Computer Hardware and Network Basics
39 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of the Central Processing Unit (CPU)?

  • To store data permanently
  • To connect and communicate with external devices
  • To provide power to the computer components
  • To execute instructions stored in random-access memory (correct)
  • Which of the following best describes the motherboard's role in a computer?

  • It allows for communication between all other computer parts (correct)
  • It manages the display and input from external devices
  • It contains the hard disk and random-access memory
  • It serves as the primary power source for the computer
  • What is the importance of cooling for processors in modern computers?

  • To maintain proper function and prevent overheating (correct)
  • To enhance the speed of data transfer
  • To synchronize with external devices
  • To provide power to the processor
  • Which function does the computer bus primarily serve?

    <p>It allows data transfer between different computer components</p> Signup and view all the answers

    Which of the following is NOT typically considered an external device?

    <p>Graphics card</p> Signup and view all the answers

    What was the initial purpose of the internet as created by DARPA?

    <p>To create a network resistant to disruptions</p> Signup and view all the answers

    Which protocol is fundamental for the operation of the internet?

    <p>TCP/IP</p> Signup and view all the answers

    What kind of network was APARNET before it evolved into the internet?

    <p>A network primarily for simple text messaging</p> Signup and view all the answers

    Which network element is responsible for connecting different networks?

    <p>Router</p> Signup and view all the answers

    What kind of software manages network resources and devices?

    <p>Network Operating System (NOS)</p> Signup and view all the answers

    Which of the following best describes a GUI?

    <p>It uses graphical elements like windows and icons for information presentation.</p> Signup and view all the answers

    What does NTFS stand for in file systems?

    <p>New Technology File System</p> Signup and view all the answers

    What characteristic differentiates a directory from a folder?

    <p>A directory must have a physical location on the hard disk, but a folder can be logical.</p> Signup and view all the answers

    Which of the following is NOT a type of logical data?

    <p>File names</p> Signup and view all the answers

    Which file type is an example of a binary file?

    <p>DOCX</p> Signup and view all the answers

    What is the primary method for defining access controls in NTFS?

    <p>Access Control List</p> Signup and view all the answers

    How many characters can names have in MS-DOS?

    <p>8 characters, plus 3 for the extension</p> Signup and view all the answers

    Which option lists operating systems developed by the respective companies?

    <p>Windows by Microsoft, macOS by Apple Inc.</p> Signup and view all the answers

    What is the primary purpose of macros in Excel?

    <p>To automate repeatable tasks using a series of commands</p> Signup and view all the answers

    What programming language is used for writing macros in Excel?

    <p>Visual Basic for Application (VBA)</p> Signup and view all the answers

    Which key combination is used to open the Visual Basic Editor (VBE) in Excel?

    <p>Alt + F11</p> Signup and view all the answers

    What must you do first when recording a macro?

    <p>Start recording the macro</p> Signup and view all the answers

    When recording actions for a macro, which of the following is true?

    <p>Mouse movements and clicks are included in the recording.</p> Signup and view all the answers

    What is the main function of a Network Interface Card (NIC)?

    <p>Translates data packages into signals for the network.</p> Signup and view all the answers

    Which of the following statements accurately describes DHCP?

    <p>It is a protocol used to determine IP addresses for devices on a network.</p> Signup and view all the answers

    What distinguishes a switch from a hub?

    <p>A switch forwards data selectively while a hub broadcasts to all devices.</p> Signup and view all the answers

    What is a primary characteristic of a router?

    <p>It determines the best path for data packets to travel.</p> Signup and view all the answers

    Which type of cable is NOT used for physical connections in networking?

    <p>USB Cable</p> Signup and view all the answers

    What role does NAT play in networking?

    <p>It allows multiple devices to share a single public IP address.</p> Signup and view all the answers

    Which component converts digital computer data into an analog signal?

    <p>Modem</p> Signup and view all the answers

    What is the maximum speed typically associated with Ethernet connections?

    <p>100Mb/s</p> Signup and view all the answers

    Which of the following features can be inserted into a document?

    <p>Special characters and mathematical equations</p> Signup and view all the answers

    What should not be left at the end of a line according to general text writing rules?

    <p>Single-letter words like a, I, and u</p> Signup and view all the answers

    What is a key feature of Excel that allows for easy manipulation and analysis of large datasets?

    <p>Automation by macros and VBA</p> Signup and view all the answers

    Which of the following is NOT a characteristic of Excel?

    <p>Exclusively operates in offline mode</p> Signup and view all the answers

    What is the purpose of a PivotTable in Excel?

