Podcast
Questions and Answers
What is the primary function of the Central Processing Unit (CPU)?
What is the primary function of the Central Processing Unit (CPU)?
Which of the following best describes the motherboard's role in a computer?
Which of the following best describes the motherboard's role in a computer?
What is the importance of cooling for processors in modern computers?
What is the importance of cooling for processors in modern computers?
Which function does the computer bus primarily serve?
Which function does the computer bus primarily serve?
Signup and view all the answers
Which of the following is NOT typically considered an external device?
Which of the following is NOT typically considered an external device?
Signup and view all the answers
What was the initial purpose of the internet as created by DARPA?
What was the initial purpose of the internet as created by DARPA?
Signup and view all the answers
Which protocol is fundamental for the operation of the internet?
Which protocol is fundamental for the operation of the internet?
Signup and view all the answers
What kind of network was APARNET before it evolved into the internet?
What kind of network was APARNET before it evolved into the internet?
Signup and view all the answers
Which network element is responsible for connecting different networks?
Which network element is responsible for connecting different networks?
Signup and view all the answers
What kind of software manages network resources and devices?
What kind of software manages network resources and devices?
Signup and view all the answers
Which of the following best describes a GUI?
Which of the following best describes a GUI?
Signup and view all the answers
What does NTFS stand for in file systems?
What does NTFS stand for in file systems?
Signup and view all the answers
What characteristic differentiates a directory from a folder?
What characteristic differentiates a directory from a folder?
Signup and view all the answers
Which of the following is NOT a type of logical data?
Which of the following is NOT a type of logical data?
Signup and view all the answers
Which file type is an example of a binary file?
Which file type is an example of a binary file?
Signup and view all the answers
What is the primary method for defining access controls in NTFS?
What is the primary method for defining access controls in NTFS?
Signup and view all the answers
How many characters can names have in MS-DOS?
How many characters can names have in MS-DOS?
Signup and view all the answers
Which option lists operating systems developed by the respective companies?
Which option lists operating systems developed by the respective companies?
Signup and view all the answers
What is the primary purpose of macros in Excel?
What is the primary purpose of macros in Excel?
Signup and view all the answers
What programming language is used for writing macros in Excel?
What programming language is used for writing macros in Excel?
Signup and view all the answers
Which key combination is used to open the Visual Basic Editor (VBE) in Excel?
Which key combination is used to open the Visual Basic Editor (VBE) in Excel?
Signup and view all the answers
What must you do first when recording a macro?
What must you do first when recording a macro?
Signup and view all the answers
When recording actions for a macro, which of the following is true?
When recording actions for a macro, which of the following is true?
Signup and view all the answers
What is the main function of a Network Interface Card (NIC)?
What is the main function of a Network Interface Card (NIC)?
Signup and view all the answers
Which of the following statements accurately describes DHCP?
Which of the following statements accurately describes DHCP?
Signup and view all the answers
What distinguishes a switch from a hub?
What distinguishes a switch from a hub?
Signup and view all the answers
What is a primary characteristic of a router?
What is a primary characteristic of a router?
Signup and view all the answers
Which type of cable is NOT used for physical connections in networking?
Which type of cable is NOT used for physical connections in networking?
Signup and view all the answers
What role does NAT play in networking?
What role does NAT play in networking?
Signup and view all the answers
Which component converts digital computer data into an analog signal?
Which component converts digital computer data into an analog signal?
Signup and view all the answers
What is the maximum speed typically associated with Ethernet connections?
What is the maximum speed typically associated with Ethernet connections?
Signup and view all the answers
Which of the following features can be inserted into a document?
Which of the following features can be inserted into a document?
Signup and view all the answers
What should not be left at the end of a line according to general text writing rules?
What should not be left at the end of a line according to general text writing rules?
Signup and view all the answers
What is a key feature of Excel that allows for easy manipulation and analysis of large datasets?
What is a key feature of Excel that allows for easy manipulation and analysis of large datasets?
Signup and view all the answers
Which of the following is NOT a characteristic of Excel?
Which of the following is NOT a characteristic of Excel?
Signup and view all the answers
What is the purpose of a PivotTable in Excel?
What is the purpose of a PivotTable in Excel?
Signup and view all the answers
What should be avoided in terms of spacing in a properly formatted document?
