Student notes 1. Computer systems. Characteristics of a computer system

Size: px
Start display at page:

Download "Student notes 1. Computer systems. Characteristics of a computer system"

Transcription

1 Student notes 1 Computer systems Characteristics of a computer system This course is not just about computers. It is about computer systems. You may have a computer inside your classroom or at home. Possibly, it looks something like this: Let s consider some aspects of this computer. It has input devices, such as the keyboard and the mouse. These input devices allow the person who is using the computer to enter data, for example a story he or she wants to write, or some numbers to calculate. When the data is entered it is converted into a special format called binary code. (You will study exactly how this is done in Section 4.) Binary code uses only the digits 0 and 1 to represent all types of data that are entered into the computer. After the data is entered, it is stored in binary code in storage devices. This may be stored only for a very short time in the memory of the computer, or it may be stored on a disk or USB drive to be used later. The computer can process the data. It performs a number of operations on the data to achieve a desired result. For example, it can perform calculations on numbers that have been entered, or it can convert a piece of written text to speech. The computer also has output devices so that users can see the result of processing the data. The output device converts binary data in the computer to a form that the user can understand such as images on the screen, a print out or sound. The computer can also communicate with other computers, for example over the internet. When it does this the data is sent between the computers in binary code. Page 1 of 6

2 Different kinds of computer systems A desktop computer such as the one shown above is not the only type of device which can be called a computer system. Consider this smart phone: Just like the a computer It has input devices : the keypad and the microphone. When you press a number or you speak into the microphone, what you input is converted into binary code. The binary code is stored in the phone s memory, or if you want to keep it for longer it may be stored onto a memory card on the phone. The phone processes the data, (e.g. by converting multiple presses of a key into letters). The phone displays what it has processed on the image on the screen. The phone can also communicate with other computers in binary code. For example, if you type in a text message, it will be sent in binary code via the telephone company to your friend s phone. Your friend s phone can then use an output device to display the message. The mobile phone can be seen as just a very specialised computer. This is the same for many other devices, such as MP3 players, digital television sets, satellite navigation systems etc. In this course, although we will often be talking about computers, we study all kinds of computer systems. What they have in common is that they all work by processing digital data and have a series of devices that allow this data to be input, output and communicated to other computer systems. Page 2 of 6

3 Importance of computer systems Over the last thirty years, computers have developed considerably so that they are now essential to any modern society. Personal computers become a much more common item available in most homes as well as in public places such as schools and libraries. Computer technology is also being used in an increasing number of devices and many devices have been improved through the use of this technology. One major development in computer technology is the internet. The number of people who connect to the internet increased significantly over the last twenty years. The speed at which people can access data through the internet was also increased. People now connect to the internet not just with computers, but also with many different types of devices, such as mobile phones, television set-top boxes and electronic textbooks. As the internet becomes bigger, better and faster, people are finding more and more uses for the possibilities it offers. A major use of computer technology and the internet is in education. Several new tools have been produced to help students and others learn better. Electronic teaching materials, such as the one you are using at the moment, offer several advantages over traditional textbooks. The classroom has also been transformed by the use of technologies such as electronic white boards and interactive voting systems. There are computer systems such as virtual learning environments (VLEs) that help teachers provide teaching materials to pupils and monitor the progress that the pupils are making. The internet contains large libraries of information to assist students with research and people who are connected to the internet have more information at their disposal than ever before. It is important, however, to evaluate carefully any information received from the internet to decide whether or not it is reliable. Computer technology has also had a great impact on people s leisure activities and social lives. Many leisure activities are enhanced through the use of computers, even though this is not always obvious. For example, the planning, marketing and selling of tickets for events such as football matches or rock concerts often rely heavily on computer technology. At the events themselves, computers are used to manage the technical aspects of the events, such as lighting or display boards, in a much more effective way than when this was done manually. Computer-based gaming is now a large part of many people s leisure activities, and this is increasing more as new types of gaming platforms and new genre of games emerge, engaging different parts of the population. The connectivity of the internet has enhanced this even more, allowing people to engage with others in a variety of ways. Social networking sites, in particular, allow people to connect to each other in new ways. Computer technology has also affected the way that people do business. Most businesses now use the internet in some way in marketing and delivering their products and services to their customers. Through the use of credit cards and online payment methods, more people are shopping online. Although this cannot quite replace the experience of seeing and touching the product in a shop before you decide to buy it, it has provided new Page 3 of 6

