1 examine computer hardware and software. explore networks and data communications learn about...
TRANSCRIPT
![Page 1: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/1.jpg)
1
Examine computer hardware and software.
Explore networks and data communications
Learn about security threats on the internet and how to protect computer systems and personal information
Concepts Unit A: Objectives
![Page 2: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/2.jpg)
Defining Computers
A computer is an electronic device accepts input processes and stores data produces output
![Page 3: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/3.jpg)
Types of Computers
Personal computers• Desktop• Notebook (Laptop) • Tablet PC
Hand-helds: PDAs, MP3 players, Cell phones
Mainframes Supercomputers Other computers (at home, in car…)
![Page 4: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/4.jpg)
Types of Computers
Personal computers are used for general computing tasks.
Hand-held computers fit in the palm of your hand and run on batteries.
Mainframes are used by companies to provide centralized storage, processing, and management for large amounts of data.
Supercomputers are the largest and fastest of computers, and can process an enormous volume of data.
![Page 5: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/5.jpg)
Types of Computers
Desktop: (HP, Dell, IBM…)• Usually more powerful and cheaper
than laptops• Needs separate monitor, not easy to
move around• Could be replaced by laptops and
tablets in the near future?
![Page 6: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/6.jpg)
Types of Computers
Notebook, Netbook & iPad• Small & lightweight.• Portable• Netbook: browsing• Internet• Tablets (7” and 10”)
![Page 7: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/7.jpg)
Types of Computers
Supercomputers are the largest and fastest computers. BNL Bluegene
Mainframe s are very powerful computers, but not as powerful as supercomputers.
Clusters: consists of hundreds and more processors.
![Page 8: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/8.jpg)
Computer Systems
A computer system is made up of: Hardware — the physical
components. Can be touched. If kicking it, your toe will get hurt.
Software — the programs or lists of instructions. Can not be touched.
Software could be more expensive than hardware. Why do most people KEEP using Windows system?
![Page 9: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/9.jpg)
Can we reduce the weight of a computer by deleting its software (files).
No!!!
Software has no weight.
![Page 10: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/10.jpg)
Hardware: major components
Motherboard CPU (Central Processing Unit) Memory Storage devices I/O (Input/Output) devices Network devices Power supply, case, video card,
sound card…
![Page 11: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/11.jpg)
Hardware: Motherboard
Also called mainboard
Located inside the computer case
Holds and connects all essential components
![Page 12: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/12.jpg)
Hardware: CPU
CPU - micro processor• A silicon chip
designed to manipulate data
• The brain of a computer.
• 64-bit CPUs and 32-bit CPUs
![Page 13: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/13.jpg)
Hardware: CPU (cont.) Intel, AMD, Apple, IBM… make
CPUs. Its speed is determined by:
• Clock speed (Hz)• Word size (32-bit and 64-bit)• Processor type• Usually, motherboard and CPU are
the most expensive components in a computer. High-end video cards are not cheap either.
![Page 14: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/14.jpg)
Question
1. What are the two most expensive components in a computer?
![Page 15: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/15.jpg)
Hardware: Units of Memory and Storage Computer understands 0 and 1 only:
on/off state, N/S pole, 0/5 volts… 1 (“on”) and 0 (“off”) are referred to
as bits. Eight bits is a byte. Two bytes
represent a unique character (Unicode)
Decimal numbers and binary numbers.
![Page 16: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/16.jpg)
Hardware: Units of Memory and Storage Everything in the computer memory
and storage devices is a number! A computer understands only numbers.
Number number Character number (ASCII code) Grey level number ( usually 0 – 255) Color three numbers (R/G/B)
![Page 17: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/17.jpg)
Question
2. A byte can store 256 different numbers, why do we need two bytes to store an English character?
![Page 18: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/18.jpg)
Hardware: units of Memory and Storage
Kilobyte (KB) = one thousand (1024) bytes
Megabyte (MB) = one million (1024 KB) bytes
Gigabyte (GB) = one billion bytes Terabyte (TB) = one trillion bytes
![Page 19: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/19.jpg)
Hardware: Memory
Computer memory is a set of storage locations.
