a computer.
 Memory chips are the hardware that
provides the workspace for the data and
instructions the computer is processing.
 The motherboard is a container for the
computer’s CPU and RAM, and contains
slots for adding expansion cards.

© Paradigm Publishing, Inc. 7 Concepts


Output
 A monitor is the screen used to
display graphics and text.
 Printers provide hard copy
printouts on paper.
 Speakers and headphones provide
audio output in stereo for movies,
radio programs, streaming video,
online learning courses, and
telephone calls.

© Paradigm Publishing, Inc. 8 Concepts


Storage

 Hard drives contain a stack of metal platters


(disks), a drive motor, and read/write heads.
 Data CDs are made of the same material that
is used for music CDs.
 DVDs can hold from 4 GB to 8 GB, depending
on whether they can record on both sides
and on one or two layers per side.
 Blu-ray discs are used both for high-
definition video and for data.
 The flash drive storage device has a USB
connector that fits into a standard USB port.

© Paradigm Publishing, Inc. 9 Concepts


CHECK POINT 1
1) The information processing cycle 3) This is a temporary version and
can be divided into how many includes any output that cannot be
segments? physically handled.
a. 2 a. hard copy
b. 3 b. soft copy
c. 4 c. temp copy
Answer Answer
d. 5 d. perm copy
Next Question Next Question

2) This works like a photocopier to 4) CDs can hold about this much
transfer pictures or text into the data.
computer. a. 100 MB
a. scanner b. 100 GB
b. mouse c. 700 MB
c. touch pad d. 700 GB
d. joystick
Answer Answer
Next Question Next Slide
© Paradigm Publishing, Inc. 10 Concepts
System Unit Ports
 Ports are the sockets that the input, output, and storage devices
plug into as displayed in the image on this slide.
 In the early days of personal computing, serial, parallel, and
printer cables and ports were found on all PCs. Today, most
peripheral devices use Universal Serial Bus (USB) cables and ports.

© Paradigm Publishing, Inc. 11 Concepts


Computer Software
 Software refers to the operating
instructions and applications that
allow computers to process the
numbers, pictures, sounds, and text
we enter into them.
 Today, most operating systems use
Graphical User Interfaces (GUIs), in
which a mouse is used to manipulate
graphic objects such as icons and
windows onscreen.
 The Windows 10 operating systems
require a CPU that runs at 1 GHz and
has 1 GB of RAM.
 The Mac OS X operating system can
run on IBM-compatible PCs.

© Paradigm Publishing, Inc. 12 Concepts


Computer Software…continued
 The thousands of software
applications available provide the
instructions that empower users to
perform these and other tasks from
the mundane to the amazing.
 A word processing program such as
Microsoft Word can support photos
and drawings, mathematical
calculations, text in table format,
text in varying sizes, shapes, and
colors, and even sound bites.
 Spreadsheet software such as
Microsoft Excel can be used for both
simple and complex calculations.

© Paradigm Publishing, Inc. 13 Concepts


Computer Software…continued
 Database software such as
Microsoft Access is designed
to keep track of information.

 Presentation software such


as Microsoft PowerPoint
allows users to create slide
shows that can be viewed on
the computer or projected
onto a large screen.

© Paradigm Publishing, Inc. 14 Concepts


Computer Software…continued
 Photo editing software is used to
organize, retouch, and edit
photographs and videos that have
been saved on CDs and DVDs,
scanned, or transferred directly
from the camera to a PC.
 Applications such as CorelDraw,
Adobe Illustrator, and PaintShop
Pro are popular software
packages that provide the tools
to design graphical images that
can be used for web pages,
posters, marketing brochures,
and greeting cards.
© Paradigm Publishing, Inc. 15 Concepts
Computer Software…continued
 Software applications are often bundled into
packages called suites.
 Money management software enables users
to manage their money by helping them pay
bills, balance checkbooks, keep track of
income and expenses, maintain investment
records, and manage other financial activities.
 Tax preparation software allows users to
efficiently fill out state and federal tax forms,
submit them electronically, and direct the
refund to your bank account.

© Paradigm Publishing, Inc. 16 Concepts


Computer Software…continued
 Microsoft Outlook and Lotus Organizer are examples of
personal information management (PIM) programs that keep
track of your to-do list, address book, and personal calendar.
 Collaborative software or groupware, such as Lotus Notes and
Microsoft Office SharePoint, provide a way to keep track of
who has made or suggested changes to documents or plans
and to distribute everything electronically.

© Paradigm Publishing, Inc. 17 Concepts


Computer Software…continued
 Today’s games contain high-quality 3D animation, sound, and
action that are very realistic.
 Open source software is the general term for applications that
are provided completely free of charge, with no license fees or
restrictions, and no copyrights to worry about. You can
download the software, copy it, and give it to your friends.

