Chapter 2 : The Internet and World Wide Web Internet : world wide collection of networks. Connecting to the internet - Dial-Up Access : use modem to



Similar documents
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Chapter 11 Computers and Society, Security, Privacy, and Ethics

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Discovering Computers Chapter 9 Communications and Networks

Chapter 9 Communications and Networks

Lecture 6: Operating Systems and Utility Programs

Test 1 Review Chapter 1 What is a computer? 1. Definition of computer 2. Data and information. Emphasize that data is processed into information. 3.

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy

Discovering Computers Chapter 3 Application Software

Computers and Society: Security and Privacy

Chapter 3. Application Software. Chapter 3 Objectives. Application Software. Application Software. Application Software. What is application software?

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers Your Interactive Guide to the Digital World

PC Security and Maintenance

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Chapter 3. Application Software. Chapter 3 Objectives. Application Software

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

Chapter 1 Instructor Version

Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 8 Operating Systems and Utility Programs

Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.

The Internet and Network Technologies

Part I: Ethics. Moral guidelines that govern use of computers and information systems. Unauthorized use of computer systems

Telecommunications, Networks, and Wireless Computing

Chapter 3 Software. Computer Concepts Chapter Contents. 3 Section A: Software Basics

NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.)

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

G11_EoT_Solved Quizzes and Worksheets

COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION

NETWORKING TECHNOLOGIES

System Administrator Guide

Medical Networks and Operating Systems

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

How to Search the Internet

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

BUILDING DIGITAL LITERACY PURPOSE DEFINING DIGITAL LITERACY USING THIS GUIDE

Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT

How To Manage A Network Safely

Lesson 24 Network Fundamentals

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Sample Career Ladder/Lattice for Information Technology

COB 302 Management Information System (Lesson 8)

Cyber Security Awareness

E-Business, E-Commerce

ViRobot Desktop 5.5. User s Guide

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

Connecting to the Internet

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

Go Wireless. Open up new possibilities for work and play

Computer Networks and Internet working

Telecommunications, the Internet, and Wireless Technology

Living Online. Module C

Integra Telecom 4690 Colorado St. SE Prior Lake, Mn DSL INSTALLATION GUIDE

Fundamentals of Network Security - Theory and Practice-

Three steps to the best technology: 1. The Assessment 2. The Dialogue 3. The Recommendation

Interactive welcome kit Charter-Business.com CB.016.fibCD.0210

Computer Concepts And Applications CIS-107-TE. TECEP Test Description

Cyber Security Awareness

MN-700 Base Station Configuration Guide

Technical Glossary from Frontier

Computers Are Your Future Prentice-Hall, Inc.

Century Commons' Internet Use

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

Asheboro City Schools 1:1 Laptop Handbook for Elementary and Middle Schools

Frequently Asked Questions: Xplornet Internet Security Suite

Content Teaching Academy at James Madison University

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Airtel PC Secure Trouble Shooting Guide

Verizon Remote Access User Guide

Local Area Networks (LANs) Blueprint (May 2012 Release)

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ONE Mail Direct for Mobile Devices

Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work

Creating client-server setup with multiple clients

Chapter 4: Networking and the Internet

UTMB INFORMATION RESOURCES PRACTICE STANDARD

Introduction to Computer Networks and Data Communications

Sophos for Microsoft SharePoint startup guide

For assistance with your computer, software or router we have supplied the following information: Tech Support , press 1

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

Local-Area Network -LAN

User's Manual. Intego Remote Management Console User's Manual Page 1

Section 12 MUST BE COMPLETED BY: 4/22

Student & Staff Access and Use of Networked Information Resources and Communications

High-Speed Broadband Internet Guide

Information Technology Grades Students will know and be able to: Basic Operations 1.1 (I)

Chapter 7A. Functions of Operating Systems. Types of Operating Systems. Operating System Basics

Security in Wireless Local Area Network

Internet Jargon. Address: See Uniform Resource Locator.