Five types of memory:• Random access memory (RAM)• Cache memory• Virtual memory• Read-only memory (ROM)• Complementary metal oxide
semiconductor memory (CMOS)
![Page 20: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/20.jpg)
Hardware: Memory
RAM --- Random Access Memory• Sits on motherboard and closes to
CPU• Also called volatile memory,
primary memory, and main memory.
• Most important memory type.• 256 MB to many GBs.• Fast CPU + big memory + (fast
graphical card) a fast computer.
![Page 21: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/21.jpg)
Hardware: Memory Cache memory
• Special high-speed memory chip on the motherboard or CPU
• Stores frequently and recently accessed data and commands.
• Usually 1 to ??? MB.• The bigger, the better, also more
expensive.
![Page 22: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/22.jpg)
Hardware: Memory Virtual memory is extra memory that
simulates RAM if more is needed. Limited by the memory space (word size).
Read-only memory (ROM) is the permanent storage location for a set of instructions the computer uses.
CMOS memory is semi-permanent information about where essential software is stored.
![Page 23: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/23.jpg)
Hardware: Storage Media
Magnetic storage devices • Hard disks—several magnetic oxide
covered metal platters usually sealed in a case inside the computer
• Tape—inexpensive, slow, archival storage for large companies who need to back up large quantities of data.
• Floppy disks: (almost) obsolete
![Page 24: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/24.jpg)
Hardware: Storage Media
Optical storage devices• CD-R - store 700 MB of data• CD-RW: not reliable• DVD—can store between 4.7 and 15.9
GB of data; Blue-ray discs and HD-DVD can store between 15 and 50 GB of data
![Page 25: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/25.jpg)
Hardware: Storage Media
Flash memory cards• Small, portable cards: rewritable• Used in digital cameras, handheld
computers, video game controllers, and other devices
• Most commonly-used: SD (HDSD) cards – Secure Digital.
![Page 26: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/26.jpg)
Hardware: Storage Media USB drive, USB
flash drive• from 32 MB to 16 GB
and more • Plug directly into the
USB port (hot operation)
• Rewritable• Best portable storage• Small and
inexpensive: $1.50/GB
![Page 27: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/27.jpg)
Hardware: Differences between memory & storage
Speed Persistent Size Location
Memory Fast No Limited On board
Storage Slow Yes Unlimited(?) External
![Page 28: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/28.jpg)
Question
3. When we talk about memory and storage, how do you compare computers and people?
![Page 29: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/29.jpg)
Hardware: Input/Output Input:
• Data you type• Data by reading files• Data through Internet.• Data from sensors……• Other sources
Output: The result of computer processing.
![Page 30: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/30.jpg)
Hardware: Input/Output
Peripheral devices • Accomplish the input, output, and
storage functions.• Not on the motherboard slow• I/O always is the slowest part of
any program execution
![Page 31: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/31.jpg)
Hardware: I/O Devices
Input devices:
Keyboard Mouse Others
![Page 32: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/32.jpg)
Hardware: I/O Devices
Output devices:• Monitors
CRT monitors (almost obsolete) LCD and LED
• Printers• Others
![Page 33: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/33.jpg)
Hardware: I/O Devices
Monitor’s quality Screen Size
(diagonal in inches)
Resolution (in pixels)
Setting the screen resolution.
![Page 34: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/34.jpg)
Hardware: I/O Devices
Types of printers• Laser• Inkjet
B/W printing:
buy laser printers Color laser printer:
very expensive cartridges. Inkjet printer
![Page 35: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/35.jpg)
Hardware: Printer
Turn OFF the printer when not printing to prevent the heat from drying the cartridges.
Use the power button to turn off the printer in order to make cartridges stay in the proper housing. Do not pull the power cord.
![Page 36: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/36.jpg)
Hardware: Video Card Integrated (on-board) and
dedicated video cards Gaming: needs high-end video
cards. High-end computers have
dedicated video-cards Usually, a video card has its own
memory; on-board video shares main memory.
36Microsoft Office 2007-Illustrated Introductory, Premium Video Edition
![Page 37: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/37.jpg)
Hardware: Network Devices Network cables (Ethernet cables)
Modems and routers Wireless cards and adapters Building a home wireless network:
Not as hard as one thinks. Just follow the instructions.
