Wednesday 28 September 2016

Chapter 11 Manage Computing Securely, Safely and Ethically

  • Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators
  • Describe various types of Internet and network attacks, and identify ways to safeguard against these attacks
  • Discuss techniques to prevent unauthorized computer access and use
  • Identify safeguards against hardware theft and vandalism
  • Explain the ways software manufacturers protect against software piracy
  • Discuss how encryption works, and explain why it is necessary
  • Discuss the types of devices available that protect computers from system failure
  • Explain the options available for backing up computer resources
  • Identify risks and safeguards associated with wireless communications
  • Recognize issues related to information accuracy, intellectual property rights, codes of conduct, and green computing
  • Discuss issues surrounding information privacy
Computer Security Risks
  • A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
  • A cybercrime is an online or Internet-based illegal act
  1. Hackers 
  2. Crackers
  3. Script Kiddies
  4. Corporate Spies
  5. nethical Employees
  6. Cyberextortionists
  7. Cyberterrorists
Internet and Network Attacks
  • Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises
  • An online security service is a Web site that evaluates your computer to check for Internet and e-mail vulnerabilities
  • Computer Virus-Affects a computer negatively by altering the way the computer works
  • Worm-Copies itself repeatedly, using up resources and possibly shutting down the computer or network
  • Trojan Horse-A malicious program that hides within or looks like a legitimate program
  • Rootkit-Program that hides in a computer and allows someone from a remote location to take full control
  • Users can take several precautions to protect their home and work computers and mobile devices from these malicious infections
  • A botnet is a group of compromised computers connected to a network
  • A denial of service attack (DoS attack) disrupts computer access to Internet services
  • A back door is a program or set of instructions in a program that allow users to bypass security controls
  • Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate
  • A firewall is hardware and/or software that protects a network’s resources from intrusion
  • Intrusion detection software-Analyzes all network traffic, Assesses system vulnerabilities, Identifies any unauthorized intrusions, Notifies network administrators of suspicious behavior patterns or system breaches
  • Honeypot-Vulnerable computer that is set up to entice an intruder to break into it
Unauthorized Access and Use
  • Organizations take several measures to help prevent unauthorized access and use-Acceptable use policy, Disable file and printer sharing, Firewalls, Intrusion detection software
  • Access controls define who can access a computer, when they can access it, and what actions they can take-Two-phase processes called identification and authentication, User name, Password, Passphrase, CAPTCHA
  • A possessed object is any item that you must carry to gain access to a computer or computer facility-Often are used in combination with a personal identification number (PIN)
  • A biometric device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
  • Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks
  • Many areas use digital forensics-Law enforcement, Criminal prosecutors, Military intelligence, Insurance agencies, Information security departments
Hardware Theft and Vandalism
  • Hardware theft is the act of stealing computer equipment
  • Hardware vandalism is the act of defacing or destroying computer equipment
  • To help reduce the of chances of theft, companies and schools use a variety of security measures-Physical access controls, Alarm systems, Cables to lock equipment, Real time location system, Passwords, possessed objects, and biometrics
Software Theft
  • Software theft occurs when someone:-Steals software media, Intentionally erases programs, Illegally copies a program, Illegally registers and/or activates a program
  • Permitted to Install the software on one computer, Make one copy of the software or Remove the software from your computer before giving it away or selling it
  • Not permitted to Install the software on a network, Give copies to friends or colleagues while continuing to use the software, Export the software, Rent or lease the software
  • Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law
  • Some software requires product activation to function fully
Information Theft
  • Information theft occurs when someone steals personal or confidential information
  • Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access
  • A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender Often used to ensure that an impostor is not participating in an Internet transaction
  • Web browsers and Web sites use encryption techniques
  • Popular security techniques include Digital Certificates, Transport Layer Security (TLS), Secure HTTP, VPN
System Failure
  • A system failure is the prolonged malfunction of a computer
  • A variety of factors can lead to system failure, including Aging hardware, Natural disasters, Electrical power problems, Errors in computer programs
  • Two ways to protect from system failures caused by electrical power variations include surge protectors and uninterruptable power supplies (UPS)
  • A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed To back up a file means to make a copy of it
  • Offsite backups are stored in a location separate from the computer site
  • Two categories of backups: Full backup, Selective backup

