Unit 1 Understanding Computer Systems

Size: px
Start display at page:

Download "Unit 1 Understanding Computer Systems"

Transcription

1 Aims of Unit 1 R001 In unit R001 learners will study the computer system on which applications software sits and consider the implications of working with data to create content. From personal computers to smartphones, computing devices are an essential feature of the modern world. Technology may be changing every day, but the knowledge and understanding of how to use computers effectively is the same regardless of the technology being used. Computers are powerful devices for the storage and manipulation of data, but how can they be used effectively and the important data they use be stored securely? On completion of this unit, learners will have gained the knowledge and understanding to use computers more effectively in a variety of different contexts including home, school and the workplace. Their regard for their own personal data security and for the security of the data of others will be increased and, overall, learners will be more informed users of computers making them more effective participators in business and social life. Page 1 04 February 2014

2 Unit 1 R001 Specifications Learning Outcomes (LO Content) - Learners must be taught: LO1: Understand how ICT can be used to meet business needs 1. Features and purposes of computing devices i.e. desktops, laptops, netbooks, tablets and smartphones 2. Input devices i.e. mice, keyboard, microphone, sensors, pads, specialist, etc. 3. Output devices i.e. monitor/screens, printers, speakers, headphones, projectors, etc 4. Software i.e. operating systems, utility software, applications software 5. Storage and connectivity devices i.e. optical disks, hard disk drive, Solid State Drives, memory cards, cloud 6. How the following factors can affect the choice of system cost, availability, user needs, data security 7. How peripherals can be connected to a computer device i.e. Wired methods (e.g. USB, firewire) and Wireless methods (e.g. WiFi) 8. How to connect a computing device to an existing wireless network i.e. network name, i.e. Service Set Identifier (SSID), security keys, firewall 9. How organisations can monitor employees i.e. GPS location tracking, monitoring internet use and communications LO2: Know how to work with information and data to meet business needs 10. Data capture methods i.e. on-line/paper forms, automated data capture systems (barcodes, RFID) 11. How the following factors can affect the choice of method: Nature of information, cost, availability, ease of use and data security 12. How to design data capture forms to obtain specified information i.e. drop down boxes, radio buttons, examples, text blocks, etc. 13. How to code information for use in a spreadsheet or database i.e. using data validation, drop down lists and limiting input data types 14. Data Validation Data ranges such as >18 and <60 or Male or Female 15. File formats for storing data i.e. proprietary, i.e..doc,.xls,.ppt / open formats, i.e..rtf,.pdf,.csv 16. Data storage technologies i.e. local and removable media remote storage (e.g. cloud storage) I Know This: I Know This: Page 2 04 February 2014

3 17. Security measures to be used when storing data Usernames/Passwords and Access rights/permissions Physical security to prevent loss of data/devices (e.g. locked doors) 18. Data transferring technologies Wired and wireless, Mobile (3g, 4g), cloud, Security methods (encryption) 19. Factors affecting data transfer speed i.e. bandwidth, router technology 20. Factors affecting the appropriate optimisation of electronic files i.e. download speeds, quality of product 21. How to use back-up and recovery systems storage media, back-up frequency, archiving, automated versus manual 22. How the following factors can affect the choice of method Cost, Availability, Ease of use, Data security LO3: Know how ICT can be used to support business working practices 23. How businesses communicate with employees and working remotely i.e. voice telephones, SMS, instant messaging, , chat rooms, etc. Appropriate use of remote communication tools i.e. for appropriate use of subject, cc/bcc, attachments, etc. 24. How diary management software is used to organise work schedules Creating appointments/meetings, Inviting, tasks, to-do lists, reminders 25. How documents can be created and edited collaboratively Comments, editing drafts, tracking changes, accepting or rejecting LO4: Legal, Ethical, Safety and Security issues affecting computer use 26. How legislation affects business computer users Data Protection Act, Copyright & Design Patents Act, Computer Misuse Act 27. How moral and ethical issues affect business computer users Use and abuse of personal and private data, Cyber Bullying 28. Implications and consequences for data loss, corruption and theft Legal implications, Impact on customers, employees, organisation 29. The main threats to data security and how to deal with them Threats to data security, i.e.: computer viruses, Trojans, worms, phishing... Actions to minimise risks, i.e.: Protection software, i.e. firewall, anti-virus Using updating facilities for Operating Systems and security software Automatic and Manual updating facilities I Know This: I Know This: Page 3 04 February 2014

4 LO1: Understand how ICT can be used to meet business needs 1. Features and purposes of computing devices Desktops Laptops Netbooks Tablets Smartphones Powerful with big monitor but not portable 2. Input devices Portable computer and still powerful also has WiFi Portable and small but not as powerful as laptop Portable and has APPs but they are limited Portable but not powerful and limited APPs Mouse Keyboard Specialist Keyboard Microphone Webcams e.g. to click on icons e.g. to type letters e.g. Braille keyboard to help blind people e.g. to record music e.g. to use Skype in VoIP Sensors Touch Pads Remote Controls Scanner Digital Camera e.g. to record temperature Touch Screens e.g. to run APPs and to output 3. Output devices e.g. Laptop mouse as limited space Readers e.g. to read barcodes e.g. to control air conditioners Magnetic Strip Reader e.g. to read credit cards e.g. to scan in photographs Chip and Pin Reader e.g. to read debit cards to pay e.g. to take photographs MIDI Instruments /Keyboard e.g. record music such as piano Monitor Touch Screen Printers Headphones Projectors Plotters Displays information from a computer 4. Software Input and output on most tablets and smartphones Inkjet for home use, cheap to buy but ink is costly; laser costly to buy, cheap to print Allows you to listen to sounds and music from a computing device Allow you to display information on large screens, e.g. for teaching Architecture and engineers use these to print large blue prints for work Operating Software Utility Software Application Software Every computer has this software and its job is to control hardware and software so users can carry out tasks. E.g. Apple OS, Microsoft Windows 7, Linux, etc. This software adds tools to help manage and maintain the OS. E.g. firewalls, backup software, managing pictures, anti-virus, defrag, etc. This software is installed so that users can perform tasks such as Word Processing, Graphics Editing, Communication, Spreadsheets, Databases, etc. Page 4 04 February 2014