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: Doc Type: Q & A with Explanations Total Questions: 50

CamGuard Security System CamGuard Security System Manual

GiftWrap 4.0 Security FAQ

Network Technology CMP-354-TE. TECEP Test Description

Transcription:

Chapter 2 : The Internet and World Wide Web Internet : world wide collection of networks. Connecting to the internet - Dial-Up Access : use modem to connect - DSL ( Digital Subscriber Line) : higher-speed internet connection using telephone lines. - Cable Modem : high-speed internet connection through cable TV network. - Fixed Wireless : high-speed internet connection use antenna. - Wi-Fi (wireless fidelity) : use radio signal to wireless devices. - Satellite Modem : high-speed internet via satellite. Internet Address - IP Address - Domain Name - Top-Level Domain (TLD) - Domain Name System (DNS) World Wide Web - WWW or Web : collection of electronic documents - Webpage : document contains text, graphic, and sound - Web server : computer that delivers requested webpage to your computer Types of Webpage - Portal - Blog - News - Wiki - Informational - Online Social Networks

- Business/Marketing - Content Aggregator - Educational - Entertainment - Advocacy - Personal Multimedia On The Web 1. Graphic : drawing, chart, photograph. - JPEG : graphical image - GIF : line drawing, single-color - Thumbnail : small or large image of review 2. Animation : motion created by displaying a series of still image in sequence. 3. Audio : music, speech, or any other sound 4. Video : full-motion images played back at various speed. 5. Virtual Reality(VR) : use of computer to stimulate a real environment that appears as a 3D space. Web Publishing 1. Planning Web Site 2. Analyzing and Designing The Web Site 3. Creating Website 4. Deploying a Website 5. Maintaining The Website E-Commerce = a business transaction that occur over the internet. 1. Business to Consumer(B2C) 2. Consumer to Consumer(C2C) 3. Business to Business(B2B)

Other Internet Services 1. E-Mail : transmission of messages via computer networks 2. File Transfer Protocol(FTP) : internet that allow you to share files with other computers on internet. 3. Newsgroups and Message Boards : online area in which users have written discussions about a particular subject. 4. Mailing List : every person on the list receives a copy of the message in their mailbox. 5. Chat Rooms : a real-time conversation 6. Instant Messaging : a real-time internet communication service that notifies you. Chapter 3 : The Application Software Application Software : program that designed to make users more produvtive - Package Software : mass produced copyrighted retail software - Custom Software : a tailored-made program developed at a user s request to perform specific functions. - Web-based Software : access and interact from computer that s connected to the internet. - Freeware : no cost and copyrighted program, cannot resell - Public-domain Software : free software, but it is donated for public use and no copyright. - Shareware : copyrighted software distributed free for trial period. Working with Application Software - Desktop : on-screen work area

- Icon : small image represent program - Button : graphical that activate to cause a specific action - Pointer : small symbol on screen use to click an object on screen - Menu : contains command - Window : rectangular area of the screen displays a program - Title bar : horizontal space that contains window s name - Dialog box : provide information or request a response - Shortcut menu : context-sensitive menu that displays a list of commonly used commands. Business Software + Word Processing Software - word processor - clipart - margins - word wrap - scrolling - find and search - replace - spelling checker - header - footer + Spreadsheet Software - cell - label - value - formula - function - charting + Database Software = a collection of data which consists of table, record, and field. + Presentation Graphic Software = allow you to create presentation i.e. Microsoft Powerpoint + Note Taking Software

= enables users to enter typed text on a page + Personal Information Managers Software (PIM) = calendar, address book, note pad + Project Management Software = allows you to plan a project + Accounting Software = record and report financial transactions Web-Based Software Web Application : software application that exists on a Website. Chapter 8 : Operating Systems and Utility Programs = program that control the operations of the computer and its devices 2 types of system software 1. Operating System : program that contains instruction that coordinate all activities among computer hardware. 2. Utility Programs : a type of system software that perform specific task. Operating System Operating system function 1. starting a computer 2. providing a user interface 3. managing program 4. managing memory 5. schedule job 6. configuring device 7. establishing an internet connection

8. monitoring performance 9. provide file management 10. controlling a network 11. administering security Operating System Utility Programs - file manager : perform functions related to file management - search utility : attempts to locate a file on the computer - image viewer : allows user to display the contents of graphic files - personal firewall : detects and protects personal computer from unauthorized instruction. - uninstaller : remove application - disk scanner : search and remove unnecessary files - backup utility : allow to copy or backup selected files onto another disk Types of Operating System - Proprietary Software : limited to a specific vendor or computer model. - Device-dependent : can run only on a specific type of computer. - Device-independent : run on many types of computer. - Downward-compatible : for earlier version of the OS. - Upward-compatible : runs with new version of OS. 1. Stand-alone OS : OS that works on desktop computer - DOS - Window XP - Window Vista -Mac OS X - UNIX - Linux 2. Network OS - Solaris designed for E-commerce applications