Tuesday 27 September 2016

Chapter 10 Managing  Database

  • Define the term, database, and explain how a database interacts with data and information
  • Define the term, data integrity, and describe the qualities of valuable information
  • Discuss the terms character, field, record, and file
  • Describe file maintenance techniques and validation techniques
  • Differentiate between a file processing approach and the database approach
  • Discuss the functions common to most database management systems
  • Explain how to access Web databases
  • Describe characteristics of relational, object-oriented, and multidimensional databases
  • Identify database design guidelines and discuss the responsibilities of database analysts and administrators

Step of How a School's Admissions Department Might Process New Student Data into Information
  1. Admin take student picture
  2. Student data stored into database
  3. computer extract data-advisor name, schedule appointment, course taken
  4. comfirmation of advisiry appointment
  5. Admin give student ID with expired date
The Hierarchy of Data
  1. Character
  2. field
  3. records
  4. files
Common Data Type Include
  • Text
  • Numeric
  • AutoNumber
  • Currency
  • Date
  • Memo
File maintenance refers to the procedures that keep data currnt
  • Adding records
  • Modifying records
  • Deleting records
Validation compares data with a set of riles or values to find out of the data is correct
  • Alphabetic / Numeric Check
  • Range check
  • Consistency Check
  • Completeness Check
  • Check Digit
  • Other Check
Chapter 8 Types of Storage

  • Differentiate between storage devices and storage media
  • Describe the characteristics of an internal hard disk including capacity, platters, read/write heads, cylinders, sectors and tracks, revolutions per minute, transfer rate, and access time
  • Discuss the purpose of network attached storage devices, external and removable hard disks, and hard disk controllers
  • Describe the various types of flash memory storage
  • Describe cloud storage and explain its advantages
  • Describe the characteristics of optical discs
  • Differentiate among various types of optical discs: CDs, archive discs and Picture CDs, DVDs, and Blu-ray Discs
  • Identify the uses of tape, magnetic stripe cards, smart cards, microfilm and microfiche, and enterprise storage
Storage
  • Storage holds data, instructions, and information for future use
  • A storage medium is the physical material on which a computer keeps data, instructions, and information
  • Capacity is the number of bytes a storage medium can hold
  • A storage device is the computer hardware that records and/or retrieves items to and from storage media
  • Reading is the process of transferring items from a storage medium into memory
  • Writing is the process of transferring items from memory to a storage medium
Hard Disks
  • A hard disk contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information
  • Hard disks can store data using longitudinal recording or perpendicular recording
  • Characteristics of a hard disk include Capacity, Platters, Read /Write Heads, Cylinders, Sectors and Tracks, Revolutions per Minute, Transfer Rate, Access Time.
  • Formatting is the process of dividing the disk into tracks and sectors so that the operating system can store and locate data and information on the disk
  • The hard disk arms move the read/write head, which reads items and writes items in the drive
  • A head crash occurs when a read/write head touches the surface of a platter
  • Always keep a backup of your hard disk
  • RAID (redundant array of independent disks) is a group of two or more integrated hard disks
  • A network attached storage (NAS) device is a server connected to a network with the sole purpose of providing storage
  • A disk controller consists of a special-purpose chip and electronic circuits that control the transfer of data, instructions, and information from a disk to and from the system bus and other components of the computer
Flash Memory Storage
  • Flash memory chips are a type of solid state media and contain no moving parts
  • Solid state drives (SSDs) have several advantages over magnetic hard disks :- Faster access time, Faster transfer rates, Generate less heat and consume less power, Last longer
  • USB flash drives plug into a USB port on a computer or mobile device
  • An ExpressCard module is a removable device that fits in an ExpressCard slot
  • Developed by the PCMCIA
  • Commonly used in notebook computers
Cloud Storage
  • Cloud storage is an Internet service that provides storage to computer users
  • Users subscribe to cloud storage for a variety of reasons:
  1. Access files from any computer
  2. Store large files instantaneously
  3. Allow others to access their files
  4. View time-critical data and images immediately
  5. Store offsite backups
  6. Provide data center functions
Optical Discs
  • An optical disc consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser
  • Typically store software, data, digital photos, movies, and music
  • Read only vs. rewritable
  • Optical discs commonly store items in a single track that spirals from the center of the disc to the edge
  • Track is divided into evenly sized sectors