What should be avoided in terms of spacing in a properly formatted document?
Signup and view all the answers
What notable feature of Excel was implemented in the 1993 version?
What notable feature of Excel was implemented in the 1993 version?
Signup and view all the answers
Why is Excel particularly useful for companies and organizations?
Why is Excel particularly useful for companies and organizations?
Signup and view all the answers
Study Notes
Introduction to IT
- Lecturer: Dr. Anna Karcz
- Timeframe: 15 hours
- Email: [email protected]
- Additional contact via Microsoft Teams
- Final exam: end of semester
- Attendance: optional
- Consultations: ?
Agenda
- Organization + history of computers
- How computers work?
- Networks
- Safety
- MS Office
- IT in business
- Term exam
- Digital world - discussion
Exam
- Term 0 - single-choice exam (during lecture)
- Terms 1 & 2 - multiple-choice exam
- Final score: average of practical lecture and final exam
Goals
- Rules of computer and network working
- MS Office package
- IT in business - main points and directions
- Safety in the digital world - opportunities and threats
Rules
- Behave in a way to create a good image
- Punctuality
- Greetings
- Active listening (not only to lecturer)
- Proper language
- Tolerance
- No mobile phones/laptops during lectures (confirm if needed)
- No eating (confirm if needed)
Additional Instructions
- Do not take pictures of the presentation
- Take notes instead
- Ask questions at the end of the meeting
Code for MS Teams
- Provided on slide 8
1 HISTORY
- Calculating machines started 2600 BC (Abacus)
- Used for arithmetical operations
- Algorithms done by humans using moving beads (addition, subtraction, multiplication, division)
- Ancient Greek and Roman usage of the Abacus
- Discovery of algorithms and calculating machines in the 17th century
- Schickard's Calculation Clock
- Pascal's Pascaline - first mechanical calculator
- Leibniz's Stepped Reckoner
- Babbage's and Turing's contributions to computer development
11 Algorithm
- "An algorithm is a set of instructions designed to perform a specific task."
- "An algorithm is a sequence of computational steps that transform the input into the output."
12 Historical View
- Real start of IT in the 19th century with Charles Babbage's analytical engine (1834)
- Universal Turing Machine (UTM, 1936) - basis for today's computers
- UTM consists of one tape (memory), a read/write head (input/output), and a finite control (processor)
- ENIAC, UNIVAC-1, IBM RAMAC 350, XYZ computer (Poland, 1958), Kenback-1, Osborne 1 - examples of early computers
15 Hardware & Software
-
Computer definition: "A computer is an electronic device that accepts data (input), processes it according to specified instructions (program), outputs the results (output), and stores the results (storage)."
-
How computer work short overview:
- Input
- Processing: fetch, decode, execute
- Storage
- Output
- Control
-
Main parts of hardware: processor, Main memory, External devices
18 Hardware
- Processor - central unit that executes commands and controls other parts, takes instructions and data from main memory.
- Main memory - cells that store bit words, each cell has a unique address.
- External devices - connected by input/output systems, allowing user interaction (keyboard, mouse, monitor, printer, etc.) External devices are usually autonomous units synchronized with the processor.
19 Processor (CPU)
- Makes instructions in RAM
- Uses binary system
- Similar to a computer's brain
- Modern processors have speeds of 2-3.5 GHz
- Cooling necessary (fans)
20 Motherboard
- Connects and communicates with all other computer parts
- Contains various components: CPU, RAM, hard disk, floppy drive, graphics card, sound card, etc.
- Receives power from PSU (Power Supply Unit)
- Slots like PS/2, USB are present
21 Computer bus and chipset
- Allow data transfer between computer components (processor, hard disk and peripheral devices, etc.)