4 opportunities as customers and shops do not have to be located near each other. Shops can sell to more customers, possibly across the whole world, while customers have more choice and can look for the best deal, all with the convenience of doing so from their own home. Reliability and standards in computer systems As computer technology becomes more and more prevalent in society, it also becomes more important to ensure that this technology is reliable. Modern society relies a great deal on technology and it is unlikely to function correctly without it. Imagine, for example, that when you woke up one morning and all computer systems have stopped working. You would not be able to listen to the radio or watch TV over breakfast, because even if you have an older analogue receiver, the stations use computer technology to record and transmit their broadcasts. If you go to school by car or bus, traffic would be a nightmare because the traffic light systems are controlled by computers. When you arrive at school, you would find that those teachers who have managed to get into work might not be able to deliver the lessons they planned as many rely on work which is on the computer. Therefore individuals, companies and governments put a lot of effort into making sure that systems do not fail. Data is backed up regularly so that if it is lost or damaged, the backup copy can be used to restore the data. Many people build in redundancy in systems. This means having more computer resources than is actually needed so that if some of it goes wrong, the rest can still carry out all the work that needs to be done. For example, a bank could have its main data stored on two different servers in two different towns so that if anything happens to the computers in one locations, the business of the bank can still run smoothly from the other computer. One way of ensuring that computer systems remain reliable is to insist on high professional standards when they are developed, used and maintained. Companies who make computer hardware and software have to agree to certain standards if they want their products to work with each other. Also, to ensure a higher quality product, companies must set high standards within themselves. They usually have to work as a team, and this means that they must be able to rely on each other and understand each other s work. Users of computer systems also have to keep certain standards. This is obviously true of employees of companies and public bodies because any failure of their systems can lead to the loss of a lot of money, or significant damages to a lot of people. There are therefore a number of rules that such organisations have to follow, such as the Data Protection Act (which we look at in the next section). Computers that are connected to the internet are at risk of being targetted by viruses and other harmful software, so organisations have a responsibility to ensure that they take enough protection against these threats. Even private users have a responsibility to protect themselves, because if they allow themselves to be attacked by viruses, they can then potentially infect other people they contact over the internet. Page 4 of 6

5 Types of standards Standards refer to conventions and rules. They are normally defined by a responsible organisation. There are various categories of standards. In computing, standards exist for programming languages, operating systems, data formats, communications protocols and electrical interfaces. Standards are important because they: enable equipment from different manufacturers to work together make learning new systems easier because they have similar characteristics minimise waste help to ensure fair play and access to markets bring costs down by opening markets to competition. De facto standards These have developed from common usage and include such standards as postscript, the QWERTY keyboard and the Microsoft Word file standard. De jure standards This means by law. They are de facto standards that have become so universally accepted that they have to be adhered to in order for devices and software to be able to communicate. They include examples such as wireless , TCP/IP, ASCII and Unicode. Proprietary standards These are standards owned by an organisation. They ensure compatibility between the company s products. They can also be used to exclude others from competing with rival products. For example, Apple computers lock users into using Apple software. Industry standards These are set by industry-wide organisations, for example: ANSI (American National Standards Institute): this sets standards for some programming languages IEEE (Institute of Electrical and Electronic Engineers): this sets standards for electrical interfaces, such as the RS232 serial interface ITU (International Telecommunication Union): this sets standards for communication protocols ISO (International Standards Organisation) Open standards Open standards are publicly available standards that are often agreed by a group of collaborators and are not for profit. Examples include HTTP, HTML, WAP, TCP/IP, XML and SQL. Page 5 of 6