5 Application software Word Processor Desktop Publishing Spreadsheet Database This can be used by staff to type letters or reports meetings, e.g. Microsoft Word Used to create flyers and posters for business advertising, e.g. Microsoft Publisher Used for finances calculating results by using functions and formulae, e.g. Excel Used to store customer details such as names and addresses, e.g. Microsoft Access Photo/Graphics Editing Video Editing Multimedia Software Presentation Software Could be used to remove red eye or crop down images; this edits graphics, e.g. Fireworks This allows users to edit and create videos removing scenes, e.g. Movie Maker Used to create presentations with multimedia elements, e.g. Mediator 9 Communication Gaming Software Web Browsers Allows communication with other employees when out of the office, e.g. Skype Used to create games, 3D people and landscapes, e.g. Unreal Engine Used to display web sites on a company Intranet or Internet, e.g. Firefox Used in meetings to display information on a projector, e.g. PowerPoint Apps for Portable Devices This allows devices with low resources and touch screens software, e.g. Angry Birds 5. Storage devices Hard Drives Solid State Optical Drives Flash Memory Cloud Storage Stores files on a computer and has huge amounts of space External drives are used to backup a whole computer Used in memory sticks, tablets and smartphones because they are small and don t easily break Used to read and/or write files to CDs and DVDs. They are small in size and are used to install software or make small backups These are USB memory sticks which are small and portable, and used to backup small amounts of data Uses the Internet to store files and space is expensive. Good for backing up smartphones and accessing work at home. Connectivity devices Switch Router Network Card Allows many devices to connect to a network, but not the Internet Used to connect computers to the Internet, and very common in home use Connects computers and devices to a network using a cable Wireless Network Card Connects computers and devices to a network without wires also called WiFi Modem Old device connecting computers to the Internet using normal telephone lines Wireless Access Point Connect wireless devices to the network many needed in large companies Page 5 04 February 2014

6 Configuring systems for physical impairment Puff-Suck Switch Users can control a computer with a blow/suck Use: motor dysfunction Braille Keyboard This is used to feel which keys to use without seeing them Use: visual impairment Foot Mouse Text-to-Speech Speech-to-Text Zoom One foot clicks and the other moves the mouse Use: motor dysfunction People use this to have text on the screen read to them Use: visual impairment Type text or do set actions Use: visual impairment and motor dysfunction To zoom on areas with the mouse to see them clearly Use: visual impairment Configuring systems for remote working Remote Desktop Connections Virtual Private Network File Transfer Protocol The Internet is used to log onto a computer when you are away from it e.g. to get work from home You can connect networks around the country together to appear as one e.g. all ASDAs networks The rules that allow files to be shared and transferred over a network and the Internet. 6. How the following factors can affect the choice of system Different companies will pay more, have different security and user needs. For example a school will pay less for a computer and need smaller space and processing power as compared to a game developing firm that might need a great graphics card and memory. 7. How peripherals can be connected to a computer device Wired Wireless USB FireWire Wi-Fi Bluetooth Infrared Allows fast data transfer and is used to transfer files between computers FireWire is much quicker than USB and is used to transfer large files like videos Devices connect without cables but are slower than wired devices like printers use Wi-Fi Connect devices such as a mouse but is slower and shorter distance than Wi-Fi This needs line of sight to work, but only short distance and can be used in remote controls Page 6 04 February 2014

7 8. How to connect a computing device to an existing wireless network Speed of Data Transmission How quickly something loads wired is usually quicker than wireless Bandwidth Max data transferred at once large videos need high bandwidth Wi-Fi Another name for a wireless network e.g. to connect printers Service Set Identifier (SSID) This is the network name given to a network e.g. DJ-Home Public SSID WEP, WPA, WPA2, AES Firewalls User ID and Passwords This network name for guests to access the network e.g. a café These are versions of security used to connect users to networks This is used to stop hackers accessing data to and from a computer For security users should have their own unique ID and password 9. How organisations can monitor employees Global Positioning System (GPS) GPS uses 4 satellites to determine where people are anywhere on the earth. GPS can be used to: 1. Send help to injured people 2. For maps and directions 3. As a duty of care e.g. to monitor social workers Mobile and Smartphone Tracking Smartphones have GPS built in to be tracked for example for maps or if they are stolen Electronic Tagging Criminals and animals can have GPS tags in order to track where they are at any time Monitoring Internet Use Monitoring Use Company Policy Companies make sure employees are using the Internet and s appropriately to do their job e.g. not to use Facebook, etc. s can be checked to make sure they are used for work and that they do not get attachments with viruses, etc. Employees must follow the rules set out in the company policy e.g. how they are allowed to use Internet and s LO2: How to work with information and data to meet business needs 10. Data capture methods On-line Forms Paper-based Forms Automated Data Capture Forms are entered directly into Take the form of a questionnaire Sometimes it is easier to collect the computer system and is and can ask customers questions data automatically, such as when usually found on a website these should be easy to use controlling temperature e.g. to register a new client and usually include examples. e.g. heating or air-conditioning Page 7 04 February 2014