![Page 38: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/38.jpg)
A Desktop Computer
![Page 39: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/39.jpg)
Motherboard and others
![Page 40: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/40.jpg)
The Back of a Computer
Computer ports and connections
Power connection
Mouse port
FireWire port
Network port
Phone line connection
Speaker and microphone connections
USB ports
Monitor port
Audio connection
Keyboard port
![Page 41: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/41.jpg)
Hardware: How to fix it?
Blue screen, won’t boot… If under warrantee, let
manufacturer fix it Diagnostics
• Run diagnostic program• Go to web to search solutions
Hardware problem: DIY in many cases. It is easier than you think
![Page 42: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/42.jpg)
Hardware: How to fix it?
Motherboard ($300-500): expensive, buy a new computer or fix it?
CPU ($100 and up): relatively expensive. Installation: 30-60 minutes.
Memory ($50 for 4GB): Installation: 10 - 30 minutes.
![Page 43: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/43.jpg)
Hardware: How to fix it?
Hard drive ($50 for 500GB): Need the system reinstallation CD to build a system drive. Installation: 10 - 30 minutes.
CD/DVD drive ($30): Installation: 10-30 minutes.
Laptop display screen ($200 and up): installation: one-hour delicate job. Professional help?
![Page 44: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/44.jpg)
Hardware: How to fix it?
Important: Always rub your hands with the computer metal frame at first to get rid of the static electricity.
Do it carefully, but with confidence.
![Page 45: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/45.jpg)
Software: major Components Operating system
• Windows• Unix & Linux (open and free)• MacOS
System utilities Application software
![Page 46: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/46.jpg)
Software: Introduction
Software manipulates and processes data
Data:Strings, numbers, figures, sounds, images, and graphics…
![Page 47: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/47.jpg)
Software: Introduction
File --- named collection of stored data.• Executable file can be run to perform
a specific task.• Data file contains data.
Everything in a computer is represented by a number on disk and in memory.
![Page 48: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/48.jpg)
Software: Data Representations
Every English character is represented by an ASCII number.
ASCII numbers defined by ANSI. ANSI standard sample ASCII code
![Page 49: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/49.jpg)
49Microsoft Office 2007-Illustrated Introductory, Premium Video Edition
Software: Data Representations
ASCII --- American Standard code for Information Exchange
ANSI --- American National Standards Institute
![Page 50: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/50.jpg)
Software: System Software
System software helps the computer carry out it s basic operating tasks.• Operating systems• Utilities• Device drivers• Programming languages
![Page 51: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/51.jpg)
Software: System Software Operating system
• Executes programs• controls the input and output (I/O)• allocates system resources and priorities• Schedules tasks• manages files on storage devices• guards against equipment failure• provides a graphical user interface
(GUI)• Others
![Page 52: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/52.jpg)
Software: System Software Operating system
• Programmer: develop and write the system
• System administrator (SA): configure and maintain the system
• End user: use the system Using GUI (Graphical User Interface) Manipulating files
![Page 53: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/53.jpg)
53
Software: System Software Major Operating systems
• Windows by Microsoft: most recent version is Windows 7.
• Unix/Linux: many flavors (Sun Solaris, HP-UX, IBM AIX, Redhat, Debian, Ubuntu…)
• MacOS: only for Apple computers.
![Page 54: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/54.jpg)
54
Software: System Software
Which OS is better?• Windows: most popular. Easy to use.
Many applications. Hardware/software installation is easy. Prone to virus attacks.
• Unix/Linux: free. Popular in academic world. Hardware/software installation needs effort and expertise. More secure than Windows.
• MacOS: nice GUI, stable and reliable. Pay a premium because it’s Apple.
![Page 55: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/55.jpg)
55
Software: System Software
We are users and we learn• Basic knowledge of file systems.• To use GUI of the system• To configure the system• To maintain the system
![Page 56: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/56.jpg)
Software: System Software
Utilities • Analyze, configure, optimize and
maintain computer system: disk defragmenter, system restore…
Device drivers• “Drives” a specific device (drive). • The main task to install a device is to
install its driver.