6 Ethical, environmental and legal considerations As we saw in the previous section, it is necessary to consider right and wrong when making, buying and using computer systems. We now look into this in more detail. Ethical considerations are about what is morally right and wrong. It comes down to what people or society believe is right and wrong. For example, for many people, whether or not you should use open-source software is an ethical issue. They believe that people should not own intellectual property but that it should be made available for everyone to benefit from. Another possible ethical issue is whether school children should be banned from accessing their private or social networking sites in lessons or whether very young children should be allowed to have mobile phones. These things are not illegal in themselves, but many people have very strong beliefs about whether they are right or wrong. Environmental considerations are about what is good or bad for the environment. People are increasingly aware of the fact that the Earth has limited resources and that these should be used carefully. Computer technology does use considerable resources. The components that are used to make hardware devices usually contain plastics which are derived from oil, and metals which are very harmful to the environment if they are not disposed of carefully. It is therefore important to consider how these materials are obtained and recycled. Also computers need power to run and this raises several issues that affect either the manufacturer (such as how to design computers so that they us less power) or the users (such as whether computers should be left on or on standby when not being used). Legal considerations are about what is legal or illegal according to the law of the country. Each country has its own laws and computer systems developers must be aware and abide by them. For example, in the UK, the Computer Misuse Act makes it illegal to hack into another person s computer system to access information that one is not authorised to access. It also makes it illegal to deliberately damage another person s computer system by introducing a virus in it, for example. The Data Protection Act gives clear guidelines on how organisations should obtain and process personal data of real people. For example, if an organisation wants to obtain people s personal data, they must have a clear purpose for doing so, obtain only the data that is necessary for this purpose and use it only for that purpose. It would be illegal for your school to ask you to fill in a form about the leisure activities of your family, and then sell this data to other companies without your permission. This is because this data is not needed for the purpose of educating the pupils and giving the data to another organisation without your permission is illegal under the Act. Apart from laws that are specifically about computers, like the Computer Misuse Act and the Data Protection Act, there are other legal considerations because computers can be used as a tool to commit other illegal acts such as fraud or inciting hatred. It is important to note that ethical, environmental and legal considerations are not always separate things. Countries usually pass laws because the majority of the people in that country believe that something is ethically wrong and should be made illegal. Most people believe that the environment should be protected and so they believe that environmental issues are also ethical issues. Governments, therefore, often pass laws that also affect the environment, such as making it illegal to dispose of batteries in a land-fill site. Page 6 of 6

BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy

BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy Approved by Leadership Team 27 th April 2016 Approved by the Governing Body: 18 th May 2016 Review Due: May 2017 Rationale The Beaconsfield

More information

Fit Clip Plus Portable Media Player

Fit Clip Plus Portable Media Player Fit Clip Plus Portable Media Player User Guide BL 8GB Thank you for purchasing a Fit Clip Plus Portable Media Player! To get the most out of your Fit Clip Plus, please read this entire user guide carefully.

More information

4. The Importance of Internet Use in the Primary Curriculum

4. The Importance of Internet Use in the Primary Curriculum Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education

More information

Independence Day Study Guide

Independence Day Study Guide Independence Day Study Guide All material in this study guide Film Education INDEPENDENCE DAY Please note: This study guide was produced for the run up to the release of Independence Day. It is therefore

More information

Instructions for the ACER Laptops

Instructions for the ACER Laptops 20 Manor Road Ruislip Middlesex HA4 7LB Telephone: +44(0)1895 624 774 E-Mail: info@llmedia.com Website: www.llmedia.com Instructions for the ACER Laptops Always, after connecting to a projector, switch

More information

Saint Martin s Catholic Academy

Saint Martin s Catholic Academy Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin

More information

S320. Contents. Page. Components 3. Quick Start Guide 4. Settings 6. Brightness. Volume. Language. Calibrate the screen. Power save.

S320. Contents. Page. Components 3. Quick Start Guide 4. Settings 6. Brightness. Volume. Language. Calibrate the screen. Power save. User manual S320 Contents Page S320 Components 3 Quick Start Guide 4 Settings 6 Brightness Volume Language Calibrate the screen Power save Information Picture Satellite Navigation & GPS Speed Trap locator

More information

Hear Better With FM. Get more from everyday situations. Life is on. www.phonak.com

Hear Better With FM. Get more from everyday situations. Life is on. www.phonak.com Hear Better With FM Get more from everyday situations Life is on We are sensitive to the needs of everyone who depends on our knowledge, ideas and care. And by creatively challenging the limits of technology,

More information

Technology/Internet Usage Workshop

Technology/Internet Usage Workshop Technology/Internet Usage Workshop 1) Workshop Goals (1 st Slide) 2) Computers Desk Top (Show examples) Lap-Top Hand-held Wireless Device Introduce Tammy Welsh from Gateway 3) What is the Internet? The

More information

Chapter 1 Basic Introduction to Computers. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 1 Basic Introduction to Computers. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 1 Basic Introduction to Computers Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Explain why computer literacy is vital to success in today s world Define

More information

In this chapter you will find information on the following subjects:

In this chapter you will find information on the following subjects: 17 1. From XP to Vista Microsoft, the creator of Windows, has published various versions of the Windows operating system over the past two decades. Windows Vista is the latest version, the successor to

More information

Nokia E90 Communicator Using WLAN

Nokia E90 Communicator Using WLAN Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia

More information

The computer's internal components

The computer's internal components Computer hardware and types of computer A brief introduction to the insides of a computer and its added hardware. This will help explain what a computer is from a hardware point of view, how we control

More information

IP Address Assignment in Large Industrial Networks

IP Address Assignment in Large Industrial Networks IP Address Assignment in Large Industrial Networks Andy Swales, Network Vision, Inc. November 2003 Background There has been much recent interest in automating the assignment of IP addresses when Ethernet

More information

Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers.

Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers. Lesson Plan Course Title: Principles of IT Session Title: Networks and Hackers Lesson Duration: Lesson length is subjective and will vary from instructor to instructor. Performance Objective: Upon completion

More information

LESSON PLANS. Contents

LESSON PLANS. Contents LESSON PLANS Contents Total Instructional Time... 2 Lesson: Ticket Pricing... 3 Lesson: Stadium Staffing... 4 Lesson: Ingress & Egress... 5 Lesson: Parking... 6 Lesson: Concessions... 7 Lesson: Sponsorships...

More information

Data storage, collaboration, backup, transfer and encryption

Data storage, collaboration, backup, transfer and encryption Data storage, collaboration, backup, transfer and encryption Scott Summers UK Data Archive Practical research data management 19 April 2016 Overview Looking after research data for the longer-term and

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

Parts of a Computer. Preparation. Objectives. Standards. Materials. 1 1999 Micron Technology Foundation, Inc. All Rights Reserved

Parts of a Computer. Preparation. Objectives. Standards. Materials. 1 1999 Micron Technology Foundation, Inc. All Rights Reserved Parts of a Computer Preparation Grade Level: 4-9 Group Size: 20-30 Time: 75-90 Minutes Presenters: 1-3 Objectives This lesson will enable students to: Identify parts of a computer Categorize parts of a

More information

Maryland Technology Literacy Standards for Students

Maryland Technology Literacy Standards for Students Standard 1.0 Technology Systems: Develop foundations in the understanding and uses of technology systems Pre-kindergarten Kindergarten Grade 1 Grade 2 Grade 3 A. Systems A. Systems A. Systems A. Systems

More information

BTEC First Diploma for IT. Scheme of Work for Computer Systems unit 3 (10 credit unit)

BTEC First Diploma for IT. Scheme of Work for Computer Systems unit 3 (10 credit unit) BTEC First Diploma for IT Scheme of Work for Computer Systems unit 3 (10 credit unit) Overview On completion of this unit a learner should: 1 Know the of 4 Be able to. Num of hours Teaching topic Delivery

More information

Fun for all the Family 3- Quite a few games for articles and determiners

Fun for all the Family 3- Quite a few games for articles and determiners Fun for all the Family 3- Quite a few games for articles and determiners Articles in English is one of those grammar points that are fairly easy to explain the fundamentals of, but even Advanced learners

More information

Server based computing An introduction to server based computing, its advantages and how it works.

Server based computing An introduction to server based computing, its advantages and how it works. Server based computing An introduction to server based computing, its advantages and how it works. This whitepaper explains the concept of server based computing and defines the main components of its

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

ICT Security Policy for Schools

ICT Security Policy for Schools WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of

More information

STUDENT MOBILE DEVICE USE

STUDENT MOBILE DEVICE USE STUDENT MOBILE DEVICE USE This document amends policies related to student use of electronic devices as outlined in the Code of Student Conduct, Telecommunications Plan, and Student AUP. GOAL/RATIONALE

More information

Think secure. Information security at the University of Copenhagen

Think secure. Information security at the University of Copenhagen Think secure Information security at the University of Copenhagen All staff and students at the University of Copenhagen (KU) have to be familiar with information security (IS), because: we need to take

More information

Ray Chance President Browsercraft, LLC rchance@browsercraft.com

Ray Chance President Browsercraft, LLC rchance@browsercraft.com Ray Chance President Browsercraft, LLC rchance@browsercraft.com 1 EXECUTIVE SUMMARY The purpose of this white paper is to briefly discuss seven important topics everyone in business needs to know about

More information

Get online. computer courses. at your library FREE. complete beginners moving on leisure interests citizenship. Bradford Libraries

Get online. computer courses. at your library FREE. complete beginners moving on leisure interests citizenship. Bradford Libraries Get online at your library FREE computer courses complete beginners moving on leisure interests citizenship Bradford Libraries Would you like to learn how to use a computer? In the library you can learn

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides

More information

How To Sniff Network Traffic

How To Sniff Network Traffic How To Sniff Network Traffic Neighborhood Network Watch Home Network Awareness Program Introduction The communities across our beloved nation have never been at a greater risk than they are today. However,

More information

Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools

Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the

More information

Lenovo Miix 2 8. User Guide. Read the safety notices and important tips in the included manuals before using your computer.