8 Barcode Used to read product details and price in shops Matrix Barcode Used to advertise products using APPs on smartphones Near Field Communications (NFC) Used to pay for products under 15 using you smartphone Radio Frequency Identification (RFID) Used as security and tracking small and difficult to break 11. How the following factors can affect the choice of method Depending on cost, ease of use and security online may be better than offline or vice-versa. For example a small business would use offline (paper based) as it is cheap and easy to use, whereas a large company would use online as they have many customers and it will work out cheaper. In dangerous situations automatic might also be preferred so that information can be easily collected e.g. recording temperatures of a volcano. 12. How to design data capture forms to obtain specified information Creating On-line Forms Creating Paper-based Forms How to use Automated Data 1. Include drop-down menus 2. Tick boxes and radio buttons 3. Do not use separate boxes 4. Use pre-set formats e.g. DD/MM/YYYY 5. Use smaller data E.g. Address is: Number, Street, Town, County and Postcode 6. Use validation rules 1. Include examples of the data and spaces for the answers 2. Include the right amount of spaces to get correct data 3. Include the type of data to be entered to reduce errors 4. Data like temperature should be collected as numbers and names as text. 1. Temperature Control temp in rooms and pools 2. PH Control the quality of water in pools 3. Light Automatically turn lights on/off to save power 4. Pressure Used in alarms to check if someone has entered 13. How to code information for use in a spreadsheet/database: DATA TYPES Text 1. Any character 2. E.g. Hello@ Used for names, postcode, telephone, etc. Integer Number 1. Whole numbers 2. E.g Used for items of stock sold, etc. Real Number Date Boolean Image 1. Numbers with decimals 2. E.g Used for prices, etc. 1. Stores dates 2. E.g. 20/12/ Used for date of birth, etc. 1. Stores true or false 2. E.g. Y/N 3. Used to check if customers have paid, for male, female, etc. 1. Stores images in a database 2. E.g. staff photos 3. Used for staff ID, etc. Page 8 04 February 2014

9 14. Data Validation Validation rules reduce errors when entering information as they check if the data entered is correctly according to a set rules, such as the right number of letters, numbers, no spaces, etc. For example, it will not allow date that are not in the format DD/MM/YYYY or telephone numbers that are not (00000) This ensures that data is entered correctly. 15. File formats for storing data Proprietary formats belong to a company and used by the OS to open the right software Format Meaning Typical Uses doc and docx Microsoft Word Document Typing letters and other documents xls and xlsx Microsoft Excel Document Creating spreadsheets for budgets, etc. ppt and pptx Microsoft PowerPoint Document Slideshow presentations pub Microsoft Publisher Document Creating flyers, newsletters, etc. fla Adobe Flash Movie/Animations For animations and movies wma Windows Media Audio To play audio and sounds wmv Windows Media Video To play videos Open formats Can be used many programs to open files such as mp3 Format Meaning Typical Uses pdf Portable Document Format Commonly used by Adobe Creating formatted documents protected from editing aac Advanced audio coding Audio/sounds stored without loss of data rtf Rich text format Word-processing documents csv Comma separated values Lists of data and often used to transfer data between software exe Executable file Applications that run on computer systems txt Text Unformatted text files mp3 MPEG audio Layer 3 Audio/sounds stored with loss of data as files are compressed aiff Apple s audio format To play Audio/Sounds Wav Windows audio format To play Audio/Sounds Page 9 04 February 2014

10 16. Data storage technologies Local storage such as hard drives and external drives are often better if you have large files to backup. Other times USB memory sticks can be better if you need to move around and need to transfer information, for example, between work and home. Cloud storage, alternatively, also allows portable access to data so long as you have the Internet but space is limited and expensive! 17. Security measures to be used when storing data Network and computer security: Usernames and Passwords Access Rights and Permissions 1. All staff need to be given unique usernames and passwords so that they cannot access sensitive data 2. All staff should also have different access rights & permissions so they cannot access files unless allowed Document security: Passwords Data Encryption 1. Passwords can be used in documents and can be set to Open/Modify or Read Only 2. Encryption uses a code/key to encrypt data and then it is decrypted using the code/key 3. On the Internet, encryption protects your passwords, payment details, etc. and is shown by https and padlock Physical security: Security Badges Locking doors, Window bars, etc. 1. RFID tags can be placed into badges so that staff only enter areas if they have permission to do so 2. Do not have computers on the ground floor where they are easily accessed 3. Ensuring that windows have bars, or strengthened glass and doors are strong, etc. 18. Data transferring technologies Wired Wireless Mobile Data Remote Methods File Compression Wires are faster and more reliable as they do not drop connection and safer as hackers need to access the cable Portable and good for phones and tablets slower than wired and easier to hack as the connection can be seen wirelessly Portable using 3G and 4G on phones and tablets slower that wired and wireless and easier to hack into 19. Factors affecting data transfer speed Good for sharing files, but easy to hack File sharing can contain viruses Cloud Good for sharing and better security available This takes a file and compresses it making it smaller in size. This helps sending large files, but can reduce quality of sounds and videos USB flash drives are usually affordable and quick for transferring files but can be easily lost so data is unsecure. CDs and DVDs are not as big as flash drives and it takes a long time to write data to them. s are useful for transferring small files, but not secure and therefore files should be encrypted. For wired and wireless data transfer, speed and bandwidth are important, especially when transferring large files such as videos. 3G and 4G wireless transfer is slow for mobiles and it usually takes long to process big files. Page February 2014

11 20. Factors affecting the appropriate optimisation of electronic files Large files can be compressed to reduce size, but will reduce the quality of sounds and videos. Other ways of optimising files is through files formats such as JPEG reducing image size (best for websites) and mp3 reducing audio file size without losing much quality. 21. How to use back-up and recovery systems CDs/DVDs and USBs are not suitable for large backups CDs/DVDs and USBs can be kept away in case of fire, etc Data Storage For large data companies can use tape drives or hard disks Tape systems are large and costly, Hard drives are large but not costly Cloud storage is portable and more secure, but space is expensive Frequency Recovery Archiving Automated VS Manual This is how often you need to backup, e.g. banks every few minutes, but a small shop only once a week Backups can be recovered in detail up to the date and even hour of when backups were made These are backups that are no longer used day-to-day and therefore are kept away securely Archived 22. How the following factors can affect the choice of method Automated systems allow backups to be done at set times and intervals over a day, week, month, etc. Manual systems allow users to decide when to make the backup, but can mean that backups are missed. Tape External Hard Disk CDs/DVDs USB Flash Drives Cloud Storage 1. Expensive 2. Easily damaged 3. Not as secure so data must be encrypted 1. Not Expensive 2. Portable USB 3. Not as secure so data must be encrypted 1. Cheap many disks needed 2. Not as secure so data must be encrypted 1. Cheap 2. Portable USB 3. Not as secure so data must be encrypted LO3: Know how ICT can be used to support business working practices 23. How businesses communicate with employees and working remotely 1. Expensive 2. Portable 3. Secure as encryption provided Voice Telephone Conversation over a landline or mobile Adv: cheap, leave messages Disadv: poor Instant Messaging Instantly send messages over computers Adv: cheap, instant Disadv: Viruses, SMS Chat Rooms Forum Short message using mobiles Adv: cheap, quickly sent Disadv: poor signal, Message sent using computers Adv: cheap, attachments Disadv: may not Conversation using Internet Adv: cheap, leave messages Disadv: poor signal, different Search for answers to questions Adv: ideas can be shared Disadv: time Page February 2014