- Bus is physical; chipset is process-oriented
23 RAM
- Random Access Memory (RAM)
- Available directly for CPU (Central Processing Unit)
- Stores code for running programs
- Contents lost when power is off (volatile memory)
24 ROM
- Read-Only Memory (ROM)
- Permanently stores critical system instructions and firmware
- Stores BIOS (Basic Input/Output System)
- Data saved on production level, not easily editable
25 RAM and ROM comparison
- RAM is volatile, ROM is non-volatile
- RAM is used for running programs, etc.; ROM stores critical system instructions
- RAM has high speed, ROM is slower but faster than HDDs or SSDs
26 Others non-volatile memories examples
- Hard Disk Drives (HDDs)-magnetic medium
- Solid-State Drives (SSDs)-flash memory
- Optical Drives (CDs, DVDs, Blue-Ray discs)
- USB Flash Drives
- External Hard Drives
- Cloud Storage
27 Hard Disk
- Saves, keeps, and processes data (non-volatile)
- Two main types: HDD and SSD
- Software (including operating system) is installed on it
- Can be internal or external component
28 Data Storage
- DAS (Direct Attached Storage): external drive connected by cable (e.g., USB)
- NAS (Network Attached Storage): connected to the network; advantage is similar to cloud, but the data isn't held by a third party.
29 Cloud Storage
- Service where data is stored and managed remotely on servers via the internet
- Users upload files; accessible from any device with internet access
- Scalable, convenient, and often includes features like data backup and synchronization
30 Cloud Computing
- Types of clouds:
- Public cloud
- Private cloud
- Hybrid cloud
31 Public clouds
- A list of examples: IBARD, Google Drive, Google Cloud Storage, iCloud, Dropbox, One Drive, Box, Sync, and other apps.
32 Peripheral Devices
- Input devices: keyboard, mouse, microphone
- Output devices: monitors, printers, loudspeakers
- Other devices: graphics cards, network cards, sound cards
33 Graphics Card
- Generates signals for monitor
- Has its own memory
- Needs cooling (fans)
- GPU (graphic processing unit) is an integrated circuit (IC) usually on the graphics card
34 Core Element
- Provided on slide 34
35 Binary System
- Memory stores binary digits (bits)
- Bit is 0 (no voltage) or 1 (voltage)
- Binary values are interpreted as data/instructions
- The binary system is the basis of computer work due to its low complexity (0 = OFF, 1 = ON)
36 Data Organization
- Main memory is a set of systems capable of storing bits.
- Systems divided into cells or words.
- One cell usually consists of 8 bits (1 byte).
- Each cell has a unique address.
- Access to one cell is independent from other cells.
37 Memory Size Units
- Binary units: bit, byte, kilobyte, megabyte, gigabyte, terabyte, petabyte, exabyte
- Conversions between different memory units using powers of 2
38 Logical Operations
- Fundamental to digital electronics
- Logic gates are basic computer construction elements
- Binary values (0 and 1) represent different voltage levels
- Common logical operations: AND, OR, NOT, NAND, NOR, XOR, XNOR
39 Logical Operations in Binary System
- List of logical operations (AND, OR, NOT, NAND, NOR, XOR, XNOR) with their binary values tables
40 Hexadecimal Notation
- A shorthand representation for bit strings in computer science
- Uses 16 digits (0-9 and A-F) representing various values. A list of example conversions
41 Hexadecimal Notation Exercise
- Example 8-bit and 16-bit strings conversion to hexadecimal
42 Software
- Software provides instructions for the computer
- It works together with hardware to function as a computer system
43 Text Coding
- Text is stored as a sequence of bits.
- Character encoding standards exist, for example ASCII and UNICODE (UTF-8, UTF-16, etc.)
- Text coding involves programming, markup, and database languages.
44 Sounds and Images Coding
- Sound - numbers representing voltage (sound pressure) at a given frequency.
- Image (raster) - rectangular array of pixels. Each pixel has 3 primary components (red, green, blue) used to represent brightness/color values .
- Image (vector) - Shapes saved with mathematical equations and coordinates.
45 How does a computer work
- Computer processes data using the binary system
- Basic actions: download, store, process, and take out data
- Data flow from input devices, storage in memory, process by processor, and output to devices.
46 How does a computer work
- Software contains instructions understood by the computer machine
- Instructions are based on algorithms and programs
- Goal: program execution
- Instructions and data are stored in computer system memory during execution.
47 Commands
- Operations are based on lists of commands
- Different components are used for command realization.
- Command cycle determines the next command, and the process continues
- Programs as lists of instructions for the computer. First command and then continues to the next command. This is programmed by John von Neumann (1950).
48 Algorithm and Programs
- Algorithm- a finite sequence of well-defined instructions for solving a problem.
- Computer program- instructions that make a computer do a task
49 Algorithm and Programs
- Programming languages - vocabulary and rules to instruct computers to do specific tasks.