Lenovo Miix 2 8. User Guide. Read the safety notices and important tips in the included manuals before using your computer. Lenovo Miix 2 8 User Guide Read the safety notices and important tips in the included manuals before using your computer. Notes Before using the product, be sure to read Lenovo Safety and General Information

More information

Technical Support. Trademarks

Technical Support. Trademarks Getting Started Technical Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number on the label of your product and use it to register your product at https://my.netgear.com.

More information

Apple G5. Standards Subpart 1194.21 Software applications and operating systems. Subpart B -- Technical Standards

Apple G5. Standards Subpart 1194.21 Software applications and operating systems. Subpart B -- Technical Standards Apple G5 Standards Subpart 1194.21 Software applications and operating systems. 1194.22 Web-based intranet and internet information and applications. 1194.23 Telecommunications products. 1194.24 Video

More information

Getting to Know Xsight... 3. Home Screen and Everyday Use... 9. Settings... 11. PC Setup... 17. 2 www.oneforall.com

Getting to Know Xsight... 3. Home Screen and Everyday Use... 9. Settings... 11. PC Setup... 17. 2 www.oneforall.com User Manual English English Getting to Know Xsight........................................ 3 Unpacking and Setting Up Xsight............................................................. 3 Using Xsight

More information

Avaya one-x Mobile User Guide for iphone

Avaya one-x Mobile User Guide for iphone Avaya one-x Mobile User Guide for iphone Release 5.2 January 2010 0.3 2009 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document was

More information

OSI Seven Layers Model Explained with Examples

OSI Seven Layers Model Explained with Examples OSI Layer Model describes how information is transmitted between networking devices. In this tutorial I will provide a brief introduction of OSI Layer model including its advantage and services. OSI model

More information

Course/Program Credential(s): Credential Certificate Postsecondary Degree University Degree Other:

Course/Program Credential(s): Credential Certificate Postsecondary Degree University Degree Other: Course Title: Information Technology Fundamentals Unit: Computer Basics Content Standard(s) and 1. Distinguish between input and output devices, including monitor, keyboard, mouse, and scanner. 2. Utilize

More information

Spyware and Viruses. There is a distinct difference between spyware and viruses.

Spyware and Viruses. There is a distinct difference between spyware and viruses. Spyware and Viruses Spyware and viruses are getting to be the largest problem in the battle of keeping your computer running smoothly and being able to use your computer with any kind of efficiency. There

More information

ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS

ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS ST MARY S COLLEGE CROSBY NETWORK & INTERNET USE POLICY FOR STUDENTS Contents:- 1. College policy. 2. Roles and Responsibilities 3. College procedures. 4. College rules for internet use by students. 5.

More information

10 Hidden IT Risks That Might Threaten Your Law Firm

10 Hidden IT Risks That Might Threaten Your Law Firm (Plus 1 Fast Way to Find Them) Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER ZIMBABWE SCHOOL EXAMINATIONS COUNCIL General Certificate of Education Ordinary Level COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER Candidates answer on the question paper Additional materials:

More information

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy

More information

What is Windows 7? How to help your people work in the way they want to. Small Business whitepaper

What is Windows 7? How to help your people work in the way they want to. Small Business whitepaper What is Windows 7? How to help your people work in the way they want to Small Business whitepaper What is Windows 7 and why should I care? In today s challenging economic and competitive climate, small

More information

Guidelines for smart phones, tablets and other mobile devices

Guidelines for smart phones, tablets and other mobile devices Guidelines for smart phones, tablets and other mobile devices Summary Smart phones, tablets and other similar mobile devices are being used increasingly both privately and in organisations. Another emerging

More information

EBooks: Expanding the School Library

EBooks: Expanding the School Library EBooks: Expanding the School Library Presenter: Dr. Terry Cavanaugh & Dr. Cathy Cavanaugh Email: tcavanau@unf.edu & ccavanau@unf.edu Web: http://drscavanaugh.org/ebooks/ As of 2004 the Million Book Project

More information

Writing Topics WRITING TOPICS

Writing Topics WRITING TOPICS Writing Topics Topics in the following list may appear in your actual test. You should become familiar with this list before you take the computer-based TOEFL test. Remember that when you take the test

More information

Moving from primary to secondary school Supporting pupils with an autism spectrum disorder

Moving from primary to secondary school Supporting pupils with an autism spectrum disorder Moving from primary to secondary school Supporting pupils with an autism spectrum disorder The transition from primary to secondary school is a major change in any child s life, and pupils with an autism

More information

S4 USER GUIDE. Read Me to Get the Most Out of Your Device...