12 signal, different time zones Bulletin Boards Post info and messages about work Adv: Accessed at anytime Disadv: Posts may be unreliable hard to show expressions VoIP Voice over Internet Protocol speaking using the Internet Adv: cheap Disadv: poor quality/signal someone may not see it Video Conferencing Have meetings using Skype, etc Adv: cheap calls around the world Disadv: signal, time zones have Internet, or viruses Webcams Conversation over a landline or mobile Adv: cheap, leave messages Disadv: poor signal, different time zones time zones Blogs Type info on the Internet to share opinions Adv: keeps info up-to-date Disadv: time consuming to manage consuming and not real time Social Networking Informal communication, images, etc. Adv: promote companies Disadv: can effect work, cyber bullying Appropriate use of remote communication tools ( ) To, CC and BCC: To: who the recipient of the will be. CC: carbon copy, so everyone will receive the same . BCC: Blind Carbon copy lets you send the to people without the others knowing. Signature: These should always include details such as: Full name, function within business, address, phone, etc. Subject Line: A brief summary of the content, this is compulsory or else the may be marked as spam. Attachment: This is where attached files are shown. The size of the attachment increases the time it will take to send. It is important to mention there is an attached file in the in case it doesn t send. Address Book: Distribution List: An address book lists all your contacts in one place. It is important for businesses as they can store customer s s, phone numbers, etc. Businesses can use distribution lists to add customer addresses in order to send them information. They could also create lists by age or gender, so if there was a special offer on suited to them they would be ed. It can be used to contact customers about offers. Page February 2014

13 Netiquette Rules or netiquette should be followed when sending s these include: 1. use an appropriate subject line 2. follow the agreed policy within the business 3. check the message content before sending the 4. include a signature on any business s 5. you should be polite 6. messages should be written in plain English with careful use of abbreviations 7. do not write the message in capital letters 8. check if the should be replied to all or just the person the was originally from 9. include the format of attachments for example, Microsoft Office file types. 24. How diary management software (DMS) is used to organise work schedules Creating appointments/ meetings Create meetings and appointments and show a list attending. Check clashes and suggest alternatives times. Inviting participants s can be used to invite people, which they can accept or reject. Accepting puts it into the diary so that they don t forget. Creating tasks Tasks can be created and tracked to see if they are finished on time. Reminders of task due dates can be set. Creating to-do lists Personal to-do lists can be created so that staff know what they have to do themselves, and by when. Setting reminders Reminders can be set for tasks and meetings to come up weeks, days, hours or even minutes before. These can be snoozed Cloud systems and APPs Let you access the DMS anywhere you have the Internet. Smartphones can also access them using APPs. 25. How documents can be created and edited collaboratively Comments Teams can share opinions by making comments, and it can show employees what others think should be done, without having to tell each other face to face. Comments can be only be removed by deleting them later. Track Changes Reviewing Facilities This tracks and highlights changes Accepting and Rejecting made to the document instead of changes allows you to accept the inserting comments. This is quicker track changes and it will become as you do not have to read a part of the new document, or comment and change it it is reject the change to put them back Page 13 already changed and you just have to the way they were before the 04 February 2014 to accept or reject the changes. changes were made.

14 LO4: Legal, Ethical, Safety and Security issues affecting computer use 26. How legislation affects business computer users Health and Safety Helps protect staff from injury at work. One of the main laws (Display Screen Equipment) says: 1. Workstations of employees must be safe 2. Make sure there are adjustable chairs, monitors, good lighting, etc. 3. Making sure employees have regular breaks 4. Arrange and pay for eye tests and glasses 5. Provide health and safety training Copyright and Design Patents Act This law makes it illegal to copy a work, for example, a file or image, without permission. The main way this act is broken include: 1. Using software without the correct licence 2. Downloading files from the internet 3. Copying music, DVDs, CDs and software Data Protection Act Rules on storage and use of data how to complain, and sometimes to claim compensation if needed. Some of the points in this act say that data must: 1. be accurate and up to date 2. be kept for longer than is necessary 3. be kept secure 4. not be transferred outside the European Economic Area (EEA) Computer Misuse Act This covers the illegal access to files and data stored on computer systems. It was introduced to cope with the increase in hacking and viruses. This law stops people from breaking into computers or stealing data for illegal reasons, or to damage the working order of the computers. 27. How moral and ethical issues affect business computer users Use and abuse of private data Cyber Bullying Monitoring people It is morally/ethically wrong to: 1. Accidentally delete data 2. Steal it in order to sell it 3. To hack into personal data When a person/group threaten or embarrass someone else using technology such as a mobile phone or the internet 1. CCTV and RFID tags can be used to track employees 2. Cookies can be used to personalise websites 3. Key logging tracks staff work, user IDs, passwords, etc. 4. Call recording and mobile tracking monitor staff work Page February 2014