Tuesday 13 September 2016

Chapter 7 : Understanding Output
  • Describe the types of output
  • Explain the characteristics of various display devices
  • Describe the factors that affect the quality of an LCD monitor or LCD screen
  • Describe various ways to print
  • Differentiate between a nonimpact printer and an impact printer
  • Summarize the characteristics of ink-jet printers, photo printers, laser printers, multifunction peripherals, thermal printers, mobile printers, label and postage printers, and plotters and large-format printers
  • Describe the uses and characteristics of speakers, headphones, and earbuds
  • Identify the purpose and features of data projectors, interactive whiteboards, and force-feedback game controllers and tactile output
What is Output?
  • Output is data that has been processed into a useful form
  • An output device is any type of hardware component that conveys information to one or more people
What is Display Devices ?
  • A display device visually conveys text, graphics, and video information
  • A monitor is packaged as a separate peripheral
  • Liquid crystal display (LCD) uses a liquid compound to present information on a display device
  • The quality of an LCD monitor or LCD screen depends primarily on Resolution, Response time, Brightness, Dot pitch, Contrast ratio 
  • Resolution is the number of horizontal and vertical pixels in a display device
  • The graphics processing unit (GPU) controls the manipulation and display of graphics on a display device
  • LCD monitors use a digital signal and should plug into a DVI port, an HDMI port, or a DisplayPort
  • Plasma monitors are display devices that use gas plasma technology and offer screen sizes up to 150 inches
  • Televisions also are a good output device require a converter if you are connecting your computer to an analog television
  • Digital television (DTV) offers a crisper, higher-quality output
  • HDTV is the most advanced form of digital television
  • A CRT monitor is a desktop monitor that contains a cathode-ray tube
What is a Printer ?
  • A printer produces text and graphics on a physical medium
  • Printed information is called a hard copy, or printout
  • Landscape or portrait orientation
  • A nonimpact printer forms characters and graphics on a piece of paper without actually striking the paper
  • An ink-jet printer forms characters and graphics by spraying tiny drops of liquid ink onto a piece of paper
  • A photo printer produces color photo-lab-quality pictures
  • A multifunction peripheral (MFP) is a single device that prints, scans, copies, and in some cases, faxes
  • A thermal printer generates images by pushing electrically heated pins against the heat-sensitive paper
  • A mobile printer is a small, lightweight, battery-powered printer that allows a mobile user to print from a notebook computer, smart phone, or other mobile device
  • A label printer is a small printer that prints on adhesive-type material
  • Plotters are used to produce high-quality drawings
  • Large-format printers create photo-realistic quality color prints on a larger scale
  • Impact printers form characters and graphics on a piece of paper by striking a mechanism against an inked ribbon that physically contacts the paper
  • A dot-matrix printer produces printed images when tiny wire pins on a print head mechanism strike an inked ribbon
Chapter 6 : Understanding Input