    <p>To summarize and analyze data interactively</p> Signup and view all the answers

    What should be avoided in terms of spacing in a properly formatted document?

    <p>Inserting gaps between two paragraphs</p> Signup and view all the answers

    What notable feature of Excel was implemented in the 1993 version?

    <p>Visual Basic 5.0</p> Signup and view all the answers

    Why is Excel particularly useful for companies and organizations?

    <p>For rapid and accurate data processing</p> Signup and view all the answers

    Study Notes

    Introduction to IT

    • Lecturer: Dr. Anna Karcz
    • Timeframe: 15 hours
    • Email: [email protected]
    • Additional contact via Microsoft Teams
    • Final exam: end of semester
    • Attendance: optional
    • Consultations: ?

    Agenda

    • Organization + history of computers
    • How computers work?
    • Networks
    • Safety
    • MS Office
    • IT in business
    • Term exam
    • Digital world - discussion

    Exam

    • Term 0 - single-choice exam (during lecture)
    • Terms 1 & 2 - multiple-choice exam
    • Final score: average of practical lecture and final exam

    Goals

    • Rules of computer and network working
    • MS Office package
    • IT in business - main points and directions
    • Safety in the digital world - opportunities and threats

    Rules

    • Behave in a way to create a good image
    • Punctuality
    • Greetings
    • Active listening (not only to lecturer)
    • Proper language
    • Tolerance
    • No mobile phones/laptops during lectures (confirm if needed)
    • No eating (confirm if needed)

    Additional Instructions

    • Do not take pictures of the presentation
    • Take notes instead
    • Ask questions at the end of the meeting

    Code for MS Teams

    • Provided on slide 8

    1 HISTORY

    • Calculating machines started 2600 BC (Abacus)
    • Used for arithmetical operations
    • Algorithms done by humans using moving beads (addition, subtraction, multiplication, division)
    • Ancient Greek and Roman usage of the Abacus
    • Discovery of algorithms and calculating machines in the 17th century
    • Schickard's Calculation Clock
    • Pascal's Pascaline - first mechanical calculator
    • Leibniz's Stepped Reckoner
    • Babbage's and Turing's contributions to computer development

    11 Algorithm

    • "An algorithm is a set of instructions designed to perform a specific task."
    • "An algorithm is a sequence of computational steps that transform the input into the output."

    12 Historical View

    • Real start of IT in the 19th century with Charles Babbage's analytical engine (1834)
    • Universal Turing Machine (UTM, 1936) - basis for today's computers
    • UTM consists of one tape (memory), a read/write head (input/output), and a finite control (processor)
    • ENIAC, UNIVAC-1, IBM RAMAC 350, XYZ computer (Poland, 1958), Kenback-1, Osborne 1 - examples of early computers

    15 Hardware & Software

    • Computer definition: "A computer is an electronic device that accepts data (input), processes it according to specified instructions (program), outputs the results (output), and stores the results (storage)."

    • How computer work short overview:

      • Input
      • Processing: fetch, decode, execute
      • Storage
      • Output
      • Control
    • Main parts of hardware: processor, Main memory, External devices

    18 Hardware

    • Processor - central unit that executes commands and controls other parts, takes instructions and data from main memory.
    • Main memory - cells that store bit words, each cell has a unique address.
    • External devices - connected by input/output systems, allowing user interaction (keyboard, mouse, monitor, printer, etc.) External devices are usually autonomous units synchronized with the processor.

    19 Processor (CPU)

    • Makes instructions in RAM
    • Uses binary system
    • Similar to a computer's brain
    • Modern processors have speeds of 2-3.5 GHz
    • Cooling necessary (fans)

    20 Motherboard

    • Connects and communicates with all other computer parts
    • Contains various components: CPU, RAM, hard disk, floppy drive, graphics card, sound card, etc.
    • Receives power from PSU (Power Supply Unit)
    • Slots like PS/2, USB are present

    21 Computer bus and chipset

    • Allow data transfer between computer components (processor, hard disk and peripheral devices, etc.)
    • Bus is physical; chipset is process-oriented

    23 RAM

    • Random Access Memory (RAM)
    • Available directly for CPU (Central Processing Unit)
    • Stores code for running programs
    • Contents lost when power is off (volatile memory)

    24 ROM

    • Read-Only Memory (ROM)
    • Permanently stores critical system instructions and firmware
    • Stores BIOS (Basic Input/Output System)
    • Data saved on production level, not easily editable

    25 RAM and ROM comparison

    • RAM is volatile, ROM is non-volatile
    • RAM is used for running programs, etc.; ROM stores critical system instructions
    • RAM has high speed, ROM is slower but faster than HDDs or SSDs