15 28. Implications and consequences for data loss, corruption and theft Legal implications Impact on customers Impact on employees Impact on organisation 1. If data is stolen a business can have criminal proceedings started or pay financial compensation. 2. If a hacker is traced, they can be imprisoned and pay a large fine. 1. The business will no longer be seen as trustworthy. 2. If personal data is lost or stolen then there is a risk of identity theft. 3. Identity theft is when someone takes the identity of another person to create big debts, etc. 1. A formal written warning. 2. A demotion in job role and lower salary 3. Dismissal from job. 4. A reference being given which stated why they lost their job this could result in difficulty in finding another job. 1. They will have to pay compensation to customers. 2. They may have to close down because of the costs. 3. More money will have to be spent on computer security. 4. Customers might lose confidence in the business. 29. The main threats to data security and how to deal with them Computer Viruses Trojans Worms Phishing Spyware Adware Hacking Denial of Service Attacks (DoS) A computer program that can duplicate itself and spread from one computer to another causing problems or damage. This is a program that looks as though it is needed, but when it is run it could contain viruses, spyware, adware, etc. to damage the computer or allow hackers into the system. A program that attaches itself to other files as it spreads through the computer damaging files and slowing down the system. A way of attempting to get information, for example usernames, passwords and credit card details, by pretending to be from a trustworthy source such as a social network or banking website. Collects information about users without their knowledge. Spyware is hidden from a user and can be difficult to detect. Also known as advertising-supported software. This is any software that automatically shows adverts, such as a pop up. Hacking means finding out weaknesses in a system. A computer hacker is a person who finds this to gain unauthorised access. Attacks that target sites or services hosted on high-profile web servers such as banks and payment websites (for example, PayPal). Page February 2014

16 Physical Threats Computer systems have keyboards, monitors, memory sticks/removable storage devices, etc. and these can be lost or stolen very easily especially memory sticks and portable devices. Actions to minimise risks Act appropriately online to reduce and Protect Personal Security Firewall Anti-Virus Anti-Spam Data Encryption 1. Do not share too much information online, especially when on social networking sites, i.e. your date of birth. 2. Use different passwords on different sites. Always check the website for the padlock and https and beware of s that ask for your information. A firewall protects a computer from threats and attacks. This is done by controlling what data can and cannot pass through it. This software detects any viruses, including Trojans and worms, and removes them to limit their damage to the computer. Spam is the sending of unwanted messages, often advertising, to a large number of addresses. Spam is serious as it can be used to deliver Trojans, viruses, worms, spyware, etc. This software encrypts data so that only users who have the encryption code/key can read/use the data transmitted. 30. Using updating facilities for Operating Systems and security software Automatic Updates Manual Updates 1. Operating Systems can update automatically. 2. These usually happen when the computer system is going through the shutdown process. 3. Security software such as an anti-virus also updates automatically and will find updates, download them and install the updates without the need for user interaction. 1. Manually updating Operating Systems and security software can be dangerous as it can be forgotten and leave the computer system open to threats. 2. One of the problems with manual updating of software is that it can take long to download once it has been left a while. 3. Sometimes manual it better though if you want to look at the updates to decide whether or not to download them. Page February 2014

Question Bank June 2015 R001 Mock

Question Bank June 2015 R001 Mock Bank June 2015 R001 Mock Jan13 1 Spec 1 Spec 7 Jan15 7 1. The software needed to create individual graphics for animated cartoons Richard uses his smartphone to take a photograph. a) State two ways in

More information

BTEC First Diploma for IT. Scheme of Work for Computer Systems unit 3 (10 credit unit)

BTEC First Diploma for IT. Scheme of Work for Computer Systems unit 3 (10 credit unit) BTEC First Diploma for IT Scheme of Work for Computer Systems unit 3 (10 credit unit) Overview On completion of this unit a learner should: 1 Know the of 4 Be able to. Num of hours Teaching topic Delivery

More information

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy Montgomery College Course Designator/Course Number: CS 11 Course Title: Computer Literacy Course Length: 3 credits 3 5-minute meetings per week or equivalent Course Description: An introduction to the

More information

www.xtremepapers.net

www.xtremepapers.net UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education *83455669* INFORMATION AND COMMUNICATION TECHNOLOGY 047/0 Paper May/June 2009 2 hours Candidates

More information

SUMMARIES OF VIDEOS GRADE 11 SYSTEMS TECHNOLOGIES

SUMMARIES OF VIDEOS GRADE 11 SYSTEMS TECHNOLOGIES SUMMARIES OF VIDEOS GRADE 11 SYSTEMS TECHNOLOGIES 1. Case Study - Understanding Computers and Computing A computer is an electronic device that can accept, process and store data by following instructions

More information

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER ZIMBABWE SCHOOL EXAMINATIONS COUNCIL General Certificate of Education Ordinary Level COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER Candidates answer on the question paper Additional materials:

More information

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0 BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4

More information

www.xtremepapers.net

www.xtremepapers.net UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education *6746873383* INFORMATION AND COMMUNICATION TECHNOLOGY 047/ Paper October/November 00 hours Candidates

More information

0417 INFORMATION AND COMMUNICATION TECHNOLOGY

0417 INFORMATION AND COMMUNICATION TECHNOLOGY UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education MARK SCHEME for the October/November 2010 question paper for the guidance of teachers 0417 INFORMATION

More information

Legal, Social, Ethical and Environmental Issues when Using ICT

Legal, Social, Ethical and Environmental Issues when Using ICT 06 Legal, Social, Ethical and Environmental Issues when Using ICT What you will learn in this chapter The main principles of the legislation relating to the use of ICT/computer systems Health and safety

More information

Unit A451: Computer systems and programming. Section 2: Computing Hardware 4/5: Input and Output Devices

Unit A451: Computer systems and programming. Section 2: Computing Hardware 4/5: Input and Output Devices Unit A451: Computer systems and programming Section 2: Computing Hardware 4/5: Input and Output Devices Input and Output devices Candidates should be able to: (a) understand the need for input and output

More information

Study Opportunities. June 2013

Study Opportunities. June 2013 Study Opportunities June 2013 COMPUTER APPLICATIONS TECHNOLOGY Grade 11 Paper 2 Written question paper Time: 2.5 hours Total: 125 This question paper consists of 10 pages (including the front page) Instructions

More information

GCSE BITESIZE Examinations. General Certificate of Secondary Education ICT HIGHER TIER. Time allowed 1 hour 30 minutes

