ITC Reviewer Finals PDF
Document Details
Uploaded by EffusiveChrysanthemum
FEU Alabang, FEU Diliman, FEU Tech
Tags
Summary
This document appears to be study notes or lecture material on computer science and information technology (IT). It covers topics such as computer science categories, information systems, information technology, and related jobs. This document does not appear to be a past exam paper.
Full Transcript
MODULE 1 COMPUTER SCIENCE Ranges from theory through programming to cutting-edge development of computing solutions. More on discovering new programs Permits graduates to adapt to new technologies and new ideas Requires some mathematical background. Work of Computer Scientist Catego...
MODULE 1 COMPUTER SCIENCE Ranges from theory through programming to cutting-edge development of computing solutions. More on discovering new programs Permits graduates to adapt to new technologies and new ideas Requires some mathematical background. Work of Computer Scientist Categories: Designing and building software. Developing effective ways to solve computing problems(ex: storing info in databases, sending data over networks, or providing new approaches to security problems). Devising new and better ways of using computers and addressing particular challenges in areas(robotics, computer vision, or digital forensics. Information System are concerned with: The information that computer systems can provide to aid a company, non-profit, or governmental organisations in defining and achieving its goals. The processes that an enterprise can implement and improve using I.T Information Systems professional must: Understand both technical and organisational factors Be able to help an organisation how information and technology enable business processes can provide a foundation for superior organisational performance. Information Technology (IT) Is a label that has two meanings, commonly used to stand as Information Technology; which is often used to refer to all of computing Undergrad program: It refers to the preparation of students to meet the computer technology needs of business, government, healthcare, schools, and other kinds of organization. IT professionals possess the right combination of knowledge and practical hands-on expertise to take care of both an organization information technology and the people who use it - They assume responsibility for selecting hardware and software products appropriate for an organization. Requirement skill for IT discipline: - Understanding how networked systems are composed and structured, and what their strengths and weaknesses are. - Important software system concerns such as reliability, security, usability, effectiveness, and efficiency for their intended purpose. Currently, there are 10.5 Million computer workers and it increases by 2% to 3% annually - The number of students majoring in computer-related fields is declining. Information Technology(IT) Department Department in business/government agency that employs people in computer-related jobs Responsible for keeping all computer operations and networks operating smoothly. Jobs available in IT Department: Management Chief information officer/ VP of IT E-Commerce director - supervives the development and execution of Internet or e-commerce systems Project leader/manager Chief Security Officer. Network admin System development and programming: Application programmer Computer scientist - researches, invents, and develops innovative solutions to complex software requirements or problems. Database analyst - uses data modeling techniques and tools to analyze, tune, and specify data usage within an application area. Software engineer Systems analyst - person who uses analysis and design techniques to solve business problems using information technology. Systems programmer - installs and maintains operating system software and provides technical support to the programming staff. Technical writer Technical lead Webpage author Technical services: Computer forensics specialist Computer technician Database admin Desktop publisher - produces documents such as newsletters, brochures, and books by combining text and graphics Graphics design/ illustrator Network security specialist - configures routers and firewalls and specified Web protocols and enterprise technologies. Quality assurance specialist - reviews programs and documentation to ensure they meet an organization’s standards Security admin Web admin/ master - maintains an organization’s website and creates or helps users create web pages. Operations - operates the centralized computer equipment and administers the network including both data and voice communication. Computer operator Data communication analyst/VolP Specialist Training Corporate trainer Help desk specialist - answers hardware, software, and networking questions in person, over the telephone, and/or in a chat room Computer equipment field Manufactures and distributes of computers and computer-related hardware Involves design, manufacture, and production of computer equipment. Computer software field Companies that develop, manufacture, and support software Project Lead Analyzes requirements, design solutions, and oversees software development process. Programmer - Writes and tests computer programs. Software engineer - Designs and develops software. Computer Scientist - Researches, invents, and develops solutions to complex software problems. Computer Service and Repair field Provides preventative maintenance, component, installation, and repair services Computer technician - Installs, maintains, and repairs hardware Computer sales Needs general understanding of computers and specific knowledge on what products they are selling Education and Training - Schools, colleges, universities, and private companies need educators and trainers. - Corporate trainers teach employees how to use software, design, and develop systems and programs. IT Consultant - Individual who draws upon expertise in specialized area of computers. - Computer selection, system design, communications, hardware and software config, network design and installation, and web development. Preparing for a Career in the Computer Industry Computer Information System(CIS) - Sometimes called Management Information Systems/Technology, it emphasizes technical knowledge and skills. Computer Science - Also called software engineering, it stressed the theoretical side of programming and operating systems. Computer Engineering - Teaches students how to design and develop the electrical components found in computers and peripheral devices. - Required courses include application and systems programming, data and file structure, networks, and operating systems. How do Companies advertise job openings? - Some websites specializes in helping people find jobs(LinkedIn) - Some allow job seekers to submit resumes online. Organizations for Computer Professionals Association for Computing Machinery(ACM) science-oriented Association of Information Technology Professionals(AITP) - computer profession organization that comprises of programmers, system analysts, and information processing managers. User Group - Collection of people with common computer equipment or software interests. Professional Growth and Continuing education can be done by - Attending events such as workshops, seminars, conferences, conventions, and trade shows(CES, a trade show with hundreds of vendors and more than 130k attendees. - Training in form of books, video-based training, computer-based training, web-based training, and instructor-led training You can stay informed about the computer industry with - Computer industry publications - News, blogs, and technical websites. Certification - Process of verifying technical knowledge in a particular area. - Enhances employees career Vendors provide access to technical information, advanced training, and discounts on publications and tools. Benefits of certification to customers, employers, and industries: Factors to Consider in Selecting a Certification: - Expenses and time involved to obtain the certification - Examine employment projections - Look at job listings to see what certifications are sought - Read evaluations of certifications - Talk to people in the industry - Think about complementary combinations of certifications to meet your goals Options available to prepare for certification: - Self-study - Online training classes - Web resources - Instructor-led training Certification Exams are: - Taken using computers - Some are multiple choices, some are skill