![Page 57: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/57.jpg)
57Microsoft Office 2007-Illustrated Introductory, Premium Video Edition
Software: System Software
Programming languages• Used by a programmer to
develop programs. • Most commonly used computer
language: C, C++, Java, C#, Visual Basic, Fortran…
![Page 58: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/58.jpg)
58Microsoft Office 2007-Illustrated Introductory, Premium Video Edition
Software: System Software
Drive and Driver• Drive --- Hardware• Driver --- software to “drive” a
specific drive. Examples:
Hard (disk) drive --- Hard (disk) driverUSB drive --- USB driverPrinter --- Printer driver
![Page 59: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/59.jpg)
Software: System Software
Windows Vista starting screen
Icons (you might see additional
icons on your
screen)
Start button
Taskbar
Quick Launch toolbar
Gadgets (small programs; you might see additional or different gadgets on your screen)
![Page 60: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/60.jpg)
Software: Application Software
Enables you to perform specific computer tasks
Examples: web browsers, Microsoft Office, DBMS, ……
![Page 61: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/61.jpg)
Software: Application Software Document production software
• Word processing, desktop publishing…
• Microsoft Word, OpenOffice Spreadsheet software (Excel)
• Creates spreadsheets composed of a grid of columns and rows
• Numerical calculations of cell data
![Page 62: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/62.jpg)
Software: Application Software
Database management software (Access)• Collects and manages data
Database• Contains many tables to store data in
a uniform format of records and fields• record—a collection of data items in a
database• field—one piece of information in the
record
![Page 63: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/63.jpg)
Software: Application Software
Presentation software (PowerPoint)• Makes slides to be presented.
Many other types of application software.
![Page 64: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/64.jpg)
Data Communications
Data communications --- Transfer data between computers
The four essential components• Sender• Channel• Receiver• Protocols
![Page 65: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/65.jpg)
Data Communications
A sender is the computer that originates the message.
The message is sent over a channel. The receiver is the computer that
receives the message. Protocols are the rules that governs the
data transfer. Data bus: the data path.
![Page 66: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/66.jpg)
Data Communications
Components needed to connect a printer to a computer
![Page 67: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/67.jpg)
Data Communications
PCs have several types of ports:• Parallel• Serial• SCSI• USB• MIDI• Ethernet
![Page 68: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/68.jpg)
Data Communications
Parallel port—transmits data eight bits at a time
Serial port—transmits data one bit at a time
SCSI (small computer system interface, pronounced “scuzzy”) port—provides an interface for one or more peripheral devices at the same port
USB (Universal Serial Bus) port—a high-speed serial port which allows multiple connections at the same port
![Page 69: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/69.jpg)
Data Communications Sound card port—usually includes
jacks for speakers and a microphone, which are designed to work with a MIDI (Musical Instrument Digital Interface, pronounced “middy”) card
Ethernet port—used to connect to another computer, a LAN, a modem, or sometimes directly to the Internet; allows data to be transmitted at high speeds.
![Page 70: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/70.jpg)
Data Communications
Computer ports and connections
![Page 71: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/71.jpg)
Networks Network
• connects one computer to other computers and peripheral devices
Network interface card (NIC) • creates a communications channel
between the computer and the network
• a cable connects the NIC port to the network
• Ethernet card Network software
• establishes the communications protocol
• controls the traffic flow
![Page 72: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/72.jpg)
Networks
Server - central storage location for programs
Client- computers on a network dependent on and connect to a server
Client/server network—a network with server and many clients.
Peer-to-peer network• a network without a server • all of the computers are equal
![Page 73: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/73.jpg)
Networks
Standalone computer—a personal computer that is not connected to a network
Workstation—a personal computer that is connected to a network
Node—any device connected to the network
![Page 74: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/74.jpg)
Networks
LAN (local area network) WAN (wide area network)
• more than one LAN connected together• the Internet is the largest example of a
WAN WLAN (wireless local area network)
• Computers and peripherals that use high-frequency radio waves instead of wires to communicate and connect in a network
• Wi-Fi (wireless fidelity) describes WLANs connected using a standard radio frequency established by the Institute of Electrical and Electronics Engineers (IEEE)
![Page 75: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/75.jpg)
Networks
PAN (personal area network)—a network that allows two or more devices located close to each other to communicate or to connect a device to the Internet• infrared technology—uses infrared light waves to
beam data from one device to another• Bluetooth—uses short range radio waves to connect
a device wirelessly to another device or to the Internet
WiMAX (Worldwide Interoperability for Microwave Access)• allows computers to connect over many miles to a
LAN• a WiMAX tower sends signals to a WiMAX receiver
built or plugged into a computer
![Page 76: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/76.jpg)
Networks
Using modems to send and receive data
Sending site
Digital signal
Modem
Analog signal
Modem
Digital signal
Receiving site
![Page 77: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/77.jpg)
Security Threats: virus (malware) Software programs infesting
computers: Worms, Trojan horse, spyware, adware…
Replicates itself and fill up disks Damages computer systems Erases files and wipes out disks Ties up network and computers.