GCSE BITESIZE Examinations. General Certificate of Secondary Education ICT HIGHER TIER. Time allowed 1 hour 30 minutes GCSE BITESIZE Examinations General Certificate of Secondary Education ICT HIGHER TIER Time allowed 1 hour 30 minutes Total marks: 90 Answer all questions in the spaces provided 1. The advert below is used

More information

Conducting Virtual Meetings

Conducting Virtual Meetings Page 1 oovoo Chat & Video Conferencing Information gathered by, International Faculty 2013 Faculty Training General Information What can I do with oovoo? oovoo offers free high quality video chat and instant

More information

Some important words and phrases:

Some important words and phrases: Some important words and phrases: Cloud Computing Open Source software/application Proprietary brand software/application Accelerometer Wireless charging mat Bandwidth Latency IMAP/4 POP3 SMTP Cloud computing

More information

TH2. Input devices, processing and output devices

TH2. Input devices, processing and output devices TH2. Input devices, processing and output devices http://www.bbc.co.uk/schools/gcsebitesize/ict/ Input devices allow us to enter raw data into a computer. The computer processes the data and then produces

More information

Internet tools and techniques at this level will be defined as advanced because:

Internet tools and techniques at this level will be defined as advanced because: Unit Title: Using the Internet OCR unit number: 41 Level: 3 Credit value: 5 Guided learning hours: 40 Unit reference number: F/502/4298 Unit purpose and aim This is the ability to set up and use appropriate

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous

More information

Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers.

Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers. Lesson Plan Course Title: Principles of IT Session Title: Networks and Hackers Lesson Duration: Lesson length is subjective and will vary from instructor to instructor. Performance Objective: Upon completion

More information

Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition

Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition APR. 08 Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition Cover photographs copyright 2001 PhotoDisc, Inc. NCJ 219941 Chapter 1. Electronic Devices: Types, Description,

More information

The computer's internal components

The computer's internal components Computer hardware and types of computer A brief introduction to the insides of a computer and its added hardware. This will help explain what a computer is from a hardware point of view, how we control

More information

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education. Paper 1 October/November 2011 2 hours

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education. Paper 1 October/November 2011 2 hours www.xtremepapers.com UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education *2238279192* INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12 Paper 1 October/November

More information

RingCentral for Desktop. UK User Guide

RingCentral for Desktop. UK User Guide RingCentral for Desktop UK User Guide RingCentral for Desktop Table of Contents Table of Contents 3 Welcome 4 Download and install the app 5 Log in to RingCentral for Desktop 6 Getting Familiar with RingCentral

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

BLU Vivo 4.3 User Manual

BLU Vivo 4.3 User Manual BLU Vivo 4.3 User Manual 1 Table of Contents Phone Safety Information... 3 Appearance and Key Functions... 4 Installation and Charging... 5 Phone Operation... 7 Communication... 10 Camera... 11 Gallery...

More information

General Security Best Practices

General Security Best Practices General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking

More information

ERA6 OBJECTIVE QUSESTION

ERA6 OBJECTIVE QUSESTION 1)Database Management Question:- ERA6 OBJECTIVE QUSESTION 1) While Creating a Table using the MS Access, you will get an interface, as shown on the screen this Interface shows, you are Working on the View

More information

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009 Getting Started with Microsoft Office Live Meeting Published October 2007 Last Update: August 2009 Information in this document, including URL and other Internet Web site references, is subject to change

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Three steps to the best technology: 1. The Assessment 2. The Dialogue 3. The Recommendation

Three steps to the best technology: 1. The Assessment 2. The Dialogue 3. The Recommendation Technology Assessment Checklist for Small Businesses A quick way to help your small-business customers get the best technology. Today's small-business owners want reliable technology that helps them do

More information

Archives About ARCHOS TV+

Archives About ARCHOS TV+ About ARCHOS TV+ General Questions I have installed a firmware/plug-in/game file on my Archos TV+ but it is not recognized by the device. You may have not correctly copied your file on the device. If it

More information

Getting Started with Microsoft Office Live Meeting. Published October 2007

Getting Started with Microsoft Office Live Meeting. Published October 2007 Getting Started with Microsoft Office Live Meeting Published October 2007 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless

More information

Point of View SmartTV-500 Center - Android 4.2. General notices for use...2 Disclaimer...2 Box Contents...2

Point of View SmartTV-500 Center - Android 4.2. General notices for use...2 Disclaimer...2 Box Contents...2 Point of View SmartTV-500 Center - Android 4.2 English Table of Contents General notices for use...2 Disclaimer...2 Box Contents...2 1.0 Product basics...3 1.1 Buttons and connections... 3 1.2 Connecting

More information

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions. Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

This guide will go through the common ways that a user can make their computer more secure.

This guide will go through the common ways that a user can make their computer more secure. A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password

More information

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted

More information

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device)

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Date approved: 7 th May 2015 Review Schedule: Annual Reviewed: Next review: 1 Context Aims of this Policy Definitions CONTENTS 1. OVERVIEW...

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

Computing Services and Systems Development 2015 2016 PittStart

Computing Services and Systems Development 2015 2016 PittStart Computing Services and Systems Development 2015 2016 PittStart CSSD @ Pitt We provide the technology tools and services that make your life at Pitt easier! Visit us at technology.pitt.edu Presentation

More information

Chapter 12 - Software. Unit 1 Role and function of application software

Chapter 12 - Software. Unit 1 Role and function of application software Chapter 12 - Software Unit 1 Role and function of application software Contents Revise software concepts Role of application software Multimedia software Communication software Application software Definition:

More information

WebEx what is it and how can I use it?

WebEx what is it and how can I use it? For assistance, contact the Solutions Centre at (403) 329-2490, or help@uleth.ca, or in person in E610, University Hall. WebEx what is it and how can I use it? 1. WebEx Overview 2. Setting up a WebEx Meeting

More information

Basics. How can I use the Internet to make free calls?