based. - With computerized adaptive testing, the test analyze a person’s responses while taking the test. Application Software Certifications - Focus on knowledge of application software. Sometimes called end-user certifications. Microsoft Office Specialist(MOS) Microsoft Certified Desktop Support Technician(MODST) Adobe Certified Expert IBM Certified Professional for Lotus Software Macromedia Certified Professional Operating System Certifications - Focus on particular skills: user, operator, system administrator, and system engineer. Differing level of certification. Microsoft Certified Systems Administrator(MCSA) Certified Linux Professional(CNP) - sponsored by Novell Red Hat Certification Technician(RHCT) Red Hat Certified Engineer(RHCE) Sun Certified System Administrator IBM Certified Specialist Programming Certification - Recognition of programming training. Broadens knowledge and skill base. Certified Software Development Professional(CSDP) - sponsored by IEEE Computer Society IBM Certified Solution Developer Microsoft Certified Professional Developer (MCPD) Sun Certified Enterprise Architect Sun Certified Developer Sun Certified Programmer Hardware Certifications - Recognition of general knowledge of hardware and controlling software needed to set up, maintain, and repair a computer. Can be narrowly or broadly focused. A+ - sponsored by Computing Technology Industry Association(Comp TIA) IBM eServer Certified Specialist NASCE Network Technician (NNIT) - sponsored by National Association of Communication Systems Engineers (NACSE) Network Certifications - Awarded to professionals who demonstrate expertise in planning, installing, managing, and troubleshooting a network. Certified Novell Administrator(CNA) Certified Novell Engineer(CNE) Cisco Certified Network Professional(CCNP) Network+ - sponsored by Comp TIA Sun Certified Network Administrator Computer Forensics Certification - Discovery, collection, and analysis of evidence found on computers and networks. Certificate holders are considered highly credible during computer crime cases. Certificate Electronic Evidence Collection Specialist(CEECS) - sponsored by International Association of Computer Investigative Specialist(IACIS) Certified Forensic Examiner(CECE) - sponsored by IACIS Certified Computer Examiner - sponsored by International Society of Forensic Computer Examiners(ISFCE) Security Certifications - Measure a candidate’s ability to identify and control security risks to computer resources Certified Information Security Professional(CISSP) - sponsored by (ISC)2 Systems Security Certified Practitioner(SSCP) Security Certified Network Professional Security Certified Network Architect(SCNA) Internet Certifications - Require technical expertise in networking hardware and configuration. Includes Web Management, Web Programming, and Web Development certifications. Certified Internet Webmaster - sponsored by prosoft training Cisco Certified Internetwork Expert(CCIE) Certified Web Professional (CWP) - sponsored by International Webmasters Association. Database System Certifications - Awarded for knowledge on a specific database management system. Test the various tasks a database management staff must perform. IBM Certified Solutions Expert - DB2 IBM Certified Solutions Expert - InformiX Microsoft Certified IT Professional (MICTP) Oracle Certified Professional Sybase Certified Professional Latest Trends and Technologies Artificial Intelligence (AI) - Refers to the computer systems built to mimic human intelligence and perform task such as recognition of images, speech or patterns and decision making, - AI can do these tasks faster and more accurately than humans. Machine Learning - Subset of AI - Computers are programmed to learn to do something they are not programmed to do. They learn by discovering patterns and insights from data. Subsets of Machine Learning - Neural networks, natural language processing(NLP) and deep learning Robotic Process Automation(RPA) - use of software to automate business processes such as interpreting applications, processing transactions, dealing with data, and even replying to emails. Blockchain - data that you can only add to, not take away from or change. - Consensus-driven, no entity can take control of the data. Edge Computing - designed to help solve some problems of cloud computing as a way to bypass the latency caused by cloud computing and getting data to a data center for processing Virtual reality - immerses the user in an environment - Primarily been used for gaming, but can also be used for training. Augmented Reality - enhances their environment. Cyber Security - as long as we have hackers, we will have cybersecurity as an emerging technology because it will constantly evolve to defend against those hackers. Internet of Things - many “things” are now being built with WIFI connectivity, meaning they can be connected to the Internet and to each other. - It enables devices, home appliances, cars and much more to be connected and exchange data over the internet - Number of IoT devices reached 8.4 billion in 2017 and is expected to reach 30 billion devices after 3 years. Articulation Agreement - ensures that if a student transfers to a four-year college or university, he or she will receive credit for most of the courses taken at the community college level. MODULE 2 Computer - electronic device, operating under the control of instructions stored in its own memory. Categories of Computer Personal Computer - can perform all of its input, processing, output, and storage activities by itself. - PC and Apple: Two populr architectures Mobile Computer - Personal computer you can carry from place to place Ex: Notebook computers, laptop computers, netbooks, ultra-thins, and Tablet PCs. Mobile Devices - Computing device small enough to hold in your hand. Ex: smart phones and PDAs, e-book readers, handheld computers, portable media players and digital cameras. Game Console - mobile computing device designed for single-player or multiplayer video games. Server - controls access to the hardware, software, and other resources on a network Provides a centralized storage area for programs, data, and information Mainframe - large, expensive, powerful computer that can handle hundreds or thousands of connected users simultaneously. Supercomputer - fastest, most powerful computer. Capable of processing more than one quadrillion instructions in a single second. Embedded Computer - special purpose computer that functions as a component in larger product. Consumer Electronics: Mobile and Digital Telephones Digital Television Cameras Video Recorders DVD Players and Recorders Answering Machines Home Automation Devices: Thermostats Sprinkling Systems Security Monitoring Systems Appliances Lights Automobiles Anti Lock Brakes Engine Control Modules Airbag Controller Cruise Control Process Controllers and Robotics Remote monitoring systems Power monitors Machine controllers Medical devices Computer Devices and Office Machines Keyboards Printers Faxes Copiers Evolution of Computers Abacus - beads on rods to count and calculate. Still widely used in Asia Slide Rule(1630) - based on Napier’s Rules for Logarithms. Used until 1970s Jacquard Loom(1804) - a device fitted to a power loom that simplifies the process of manufacturing textiles with complex patterns as brocade, damask and matelassé. Made by Joseph Marie Jacquard Analytical Engine - a proposed mechanical general-purpose computer designed by Charles Babbage(Father of Modern Computer) First described in 1837 as the successor to Difference Engine, a design for a simpler mechanical computer. Advancements that led to Modern Computers Electricity Transistor Microchip Data storage First Gen(1940-1956) of Electronic Computers - used Vacuum Tubes - Vacuum Tubes - glass tubes with circuits inside, and no air inside to protect the circuitry. Universal Automatic Computer(UNIVAC) - electrical computer containing thousands of vacuum tubes that utilizes punch cards for outputting and storing data, and switches for inputting data. Released in 1951 and 1952 when first developed by J. Presper Eckert and John Mauchly. Grace Hopper - Programmed UNIVAC Recipient of Computer Science’s first “Man of the Year Award” First Computer Bug - a moth that caused malfunction in relay switches was found by Grace Hopper. - “Debugging” a computer. Second Gen(1956-1963) computers - used transistors instead of vacuum tubes. Transistors - used to control the amount of current or voltage or used for amplification/modulation or switching of an electronic