- Translation- converts a program written in one language to another language or machine code.
50 Software
- Software is programs providing instructions to a computer; making the operating of computer possible
- It works with the computer hardware to perform tasks
51 Computer Programs
- Description of operations or sequences of operations to solve a problem
- Description of data- details of information to be processed by those instructions
52 Operating System
- Essential software part to mange computer resources (memory, CPU), Input/Output devices
- Acts as an interface between computer and user
- Allows program execution
- Includes compilers, utility programs, graphical programs, and engineering/design programs
53 Tasks for Operating Systems
- Manages computer resources.
- Assigns memory and processor time to program processes
- Manages data collection and sharing
- Communicates with and manages otherdevices
- Shows errors to the user.
54 User Interface
- GUI (Graphical User Interface)-info presented by graphical elements such as windows and icons
- TUI (Text User Interface)-info presented with text and signs in text mode
55 Different Kinds of Data
- logical values (TRUE/FALSE)
- Signs (alphanumeric characters, symbols)
- Numbers (integers and non-integers)
- Images
- Sound signals
56 File Systems
- Rules for entering data on data carriers (especially hard drives)
- Methods and ways of storing files and determining access to files and folders
- NTFS (New Technology File System) used by Windows
- Access Control Lists (ACLs) manage access controls in NTFS
57 File
- Data set of fixed length with specific characteristics
- Directory is a file containing references to other files and directories that are its contents
- The term folder is also often used with similar meaning as the directory
- File names have a length (e.g., 8 signs in MS-DOS, 256 in Windows 95,and modern Unix-based systems.
58 File Types and Examples
- Text files: TXT, RTF, HTML, XML, KML, CSS, CSV, SVG
- Binary files: DOC, DOCX, ODT, PDF, XLS, XLSX, ODS, BMP, JPG, GIF, PNG, MP3, AVI, MPG
59 Operating Systems Examples
- Microsoft Windows - developed by Microsoft, main OS for PCs
- macOS - developed by Apple, OS for Apple computers
- Linux - open-source OS
60 End.
61 Network
- A collection of interconnected computers and devices, enabling data exchange
- Common use of files, programs, devices (like printers, mass memory), and databases
- Enables common data sharing and mailbox capabilities between multiple users.
62 Network
- A collection of interconnected autonomous computers using a single technology.
- Provides common file and program use, device access (printers, memory), and database use.
- Allows for data sharing among many users and mailboxes
63 Network Split (Scope)
- Global network - internet
- Local network - school or company networks
64 Network Split (Architecture)
- Peer-to-peer (P2P) - each device acts as both a client and a server. Suitable for smaller networks where users manage their own computers.
- Client-server - devices are divided into clients (using resources) and servers (supplying resources and services). Administrators manage the network. Suitable for larger networks
65 Network Split (Size)
- LAN (Local Area Network) - covers a small area like a building or office.
- MAN (Metropolitan Area Network) - covers a larger area like a city.
- WAN (Wide Area Network) - covers a very large geographical area (e.g., the internet).
66 LAN Types
- Wired network - uses cables and fiber optics to connect devices
- Wireless network (WLAN) - uses radio waves (e.g., Wi-Fi) to connect devices
- Virtual Network (VLAN) - uses protocols to logically segment a LAN into smaller networks
67 Network Topologies
-
Physical topologies - describe the physical arrangement of devices and connections
-
Logical topologies - define how data flows and is handled on the network
- Physical: Bus, Ring, Star, Extended Star, Mesh, Hybrid Technology
- Logical: VLAN, VPN, Overlay, SDN, P2P, Overlay Multicast
68 Bus Topology
- Connected by one coaxial cable
- Easy to add new stations, but difficult to troubleshoot cable issues.
- One transmission at a time
69 Ring Topology
- Data passes in one direction through connecting devices
- Network outage occurs if there is an issue on any part of the ring
- Difficulty in connecting new equipment
70 Star Topology
- Connects to a central point (e.g., a hub or switch)
- Easy to identify and resolve issues at individual connections - high bandwidth, easy to resolve local issues.
- High demand on cables, global issues are caused by the central hub malfunction (e.g., a switch)
- Used mostly in LAN.