S4 USER GUIDE. Read Me to Get the Most Out of Your Device... S4 USER GUIDE Read Me to Get the Most Out of Your Device... Contents Introduction 4 Remove the Protective Cover 5 Charge Your S4 5 Pair the S4 with your Phone 6 Install the S4 in your Car 8 Using the Handsfree

More information

Fact or opinion quiz. Level A. 1. War is always wrong. A) Fact B) Opinion. 2. Many innocent people are killed in war. A) Fact B) Opinion

Fact or opinion quiz. Level A. 1. War is always wrong. A) Fact B) Opinion. 2. Many innocent people are killed in war. A) Fact B) Opinion Level A 1. War is always wrong. 2. Many innocent people are killed in war. 3. There is too much unemployment in Britain. 4. Wild animals should not be kept in zoos. 5. Teachers should be allowed to smack

More information

ADMINISTRATION COMPUTER NETWORK

ADMINISTRATION COMPUTER NETWORK ADMINISTRATION COMPUTER NETWORK School Administrative Computer Network The Cumberland School operates a network of computers specifically for administrative purposes in the school. This network is electronically

More information

PART I: The Pros and Cons of Public Cloud Computing

PART I: The Pros and Cons of Public Cloud Computing PART I: The Pros and Cons of Public Cloud Computing Pros 1. Efficiently use the resource through sharing Users from companies or enterprises can access to the centralized servers where data are stored

More information

M2M Summit 2012. Fraud An underestimated risk for M2M solutions? 05.09.2012 matthias.kaiser@liongate.de volker.ott@ottit.de

M2M Summit 2012. Fraud An underestimated risk for M2M solutions? 05.09.2012 matthias.kaiser@liongate.de volker.ott@ottit.de M2M Summit 2012 Fraud An underestimated risk for M2M solutions? 05.09.2012 matthias.kaiser@liongate.de volker.ott@ottit.de 2012 LionGate AG www.liongate.de Agenda 1. M2M Fraud examples 2. Key drivers increasing

More information

Information Technology Career Field Pathways and Course Structure

Information Technology Career Field Pathways and Course Structure Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating

More information

Albany Senior High School

Albany Senior High School Albany Senior High School Bring your own device (BYOD) Usage Policy for Students and Parents BYOD Usage Policy S:\AdminShared\Teaching Staff\ICT\BYOD\BYOD Policy for Parents.doc Table of Contents 1 Introduction

More information

Introduction to the Technology & Laptop Program

Introduction to the Technology & Laptop Program Introduction to the Technology & Laptop Program Today s careers in science, technology, engineering and math, require students and professionals with 21st century technology skills and experience. At SciTech,

More information

A+ Practical Applications Solution Key

A+ Practical Applications Solution Key A+ Practical Applications Solution Key Module 1 Assignment: Introducing Microsoft Windows - answer the following questions: 1. What attributes are available in the NTFS file system that are not available

More information

ONE-2-ONE LEARNING LAPTOP PROGRAM 2011

ONE-2-ONE LEARNING LAPTOP PROGRAM 2011 GLENUNGA INTERNATIONAL HIGH SCHOOL ONE-2-ONE LEARNING LAPTOP PROGRAM 2011 Department of Education and Children s Services T/A South Australian Government Schools CRICOS Provider No. 00018A 1. VISION and

More information

DAB1001. Wireless Digital Radio Interface. Installation & User Guide

DAB1001. Wireless Digital Radio Interface. Installation & User Guide DAB1001 Wireless Digital Radio Interface Installation & User Guide Contents Contents... 2 Introduction... 3 Contents of Package... 4 Installation... 5 Product Overview... 5 Installation Procedure... 5

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

not a Web- based application. not self-contained, closed products. Please refer to the attached VPAT Please refer to the attached VPAT

not a Web- based application. not self-contained, closed products. Please refer to the attached VPAT Please refer to the attached VPAT Apple Cinema Display Standards Subpart 1194.21 Software applications and operating systems. 1194.22 Web-based intranet and internet information and applications. 1194.23 Telecommunications products. 1194.24

More information

The Top 5 Lessons Every Small Business Owner Needs to Learn to be Successful in Today s Unforgiving Business Climate TOP

The Top 5 Lessons Every Small Business Owner Needs to Learn to be Successful in Today s Unforgiving Business Climate TOP 5The TOP LESSONS EVERY SMALL BUSINESS OWNER NEEDS TO LEARN TO BE SUCCESSFUL IN TODAY S UNFORGIVING BUSINESS CLIMATE Lessons learned Change happens to you or with you We ve been working with small businesses