signal. Made up of semi-conductors Developed by John Bardeen, Walter Brattain and William Shockley at the Bell Laboratories on Dec 23, 1947 Third Gen(1964-1971) computers - used integrated circuits(IC) on computers. Helped to reduce the size of computers. Fourth Gen(1972-2010) - took advantage of the invention of microprocessor/CPU Fifth Gen(2010-Present)- beginning to use AI Green Computing - involves reducing the electricity consumed and environmental waste generated when using a computer. Elements of a Computer System Hardware Elements - electric, electronic, and mechanical components of a computer. Input Device - allows you to enter data and instructions into a computer Output Device - hardware component that conveys information to one or two or more people System Unit - Case that contains the electronic components of the computer that are used to process data. Storage Unit - Records/writes and retrieves/reads items to and from storage media. Communication Device - Enables a computer to send and receive data, instructions, and information to and from one or more computers or mobile devices. Software/Program - tells the computer what tasks to perform and how to perform them. System Software - operating system and utility program. Application Software Installing - process of setting up software to work with the computer printer, and other hardware Data - raw material/ input. Collection of numbers represented as bytes(composed of bits) processed by CPU Information - processed data/ output. Meaningful and can be used in many significant ways. People - part of the computing process. Some computers function without computers but they require constant maintenance by people. Procedures - steps that you must follow to accomplish a specific computer-related task. Computer Usage Home User Personal Financial Management Web access Communications Entertainment Small Office/Home Office User Look up information Send and receive e-mail messages Make telephone calls Mobile User Connect to other computers on a network or the Internet Transfer Information Play video games Listen to music Watch movies Power User Work with multimedia Use industry-specific software Enterprise User Communicate among employees Process high volumes of transactions Blog Telecommuting - the practice of working from home, making use of the internet, email, and the telephone Module 3 System Unit - case that contains electronic components of the computer used to process data. Desktop personal computers - most storage devices also are part of the system unit. Most Notebook computers, including netbooks, the keyboard and pointing device often occupy the area on top of the system unit, and the display attaches to the system unit by hinges. Tablet PC’s system unit varies, depending on the design of the Tablet PC. On mobile computers and devices, the display often is built into the system unit. With game consoles, the input and output devices, such as controllers and a television, reside outside the system unit. On handheld game consoles, portable media players, and digital cameras by contrast, the packaging around the system unit houses the input devices and display. Motherboard/System Board – is the main circuit board of the system unit. The motherboard contains many electronic components including a processor chip, memory chips, expansion slots, and adapter cards. Microprocessor - personal computer processor chip Computer chip – a small piece of semiconducting material, usually silicon, on which integrated circuits are etched. Expansion slots hold adapter cards that provide connections and functions not built into the motherboard. Processor/ Central Processing Unit - interprets and carries out the basic instructions that operate a computer. Control unit - directs and coordinates most of the operations in the computer and Arithmetic logic unit (ALU) - performs arithmetic, comparison, and other operations. Memory - consists of electronic components that store instructions waiting to be executed by the processor Memory Slots - hold memory modules. The machine cycle is a set of four basic operations — fetching, decoding, executing, and storing — that the processor repeats for every instruction Decoding - process of translating instructions into signals Fetching - process of obtaining a program instruction or data item from memory Executing - process of carrying out commands Pipelining - processor begins fetching a second instruction before it completes the machine cycle for the first instruction Multi-core - is a single chip with two or more separate processor cores. Two common multi-core processors are dual-core and quad-core. A dual-core processor is a chip that contains two separate processor cores. A quad-core processor is a chip with four or more separate processor cores. Intel Core processor family – for high- performance personal computers, Pentium and Celeron processor families – for basic personal computers. Xeon and Itanium processor families – for workstations and low-end servers. AMD manufactures Intel-compatible processors, which have an internal design similar to Intel processors. System-on-a-chip processor that integrates the functions of a processor, memory, and a video card on a single chip. Heat sinks/pipes and liquid cooling technologies are used to dissipate processor heat. A heat sink is a small ceramic or metal component that absorbs and disperses heat. Heat pipe smaller device that cools processors in notebook computers, including netbooks and Tablet PCs. Some computers use liquid cooling technology, which uses a continuous flow of fluid(s) to transfer heated fluid away from the processor. Binary System - which is a number system that has just two unique digits — 0 (for off ) and 1 (for on) — called bits. - A bit (short for binary digit), is the smallest unit of data a computer can process. 8 bits form a byte, which provides enough different combinations of 0s and 1s to represent 256 individual characters. - The combinations are defined by patterns, called coding schemes, such as ASCII and Unicode. Memory usually consists of one or more chips on the motherboard or some other circuit board in the computer. Volatile memory loses its contents when the computer’s power is turned off. - RAM Nonvolatile memory does not lose its contents when the computer’s power is turned off. - ROM, flash memory, and CMOS RAM (random access memory), also called main memory, consists of memory chips that can be read from and written to by the processor and other devices ROM (read-only memory) refers to memory chips storing permanent data and instructions that usually cannot be modified. Flash memory can be erased electronically and rewritten. Clock Speed -pace of the system clock 1GHZ - equals 1 billion ticks of the system clock per second Registers - processor contains this small high-speed locations that temporarily hold data and instructions CMOS (complementary metal-oxide semiconductor) technology uses battery power to retain information even when the power to the computer is turned off. Expansion Slot is a socket on the motherboard that can hold an adapter card. Adapter Card, sometimes called an expansion card, is a circuit board that enhances functions of a component of the system unit and/or provides a connection to a peripheral. Sound Card enhances the sound-generating capabilities of a personal computer. Video Card, also called a graphics card, converts computer output into a video signal that displays an image on the screen. Memory Card is a removable flash memory device that you insert and remove from a slot in a personal computer, a game console, a mobile device, or card reader/writer. USB flash drive plugs in a USB port on a computer or mobile device. PC Card slot or an ExpressCard slot holds a PC Card or ExpressCard module. Port is the point at which a peripheral attaches to or communicates with a system unit so that it can send data to or receive information from the computer. Connector joins a cable to a port. A USB port, short for universal serial bus port, can connect up to 127 different peripherals together with a single connector. FireWire port can connect multiple types of devices that require faster data transmission speeds. Bluetooth technology uses radio waves to transfer data between two devices. SCSI port attaches the system unit to SCSI peripherals, such as disk drives and printers. eSATA port connects an external SATA hard disk to a computer. IrDA port allows wireless devices to transmit signals to a computer via infrared light waves. Serial port