© Paradigm Publishing, Inc. 18 Concepts


Networks
 A Local Area Network (LAN)
consists of several computers
that are physically connected to
one another via a central hub
called a switch.

 LANs can be connected to one


another to form Wide Area
Networks (WANs).

© Paradigm Publishing, Inc. 19 Concepts


Networks…continued
 Clients are the computer
workstations where end users run
the various applications necessary
for them to do their jobs.

 Servers are data providers that are


often larger and more powerful
computers than clients. They house
the network operating system
software that organizes the sharing
of data among the end users’ PCs.

© Paradigm Publishing, Inc. 20 Concepts


Networks…continued

 A switch provides a central


connection place for cables from
multiple computers.

 A router enables you to join two or


more networks, or to join your LAN
to the Internet.

© Paradigm Publishing, Inc. 21 Concepts


Networks…continued
 The PCs that make up a network have to be connected to each
other in some way.
 The original method uses physical cables containing several
strands of wire.
 The latest method is wireless and uses radio frequencies to
carry data over short distances from a PC to a switch or router.
 All the devices are often located in the same room, but the
signals are strong enough to penetrate the types of walls found
in homes and offices.
 The most commonly used network cable is unshielded twisted
pair cable (UTP).

© Paradigm Publishing, Inc. 22 Concepts


Networks…continued
COMMON NETWORK PROTOCOLS
802.11ac is the current Wi-Fi standard. It has a maximum data rate of 1,300 Mbps
and a range of about 70 meters indoors or 250 meters outdoors.
802.11n is the most common Wi-Fi standard; many 802.11n devices are still in use
today. It has a maximum data rate of 450 Mbps and a range of about 70 meters
indoors or 250 meters outdoors.
802.11g is an earlier Wi-Fi standard. It has a maximum data rate of 54 Mbps and a
range of 38 meters indoors or 140 meters outdoors.
802.11b and 802.11a are now obsolete Wi-Fi standards, with maximum data rates
of 54 Mbps and 11 Mbps, respectively.
TCP/IP (Transmission Control Protocol/Internet Protocol) defines the rules for
sending and receiving data between network devices. Each device has a unique IP
address, which is a series of four numbers between 0 and 255, separated by
periods, like this: 192.168.0.1.

continued on next slide…


© Paradigm Publishing, Inc. 23 Concepts
Networks…continued
HTTP (HyperText Transfer Protocol) defines the rules for sending and receiving web pages
(hypertext) on the Internet. For example, you might see http://
ParadigmCollege/myschool.edu on the uniform resource locator (URL) or Address line of
your Internet browser. Figure 8 shows how data travels across the Internet.
HTTPS (HyperText Transfer Protocol Secure Sockets) encrypts data before sending it over
the web. You can see the letters https on the URL line when you reach a web page asking
for your credit card number or when you are paying your bills online, such as
https://emcp/mybank.com/myaccount.
POP3 is the current version of Post Office Protocol for receiving email. POP is a store-and-
forward system in which your email waits on the mail server until you pick it up via an
email application such as Outlook; then it forwards it to that application.
SMTP (Simple Mail Transfer Protocol) enables you to send email. The message is
transferred to the recipient’s mail server on the Internet, where it waits for the user to
pick it up via his or her email application.
FTP (File Transfer Protocol) provides an efficient, fast way to transfer files between
computers. It is commonly used for files that are too large for email attachments and for
large repositories of files.

© Paradigm Publishing, Inc. 24 Concepts


Networks…continued
 Data moves across the Internet by traveling through a
collection of physical devices.

© Paradigm Publishing, Inc. 25 Concepts


CHECK POINT 2
1) The Windows 8 operating system 3) Software applications are often
requires a CPU that runs at this bundled into packages called this.
speed. a. suites
a. 100 GHz b. collections
b. 100 MHz c. groups
c. 1 GHz d. piles
Answer Answer
d. 1 MHz
Next Question Next Question

2) Microsoft Access is an example of 4) This is the term for applications


this type of program. that are provided completely free
a. word processing of charge.
b. presentation a. Open Use
c. spreadsheet b. Open Source
d. database c. Source Free
d. Source Use
Answer Answer
Next Question Next Slide
© Paradigm Publishing, Inc. 26 Concepts
The Internet
 The World Wide Web is a
collection of hypertext files
containing graphics, audio,
and video that can be
accessed on the Internet.

© Paradigm Publishing, Inc. 27 Concepts


The Internet…continued
 Electronic mail (email) uses its
own protocols (such as SMTP
and POP3) to route a message
between computers on the
Internet and hold it at a
destination mail server until the
recipient picks it up.

 File Transfer Protocol (FTP) is an


information workspace on the
Internet and is used to transfer
files.