    26 Others non-volatile memories examples

    • Hard Disk Drives (HDDs)-magnetic medium
    • Solid-State Drives (SSDs)-flash memory
    • Optical Drives (CDs, DVDs, Blue-Ray discs)
    • USB Flash Drives
    • External Hard Drives
    • Cloud Storage

    27 Hard Disk

    • Saves, keeps, and processes data (non-volatile)
    • Two main types: HDD and SSD
    • Software (including operating system) is installed on it
    • Can be internal or external component

    28 Data Storage

    • DAS (Direct Attached Storage): external drive connected by cable (e.g., USB)
    • NAS (Network Attached Storage): connected to the network; advantage is similar to cloud, but the data isn't held by a third party.

    29 Cloud Storage

    • Service where data is stored and managed remotely on servers via the internet
    • Users upload files; accessible from any device with internet access
    • Scalable, convenient, and often includes features like data backup and synchronization

    30 Cloud Computing

    • Types of clouds:
      • Public cloud
      • Private cloud
      • Hybrid cloud

    31 Public clouds

    • A list of examples: IBARD, Google Drive, Google Cloud Storage, iCloud, Dropbox, One Drive, Box, Sync, and other apps.

    32 Peripheral Devices

    • Input devices: keyboard, mouse, microphone
    • Output devices: monitors, printers, loudspeakers
    • Other devices: graphics cards, network cards, sound cards

    33 Graphics Card

    • Generates signals for monitor
    • Has its own memory
    • Needs cooling (fans)
    • GPU (graphic processing unit) is an integrated circuit (IC) usually on the graphics card

    34 Core Element

    • Provided on slide 34

    35 Binary System

    • Memory stores binary digits (bits)
    • Bit is 0 (no voltage) or 1 (voltage)
    • Binary values are interpreted as data/instructions
    • The binary system is the basis of computer work due to its low complexity (0 = OFF, 1 = ON)

    36 Data Organization

    • Main memory is a set of systems capable of storing bits.
    • Systems divided into cells or words.
    • One cell usually consists of 8 bits (1 byte).
    • Each cell has a unique address.
    • Access to one cell is independent from other cells.

    37 Memory Size Units

    • Binary units: bit, byte, kilobyte, megabyte, gigabyte, terabyte, petabyte, exabyte
    • Conversions between different memory units using powers of 2

    38 Logical Operations

    • Fundamental to digital electronics
    • Logic gates are basic computer construction elements
    • Binary values (0 and 1) represent different voltage levels
    • Common logical operations: AND, OR, NOT, NAND, NOR, XOR, XNOR

    39 Logical Operations in Binary System

    • List of logical operations (AND, OR, NOT, NAND, NOR, XOR, XNOR) with their binary values tables

    40 Hexadecimal Notation

    • A shorthand representation for bit strings in computer science
    • Uses 16 digits (0-9 and A-F) representing various values. A list of example conversions

    41 Hexadecimal Notation Exercise

    • Example 8-bit and 16-bit strings conversion to hexadecimal

    42 Software

    • Software provides instructions for the computer
    • It works together with hardware to function as a computer system

    43 Text Coding

    • Text is stored as a sequence of bits.
    • Character encoding standards exist, for example ASCII and UNICODE (UTF-8, UTF-16, etc.)
    • Text coding involves programming, markup, and database languages.

    44 Sounds and Images Coding

    • Sound - numbers representing voltage (sound pressure) at a given frequency.
    • Image (raster) - rectangular array of pixels. Each pixel has 3 primary components (red, green, blue) used to represent brightness/color values .
    • Image (vector) - Shapes saved with mathematical equations and coordinates.

    45 How does a computer work

    • Computer processes data using the binary system
    • Basic actions: download, store, process, and take out data
    • Data flow from input devices, storage in memory, process by processor, and output to devices.

    46 How does a computer work

    • Software contains instructions understood by the computer machine
    • Instructions are based on algorithms and programs
    • Goal: program execution
    • Instructions and data are stored in computer system memory during execution.

    47 Commands

    • Operations are based on lists of commands
    • Different components are used for command realization.
    • Command cycle determines the next command, and the process continues
    • Programs as lists of instructions for the computer. First command and then continues to the next command. This is programmed by John von Neumann (1950).

    48 Algorithm and Programs

    • Algorithm- a finite sequence of well-defined instructions for solving a problem.
    • Computer program- instructions that make a computer do a task

    49 Algorithm and Programs

    • Programming languages - vocabulary and rules to instruct computers to do specific tasks.
    • Translation- converts a program written in one language to another language or machine code.