transmits data one bit at a time. MIDI port connects the system unit to a musical instrument. Bus - an electrical channel along which bits transfer within the circuitry of a computer, allowing devices both inside and attached to the system unit to communicate. Data bus - transfers actual data, and the address bus transfers information about where the data should reside in memory. Bus Width - determines the number of bits that the computer can transmit at one time. - The larger the bus width, the faster the computer transfers data. Power Supply - the component of the system unit that converts wall outlet AC power into DC power for the computer to use. Input - any data or instructions entered into the memory of a computer. Program is a series of related instructions that tells a computer what tasks to perform and how to perform them. Command is an instruction that causes a program to perform a specific action. A user issues a user response by replying to a question displayed by a program to perform certain actions. Keyboard - an input device that contains keys users press to enter data and instructions into a computer. Computer keyboards have a typing area that includes letters of the alphabet, numbers, punctuation marks, and other basic keys. Gaming keyboard - a keyboard designed specifically for users who enjoy playing games on the computer. Notebook computers and some other mobile devices - the keyboard is built into the top of the system unit. To fit in these mobile computers and devices, the keyboards usually are smaller and have fewer keys than desktop computer keyboards. Mouse - a pointing device that fits under the palm of your hand. Optical Mouse - uses devices that emit and sense light to detect the mouse’s movement. Laser Mouse - uses a laser and is more expensive than an optical mouse. Air Mouse - allows you to control objects, media players, and slide shows by moving the mouse in predetermined directions through the air Wireless mouse, or Cordless mouse - transmits data using wireless technology. Touch Screen - a touch-sensitive display device. Touch-sensitive pad is an input device that enables users to scroll through and play music, view pictures, watch videos or movies, adjust volume, and/or customize settings on a portable media player or other mobile device Digital camera allows users to take pictures and store the photographed images digitally. Resolution is the number of horizontal and vertical pixels in a display device. Voice recognition, also called speech recognition, is the computer’s capability of distinguishing spoken words. Web cam, also called a PC video camera, is a digital video camera that enables users to capture video and still images and then send or broadcast the images over the Internet Scanner, or optical scanner, is a light-sensing input device that reads printed text and graphics and translates the results into a form the computer can process. Flatbed scanner works in a manner similar to a copy machine except it creates a file of the document. An optical reader uses a light source to read characters, marks, and codes and converts them into digital data that a computer can process. A biometric device translates a personal characteristic into digital code that is compared with a digital code stored in the computer to identify an individual. Output is data that has been processed into a useful form. Computers process data (input) into information (output). Four categories of output are text, graphics, audio, and video. An output device is any hardware component that conveys information to one or more people. A display device, or simply display, is an output device that visually conveys text, graphics, and video information and consists of a screen and the components that produce the information on the screen. Desktop computers typically use a monitor as their display device; most mobile computers and devices integrate the display into the same physical case. A flat-panel display is a lightweight display device with a shallow depth that typically uses LCD or gas plasma technology. An LCD monitor is a desktop monitor that uses a liquid crystal display to produce images. A plasma monitor is a display device that uses gas plasma technology, which substitutes a layer of gas for the liquid crystal material in an LCD monitor. A CRT monitor is a desktop monitor that contains a cathode-ray tube (CRT) Printer - an output device that produces text and graphics on a physical medium, such as paper Nonimpact Printers - spray ink, while others use heat or pressure to create images Laser Printer - high-speed, high-quality nonimpact printer Infrared Printing - printer communicates with a device using light waves Toner - printer creates images using laser beam and powdered ink Memory Module - small circuit board where RAM chips usually reside being inserted into the motherboard Memory Slots - on the motherboard hold the memory modules Cursor - keyboard contain keys that allow users to position the insertion point The quality of an LCD monitor or LCD screen depends primarily on its resolution, response time, brightness, dot pitch, and contrast ratio. Resolution is the number of horizontal and vertical pixels in a display device; a higher resolution uses a greater number of pixels and provides a sharper image. Response time - the time in milliseconds that it takes to turn a pixel on or off. Lower the time in millisecond, the slower the response time. Brightness of an LCD monitor or LCD screen is measured in nits; the higher the nits, the brighter the image. A nit is a unit of visible light intensity equal to one candela per square meter. Dot pitch, or pixel pitch - is the distance in millimeters between pixels on a display device. Contrast ratio - describes the difference in light intensity between the brightest white and darkest black that can be displayed on a monitor. Storage medium - the physical material on which a computer keeps data, instructions, and information. The number of bytes (characters) a storage medium can hold is its capacity. Storage device - the computer hardware that records and/or retrieves items to and from storage media. Writing is the process of transferring items from memory to a storage medium, and reading is the process of transferring these items from a storage medium into memory. A hard disk, also called a hard disk drive or hard drive, is a storage device that contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information. A platter is made of aluminum, glass, or ceramic and is coated with a material that allows items to be recorded magnetically on its surface. Each platter has two read/write heads, one for each side. The location of a read/write head often is referred to by its cylinder, which is the vertical section of a track that passes through all platters Formatting is the process of dividing the disk into tracks and sectors. Flash memory chips are a type of solid-state media, which means they consist entirely of electronic components and contain no moving parts. A solidstate drive (SSD) typically uses flash memory to store data, instructions, and information. A memory card is a removable flash memory device that you insert and remove from a slot in a computer, mobile device, or card reader/writer. Common memory cards include CompactFlash (CF), Secure Digital (SD), Secure Digital High Capacity (SDHC), microSD, microSDHC, xD Picture Card, Memory Stick, and Memory Stick Micro (M2). A USB flash drive, sometimes called a thumb drive, is a flash memory storage device that plugs in a port on a computer or mobile device. An ExpressCard module is a removable device that fits in an ExpressCard slot. ExpressCard modules can add memory, storage, communications, or other capabilities to a computer. Cloud storage is an Internet service that provides storage for computer users. Available for all sizes of users, with various degrees of storage services available for home and business users, cloud storage fees vary, depending on the user’s storage requirements. Optical disc - a type of storage media that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser. Drive designation of an optical disc drive, into which the disc would fit usually follows alphabetically after that of all the hard disks 4.75 inches in diameter and less than one-twentieth of an inch thick A CD-ROM, or compact disc read-only memory, is a type of optical disc that uses laser technology to store items. Users can read the contents of standard CD-ROMs but cannot erase or modify their contents. Numeric Keyboard - all