Basics. How can I use the Internet to make free calls? Basics Use this document with the glossary A helper should take you through this guide Keeping in touch 4.3 Making calls on Skype How can I use the Internet to make free calls? Skype is a free service

More information

Version 2 January 2015

Version 2 January 2015 Version 2 January 2015 IT SUPPORT HANDBOOK FOR BYO DEVICES 2015 INSTALLING SOFTWARE... 1 Microsoft Office... 1 Setting up Office preferences... 5 Setting up your College email account for the first time

More information

How to Create and Run a Missouri Arts Council

How to Create and Run a Missouri Arts Council Tips for Using Grants Online (GO) Missouri Arts Council This guide is divided into three sections: Getting Started Application Tips (pg. 4) Submission Tips (pg. 10) Getting Started Icons Link to FormSet

More information

Video conferencing with its multiple simultaneous video chats demands a good deal from your computer. The following platforms are required:

Video conferencing with its multiple simultaneous video chats demands a good deal from your computer. The following platforms are required: VIDEO CONFERENCING TECHNICAL REQUIREMENTS AND SETUP TUTORIAL Conferences are conducted through the class website. No special conferencing software or service is required. Participation requires that your

More information

Protecting personally identifiable information: What data is at risk and what you can do about it

Protecting personally identifiable information: What data is at risk and what you can do about it Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most

More information

Cox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet

Cox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet Cox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet experience friendlier, easier and more cutting edge. 43 Connecting

More information

How To Manage A Network Safely

How To Manage A Network Safely ICANWK303A Configure and administer a network operating system Release: 1 ICANWK303A Configure and administer a network operating system Modification History Release Release 1 Comments This Unit first

More information

Information and Digital Technology

Information and Digital Technology 2014 HIGHER SCHOOL CERTIFICATE EXAMINATION Information and Digital Technology Networking and Hardware Total marks 80 Section I Pages 2 7 General Instructions Reading time 5 minutes Working time 2 hours

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Information and communication technology (ICT) skills audit for returning teachers

Information and communication technology (ICT) skills audit for returning teachers Information and communication technology (ICT) skills audit for returning teachers Please rate your ICT skills using the following values: 1 I have no knowledge at all of this area of ICT 2 I have a small

More information

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 8 Types of Utility Programs and Operating Systems Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define system software and identify the two types of

More information

ADOBE ACROBAT CONNECT PRO MOBILE VISUAL QUICK START GUIDE

ADOBE ACROBAT CONNECT PRO MOBILE VISUAL QUICK START GUIDE ADOBE ACROBAT CONNECT PRO MOBILE VISUAL QUICK START GUIDE GETTING STARTED WITH ADOBE ACROBAT CONNECT PRO MOBILE FOR IPHONE AND IPOD TOUCH Overview Attend Acrobat Connect Pro meetings using your iphone

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third

More information

Digital Story Telling with Windows Movie Maker Step by step

Digital Story Telling with Windows Movie Maker Step by step . PAGE 1 Superhighways 2013 CONTENTS Before you open Windows Movie Maker (WMM)... 3 Organising your digital assets... 3 Windows Live Photo Gallery... 3 Your First Project in WMM... 4 Adding Audio... 6

More information

How can I use the internet to make free calls?

How can I use the internet to make free calls? Keeping in touch 4.3 Making calls on Skype How can I use the internet to make free calls? Skype is a free service that enables anyone to make free voice or video calls between computers regardless of location.

More information

User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved.

User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Table of Contents Getting Started... 4 New Features... 4 System Requirements... 4 Configuring Microsoft Internet Explorer... 4 Configuring

More information

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Webmail User Manual Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Chapter 2 MAILENABLE KEY FEATURES OVERVIEW...

More information

Password Depot for Android

Password Depot for Android Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening

More information

Microsoft Exchange ActiveSync Administrator s Guide

Microsoft Exchange ActiveSync Administrator s Guide Microsoft Exchange ActiveSync Administrator s Guide Copyright 2005 palmone, Inc. All rights reserved. palmone, HotSync, Treo, VersaMail, and Palm OS are among the trademarks or registered trademarks owned

More information

Chapter 3 Software. Computer Concepts 2013. 3 Chapter Contents. 3 Section A: Software Basics 13-09-27

Chapter 3 Software. Computer Concepts 2013. 3 Chapter Contents. 3 Section A: Software Basics 13-09-27 Chapter 3 Software Computer Concepts 2013 3 Chapter Contents Ø Section A: Software Basics Ø Section B: Office Suites Ø Section C: Installing Software and Upgrades Ø Section D: Buying Software Ø Section

More information

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

Deutsche Bank db easynet. Secure method of use of the db easynet e-banking system

Deutsche Bank db easynet. Secure method of use of the db easynet e-banking system Deutsche Bank Secure method of use of the e-banking system Introduction Deutsche Bank pays particular attention to your security. Therefore, the funds entrusted to us by our Customers are protected, using

More information

Personal WiFi Hotspot

Personal WiFi Hotspot Personal WiFi Hotspot Connect all WiFi enabled devices by simply plugging in activated 3G USB Modem and Mobile Phones Powerful portable WiFi Hotspot with true Plug & Play WiFi 802.11N up to 300Mbps Plug

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Many home and small office networks exist for no

Many home and small office networks exist for no C H A P T E R Accessing and Sharing Network Resources Many home and small office networks exist for no other reason than to share a broadband Internet connection. The administrators of those networks attach

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Saint Martin s Catholic Academy

Saint Martin s Catholic Academy Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin

More information

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan LAW OFFICE SECURITY for Small Firms and Sole Practitioners Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan 1. Introduction CONTENTS 2. Security Consciousness Having a Firm Security

More information

Internet and Computing Core Certification Guide Module A Computing Fundamentals

Internet and Computing Core Certification Guide Module A Computing Fundamentals Lesson 4: Using Input/Output Devices input/output devices common input devices common output devices specialized devices how a device connects what a port is what a device driver is What are Input/Output

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

Risks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012

Risks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012 Minimizing Technology-Related Risks NAN STENZEL NAN STENZEL REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012 Current Computer Topics Buying a New Computer In-home Wireless Security

More information

Welcome to The Grid 2

Welcome to The Grid 2 Welcome to 1 Thanks for choosing! These training cards will help you learn about, providing step-by-step instructions for the key skills you will need and introducing the included resources. What does

More information

Create a Basic Skype* Account. Intel Easy Steps 1 2012 Intel Corporation All rights reserved.