    50 Software

    • Software is programs providing instructions to a computer; making the operating of computer possible
    • It works with the computer hardware to perform tasks

    51 Computer Programs

    • Description of operations or sequences of operations to solve a problem
    • Description of data- details of information to be processed by those instructions

    52 Operating System

    • Essential software part to mange computer resources (memory, CPU), Input/Output devices
    • Acts as an interface between computer and user
    • Allows program execution
    • Includes compilers, utility programs, graphical programs, and engineering/design programs

    53 Tasks for Operating Systems

    • Manages computer resources.
    • Assigns memory and processor time to program processes
    • Manages data collection and sharing
    • Communicates with and manages otherdevices
    • Shows errors to the user.

    54 User Interface

    • GUI (Graphical User Interface)-info presented by graphical elements such as windows and icons
    • TUI (Text User Interface)-info presented with text and signs in text mode

    55 Different Kinds of Data

    • logical values (TRUE/FALSE)
    • Signs (alphanumeric characters, symbols)
    • Numbers (integers and non-integers)
    • Images
    • Sound signals

    56 File Systems

    • Rules for entering data on data carriers (especially hard drives)
    • Methods and ways of storing files and determining access to files and folders
    • NTFS (New Technology File System) used by Windows
    • Access Control Lists (ACLs) manage access controls in NTFS

    57 File

    • Data set of fixed length with specific characteristics
    • Directory is a file containing references to other files and directories that are its contents
    • The term folder is also often used with similar meaning as the directory
    • File names have a length (e.g., 8 signs in MS-DOS, 256 in Windows 95,and modern Unix-based systems.

    58 File Types and Examples

    • Text files: TXT, RTF, HTML, XML, KML, CSS, CSV, SVG
    • Binary files: DOC, DOCX, ODT, PDF, XLS, XLSX, ODS, BMP, JPG, GIF, PNG, MP3, AVI, MPG

    59 Operating Systems Examples

    • Microsoft Windows - developed by Microsoft, main OS for PCs
    • macOS - developed by Apple, OS for Apple computers
    • Linux - open-source OS

    60 End.

    61 Network

    • A collection of interconnected computers and devices, enabling data exchange
    • Common use of files, programs, devices (like printers, mass memory), and databases
    • Enables common data sharing and mailbox capabilities between multiple users.

    62 Network

    • A collection of interconnected autonomous computers using a single technology.
    • Provides common file and program use, device access (printers, memory), and database use.
    • Allows for data sharing among many users and mailboxes

    63 Network Split (Scope)

    • Global network - internet
    • Local network - school or company networks

    64 Network Split (Architecture)

    • Peer-to-peer (P2P) - each device acts as both a client and a server. Suitable for smaller networks where users manage their own computers.
    • Client-server - devices are divided into clients (using resources) and servers (supplying resources and services). Administrators manage the network. Suitable for larger networks

    65 Network Split (Size)

    • LAN (Local Area Network) - covers a small area like a building or office.
    • MAN (Metropolitan Area Network) - covers a larger area like a city.
    • WAN (Wide Area Network) - covers a very large geographical area (e.g., the internet).

    66 LAN Types

    • Wired network - uses cables and fiber optics to connect devices
    • Wireless network (WLAN) - uses radio waves (e.g., Wi-Fi) to connect devices
    • Virtual Network (VLAN) - uses protocols to logically segment a LAN into smaller networks

    67 Network Topologies

    • Physical topologies - describe the physical arrangement of devices and connections

    • Logical topologies - define how data flows and is handled on the network

      • Physical: Bus, Ring, Star, Extended Star, Mesh, Hybrid Technology
      • Logical: VLAN, VPN, Overlay, SDN, P2P, Overlay Multicast

    68 Bus Topology

    • Connected by one coaxial cable
    • Easy to add new stations, but difficult to troubleshoot cable issues.
    • One transmission at a time

    69 Ring Topology

    • Data passes in one direction through connecting devices
    • Network outage occurs if there is an issue on any part of the ring
    • Difficulty in connecting new equipment

    70 Star Topology

    • Connects to a central point (e.g., a hub or switch)
    • Easy to identify and resolve issues at individual connections - high bandwidth, easy to resolve local issues.
    • High demand on cables, global issues are caused by the central hub malfunction (e.g., a switch)
    • Used mostly in LAN.