More information

ERA6 OBJECTIVE QUSESTION

ERA6 OBJECTIVE QUSESTION 1)Database Management Question:- ERA6 OBJECTIVE QUSESTION 1) While Creating a Table using the MS Access, you will get an interface, as shown on the screen this Interface shows, you are Working on the View

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Preservation Handbook

Preservation Handbook Preservation Handbook Plain text Author Version 2 Date 17.08.05 Change History Martin Wynne and Stuart Yeates Written by MW 2004. Revised by SY May 2005. Revised by MW August 2005. Page 1 of 7 File: presplaintext_d2.doc

More information

Remote Access and Home Working Policy London Borough of Barnet

Remote Access and Home Working Policy London Borough of Barnet Remote Access and Home Working Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Remote Access and Home Working Policy Document Description This policy applies to home and

More information

Universal Push2TV HD Adapter PTVU1000 Installation Guide

Universal Push2TV HD Adapter PTVU1000 Installation Guide Universal Push2TV HD Adapter PTVU1000 Installation Guide 2011 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or

More information

Chapter 9 The Internet

Chapter 9 The Internet CSCA0101 COMPUTING BASICS Chapter 9 1 1. 2. Types of Network 3. What Makes Internet Works? 4. Internet Equipment 5. Internet Applications 2 A global network connecting millions of computers More than 100

More information

TeachingEnglish Lesson plans. Conversation Lesson News. Topic: News

TeachingEnglish Lesson plans. Conversation Lesson News. Topic: News Conversation Lesson News Topic: News Aims: - To develop fluency through a range of speaking activities - To introduce related vocabulary Level: Intermediate (can be adapted in either direction) Introduction

More information

Sure Data Hosting Solutions

Sure Data Hosting Solutions Sure Data Hosting Solutions Welcome to Sure Sure supplies telecommunication services in the South Atlantic in Ascension, Falkland Islands and Saint Helena. Across the Falkland Islands we deliver mobile,

More information

Development Techniques for Native/Hybrid Tizen Apps. Presenter Matti Pakarinen

Development Techniques for Native/Hybrid Tizen Apps. Presenter Matti Pakarinen Development Techniques for Native/Hybrid Tizen Apps Presenter Matti Pakarinen 1 Content Symphony Teleca in Brief Introduction to Native/Hybrid Apps Key experiences Case Studies 2 Who we are Symphony Teleca

More information

THE LITTLE BIG BOOK OF BADNESS

THE LITTLE BIG BOOK OF BADNESS THE LITTLE BIG BOOK OF BADNESS How to stay safe on the Internet a guidebook for students and parents USE THIS BOOK TO FIND OUT HOW YOU AND YOUR COMPUTER CAN STAY AWAY FROM BAD THINGS 2 CONTENTS Why you

More information

Introduction to Information Technology

Introduction to Information Technology Introduction to Information Technology Career Cluster Information Technology Course Code 10009 Prerequisite(s) Recommended that a student has taken from the Foundation Courses Computer Applications. Credit.5

More information

Florida 4-H Consumer Choices 2010-11 Study Topics. Student Guide. Video Game Systems. Introduction and Background

Florida 4-H Consumer Choices 2010-11 Study Topics. Student Guide. Video Game Systems. Introduction and Background Florida 4-H Consumer Choices 2010-11 Study Topics Student Guide Video Game Systems Introduction and Background Buying a video game system is a big decision that can cost hundreds of dollars, so it is important

More information

Blue&Me. Live life while you drive. What you can do: Introduction. What it consists of:

Blue&Me. Live life while you drive. What you can do: Introduction. What it consists of: Blue&Me Live life while you drive Introduction Blue&Me is an innovative in-car system that allows you to use your Bluetooth mobile phone and to listen to your music while you drive. Blue&Me can be controlled

More information

Computer Technology: Literacy and Usage KINDERGARTEN. Standard 1.0 Students will understand basic operations and concepts of technology.