  • Define input and differentiate among a program, command, and user response
  • Identify the keys and buttons commonly found on desktop computer keyboards, and describe how keyboards for mobile computers and devices differ from desktop computer keyboards
  • Describe different mouse types
  • Describe various types of touch screens and explain how a touch-sensitive pad works
  • Describe various types of pen input, and identify other types of input for smart phones
  • Summarize the purpose of various game controllers
  • Explain how resolution affects the quality of a picture captured on a digital camera
  • Describe the uses of voice recognition, Web cams, and video conferencing
  • Discuss how various scanners and reading devices work
  • Summarize the various biometric devices
  • Discuss how POS terminals, automated teller machines, and DVD kiosks work
  • Identify alternative input devices for physically challenged users
What is Input?
  • Input is any data and instructions entered into the memory of a computer
  • Instructions can be entered into the computer in the form of programs, commands, and user responses
  • An input device is any hardware component that allows users to enter data and instructions into a computer
What is a Keyboard?
  • A keyboard is an input device that contains keys users press to enter data and instructions into a computer
  • Most desktop computer keyboards have between 101 and 105 keys
  • Most desktop computer keyboards have a numeric keypad on the right side of the keyboard
  • Most desktop computer keyboards have function keys, CTRL keys, ALT keys, and arrow keys
  • The insertion point, also known as the cursor, is a symbol on the screen that indicates where the next character you type will appear
  • An ergonomic keyboard has a design that reduces the chance of wrist and hand injuries
  • Ergonomics incorporates comfort, efficiency, and safety into the design of the workplace
  • Keyboards on mobile devices typically are smaller and/or have fewer keys
  • Some phones have predictive text input, which saves time when entering text using the phone’s keypad
What is a Pointing Device?
  • A pointing device is an input device that allows a user to control a pointer on the screen
  • A pointer is a small symbol on the screen whose location and shape change as a user moves a pointing device
  • A mouse is a pointing device that fits under the palm of your hand comfortably
  • A mouse can be wired or wireless
What is Voice Device?
  • Voice input is the process of entering input by speaking into a microphone
  • Voice recognition is the computer’s capability of distinguishing spoken words
  • Audio input is the process of entering any sound into the computer
  • Music production software allows users to record, compose, mix, and edit music and sounds
  • Video input is the process of capturing full-motion images and storing them on a computer’s storage medium
  • A Web cam is a type of digital video camera that enables a user to capture video and still images
  • A Web cam is a type of digital video camera that enables a user to send e-mail messages with video attachments
  • A Web cam is a type of digital video camera that enables a user to add live images to instant messages
  • A Web cam is a type of digital video camera that enables a user to broadcast live images over the Internet
  • A video conference is a meeting between two or more geographically separated people

Monday 12 September 2016

Chapter 5 : Types of Utility Programs and Operating Systems
  • Define system software and identify the two types of system software
  • Summarize the features of several stand-alone operating systems
  • Describe the functions of an operating system
  • Briefly describe various server operating systems
  • Explain the purpose of several utility programs
  • Summarize the startup process on a personal computer
  • Summarize the features of several embedded operating systems
What is a System Software?
  • System software consists of the programs that control or maintain the operations of the computer and its devices
What is an operating system?
  • An operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
  • Example [ Start and shut down a computer, Provide a user interface, Manage programs, Manage memory, Coordinate tasks, Configure devices, Establish an Internet connection, Monitor performance, Provide utilities, Automatically update, Control a network, Administer security ]
The function of operating system:-
  • The process of starting or restarting a computer is called booting including Cold boot and Warm boot 
  • Cold boot is when we turning on a computer that has been powered off completely
  • Warm boot is when we using the operating system to restart a computer
  • You can boot from a boot disk
  • A recovery disk contains a few system files that will start the computer
  • An operating system includes various shut down options
  • A user interface controls how you enter data and instructions and how information is displayed on the screen
  • With a graphical user interface (GUI), you interact with menus and visual images
  • With a command-line interface, a user uses the keyboard to enter data and instructions

Tuesday 6 September 2016

Chapter 4 : System Unit Coponents

  • Differentiate among various styles of system units on desktop computers, notebook computers, and mobile devices
  • Identify chips, adapter cards, and other components of a motherboard
  • Describe the control unit and arithmetic logic unit components of a processor, and explain the four steps in a machine cycle
  • Identify characteristics of various personal computer processors on the market today, and describe the ways processors are cooled
  • Define a bit and describe how a series of bits represents data
  • Explain how program instructions transfer in and out of memory
  • Differentiate among the various types of memory
  • Describe the purpose and types of expansion slots and adapter cards, and differentiate among slots for various removable flash memory devices
  • Differentiate between a port and a connector, and explain the differences among a USB port, FireWire port, Bluetooth port, SCSI port, eSATA port, IrDA port, serial port, and MIDI port
  • Describe the types of buses in a computer
  • Explain the purpose of a power supply and describe how it keeps cool
  • Understand how to clean a system unit on a computer or mobile device
What is a System Unit ? 
  • The system unit is a case that contains electronic components of the computer used to process data
  • The inside of the system unit on a desktop personal computer includes Drive Bay(s), Power Supply, Sound Card, Video Card, Processor, Memory.
  • The main circuit board of the system unit is Motherboard
  • A computer chip contains integrated circuits
What is Processor ?
  • The processor, also called the central processing unit (CPU), interprets and carries out the basic instructions that operate a computer
  • Contain a control unit and an arithmetic logic unit (ALU)
  • The control unit is the component of the processor that directs and coordinates most of the operations in the computer
  • The arithmetic logic unit (ALU) performs arithmetic, comparison, and other operations
What is Memory?