71 Extended Star Topology
- Based on the Star topology
- Used in larger networks
72 Mesh Topology
- Devices are connected to multiple other devices
- Costly and complex, but reliable (if one part fails, the rest can still communicate)
- Used in large networks, like the Internet
73 Internet
- Globally interconnected network of networks
- Based on the Internet Protocol (IP)
- Enables connections between many computers and systems
74 Internet - Historical Part
- Developed initially as a military network (ARPANET)
- Purpose was for data to work even if some parts were destroyed
- Security reasons led to the development of MILNET
- Commercial network development. TCP/IP protocols became essential components, leading to larger scale and expansion which is used today.
75 Network Hardware Elements
- A list of typical network hardware components, including Network Interface Cards (NICs), Routers, Switches, Cables, Repeaters, Access Points, Firewalls, Network Adapters, Network storage devices (e.g., NAS), etc
76 Network Software Elements
- List of typical network software components including Network Operating System (NOS), Network Protocols, Firewall Software, Network Management Software, Virtual Private Network (VPN) Software, Intrusion Detection and Prevention Systems (IDPS), Proxy Servers, Network Analyzers, Remote Desktop Software, Backup & Recovery Software, Email Servers, DNS Servers, DHCP Servers, Web Servers, Collaboration Software
77 Network Interface Cards (NICs)
- Connects computer to the local network
- Ethernet is the most common type, having a unique MAC address (assigned in ROM).
- Speed measured in Mbps (megabits per second) or Gbps (gigabits per second).
78 Routers
- Determine the best path for data packets
- Customizable configuration
- Connection between networks (e.g., between LAN and Internet)
- Provide features such as firewalls, VPN support, Dynamic Host Configuration Protocol (DHCP), and Network Address Translation (NAT)
79 Switch
- Connects multiple devices on a LAN
- Uses MAC addresses to forward data only to the intended destination
- More intelligent than hubs
80 Cables
- Provide physical connections between devices
- Types: Coaxial cables, Fiber optic cables, Ethernet cables
81 Other Network Components
- Modems - convert digital data to analog signals and vice versa
- Repeaters – amplifies/regenerates signals to strengthen network connections.
- Access Points – provide wireless stations access to network resources; acts as a bridge between wireless and wired networks; can be combined with routers
82 Network Operating System (NOS)
- Manages and controls computer networks
- Runs on dedicated servers or network devices (routers, switches)
- Ensures efficient operation
83 Firewall Software
- Monitors and controls network traffic
- A barrier between the internal and external networks
- Protects against unauthorized access and cybersecurity attacks and malware
84 Network Management Software
- Monitors, maintains, and optimizes computer networks
- Manages resources, troubleshooting issues and ensuring reliability and performance
85 Network Protocols
- Sets of rules and standards for data transmission on networks.
- Examples: TCP/IP, UDP, HTTP, FTP, SMTP
86 Sending data over the networks (TCP/IP)
- Data is sent through packet-based transmission.
- Packets contain data and procedures for merging on the receiver's side.
87 IP Addressing
- Numerical value assigned to devices on a network
- IP addresses (32-bit) are often written in decimal notation (e.g., 172.16.254.1)
88 IP Addressing Exercise
- converting binary to decimal and vice versa
89 TCP/IP and OSI Model
-
Conceptual frameworks for understanding network protocols and communication
- TCP/IP Model: Applications, Transport, Internet, Link
- OSI Model: Application, Presentation, Session, Transport, Network, Data Link, Physical
90 Internet Links
- Connections are based on a network of cables, both on land and underwater.
91 Types of Internet Connections
- Wired (DSL, ADSL, cable landline)
- Fiber optic
- Radio and satellite
92 End.
93 Safety
- Importance of cybersecurity in the context of the internet, given the risks associated with cyberattacks.
94 Safety in Network
- The internet brings many benefits, but also dangers. Cybercriminals exploit opportunities on the internet, which is why it is important to be aware and practice safety measures.
95 Types of Threats on the Internet
- Privacy threats
- Security threats
- Cyberbullying
- Threats to children
- Misinformation
- Economic threats
96 Privacy Threats Examples
- General ideas on privacy threats on the internet
97 Identity Theft
- Cybercriminals steal personal information (e.g., PESEL, SSN) to steal identity and cause various problems (loans, etc.)