    71 Extended Star Topology

    • Based on the Star topology
    • Used in larger networks

    72 Mesh Topology

    • Devices are connected to multiple other devices
    • Costly and complex, but reliable (if one part fails, the rest can still communicate)
    • Used in large networks, like the Internet

    73 Internet

    • Globally interconnected network of networks
    • Based on the Internet Protocol (IP)
    • Enables connections between many computers and systems

    74 Internet - Historical Part

    • Developed initially as a military network (ARPANET)
    • Purpose was for data to work even if some parts were destroyed
    • Security reasons led to the development of MILNET
    • Commercial network development. TCP/IP protocols became essential components, leading to larger scale and expansion which is used today.

    75 Network Hardware Elements

    • A list of typical network hardware components, including Network Interface Cards (NICs), Routers, Switches, Cables, Repeaters, Access Points, Firewalls, Network Adapters, Network storage devices (e.g., NAS), etc

    76 Network Software Elements

    • List of typical network software components including Network Operating System (NOS), Network Protocols, Firewall Software, Network Management Software, Virtual Private Network (VPN) Software, Intrusion Detection and Prevention Systems (IDPS), Proxy Servers, Network Analyzers, Remote Desktop Software, Backup & Recovery Software, Email Servers, DNS Servers, DHCP Servers, Web Servers, Collaboration Software

    77 Network Interface Cards (NICs)

    • Connects computer to the local network
    • Ethernet is the most common type, having a unique MAC address (assigned in ROM).
    • Speed measured in Mbps (megabits per second) or Gbps (gigabits per second).

    78 Routers

    • Determine the best path for data packets
    • Customizable configuration
    • Connection between networks (e.g., between LAN and Internet)
    • Provide features such as firewalls, VPN support, Dynamic Host Configuration Protocol (DHCP), and Network Address Translation (NAT)

    79 Switch

    • Connects multiple devices on a LAN
    • Uses MAC addresses to forward data only to the intended destination
    • More intelligent than hubs

    80 Cables

    • Provide physical connections between devices
    • Types: Coaxial cables, Fiber optic cables, Ethernet cables

    81 Other Network Components

    • Modems - convert digital data to analog signals and vice versa
    • Repeaters – amplifies/regenerates signals to strengthen network connections.
    • Access Points – provide wireless stations access to network resources; acts as a bridge between wireless and wired networks; can be combined with routers

    82 Network Operating System (NOS)

    • Manages and controls computer networks
    • Runs on dedicated servers or network devices (routers, switches)
    • Ensures efficient operation

    83 Firewall Software

    • Monitors and controls network traffic
    • A barrier between the internal and external networks
    • Protects against unauthorized access and cybersecurity attacks and malware

    84 Network Management Software

    • Monitors, maintains, and optimizes computer networks
    • Manages resources, troubleshooting issues and ensuring reliability and performance

    85 Network Protocols

    • Sets of rules and standards for data transmission on networks.
    • Examples: TCP/IP, UDP, HTTP, FTP, SMTP

    86 Sending data over the networks (TCP/IP)

    • Data is sent through packet-based transmission.
    • Packets contain data and procedures for merging on the receiver's side.

    87 IP Addressing

    • Numerical value assigned to devices on a network
    • IP addresses (32-bit) are often written in decimal notation (e.g., 172.16.254.1)

    88 IP Addressing Exercise

    • converting binary to decimal and vice versa

    89 TCP/IP and OSI Model

    • Conceptual frameworks for understanding network protocols and communication

      • TCP/IP Model: Applications, Transport, Internet, Link
      • OSI Model: Application, Presentation, Session, Transport, Network, Data Link, Physical
    • Connections are based on a network of cables, both on land and underwater.

    91 Types of Internet Connections

    • Wired (DSL, ADSL, cable landline)
    • Fiber optic
    • Radio and satellite

    92 End.

    93 Safety

    • Importance of cybersecurity in the context of the internet, given the risks associated with cyberattacks.

    94 Safety in Network

    • The internet brings many benefits, but also dangers. Cybercriminals exploit opportunities on the internet, which is why it is important to be aware and practice safety measures.

    95 Types of Threats on the Internet

    • Privacy threats
    • Security threats
    • Cyberbullying
    • Threats to children
    • Misinformation
    • Economic threats

    96 Privacy Threats Examples

    • General ideas on privacy threats on the internet

    97 Identity Theft

    • Cybercriminals steal personal information (e.g., PESEL, SSN) to steal identity and cause various problems (loans, etc.)
    • Protecting identity is important in online activities to avoid negative consequences

    98 Data Theft

    • Cybercriminals target company/institution databases for manipulation/exploitation. These actions can lead to identity theft, financial fraud, or loss of privacy
    • Gaps in security are common targets.