3. Embedded OS : OS on most PDA and small device - Window CE - Windows Mobile - Palm OS - Symbian OS Stand-Alone Utility Programs - Anti-virus : detect and remove virus from computer. - Spyware removers : secretly collects information about user. - Internet Filters : remove or block certain items from being displayed. - File Compression Utility : compressed file takes up less storage than original file. - Media Player : allows to view image on the computer. - CD/DVD Burning Software : write text, sound, video on CD/DVD. - Personal Computer Maintenance : repair disk problems and improving computer s performance. Chapter 9: Data Communications and Networking Types of Network 1. Local Area Network (LAN): a network that connects computers and devices in a limited geographical area. 2. Metropolitan Area Network (MAN): a network that connects LAN in a metropolitan area such as city or country. 3. Wide Area Network (WAN): a network that covers a large geographic area. Network Architecture 1. Peer-to-Peer: a simple and inexpensive network that connect less than 10 computers together.

2. Client-Server: controls access to network resources and provide a centralized storage area Wired Network: Transmission Media 1. Twisted Pair Cable: consists of one or more twisted paired wires bundled together 2. Coaxial Cable: use in Cable TV because it can be cabled over longer distances than twisted pair cable 3. Fiber Optic Cable : consists of hundreds of thin glass or plastic that use light to transmit signals. Wireless Network: Use Radio frequency to carry the data signals 1. IrDA (Infrared): transmit data wirelessly to each other via infrared light waves. 2. Bluetooth: Technology uses short range radio waves to transmit data between two Bluetooth devices. 3. Radio Frequency Identification: uses radio signals to communicate with a transponder placed on person. 4. Ultra-wideband: use short range radio wave to communicate at high speed 5. WiFi: a family standard for wireless LANs 6. Broadcast Radio: distributes radio signals through the air over long distances 7. Cellular Radio: a form of broadcast radio that is used widely for mobile communications, specifically for cellular telephones. 8. Microwaves: Microwave transmissions involve sending signals from one microwave station to another.

9. WiMax: newer network which communicate wirelessly over the air in wide area 10. Communications Satellite: a space station that receives microwave signals from an earth-based station, and broadcasts the signals back over a wide area to any number of earth-based stations. Communication and Navigational Devices Hub/Switch: The central computers that provide a connection point for devices in the network, and all data transfer the hub to another computer. Wireless Access points: allows computers and devices to transfer data wirelessly. Analog Modem: convert digital to analog signal that would allow the user to make a point-to-point connection over a copper-based telephone line. Digital Modem: convert computer digital signal to telecommunication digital signal that would allow you to make a point-to-point connection over a fiber optic cable Routers: connects multiple computers or others routers together and transmits data to its destination on the network. Chapter 10: Managing a Database Qualities of Valuable Information - Accurate information: correct information - Verifiable information: can prove the information is correct or incorrect - Timely information: age suited to its use - Organized information: arranged to suit your need and requirement

- Useful information: has meaning to user who receives it - Accessible information: available when you need it - Cost-effective information: give more value than it costs to produce Database approach: Pro and cons Pros 1. Reduce data redundancy 2. Improved Data integrity 3. Shared Data 4. Reduced Development Time 5. Easier Access Cons 1. Use more computing resource-power computer 2. Need data analyst, database administrator and database programmers 3. Data is stored in a single file. It is vulnerable to be tempered and damaged. Data Model 1. Relational Database: store data in tables that consists of rows and columns. 2. Objected-Oriented Database (OODB): store data in objects which are items that contain data. 3. Multidimensional Database (MDDB): store data in dimensions. It can store more than two dimensions of data (hypercube) 4. Data Warehouse: A huge database system that stores and manages the data required to analyze historical and current transactions Database Management Systems 1. Data Dictionary: contains data about each file in the database and 2. Form generator (User Data entry form) 3. Report Generator: allows user to design a report on the screen