- Protecting identity is important in online activities to avoid negative consequences
98 Data Theft
- Cybercriminals target company/institution databases for manipulation/exploitation. These actions can lead to identity theft, financial fraud, or loss of privacy
- Gaps in security are common targets.
99 Online Tracking
- Privacy is often violated by tracking personal data (e.g., IP addresses, locations).
- Understanding and being aware of this fact and the methods used by scammers/hackers is crucial
100 Security Threats Example
- Provided on slide, but little or no detail available here
101 Phishing
-Cybercriminals imitate trustworthy sources (e.g., banks) through emails, websites, and other methods to acquire personal data.
102 Spear Phishing
- Hackers research individuals to make their phishing attacks more effective (by better targeting)
- They use known info about the victim to create tailored messages for more effective actions.
103 Ways of Phishing
- Details on various ways phishing attacks can be launched, e.g. through emails, messages, voice communication
104 Malware
- Malicious software designed to harm computers or access information and/or data.
105 Malvertising
- Ads that may contain malicious code to infect a device
106 Watering Hole Attacks
- Targeted attacks against specific groups because they visit certain websites that are compromised.
107 Ransomware
- Malware that blocks access to files and demanding a ransom to unlock them.
108 Company Attacks
- Insiders (employees) can intentionally or unintentionally cause issues.
- Accidental or negligent actions (e.g., clicking phishing links) and malicious intent can pose significant risks to companies.
109 Spoofing
- Attack technique where cybercriminals try to impersonate someone else (a bank, etc.) for accessing personal data.
110 DDoS Attacks
- Attacks that overload a server or service with traffic from multiple sources.
- Goal is to cause system dysfunction.
111 Cyberbullying Threats
- Overview of threats related to cyberbullying
112 Cyberbullying - Online Harassment
- Cyberbullying involves various forms of harassment through technology, including doxxing, hateful messages, and psychological harassment.
113 Threats for Children
- Online content can be inappropriate for children. It's crucial to implement safety measures.
114 Content Dangerous for Children – Access Control to Network
- Importance of access control to inappropriate content in online spaces.
115 Misinformation Threats
- Threats related to the spread of misinformation via the internet.
116 Man-in-the-middle Attacks
- Attackers intercept data transmission between two parties.
- Goal is access to personal data.
- Using HTTPS or VPN might help
117 Economic Threats
- Overview of economic threats related to fraud or scams experienced on the internet.
118 Internet Fraud
- Various ways fraud can occur in online transactions
- Users need to exercise caution.
119 Vinted Example
- Example of a Vinted message that may be phishing.
120 Facebook Fake Messages
- Example of a scenario involving a Facebook message that is a scam
121 Jacket Trade Example
- Example of a scenario depicting online fraud in a purchase
122 OLX Example
- Example depicting online fraud, similar to previous examples.
123 Your Stories
- Provided as a space for discussion
124 Remember
- Using awareness as a key defense mechanism
125 Always Report Attacks
- Reporting important for cybersecurity,
- CERT.PL, a centralized reporting system in Poland
126 CERT - Computer Emergency Response Team
- Global and national organizations that deal with cybersecurity incidents.
127 NASK
- National Research Institute in Poland to develop information and communication networks and cybersecurity
128 UKE
- Regulatory authority in Poland responsible for telecommunications, postal activities, and regulating electromagnetic field emissions
129 15 rules of online safety
- A list of safety rules is expected here
130 Protect access to your devices
- Physical safeguards to prevent unauthorized access
131 Make backups
- Creating backups of data is important
132 Be careful with the e-mails contents
- Caution towards emails with suspicious links, attachments, or senders that are not trusted
133 Keep the control on applications
- Only download applications from official sources.
- Review the app permissions before installation.
- Delete apps not used regularly
134 Do not postpone actualizations
- Keep software updated for safety
135 Protect Login Data
- Keeping login details safe.
- Using two-factor (2FA) authentication is a good practice.
136 Use strong passwords
- Avoid simple, predictable passwords
- Use a mix of upper and lower case letters, numbers, and special characters
- Change passwords regularly
- Use password management tools
137 Rules for safety passwords
- Various suggestions for creating secure passwords
138 Check www websites
- Verify the website's address, even if it seems legit
139 Control camera access
- Protect camera access when not in use
140 Monitor children behaviour in network
- Monitoring children's online activity
141 Protect your Internet browser
- Configure your browser settings for security.