    99 Online Tracking

    • Privacy is often violated by tracking personal data (e.g., IP addresses, locations).
    • Understanding and being aware of this fact and the methods used by scammers/hackers is crucial

    100 Security Threats Example

    • Provided on slide, but little or no detail available here

    101 Phishing

    -Cybercriminals imitate trustworthy sources (e.g., banks) through emails, websites, and other methods to acquire personal data.

    102 Spear Phishing

    • Hackers research individuals to make their phishing attacks more effective (by better targeting)
    • They use known info about the victim to create tailored messages for more effective actions.

    103 Ways of Phishing

    • Details on various ways phishing attacks can be launched, e.g. through emails, messages, voice communication

    104 Malware

    • Malicious software designed to harm computers or access information and/or data.

    105 Malvertising

    • Ads that may contain malicious code to infect a device

    106 Watering Hole Attacks

    • Targeted attacks against specific groups because they visit certain websites that are compromised.

    107 Ransomware

    • Malware that blocks access to files and demanding a ransom to unlock them.

    108 Company Attacks

    • Insiders (employees) can intentionally or unintentionally cause issues.
    • Accidental or negligent actions (e.g., clicking phishing links) and malicious intent can pose significant risks to companies.

    109 Spoofing

    • Attack technique where cybercriminals try to impersonate someone else (a bank, etc.) for accessing personal data.

    110 DDoS Attacks

    • Attacks that overload a server or service with traffic from multiple sources.
    • Goal is to cause system dysfunction.

    111 Cyberbullying Threats

    • Overview of threats related to cyberbullying

    112 Cyberbullying - Online Harassment

    • Cyberbullying involves various forms of harassment through technology, including doxxing, hateful messages, and psychological harassment.

    113 Threats for Children

    • Online content can be inappropriate for children. It's crucial to implement safety measures.

    114 Content Dangerous for Children – Access Control to Network

    • Importance of access control to inappropriate content in online spaces.

    115 Misinformation Threats

    • Threats related to the spread of misinformation via the internet.

    116 Man-in-the-middle Attacks

    • Attackers intercept data transmission between two parties.
    • Goal is access to personal data.
    • Using HTTPS or VPN might help

    117 Economic Threats

    • Overview of economic threats related to fraud or scams experienced on the internet.

    118 Internet Fraud

    • Various ways fraud can occur in online transactions
    • Users need to exercise caution.

    119 Vinted Example

    • Example of a Vinted message that may be phishing.

    120 Facebook Fake Messages

    • Example of a scenario involving a Facebook message that is a scam

    121 Jacket Trade Example

    • Example of a scenario depicting online fraud in a purchase

    122 OLX Example

    • Example depicting online fraud, similar to previous examples.

    123 Your Stories

    • Provided as a space for discussion

    124 Remember

    • Using awareness as a key defense mechanism

    125 Always Report Attacks

    • Reporting important for cybersecurity,
    • CERT.PL, a centralized reporting system in Poland

    126 CERT - Computer Emergency Response Team

    • Global and national organizations that deal with cybersecurity incidents.

    127 NASK

    • National Research Institute in Poland to develop information and communication networks and cybersecurity

    128 UKE

    • Regulatory authority in Poland responsible for telecommunications, postal activities, and regulating electromagnetic field emissions

    129 15 rules of online safety

    • A list of safety rules is expected here

    130 Protect access to your devices

    • Physical safeguards to prevent unauthorized access

    131 Make backups

    • Creating backups of data is important

    132 Be careful with the e-mails contents

    • Caution towards emails with suspicious links, attachments, or senders that are not trusted

    133 Keep the control on applications

    • Only download applications from official sources.
    • Review the app permissions before installation.
    • Delete apps not used regularly

    134 Do not postpone actualizations

    • Keep software updated for safety

    135 Protect Login Data

    • Keeping login details safe.
    • Using two-factor (2FA) authentication is a good practice.

    136 Use strong passwords

    • Avoid simple, predictable passwords
    • Use a mix of upper and lower case letters, numbers, and special characters
    • Change passwords regularly
    • Use password management tools

    137 Rules for safety passwords

    • Various suggestions for creating secure passwords

    138 Check www websites

    • Verify the website's address, even if it seems legit

    139 Control camera access

    • Protect camera access when not in use

    140 Monitor children behaviour in network

    • Monitoring children's online activity

    141 Protect your Internet browser

    • Configure your browser settings for security.
    • Remove any unnecessary or potentially dangerous add-ons.
    • Keep your browser updated.