4. Security with the help of Access privileges: define the activities that a specific user or group of user can perform. 5. Backup and recovery Recovery Utilities: uses the logs and/or backups to restore a database when it is damaged or destroyed. Validation Checks 1. Alphabetic Check: ensure that enter only alphabetic data into a field. 2. Range Check: determines whether a number is within specified range 3. Consistency Check: test if the data in two or more associated fields is logical 4. Completeness Check: verifies a required field contains data Chapter 11: Computer Security, Ethics, and Privacy Computer Viruses 1. Virus: a potentially damaging computer program that affects your computer negatively 2. Worm: a program that copies itself repeatedly in memory or on disk drive until no memory or disk space remains. 3. Trojan Horse: a program that hide within or looks like a legitimate program and will deliberately alters the computer s operations. Protection from viruses, worm, and Trojan horse 1. Trusted source 2. Antivirus program: can identify and remove computer viruses 3. Virus Signature: a known specific pattern of virus code.

4. Inoculate: antivirus records information such as file size in a separate inoculation file. 5. Quarantine: a separate area of a hard disk that holds the infected file until you can remove its virus. 6. Beware of virus hoax: an e-mail message in the form of a chain letter that request you to send it to others. Other Computer Attack 1. Botnets: internet used as part of a network that attack other networks 2. Denial of service attacks: assault whose purpose is to disrupt computers access to an internet service. 3. Back Doors: program that allow users to bypass security controls when accessing a program. 4. IP Spoofing: a technique intruders use to make their network or internet transmission appear legitimate to a victim computer. Software Theft Software piracy: unauthorized and illegal duplication of copyrighted software. Information Theft : Safeguards against Information Theft 1. Encryption: the process of converting readable data into unreadable characters to prevent unauthorized access. 2. Plaintext: readable data 3. Ciphertext: the encrypted data 4. Encryption Key: the recipient of the data uses to decrypt cipher text. Information Privacy Electronic profiles: customer profile enters in a form in various media.

Cookies: a small file that a web server store on your computer. Typically contain data about you, such as user name, and user preferences. Phishing: an official looking e-mail that attempts to obtain your personal and financial account. Spyware: a program placed on a computer without the user s knowledge that secretly collects information about the user. Spam: an unsolicited e-mail message sent to many recipients at once Privacy Laws: law regarding the storage and disclosure of personal data Social Engineering: gaining unauthorized access or obtaining confidential information by taking advantage of the human nature (lure user and password) Employee monitoring: involves the use of computers to observe, record, and employee s use of computer. Content Filtering: the process of restricting access to certain material on web Health Concerns of Computer Use 1. Repetitive Strain Injury 2. Ergonomic and Workplace Design 3. Computer Addiction 4. Green Computing Chapter 14 : Enterprise Computing Level of users in an organization - Executive Management: focus on the company s overall goals. - Middle Management: applies specific programs and plans - Operational Management: day-to-day activities within the company- making operational decision

- Non-Management Employee: production, clerical, and staff personnel. General purpose Information Systems 1. Office Information Systems: increases employee productivity and assist with communications among employee 2. Transaction Processing Systems: captures and processes data from day-today business activities 3. Management Information System: generates accurate, timely, and organized information, so managers and other users can make decision, solve problems. 4. Decision Support System: helps user to analyze data and make decision. By using Internal Source of data and External Source 5. Expert Systems: captures and stores the knowledge of human reasoning and decision making 6. Integrated Information Systems: combined various system into one Enterprise Wide Technologies and Methodologies 1. Portal 2. EDI 3. Data Warehouse 4. Extranet 5. Document Management Systems 6. Workflow 7. Virtual Private Network Enterprise Hardware 1. Redundant Array of Independent Disks 2. Network Attached Storage 3. Enterprise Storage System 4. Blades Servers 5. High-Availability Systems 6. Scalability 7. Utility and Grid Computing 8. Interoperability

Back Up Procedure 1. Full Backup: copies all of the files in computer. It provides the best protection against data loss. 2. Differential Backup: copies only the files that have changed since the last full backup. 3. Incremental Backup: copies only the files that have changed since the last full or last incremental backup 4. Selective Backup: allows the user to choose specific files to backup. 5. Continuous Data Protection: a backup plan in which all data is backed up whenever a chance is made Disaster Recovery Plan 1. The emergency plan: steps taken immediately after a disaster strikes 2. The Backup plan: a company uses backup files to resume information processing 3. The Recovery Plan: specifies the action to be taken to restore full information processing operations which differs for each type of disaster. 4. The Test Plan: to assure that the disaster plan is completed, it should be tested.