- Remove any unnecessary or potentially dangerous add-ons.
- Keep your browser updated.
142 Be careful with hotspots
- Precautions when using public Wi-Fi networks
143 Limit usage of USB
- Avoid using unknown USB devices or borrowing them.
144 Stay alert
- Be aware of potential online risks and scams.
- Be cautious of special offers and prizes
145 ... use experts knowledge when needed
- Use trusted antivirus and security solutions
146 Safety rules chart
- Chart summarizing safety rules
147 Mental health in digital world
- Mental health impacts from increased use of digital technologies.
148 End.
149 MS Office
- Microsoft Office suite – a collection of software tools for business and personal use
- Originally introduced in 1989, updated versions have different names (e.g. MS Office 365)
150 Microsoft Office
- Software suite for personal and business use
- Developed by Microsoft
- Features: documents, presentations, spreadsheets, intelligent clouds and enhanced security
151 Productivity Applications
- List of Microsoft Office software applications like Word, Excel, PowerPoint, Access, OneNote, Publisher, and Power BI.
152 Collaboration Tools
- Microsoft Office software applications for collaboration such as: Outlook, Teams, OneDrive, SharePoint, Planner, Forms, To Do, Stream, Yammer and Sway
153 Security and Protection
- Security and protection tools available within the Microsoft Office suite, or its expanded offerings
154 MS Word
- Text writing and editing software
- Features: inserting, editing, formatting, sharing text documents
- Developed in 1983
155 MS Word Interface
- Main Parts of the MS Word interface
156 MS Word Features
- Different format types
- Text and paragraph formatting tools
- Page formatting tools
- Features for inserting different objects
- Table of contents and figure list creation
157 MS Word Features
- Formatting options available within the program
- Methods of page settings, headers or footers and other features
158 General rules for text writing
-Punctuation, brackets and quotations
-Spacing rules and formatting for the text.
159 Excel
- Software used in business, finance, and other fields involving calculations
- Developed for Windows in 1987; the software was later enhanced by including VBA(Visual Basic for Applications), implemented in 1993.
160 Excel Usefulness
- Data processing, analysis and presentation are core competencies
- Applicable in various industries for better analysis and planning
161 General Overview
- Basic element is workbook, which has atleast one sheet, used for various data organisation
162 General Overview
- Cells are the fundamental elements for data input, storage, and manipulation
- Data and their organization can be modified
- Examples given of data organization (rows, columns).
163 Relative and Absolute Address
- Relative address change when copied or moved
- Absolute address doesn't change when copied or moved
- Formulas with examples that use relative and absolute addresses
164 Formulas
- Starting with '=' sign
- Mathematical operators with examples (+,-,*,/,^)
- Including other cells´ addresses in formulas.
- Built in functions.
165 Functions
- Various functions (e.g., SUM, AVERAGE, IF, PI) available for calculations.
- Order of performing calculation operations can be determined as functions are nested inside parameters
166 Excel Functions
- Categories of functions (Math, Logical, Date and Time, Text, Lookup and Reference, Statistical, Financial, Engineering, Database, Cube, Compatibility and Web functions)
167 Examples of Functions
- Common or well known functions examples. The examples show arguments, and the potential ways to use them in different contexts
168 Sorting
- Necessary format for accurate sorting
- Data sorting based on various input types
169 Filters
- Data filtering and validation
- Creating validation rules to show necessary data
170 Subtotals
- Methods used for summarized data from individual rows and columns in worksheets
171 Subtotals
- Data summary tools for big data sets.
- Subtotal setup
172 PivotTables
- Summarizing data in tables.
- Useful for big data, including pivot charts to visualize data.
173 PivotTables (Practical Exercise)
- Pivot tables features and usage with visual aids, including charts
174 Examples for Pivot Table Creation
- Data summarization with examples. Different use cases of Pivot tables
175 Charts
- Data visualization tool types
- Modify chart as needed in Excel software
176 Macros
- Recorded series of commands or functions to automate work in VBA (Visual Basic for Applications)
177 Macro Settings
- Options available in Macro settings
180 1. Start Recording
- Steps for starting, naming, and defining the macro record start
181 2. Perform actions
- How to record actions by mouse and keyboard
182 3. Stop Recording
- How to stop recording macros in Excel
186 Macro Recording Background
- Visual presentation
187 Examples of the commands in VBA
- VBA (Visual Basic for Application commands)
188 Excel Options
- Options available in the Excel program for settings.