    142 Be careful with hotspots

    • Precautions when using public Wi-Fi networks

    143 Limit usage of USB

    • Avoid using unknown USB devices or borrowing them.

    144 Stay alert

    • Be aware of potential online risks and scams.
    • Be cautious of special offers and prizes

    145 ... use experts knowledge when needed

    • Use trusted antivirus and security solutions

    146 Safety rules chart

    • Chart summarizing safety rules

    147 Mental health in digital world

    • Mental health impacts from increased use of digital technologies.

    148 End.

    149 MS Office

    • Microsoft Office suite – a collection of software tools for business and personal use
    • Originally introduced in 1989, updated versions have different names (e.g. MS Office 365)

    150 Microsoft Office

    • Software suite for personal and business use
    • Developed by Microsoft
    • Features: documents, presentations, spreadsheets, intelligent clouds and enhanced security

    151 Productivity Applications

    • List of Microsoft Office software applications like Word, Excel, PowerPoint, Access, OneNote, Publisher, and Power BI.

    152 Collaboration Tools

    • Microsoft Office software applications for collaboration such as: Outlook, Teams, OneDrive, SharePoint, Planner, Forms, To Do, Stream, Yammer and Sway

    153 Security and Protection

    • Security and protection tools available within the Microsoft Office suite, or its expanded offerings

    154 MS Word

    • Text writing and editing software
    • Features: inserting, editing, formatting, sharing text documents
    • Developed in 1983

    155 MS Word Interface

    • Main Parts of the MS Word interface

    156 MS Word Features

    • Different format types
    • Text and paragraph formatting tools
    • Page formatting tools
    • Features for inserting different objects
    • Table of contents and figure list creation

    157 MS Word Features

    • Formatting options available within the program
    • Methods of page settings, headers or footers and other features

    158 General rules for text writing

    -Punctuation, brackets and quotations

    -Spacing rules and formatting for the text.

    159 Excel

    • Software used in business, finance, and other fields involving calculations
    • Developed for Windows in 1987; the software was later enhanced by including VBA(Visual Basic for Applications), implemented in 1993.

    160 Excel Usefulness

    • Data processing, analysis and presentation are core competencies
    • Applicable in various industries for better analysis and planning

    161 General Overview

    • Basic element is workbook, which has atleast one sheet, used for various data organisation

    162 General Overview

    • Cells are the fundamental elements for data input, storage, and manipulation
    • Data and their organization can be modified
    • Examples given of data organization (rows, columns).

    163 Relative and Absolute Address

    • Relative address change when copied or moved
    • Absolute address doesn't change when copied or moved
    • Formulas with examples that use relative and absolute addresses

    164 Formulas

    • Starting with '=' sign
    • Mathematical operators with examples (+,-,*,/,^)
    • Including other cells´ addresses in formulas.
    • Built in functions.

    165 Functions

    • Various functions (e.g., SUM, AVERAGE, IF, PI) available for calculations.
    • Order of performing calculation operations can be determined as functions are nested inside parameters

    166 Excel Functions

    • Categories of functions (Math, Logical, Date and Time, Text, Lookup and Reference, Statistical, Financial, Engineering, Database, Cube, Compatibility and Web functions)

    167 Examples of Functions

    • Common or well known functions examples. The examples show arguments, and the potential ways to use them in different contexts

    168 Sorting

    • Necessary format for accurate sorting
    • Data sorting based on various input types

    169 Filters

    • Data filtering and validation
    • Creating validation rules to show necessary data

    170 Subtotals

    • Methods used for summarized data from individual rows and columns in worksheets

    171 Subtotals

    • Data summary tools for big data sets.
    • Subtotal setup

    172 PivotTables

    • Summarizing data in tables.
    • Useful for big data, including pivot charts to visualize data.

    173 PivotTables (Practical Exercise)

    • Pivot tables features and usage with visual aids, including charts

    174 Examples for Pivot Table Creation

    • Data summarization with examples. Different use cases of Pivot tables

    175 Charts

    • Data visualization tool types
    • Modify chart as needed in Excel software

    176 Macros

    • Recorded series of commands or functions to automate work in VBA (Visual Basic for Applications)

    177 Macro Settings

    • Options available in Macro settings

    180 1. Start Recording

    • Steps for starting, naming, and defining the macro record start

    181 2. Perform actions

    • How to record actions by mouse and keyboard

    182 3. Stop Recording

    • How to stop recording macros in Excel

    186 Macro Recording Background

    • Visual presentation

    187 Examples of the commands in VBA

    • VBA (Visual Basic for Application commands)

    188 Excel Options

    • Options available in the Excel program for settings.