Computer Technology: Literacy and Usage KINDERGARTEN. Standard 1.0 Students will understand basic operations and concepts of technology. Computer Technology: Literacy and Usage KINDERGARTEN Standard 1.0 Students will understand basic operations and concepts of technology. 1.1. Students will demonstrate an understanding of the nature and

More information

Smart Shopping Cart. Group 5. March 11, 2008. Advisor: Professor Haibo He

Smart Shopping Cart. Group 5. March 11, 2008. Advisor: Professor Haibo He Smart Shopping Cart Group 5 March 11, 2008 Advisor: Professor Haibo He ------------------------------ Group Members: Norasyikin Fadilah Siti Fatimah Ahmad Anirudh Argawal Rajwinder Singh Katherine Casella

More information

The use of binary codes to represent characters

The use of binary codes to represent characters The use of binary codes to represent characters Teacher s Notes Lesson Plan x Length 60 mins Specification Link 2.1.4/hi Character Learning objective (a) Explain the use of binary codes to represent characters

More information

STB- 2. Installation and Operation Manual

STB- 2. Installation and Operation Manual STB- 2 Installation and Operation Manual Index 1 Unpacking your STB- 2 2 Installation 3 WIFI connectivity 4 Remote Control 5 Selecting Video Mode 6 Start Page 7 Watching TV / TV Guide 8 Recording & Playing

More information

Terms and conditions for your ThinkingWISP broadband service

Terms and conditions for your ThinkingWISP broadband service Terms and conditions for your ThinkingWISP broadband service These terms and conditions set out the agreements between (1) you ('you', 'the customer' or 'your') and (2) Thinking Rural Community Interest

More information

TechniSat HDFS Satellite HD Digital Receiver. USB Recorder Instructions

TechniSat HDFS Satellite HD Digital Receiver. USB Recorder Instructions TechniSat HDFS Satellite HD Digital Receiver USB Recorder Instructions 1 Contents 1 Contents...2 2 Introduction...3 3 Getting Started...4 3.1 Formatting...4 4 Scheduled Recording...6 4.1 Manual Timer...6

More information

Chapter 9 Communications and Networks

Chapter 9 Communications and Networks Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications

More information

Sibford School Student Computer Acceptable Use Policy

Sibford School Student Computer Acceptable Use Policy Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

More information

NETWORK AND INTERNET SECURITY POLICY STATEMENT

NETWORK AND INTERNET SECURITY POLICY STATEMENT TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

Get New Customers With YouTube Advertising

Get New Customers With YouTube Advertising Get New Customers With YouTube Advertising What We Do We produce a 30 second video We find your target audience We keep you informed with reports Free of Charge We ensure that the right people see your

More information

IT3 Database Questions

IT3 Database Questions IT3 Database Questions 1 15 Explain what is meant by a relational database. [2] A (large) collection of data items and links/relationships between them (1) structured in such a way that it allows it to

More information

DISTANCE LEARNING APPLICATIONS ACROSS MULTIPLE PLATFORMS AND NETWORKS

DISTANCE LEARNING APPLICATIONS ACROSS MULTIPLE PLATFORMS AND NETWORKS DISTANCE LEARNING APPLICATIONS ACROSS MULTIPLE PLATFORMS AND NETWORKS Claus J. S. Knudsen Division of Media Technology and Graphic Arts Royal Institute of Technology (KTH) Drottning Kristinas v.47 D, SE-100

More information

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12 Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge

More information

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some

More information

Computer Organization

Computer Organization Basics Machine, software, and program design JPC and JWD 2002 McGraw-Hill, Inc. Computer Organization CPU - central processing unit Where decisions are made, computations are performed, and input/output

More information

E-Booking at London International Airport

E-Booking at London International Airport Standard Grade Computing Studies Commercial Data Processing Frank Frame Acknowledgement Thanks to Dorothy Tedman for her contribution to the review of the content. First published 2004 2004 This publication

More information

CDW Technology Services

CDW Technology Services CDW Technology Services The Right Technology. Right Away. 20 Carlson Court Suite 300 Etobicoke, Ontario M9W 7K6 CDW.ca 800.97.CDWCA Optimize your IT investment with CDW Technology Services 34451 022607

More information

FIRBANK GRAMMAR SCHOOL

FIRBANK GRAMMAR SCHOOL FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...

More information

Avaya one-x Mobile User Guide for iphone

Avaya one-x Mobile User Guide for iphone Avaya one-x Mobile User Guide for iphone 18-602788 Issue 1 February 2008 2008 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document was

More information

Building a website. Should you build your own website?

Building a website. Should you build your own website? Building a website As discussed in the previous module, your website is the online shop window for your business and you will only get one chance to make a good first impression. It is worthwhile investing

More information

Protection of Computer Data and Software

Protection of Computer Data and Software April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal

More information

Basics of Accessible Design

Basics of Accessible Design Basics of Accessible Design Font Consider using a sans serif type font such as Arial or Veranda. The sans serif fonts are easier for people with reading disorders and visual impairments to read. This document

More information