computer keyboard have it that includes letters of the alphabet, numbers, punctuation, and other basic keys Function Keys - special keys programmed to issue commands to a computer. Chassis - case of system unit Module 5 Software System Software - consists of the programs that control or maintain the operations of the computer and its devices. Operating System - set of programs containing instructions that work together to coordinate all the activities among computer hardware resources. Booting - the process of starting or restarting a computer. Cold Boot - turning on the computer that has been powered off completely Warm Boot - using the operating system to restart a computer Boot Drive - the drive which your computer starts You can boot from a boot disk. Recovery Disk - contains a few system files that will start the computer. Shut Down Options of an Operating System Sleep Mode - saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state. Hibernate - saves any open documents and programs to a hard disk before removing power from the computer. Operating System Functions User Interface - controls how you enter data and instructions and how information is displayed on the screen. With a Graphical User Interface(GUI), you interact with menus and visual images. Command-line Interface - a user uses the keyboard to enter data and instructions. Managing Programs - refers to how many users and how many programs an operating system can support at one time. How an Operating System handles programs directly affects your productivity Single user and multiuser Single tasking and multitasking Foreground and background Preemptive Multitasking Multiprocessing Memory Management - optimizes the use of RAM Virtual Memory - is a portion of a storage medium functioning as additional RAM Task Scheduling/Coordinating Tasks - the operating system determines the order in which tasks are processed. Configuring Devices - involves loading each device’s driver when a user boots the computer. Driver - a small pam that tells the operating system how to communicate with a specific device. Plug and Play - automatically configures new devices as you install them Operating systems typically provide a means to establish Internet Connections. Performance Monitor - a program that assesses and reports information about various computer resources and devices. Operating Systems often provide users with the capability of: Managing files Searching for files Viewing images Securing a computer Uninstalling programs Cleaning up disks Defragmenting disks Diagnosing problems Backing up files and disks Setting up screen savers Automatic Update - automatically provides updates to the programs, especially the operating system. A Network Administrator uses the server operating system to: Add and remove users, computers, and other devices Install software and administer network security Some operating systems are designed to work with a server on a network. A server operating system organizes and coordinates how multiple users access and share resources on a network. Each User has a User Account User Name/User ID - identifies a specific user Password - a private combination of characters associated with the user name. Types of Operating Systems Stand-alone operating system - a complete operating system that works on a desktop computer, notebook computer, or mobile computing devices Windows 7 Mac OS X UNIX Linux Windows 10 - microsoft’s fastest, most efficient operating to date and is available in multiple editions (12) Windows 10 Pro Windows 10 Home Windows 10 Education Windows 10 Enterprise Windows 10 provides programs such as: Windows Defender Groove Music Microsoft Store Movies and TV Additional Windows 10 Features: Return of the familiar Start Menu New web browser, Microsoft Edge Cortana, your personal virtual assistant Multiple desktop and Task View Action Center, accessible notifications and settings Tablet Mode Macintosh Operating System - set the standard for operating system ease of use. Latest version is Mac OS Mojave Unix - multitasking operating system developed in the early 1970s Linux - open-source, popular, multitasking UNIX-type operating system Server Operating Systems Windows Server 2019 UNIX Linux Solaris Netware Embedded Operating System - resides on a ROM chip on a mobile device or consumer electronic device Windows Embedded CE Windows 10 Mobile Palm OS iPhone OS BlackBerry Google Android Embedded Linux Symbian OS Utility Programs Utility Program - a type of system software that allows a user to perform maintenance-type tasks. File Manager - utility program that performs functions related to file management. Displaying a list of files Organizing files in folders Copying, renaming, deleting, moving, and sorting files and folders Creating shortcuts Search Utility - a program that attempts to locate a file on your computer based on the criteria you specify Image Viewer - allows users to display, copy, and print the contents of a graphics file Uninstaller - removes a program, as well as any associated entries in the system files Disk Cleanup - searches for and removes unnecessary files. Downloaded program files Temporary Internet files Deleted files Unused program files Disk Defragmenter - reorganizes the files and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs run faster Backup Utility - allows users to copy files to another storage medium Restore Utility - reverses the process and returns the backed up files to their original form. Personal Firewall - detects and protects a personal computer from unauthorized intrusions Screensaver - shows a moving image or blank screen if no activity occurs for a specified time. Virus - a potentially damaging computer program that affects a computer negatively Worm - copies itself repeatedly in memory or over a network. Trojan Horse - hides within or looks like a legitimate program does not replicate itself to other computers Antivirus Program - protects a computer against viruses Spyware - program placed on a computer without the user’s knowledge that secretly collects information about the user. Spyware Remover - detects and deletes spyware and other similar programs. Adware - displays an online advertisement in a banner or pop-up window Adware remover - program that detects and delete adware Signs of Virus Infection Unusual message or image is displayed on the computer screen Unusual sound or music plays randomly Available memory is less than what should be available Program or file suddenly is missing Unknown program or file mysteriously appears Size of file changes without explanation File becomes corrupted Program or file does not work properly System properties change The computer operates much slower than usual Filters - programs that remove or block certain items from being displayed Web filtering software Anti-spam programs Phishing filters Pop-up blockers File Compression Utility - shrinks the sizes of a a files, frees up room on the storage media Lossy Lossless Compressed files are sometimes called zipped files. Can be uncompressed/unzipped Media Player - allows you to view images and animation, listen to audio, and watch video files on your computer. Disc Burning Software - writes text, graphics, audio, and video files on a recordable or rewritable optical discs Personal Computer Maintenance Utility - identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer’s performance. Application Software Application Software - consists of programs designed to make users more productive and assist with personal tasks. Available in a variety of Forms: Packaged Software Custom Software Web Application Open Source software Shareware Freeware Public-domains software System Software - serves as the interface between the user, the application software, and the computer’s hardware 4 Categories of Application Software: Business Graphics and Multimedia Home, personal and educational Communications Business Softwares Business Software - assists people while performing business activities Word Processing Software - allows users to create and manipulate documents. Clip Art - collection of electronic drawings, photos and other images. Additional word processing features: Autocorrect, Auto Format, Collaboration, Columns, Grammar Checker, Ink Input, Macros, Mail Merge, Reading Layout, Research, Search and Replace, Smart Tags, Tables, Templates, Thesaurus, Tracking Changes, Voice Recognition, Web Page Development Developing a Document: Create a Document Enter text and numbers Insert images Perform other tasks Edit a Document Make