Slows down program execution
![Page 78: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/78.jpg)
78
Security Threats: viruses
Pops up ads Keylogger: steals personal
information Creates a back-door and lets
remote users access your computer
A bad virus spreads very fast and affects millions computers.
![Page 79: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/79.jpg)
79
Security Threats: Sources of viruses
Downloading virus-infected files Opening malicious emails and their
attachments Infected disks and CDs Worst incidents: Melissa, ILOVEYOU
![Page 80: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/80.jpg)
Security Threats: Anti-virus Firewall
• Stop unwanted and unsolicited incoming network messages and data.
• Can be either hardware or software. Antivirus software
• Every computer must equip with an antivirus software.
System and software update:• Automatic update
![Page 81: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/81.jpg)
81
Security Threats: Antivirus
Microsoft: security_essentials (free) Paid: Norton, MacAfee, Trend Micro Free:
• ClamAV: open source. For Unix/Linux , also for Windows
• Clamwin: variant of ClamAV for Windows• Stopzilla• Avast!• AVG Anti-Virus
![Page 82: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/82.jpg)
82
Security Threats: Antivirus
There is no excuse not to install an antivirus software, at least it should have security_essential installed fromwww.microsoft.com/security_essential
SE is free and works well!
![Page 83: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/83.jpg)
Security Threats: Spoofed sites Spoofed site
• A Web site set up to look like another Web site, but which does not belong to the organization portrayed in the site
• The URL (address on the Web) looks similar to a URL from the legitimate site www.citibank.com and www.citybank.com
• Usually set up to try to convince customers of the real site to enter personal information
![Page 84: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/84.jpg)
Security Threats: Phishing Phishing
• Sending e-mails to customers of a legitimate Web site (banks and institutions) asking them to click a link in the e-mail because of Security upgrade Account update Account compromised Other reasons
• If the customer does not click the link, his/her account will be suspended or closed
• the link leads to a spoofed site and asks personal and/or login information.
![Page 85: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/85.jpg)
Security Threats: Other tricks Nigerian scams
• Lottery winner, request processing fee• Unclaimed treasure: needs your account
number to deposit Over-payment scam
• You sell an item (a car…)• A far-away guy will buy it and send you a
bank check larger than your asking price• He asks you to mail the extra to himself
or someone else through western union…• You deposit the check and send the extra
back (real money). Several weeks later, the check bounced.
![Page 86: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/86.jpg)
Security Threats: Phishing
Too good to be true >>> not true Never open an unsolicited email,
especially, its attachments Never reveal your personal information
(SSN, bank account number, credit number…) unless you initialize the communication
Never make any payment to a (faraway) stranger.
Wait for the check cleared, then take action.
If someone specifically ask you to send money through Western Union or Money Gram most likely it’s a scam.
![Page 87: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/87.jpg)
Security Threats: Phishing
To clear a bank check needs one to several weeks, especially foreign checks.
Payment by Western Union… is not traceable.
87Microsoft Office 2007-Illustrated Introductory, Premium Video Edition
![Page 88: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/88.jpg)
Security Threat: Strong password At least eight characters long
Consists of upper- and lowercase letters and numbers
Does not include common personal information
![Page 89: 1 Examine computer hardware and software. Explore networks and data communications Learn about security threats on the internet and how to protect](https://reader033.vdocuments.mx/reader033/viewer/2022051619/56649e0c5503460f94af5ada/html5/thumbnails/89.jpg)
Security Threats: Encryption
Encrypt important files especially when files are on a USB drive.
TrueCrypt: free and easy to use for Unix, Linux, and Windows.