    189 Power Point

    • Created in 1987
    • Used for presentation creation

    190 Rules for Presentations

    • Presentation rules for content and formatting

    191 KISS

    • Keep it Short and Simple (KISS) presentation content suggestions

    192 SSS

    • Say what you are going to say, Say it, Say what you said (SSS) principle for structuring presentations

    193 Tips for Slide Formatting

    • Tips for formatting presentation slides such as selecting appropriate themes, font styles, colors, graphics, and animations

    194 Example of Presentation Preparation Scheme

    • Step-by-step procedure for creating a presentation.

    195 Outlook

    • Software for managing emails and calendars; developed as hotmail in the early 1996; was acquired by Microsof for 400 million in 1997 and renamed to Outlook. Various functionalities such as organizing emails, calendar sharing, and integration tools

    196 Microsoft Teams

    • Cloud-based collaboration platform for communication and file sharing
    • Virtual meetings and other features.

    197 Power BI

    • Business intelligence and data analysis software
    • Designed for data visualization and improved decision making in organizations

    198 End

    199 IT in Business

    • Information technology's role in various business contexts

    200 Information Technology

    • Definition including the science of computing and the activity of using computational resources

    201 Over the decades

    • Timeline highlighting key advancements in computing and information technology, from the early computers to cloud computing

    202 Over the decades

    • Timeline highlighting more recent advancements in computing and information technology, including big data, Al, 5G and quantum computing

    203 Al Definition

    • Definition of AI, including the aspects of action, interpretation, and environment

    204 Al Definition

    • Summary definition of Artificial Intelligence

    205 AI

    • Key areas of AI application

    206 Machine Learning

    • Detailed definition of machine learning

    207 Big Data

    • Definition of Big Data

    208 5 Vs

    • Key characteristics of Big Data (volume, velocity, variety, veracity, and value)

    209 IoT

    • Definition of Internet of Things (IoT), including objects and computing devices

    210 Cybersecurity

    • Definition of cybersecurity

    211 5G

    • Definition of 5G wireless communication technologies, including their higher level capabilities

    212 Quantum Computing

    • Definition of Quantum Computing, including the conceptual differences to traditional computing

    213 Information Systems

    • Key information systems functions, including storage, data management, transmission, analysis, and filtering

    214 ERP Systems Evolution

    • Different phases for development

    215 MRP and ERP systems Differences

    • Difference between initial Material Requirements Planning (MRP) and its advanced version (Enterprise Resource Planning -ERP), including examples

    216 ERP

    • Definition and roles of the ERP.

    217 Robotization and Automation

    • Detailed definition of and difference between Robotization and Automation

    218 Types of Automation

    • Detailed description of how different kinds of automation are used for various tasks.

    219 Robotization and Automation Evolution

    • Timeline of Robotization and Automation

    220 Role of IT for Business Operations

    • Various IT roles within Business context

    221 Role of IT for Business Decision-Making

    • IT's influence on modern business decision making

    222 Role of IT for Business Strategy

    • Role of IT in developing and supporting business strategies

    223 Challenges and Risks in IT Adoption inside the Business

    • Challenges faced when adopting IT in Business scenarios

    224 Current Digital World

    • Importance of big tech companies in the current digital world

    225 Paradoxes from Natalia Hatalska book “Czy technologia Nas ocali”

    • The changing nature of time and new relationships in modern digital environment
    • The tension between online and offline interactions

    226 Digital World Threats

    • Potential risks related to overuse of digital technologies (e.g., loss of focus, addiction).

    227 Chat GPT as an Example

    • Explanation and concerns regarding the capabilities and potential misuse of a chatbot used in modern contexts

    228 Advices

    • General advice for handling the digital world responsibilities and avoiding dangerous practices for safety.

    229 Digital World Discussion

    • Suggestions and prompts for a discussion on the digital world

    230 7 „0” TERM

    • Provided in the presentation

    231 8 DIGITAL WORLD

    • Provided in the presentation

    232 DISCUSSION

    • Provided in the presentation

    233 Thank You!

    • Provided in the presentation

    234 Additional Literature Examples

    • Key Literature sources provided at the end of the presentation

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Introduction to IT PDF

    Description

    This quiz tests your knowledge on fundamental concepts of computer hardware, including the CPU, motherboard, and network essentials. Explore questions about the internet's initial purpose, protocols, and the role of software in managing system resources. Perfect for students in computer science or information technology courses.

    More Like This

    Use Quizgecko on...
    Browser
    Browser