189 Power Point
- Created in 1987
- Used for presentation creation
190 Rules for Presentations
- Presentation rules for content and formatting
191 KISS
- Keep it Short and Simple (KISS) presentation content suggestions
192 SSS
- Say what you are going to say, Say it, Say what you said (SSS) principle for structuring presentations
193 Tips for Slide Formatting
- Tips for formatting presentation slides such as selecting appropriate themes, font styles, colors, graphics, and animations
194 Example of Presentation Preparation Scheme
- Step-by-step procedure for creating a presentation.
195 Outlook
- Software for managing emails and calendars; developed as hotmail in the early 1996; was acquired by Microsof for 400 million in 1997 and renamed to Outlook. Various functionalities such as organizing emails, calendar sharing, and integration tools
196 Microsoft Teams
- Cloud-based collaboration platform for communication and file sharing
- Virtual meetings and other features.
197 Power BI
- Business intelligence and data analysis software
- Designed for data visualization and improved decision making in organizations
198 End
199 IT in Business
- Information technology's role in various business contexts
200 Information Technology
- Definition including the science of computing and the activity of using computational resources
201 Over the decades
- Timeline highlighting key advancements in computing and information technology, from the early computers to cloud computing
202 Over the decades
- Timeline highlighting more recent advancements in computing and information technology, including big data, Al, 5G and quantum computing
203 Al Definition
- Definition of AI, including the aspects of action, interpretation, and environment
204 Al Definition
- Summary definition of Artificial Intelligence
205 AI
- Key areas of AI application
206 Machine Learning
- Detailed definition of machine learning
207 Big Data
- Definition of Big Data
208 5 Vs
- Key characteristics of Big Data (volume, velocity, variety, veracity, and value)
209 IoT
- Definition of Internet of Things (IoT), including objects and computing devices
210 Cybersecurity
- Definition of cybersecurity
211 5G
- Definition of 5G wireless communication technologies, including their higher level capabilities
212 Quantum Computing
- Definition of Quantum Computing, including the conceptual differences to traditional computing
213 Information Systems
- Key information systems functions, including storage, data management, transmission, analysis, and filtering
214 ERP Systems Evolution
- Different phases for development
215 MRP and ERP systems Differences
- Difference between initial Material Requirements Planning (MRP) and its advanced version (Enterprise Resource Planning -ERP), including examples
216 ERP
- Definition and roles of the ERP.
217 Robotization and Automation
- Detailed definition of and difference between Robotization and Automation
218 Types of Automation
- Detailed description of how different kinds of automation are used for various tasks.
219 Robotization and Automation Evolution
- Timeline of Robotization and Automation
220 Role of IT for Business Operations
- Various IT roles within Business context
221 Role of IT for Business Decision-Making
- IT's influence on modern business decision making
222 Role of IT for Business Strategy
- Role of IT in developing and supporting business strategies
223 Challenges and Risks in IT Adoption inside the Business
- Challenges faced when adopting IT in Business scenarios
224 Current Digital World
- Importance of big tech companies in the current digital world
225 Paradoxes from Natalia Hatalska book “Czy technologia Nas ocali”
- The changing nature of time and new relationships in modern digital environment
- The tension between online and offline interactions
226 Digital World Threats
- Potential risks related to overuse of digital technologies (e.g., loss of focus, addiction).
227 Chat GPT as an Example
- Explanation and concerns regarding the capabilities and potential misuse of a chatbot used in modern contexts
228 Advices
- General advice for handling the digital world responsibilities and avoiding dangerous practices for safety.
229 Digital World Discussion
- Suggestions and prompts for a discussion on the digital world
230 7 „0” TERM
- Provided in the presentation
231 8 DIGITAL WORLD
- Provided in the presentation
232 DISCUSSION
- Provided in the presentation
233 Thank You!
- Provided in the presentation
234 Additional Literature Examples
- Key Literature sources provided at the end of the presentation
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz tests your knowledge on fundamental concepts of computer hardware, including the CPU, motherboard, and network essentials. Explore questions about the internet's initial purpose, protocols, and the role of software in managing system resources. Perfect for students in computer science or information technology courses.