Create a Basic Skype* Account. Intel Easy Steps 1 2012 Intel Corporation All rights reserved. Create a Basic Skype* Account Intel Easy Steps 1 2012 Intel Corporation Using Skype* to Communicate: Create and use a Basic Skype Account There are different ways of communicating and sharing through the

More information

Protection of Computer Data and Software

Protection of Computer Data and Software April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal

More information

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Information Security Guide for Students

Information Security Guide for Students Information Security Guide for Students August 2009 Contents The purpose of information security and data protection...1 Access rights and passwords...2 Internet and e-mail...3 Privacy protection...5 University

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2013 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google is a trademark of Google Inc.

More information

Internet basics 2.3 Protecting your computer

Internet basics 2.3 Protecting your computer Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from

More information

Point of View SmartTV HDMI 210 dongle - Android 4.2. General notices for use... 2 Disclaimer... 2 Box Contents... 2

Point of View SmartTV HDMI 210 dongle - Android 4.2. General notices for use... 2 Disclaimer... 2 Box Contents... 2 Table of Contents General notices for use... 2 Disclaimer... 2 Box Contents... 2 1.0 Product basics... 3 1.1 Connecting your device for the first time... 3 1.2 Connections... 4 1.3 Using the remote control

More information

For Windows. 2012 Microsoft Corporation. All rights reserved.

For Windows. 2012 Microsoft Corporation. All rights reserved. For Windows 1 About Microsoft Lync... 4 Lync Window... 5 Audio... 6 Set up your audio device... 6 Make a call... 6 Answer a call... 7 Use audio call controls... 7 Check voicemail... 7 Invite more people

More information

UNIFIED MEETING 5 HELP

UNIFIED MEETING 5 HELP UNIFIED MEETING 5 HELP Table of Contents Conference Manager... 1 About Conference Manager... 1 From Conference Manager, you can... 1 Signing in to Conference Manager... 2 To sign in to the Conference

More information

Q. The Internet is a global network of computer networks that connects millions of computers. A TRUE B FALSE

Q. The Internet is a global network of computer networks that connects millions of computers. A TRUE B FALSE . Q. What is Tethering? A Process by which mobile phones share pictures and videos with other phones B It turns a Smartphone into a gaming console C It turns mobile phone into a Wifi hotspot which can

More information

Axis Technologies Computer Hardware and Electronics Portfolio Categories

Axis Technologies Computer Hardware and Electronics Portfolio Categories Axis Technologies Computer Hardware and Electronics Portfolio Categories SEPTEMBER 2008 Barebone Accessories Barebone Systems Media Center Barebone Systems Mini / Booksize Barebone Systems Bluetooth Headsets

More information

2015 HSC Information and Digital Technology Networking and hardware Marking Guidelines

2015 HSC Information and Digital Technology Networking and hardware Marking Guidelines 015 HSC Information and Digital Technology Networking and hardware Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B C 3 B 4 A 5 B 6 D 7 D 8 A 9 A 10 C 11 D 1 A 13 C 14 B 15 B

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The

More information

COMPUTER BASICS. Seema Sirpal Delhi University Computer Centre

COMPUTER BASICS. Seema Sirpal Delhi University Computer Centre COMPUTER BASICS Seema Sirpal Delhi University Computer Centre What is a Computer? An electronic device that stores, retrieves, and processes data, and can be programmed with instructions. A computer is

More information

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY Putting Barnsley People First BARNSLE CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLIC Version: 2.0 Approved By: Governing Body Date Approved: Feb 2014 (initial approval), March

More information

Beginners Guide to Mobile Technology

Beginners Guide to Mobile Technology Beginners Guide to Mobile Technology A Transformyx Whitepaper I. MOBILE TECHNOLOGY Mobile computing allows people to use IT without being tied to a single location. Any business with staff that work away

More information

7 Mini Tablet User Guide

7 Mini Tablet User Guide 7 Mini Tablet User Guide MODEL NUMBER: Powered by SYTABBL7 Wireless Mobile Internet Tablet Getting to Know Your New Tablet: Front View: Back View: Side Angle View: MENU MENU Power Key ON/OFF, Back Button

More information

Quick Start Guide. Web Conferencing & Secure Instant Messaging via Microsoft Office Communications Server 2007. Apptix Live Support: 866-428-0128

Quick Start Guide. Web Conferencing & Secure Instant Messaging via Microsoft Office Communications Server 2007. Apptix Live Support: 866-428-0128 Quick Start Guide Web Conferencing & Secure Instant Messaging via Microsoft Office Communications Server 2007 Apptix Live Support: 866-428-0128 Quick Start Guide / Introduction Page 2 of 6 Quick Start

More information

Point of View ProTab 3XXL IPS - Android 4.0 Tablet PC. Contents... 1 General notices for use... 2 Disclaimer... 2 Box Contents...

Point of View ProTab 3XXL IPS - Android 4.0 Tablet PC. Contents... 1 General notices for use... 2 Disclaimer... 2 Box Contents... Point of View ProTab 3XXL IPS - Android 4.0 Tablet PC English Contents Contents... 1 General notices for use... 2 Disclaimer... 2 Box Contents... 2 1.0 Product basics... 3 1.1 Buttons and connections...

More information

How to register and use our Chat System

How to register and use our Chat System How to register and use our Chat System Why this document? We have a very good chat system and easy to use when you are set up, but getting registered and into the system can be a bit complicated. If you

More information

Setting up for Adobe Connect meetings

Setting up for Adobe Connect meetings Setting up for Adobe Connect meetings When preparing to lead a live lecture or meeting, you probably ensure that your meeting room and materials are ready before your participants arrive. You run through

More information

Getting Started with a Mac For businesses with a Windows Server

Getting Started with a Mac For businesses with a Windows Server Getting Started with a Mac For businesses with a Windows Server This document, a quick guide designed to help you integrate a Mac into your environment, is geared toward businesses with a Microsoft server

More information