changes to existing content Inserting, deleting, cutting, copying, and pasting Format a Document Change appearance (font and font size) Spreadsheet software - allows users to organize data in rows and columns and perform calculations. Function - predefined formula that performs common calculations Charting - depicts data in a spreadsheet in graphical form Database - collection of data organized in a manner that allows access, retrieval, and use of that data Database software - allows users to create, access, and manage a database. Presentation Software - creates visual aids for presentations to communicate ideas, messages, and other information to a group Note Taking Software - enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page. Software suite - collection of individual programs available together as a unit Personal Information Manager (PIM) - application software that includes Appointment calendar Address book Notepad Scaled down versions of software are available to work with smartphones and other mobile devices. Project Management Software - plan, schedule, track, and analyze the events, resources, and costs of a project Accounting software - helps companies record and report their financial transactions Document Management Software - provide a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user Enterprises typically require special computing solutions for various functional units Human resources Accounting Engineering Marketing Sales Distribution Customer Service Information Technology Graphics and Multimedia Software Computer-Aided Design(CAD) - assists in creating engineering, architectural, and scientific designs Autodesk AutoCAD Chief Architect Microsoft Visio Desktop Publishing - enables professionals to create sophisticated documents that contain text, graphics, and colors Adobe Indesign Corel Ventura QuarkXPress Paint/Image Editing - lets users draw graphical images with various on-screen tools Adobe Illustrator Corel Painter Microsoft Expression Design Photo Editing - allows high-volume digital photo users to edit and customize digital photos Adobe Photoshop Arcadia PhotoPerfect Ultimate Nik Professional Suite Video and Audio Editing - allows professionals to modify segments of a video and audio clips. Adobe Audition Premiere Pro Soundbooth Avid Media Composer Cakewalk SONAR Sony ACID Pro Multimedia Authoring - allows users to combine text, graphics, audio, video, and animation in an interactive application Adobe Director Agilix GoCourse SunTotal Systems ToolBook Instructor Web Page Authoring - helps users of all skill levels create web pages that include multimedia and interactive content Adobe Dreamweaver Fireworks Flash Microsoft Expression Web SharePoint Designer Software for Home, Personal, and Educational Use Personal Finance Software Legal Software Tax preparation Software Personal DTP Software Personal Paint/Image editing Software Personal Photo editing software Clip Art/Image Gallery Video and Audio editing Software Home design/Landscaping Software Travel and Mapping Software Reference Software Educational Software Entertainment Software Web Applications Web Application - a website that allows users to access and interact with software from any computer or device that is connected to the Internet. Application Softwares for Communications Web Browser E-mail Instant Messaging Chat Room Text, Picture, Video Messaging RSS Aggregator Blogging Newsgroup/ Message Board FTP Video Conferencing Learning Tools for Application Software Online Help - electronic equivalent of a user manual Web-based Help - provides updates and comprehensive resources to respond to technical issues about software Web-based Training - type of CBT that uses Internet technology and consists of application software on the web, Distance Learning - delivery of education at one location while the learning takes place at other locations. Module 6 Information System and Database Information System - collection of multiple pieces of equipment involved in the dissemination of information. IS is the study of complementary networks of hardware and software that people and organizations use to collect, filter, process, create, and distribute data. IS are combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in organizational seetings Parts of an IS Hardware Software Computer system connections and information IS users System’s housing Common types of Information Systems Transaction processing systems Management information systems Decision support systems Executive information systems 6 Elements of Computer-based Information System Hardware - refers to the computer themselves, along with any and all peripherals, including servers, routers, monitors, printers and storage devices. A CBIS may use a single computer or thousands. Software - tells the hardware how to function Gathers, organizes, and manipulates data and carries out instructions. Everything you do using a computer is done by the software Data - information part of an information system, and whether that is statistical data, sets of instructions, lists of names or even graphics and animations, it is all key to a CBIS. Software cannot function without data, just as hardware cannot function without software Procedures - rules, descriptions and instructions for how things are done. People - most overlooked and most important part of computer-based information system Designs and operates the software, inputs the data, builds the hardware and keep it running, writer the procedures, and it is ultimately people who determine the success or failure of a CBIS Communication - is left out of some list of CBIS elements because parts of it are covered under hardware Hardware is the component that allow one computer to communicate with one another and is controlled by the software What is a Database Database - organized collection of information which can easily be retrieved. Such as: Telephone book Mailing list Address list It is a set of data related for a specific purpose or topic Tools needed to work with data: Sorting Filtering Extracting Summarizing Basic Database Terminologies Table - list of related information in columns and rows Each row in a table is considered a Record Each column in a table is a category or a field Data value - one item of data Query - database object that can be used to extract or show information in Datasheet view. Record source - tables or queries from which the query gets its data from. Form - database object you can use to enter, edit, or display data from a table or query. Report - can be used to summarize information from a table or query. Pede rin maprint just like a word document Macros - can be used to create an action or set of actions that can be used to automate a task. Primary Key - acts as a unique identifier for every row Relationship - situation that exists between two relational database tables when one table has a foreign key that references the primary key of the other table Types of Relationship: One-to-One - primary record from the primary table has only one related record in the related table One-to-Many - primary record from the primary table is related to many records in the related table ○ One customer can have many accounts ○ One customer can order many products ○ One person may have many phone numbers ○ A person may have multiple e-mail addresses ○ A music CD usually has many songs Many-to-Many - primary record from the primary table is related to many records in the related table and vice versa. ○ People can have many address; and addresses may have many people ○ A single order can include more than one product. On the other hand, a single product can appear on many orders. ○ A supplier can carry many products; and a single product may be available from many suppliers ○ A student takes many classes; and each class has many students Purpose and Importance of Database Systems In the early days, database applications were built on top of file systems Drawbacks of using File Systems to store data: Data Redundancy and Inconsistency Difficulty in accessing Data Data isolation Integrity problems ○ Integrity constraints become part of the program code ○ Hard to add new constraints or change existing ones Atomicity of updates ○ Failures may leave database in an inconsistent state with partial updates carried out Concurrent access by multiple users Security problems Database systems offer solutions to all the above problems Module 7 Computer Networks and Internet Computer Network - a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users Network - collection of computers and devices connected together via communications devices and transmission media Wireless Internet Access Point - people connect wirelessly to the internet through this Online Meeting - allows users to share documents with others in real time. Communication Channel - transmission media on which data, instructions, or information travel For best performance: bandwidth should be high and latency low Hotspot - wireless network that provides Internet connections to mobile computers and devices Cybercafe - coffeehouse, restaurant, or other location that provides computers with internet access. Global Positioning System - analyzes signals sent by satellites to determine an earth-based receiver’s geographic location Groupware - software that helps groups of people work on projects or share information over a network Component of broad concept called workgroup computing Client/Server Network - one or more computer acts a server, sometimes called a host computer, which controls access to network resources and provides a centralized storage area Peer to Peer Network - simple network that typically connects fewer than 10 computers. Also called as P2P Network Architecture - design of computers, devices, and media in network Categorized as either client/server or p2p Host Computer - controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs, data, and information Dedicated Servers - perform a specific task and can be placed with other servers to perform multiple tasks File Server - dedicated server that stores and manages files Clients - computers and mobile devices on the network that rely on the server for its resources Communications Device - any type of hardware capable of transmitting data, instructions, and information between a sending and receiving device. Router - a communications device that connects multiple computers together and transmits data to its correct destination on a network Allows multiple computers to share a single high-speed Internet connections Modem - a communications device that connects a communication channel to a sending or receiving device Network License - legal agreement that allows multiple users to access software on a server simultaneously. Dial-up Line - temporary connection that uses one or more analog telephone lines for communications Intelligent Home Network - extends the basic home network to include features such as lighting control, thermostat adjustment, and a security system E-commerce - business transaction that occurs over an electronic network such as the Internet NIC - USB network adapter that enables a computer or devices to access a network Broadband Modem - digital modem that sends and receives digital data over the cable television network Digital Modem - sends and receives data and information to and from digital line Broadcast radio - slower and more susceptible to noise Web Services - businesses are the primary users of this because it provides a means for departments to communicate with each other, suppliers, vendors, and with clients Communications Software - programs that help users establish a connection to another computer or network Satellite Modem - communicates with a satellite dish to provide high-speed Internet connections via satellite Computer Communications - describes a process in which 2 or more computers or devices transfer data, information and instructions. Fixed Wireless - microwave transmission, involves sending signals from one microwave station to another. Microwave station: earth-based reflective dish that contains the antenna, transceivers, and other equipment necessary for microwave communications Extranet - allows customers or suppliers to access part of its intranet Fiber-Optic - its core consists of dozens or hundreds of thin strands of glass or plastic that use light to transmit signals Wi-FI - network based on the 802.11 family of standards 802.11 - series of network standards that specifies how 2 wireless devices communicate over the air with each other. Twisted Pair Cable - one or more twisted-pair wires bundled together Coaxial Cable - consists of a single copper wire surrounded by at least three layers Mobile TV - service that provides television programs over the cellular network Noise - electrical disturbance that can degrade communications Transmission Media - consist of materials or substances capable of carrying one or more signals Cellular radio - used widely for mobile communications Broadcast radio - wireless transmission medium that distributes radio signals through air over long distances. Network Standard - defines guidelines that specify the ways computer access a me medium, the types of medium, the speeds on different types of networks, and the type of physical cable or wireless technology Ethernet - network standard that specifies no central network or device on the network should control when data can be transmitted. Satellite Internet Service - high-speed internet connection DSL - uses modem that sends digital data and information from a DSL line Technology that provides high-speed Internet connection using regular copper telephone lines Latency - time it takes a signal to travel from one location to another on a network. Bandwidth - amount of data, instructions, and information that can travel. Cable Modem - allows access to high-speed internet services through the cable television network Several Types of Network Local Area Network - connect groups of computers and low-voltage devices together across short distances Personal Area Networks- smallest and most basic type of network. Wireless LAN - makes use of wireless network technology Campus Area Network - larger than LANs, but smaller than MANs. Typically seen in universities, large k-12 school districts or small businesses. Metropolitan Area Network - larger than LANs but smaller than WANs. WIde Area Network - network that covers a large geographic area Storage Area Network - move storage resources away from the network and place them into their own high-performance network System Area Network - used to explain a relatively local network that is designed to provide high-speed connection in server-to-server applications (cluster environments) Passive Optical LAN - uses optical splitters to split an optical signal from one strand of single-mode optical fiber into multiple signals to serve users and devices Enterprise Private Network - built and owned by businesses that they want to securely connect its various locations to share computer resources Virtual Private Networks - lets its users send and receive data as if their devices were connected to the private network – even if they’re not. Network Topologies - arrangement of a network which comprises nodes and connecting lines via sender and receiver. Bus Topology - every computer and network device is connected to a single cable. Transmits data from one end to another in single direction Risk to Bus Network ○ Bus itself might become inoperable Ring Topology - forms a closed loop/ring connecting all devices with its exactly 2 neighboring devices. Star Topology - all computers and devices on the network connect to a central device, thus forming a Hub - central node, can be passive/not intelligent or active/intelligent. ○ Active hubs have repeaters in them Mesh Topology - every device is connected to another device via a particular channel Hybrid Topology - collection of 2 or more topologies A scalable topology which can be expanded easily A reliable one but at the same time, it is costly. Internet - worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals. Evolution of the Internet Internet originated as ARPANET(Advanced Research Project Agency Network) in September 1969 and had 2 main goals: Allows scientists at different physical locations to share information and work together Function even if part of the network were disabled or destroyed by a disaster 1969 - ARPANET becomes functional 1984 - ARPANET has more than 1,000 individual computers linked as hosts 1986 - NSF connects NSFnet to ARPANET and became known as the Internet 1995 - NSFNet terminates its network on the Internet and resumes status as a research network. 