  • Memory consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data
  • Stores three basic categories of items. Example [The operating system and other system software, Application programs, Data being processed and the resulting information]
  • Each location in memory has an address
  • Memory size is measured in kilobytes (KB or K), megabytes (MB), gigabytes (GB), or terabytes (TB)
  • The system unit contains two types of memory which are Volatile memory and Nonvolatile memory
  1. Volatile memory - Loses its contents when power is turned off. Example includes RAM
  2. Nonvolatile memory - Does not lose contents when power is removed. Examples include ROM, flash memory, and CMOS
There are some type of basic types of RAM chips exist

  • Dynamic RAM (DRAM)
  • Static RAM (SRAM)
  • Magnetoresistive RAM (MRAM)
  • Chapter 3: Software and System

    • Identify the four categories of application software
    • Differentiate among the seven forms through which software is available
    • Explain how the operating system and utility programs work with application software
    • Describe characteristics of a user interface
    • Identify the key features of widely used business programs
    • Identify the key features of widely used graphics and multimedia programs
    • Identify the key features of widely used home, personal, and educational programs
    • Discuss the advantages of and ways to access Web applications
    • Identify the types of application software used in communications
    • Describe the learning aids available for application software

    What is a computer Application Software
    • Application software consists of programs designed to make users more productive and/or assist with personal tasks
    • For example : To make business activities more efficient, To assist with graphics and multimedia projects, To support home, personal, and educational tasks,To facilitate communications.
    • Application software are available in a variety of forms in Packaged software, Custom software, Web application, Open source software, Shareware, Freeware, Public-domain software

    Thursday 1 September 2016

    Chapter 2 :Fundamentals of the world Wide Web and Internet

    • Explain the purpose of a Web browser and identify the components of a Web address
    • Identify and briefly describe various broadband Internet connections and state differences between broadband Internet connections and dial-up connections
    • Describe the types of Internet access providers
    • Describe the purpose of an IP address and its relationship to a domain name
    • Explain the purpose of a Web browser and identify the components of a Web address
    • Describe how to use a search engine to search for information on the Web and differentiate between a search engine and a subject directory
    • Describe the type of Web sites
    • Explain how Web pages use graphics, animation, audio, video, virtual reality, and plug-ins
    • Identify and briefly describe the steps required for Web publishing
    • Describe the types of e-commerce
    • Explain how e-mail, mailing lists, instant messaging, chat rooms, VoIP, newsgroups and message boards, and FTP work
    • Identify the rules of netiquette
    Chapter 1 : The introduction of the Computer

    • Explain why computer literacy is vital to success in today’s world
    • Define the term, computer, and describe the relationship between data and information
    • Describe the five components of a computer
    • Discuss the advantages and disadvantages that users experience when working with computers
    • Define the term, network, and identify benefits of sharing resources on a network
    • Discuss the uses of the Internet and World Wide Web
    • Distinguish between system software and application software
    • Differentiate among types, sizes, and functions of computers in each category
    • Describe the role of each element in an information system
    • Explain how home users, small office/home office users, mobile users, power users, and enterprise users each interact with computer
    • Discuss how society uses computers in education, finance, government, health care, science, publishing, travel, and manufacturing

    1. What is Computer - A computer is an electronic device, operating under the control of instructions stored in its own memory
    2. The Components of a Computer - A computer contains many electric, electronic, and mechanical components known as hardware. Example :Input Device, Output Device, System Unit, Storage Device, Communications Device
    Advantages of Using Computers
    -speed
    -Reliability
    -Consistency
    -storage
    -Communication

    Disadvantages of Using Computers
    -Health Risks
    -Violation of Privacy
    -Public Safety
    -Impact on Labor Force
    -Impact on Environment
    • People use the Internet for Communicate, Research and Access Information, Shop, Bank and Invest, Online Trading, Entertainment, Download Videos, Share Information, Web Application and so on ...