© Paradigm Publishing, Inc. 28 Concepts


Security Issues
 Malware is a term describing computer programs that have
malicious intent. Viruses, spyware, ransomware, worms, and
adware programs all fall into this category.

 A computer virus is a string


of code written by someone
who wants to hurt others by
damaging or destroying their
computer files or making
their computer experience
difficult.

© Paradigm Publishing, Inc. 29 Concepts


Security Issues…continued
 A worm is a self-replicating
computer program that
distributes itself via a network.
Unlike a virus, it does not
necessarily attach itself to
another file.

 Named after the infamous Trojan


horse of the Greek legend, a
Trojan is malware that
masquerades as a useful
program.

© Paradigm Publishing, Inc. 30 Concepts


Security Issues…continued
 Spyware tracks your activity as
you surf the Internet and
reports it to companies that
want to sell you their products
—or steal your identity.

 Adware looks at files on your


computer and then sends pop-
up advertisements that try to
sell you products and services.

© Paradigm Publishing, Inc. 31 Concepts


Security Issues…continued
 Several computer programs are
available to provide protection from
virus attacks and from the installation
of spyware or adware on your
computer.
 Some examples are McAfee VirusScan
and BitDefender AntiVirus for viruses;
and Spybot Search & Destroy,
SpySweeper, AdAware, and Spyware
Detector for spyware and adware.
 Windows 10 includes an anti-spyware
program called Windows Defender.

© Paradigm Publishing, Inc. 32 Concepts


Email Etiquette and Computer Ethics
 Etiquette refers to the rules that
govern courteous behavior.
 Etiquette also involves the rules
for language appropriate in a
businesslike environment.
 Using proper etiquette is a way of
showing a person respect.
 Ethics are the moral principles
that govern behavior.
 Ethics are the rules we use to
determine what is right and
wrong.

© Paradigm Publishing, Inc. 33 Concepts


Email Etiquette and Computer Ethics…continued
 Speedy communication with other people all over the world can
be fun, exciting, and productive. However, it can also cause
problems.
 What you write in an email message can hurt someone’s feelings,
be misinterpreted, or might accidentally be sent to the wrong
person.
 You can cause yourself embarrassment or even get yourself fired.

© Paradigm Publishing, Inc. 34 Concepts


Email Etiquette and Computer Ethics…continued
TEN RULES OF EMAIL ETIQUETTE
1. Be brief and to the point. Emails are supposed to be a fast way to
communicate. Don’t slow down the process.
2. Don’t use ALL CAPITAL letters. It looks and feels like you’re shouting or angry.
3. Remember to attach the attachment. Mentioning what you are “attaching”
in any type of email is a good idea. Get in the habit of stopping as soon as
you type the phrase “I am attaching…” and immediately clicking the button
for attaching the file.
4. Use the spelling check (even if you’re a great speller). Using the spelling
check feature only takes a few seconds and it shows that you care about
quality. But watch out! It is easy to click “Change” instead of “Ignore” and
change a person’s name to a common word.
5. Reread what you wrote from the perspective of the receiver. Ask yourself
how the recipient is likely to interpret your words. Did you leave out or
misspell a word that changes the meaning?

continued on next slide…


© Paradigm Publishing, Inc. 35 Concepts
Email Etiquette and Computer Ethics…continued

6. Double-check the address in the To box. Confirm that you clicked the correct
name in your address list. Once you click the Send button, there is no way to
stop the message or undo an address mistake.
7. Watch your language. Profanity can come back to haunt you.
8. Assume your email will be read by lots of other people. Emails are often
forwarded so others can take action or to inform a supervisor. Avoid cute or
friendly asides and comments that you only want a close friend to see.
9. Always put something in the Subject line. A well-written subject will help the
receiver decide where to file your message and whether to read it now or
wait until later.
10. Privacy does not exist in emails, especially those in a corporate environment.
The email administrator can potentially see the contents of any email.
Company policy may allow checking emails to ensure that no company
secrets are exposed, or to stop harassing or abusive email.

© Paradigm Publishing, Inc. 36 Concepts


Email Etiquette and Computer Ethics…continued
 Most software is copyrighted. The exception is open source
software.
 Infringing on a copyright is illegal.

© Paradigm Publishing, Inc. 37 Concepts


CHECK POINT 3
1) This is an information workspace 3) This is a self-replicating computer
on the Internet and is used for file program that distributes itself via a
transfer. network.
a. ftf a. Spyware
b. ftp b. Trojan
c. fpt c. Worm
Answer Answer
d. fft d. Virus
Next Question Next Question

2) This is typically spread via an 4) This refers to the rules that


email attachment. govern courteous behavior.
a. Spyware a. Etiquette
b. Trojan b. Ethics
c. Worm c. Morale
d. Virus d. Protocol
Answer Answer
Next Question Next Slide
© Paradigm Publishing, Inc. 38 Concepts

You might also like