1996- Internet2 was founded Today - More than 550 million hosts connect to the Internet. Each organization is responsible only for maintaining its own network World Wide Web Consortium(W3C) - oversees research and sets guidelines and standards Internet 2 - connects more than 200 universities and 115 companies via a high-speed private network Many Home and Small Business users connect to the internet via high-speed broadband Internet service Access Provider - business that provides individuals and organizations access to the Internet for free or for a fee. Internet Service Provider Regional ISPs - provide Internet access to a specific geographical area National ISPs - provide Internet access in cities and towns nationwide Online Service Provider - has many members-only features Popular OSPs - AOL, MSN Wireless Internet Service Provider - provides wireless Internet access May require a wireless modem IP Address - number that uniquely identifies each computer or device connected to the Internet Domain Name - text version of an IP address Top-level domain (TLD) DNS server - translates the domain name into its associated IP address The World Wide Web - consists of a worldwide collection of electronic documents(webpages) Email and WWW - 2 of the more widely accessed Internet Services Website - collection of related web pages and associated items Web server - computer that delivers requested Web pages to your computer Web 1.0 - read-only Web 2.0 - refers to web sites that provide a means for users to interact Web Browser - application software that allows users to access and view webpages Internet Explorer, FIrefox, Opera, Safari, Google Chrome Microbrowser - a special type of browser designed for their small screens and limited computing power. Home Page - first page that a web site displays Web pages provide links to other related Web pages Downloading - process of receiving information Uploading - process of transferring documents, graphics, and other objects from a computer to a server on the internet URL| Web Address - unique address of a web page Tabbed Browsing - allows you to open and view multiple web pages in a single web browser window Search Engine - finds information related to a specific topic Spider - a program used to build and maintain lists of words found on web sites Subject Directory - classifies Web Pages in an organized set of categories Instant Search Box - some browsers contain this to eliminate the steps of displaying the search engine’s web page prior to entering the search text 13 Types of Websites Portal - website that offers variety of Internet services from a single, convenient location News Informational Business/Marketing Blog Wiki Online Social Network Educational Entertainment Advocacy Web Application Content Aggregator Personal Plug-in - program that extends the capability of a web browser Web publishing - development and maintenance of web pages Email - transmission of messages and files via a computer network Email program - allows you to create, send receive, forward store, print, and delete email messages Flame - unsolicited email message or newsgroup article sent to many recipients or newsgroups at once Mailing List - group of email names and addresses given a single name Subscribing - adds your email name and address Unsubscribing - removes your name Instant Messaging(IM) - real-time Internet communications service Chat - real-time typed conversation that takes place on a computer Chat room - location on an Internet server that permits users to chat with each other. Video Messaging - capability of sending video clips SMS - users type and send short text messages on a smartphone or mobile devices MMS - allows usrs to send graphics, pictures, video clips, and sound files, as well as short text messages to another smartphone or mobile device. Wireless Instant Messaging - real-time Internet communications service that allows wireless mobile devices to exchange messages with one or more mobile devices or online users VoIP- enables users to speak to other users over the internet Also called Internet Telephony Newsgroup - online area in which users have written discussions about a particular subject Requires a newsreader News server - stores and distributes newsgroup messages Message board - web-based type of discussion group Doesn’t require a newsreader FTP - Internet standard that permits file uploading and downloading with other computers on the Internet. Netiquette - code of acceptable Internet behavior Module 8 Computer Security RIsks - action that causes loss of or damage to computer system Spoofing - a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. Back Door - a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network. Digital Certificate - a notice that guarantees a user or a Web site is legitimate Biometric Device - authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic Possessed object - any item that you must carry to gain access to a computer or computer facility Username|User ID - a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user. Password - a private combination of characters associated with the username that allows access to certain computer resources. Firewall - hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet. All networked and online computer users should implement a firewall solution. Personal firewall - a utility program that detects and protects a personal computer and its data from unauthorized intrusions. Personal firewalls constantly monitor all transmissions to and from the computer and may inform a user of any attempted intrusion. System Failure - prolonged malfunction of a computer Spyware Program - secretly collects information about a user Overvoltage - incoming electrical power increases significantly above the normal 120 volts Undervoltage - electrical supply drops Noise - Unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer Intrusion detection software- analyzes all network traffic, assesses systems vulnerabilities, identifies any unauthorized access and notifies a network administrator of suspicious behavior patterns or system breaches Malware - programs that act without a user’s knowledge and deliberately alter the computer’s operations Cybercrime - refers to online or internet-based illegal acts Crimeware - software used by cybercriminals Viruses - Potentially damaging computer program Can spread and damage files Hacker - originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally Cracker - someone who accesses a computer or network illegal but has the intent of destroying data, stealing information, or other malicious action Script Kiddie - has the same intent as cracker but does not have the technical skills and knowledge Corporate Spies - have excellent computer and networking skills and are hired to break into a specific computer and steal its own proprietary data and information, or to help identify security risks in their own organizations Unethical Employees Worms - copies itself, using up resources and possibly shutting down computer or network Trojan Horse -hides within or looks like a legitimate program until triggered Does not replicate itself on other computers War Driving - they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network. Content Filtering - restricting access to certain material on the Web Web Filtering Software - program that restricts access to specified web sites CVS - users may have this if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image Computer Addiction - occurs when a computer consumes someone’s entire social life. Session Cookie - websites use this to keep track of items in a user’s shopping cart. 1986 Electronic Communications Privacy Act(ECPA) - provides the same protection that covers mail and telephone communications to electronic communications such as voice mail UPS - device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. Software Theft - unauthorized and illegal duplication of copyrighted software. Back-Up - make a copy of it RSI - injury or disorder of the muscles, nerves, tendons, ligaments, and joints TLS - provides encryption of all data that passes between a client and an Internet server, requiring only that the client has a digital certificate. Phishing - scam in which a perpetrator sends an official looking email that attempt Energy Star - personal computers, display devices, and printers should comply with the guidelines of this program. Personal Firewall - utility program that detects and protects a personal computer and its data from unauthorized access Denial of service attack, or DoS attack, is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Perpetrators carry out a DoS attack in a variety of ways Distributed DoS attack - multiple unsuspecting computers are used to attack multiple computer networks wireless access point (WAP) should be configured so that it does not broadcast a network name, known as an SSID (service set identifier)