Comprehensive IT Review PDF

Summary

This document provides a comprehensive review of Information Technology (IT) concepts. It covers topics such as computer basics, hardware, software, networks, and security. The document also includes information about copyright, shareware, freeware, and ergonomics, and is presented as a review for an exam.

Full Transcript

‫مراجعة لالختبار‬ ‫النهائي لمادة‬ ‫‪IT‬‬ ‫منصة اثراء التعليمية‬ ‫نثري المعرفة‬ ‫تقديم‪ :‬أ‪.‬شيخة الزعابية‬ Basics Of Computer What is a computer? A computer is an electronic machine that accepts...

‫مراجعة لالختبار‬ ‫النهائي لمادة‬ ‫‪IT‬‬ ‫منصة اثراء التعليمية‬ ‫نثري المعرفة‬ ‫تقديم‪ :‬أ‪.‬شيخة الزعابية‬ Basics Of Computer What is a computer? A computer is an electronic machine that accepts (data), stores and processes it according to instructions (programs) to produce the results (information). The word “computer” comes from the word ‘compute’, which means to calculate. Basic parts of a computer: 1. System unit 2. Monitor 3. keyboard 4. Mouse Classifications of computers: 1. Personal computer (microcomputer) 2. Server 3. Mainframe computer 4. Supercomputer 1. Microcomputers/Personal Computer It’s for personal use, it’s for one person at a time. ❖ Laptop ❖ Desktop ❖ Tablet ❖ Smartphone.. 2. Server Computer: ▪ A computer [SERVER] in a far place that people use to connect to get information using their personal computers such as laptop or smart phone [client]. 3. Mainframe Computer More powerful servers (ROP, Oman Air, Bank Muscat) where more people (2 to 3 million or more) access the server. 4. Supercomputer It’s the fastest computer in the world, and it’s the most expensive computer in the world. We use supercomputers for ✓ Weather forecasting prediction ✓ research ✓ space projects ✓ petroleum exploration Hardware: Part of a computer that we can touch (Physical components) Example : Motherboard CPU RAM ❑Motherboard: it’s the main circuit board of your computer. ❑CPU [Central Processing Unit] : Brain of your computer. 1. ALU [Arithmetic & Logic unit] – Calculations & Comparison 2. CU [Control Unit] – It controls (directs) the operations in a computer. 3. Register – Small Memory inside CPU, Temporary storage (memory) How Processor Works – 1. Fetching (take) – from RAM to CU 2. Decoding - CU 3. Execution - ALU 4. Storing - RAM Computer Memory [It helps us to keep/store data in a computer] 1. Primary Memory RAM – Random Access Memory [volatile [short term or temporary] memory] ROM – Read Only Memory [non-volatile [permanent] 2. Secondary Memory [Secondary storage devices] Storage devices: Hard disk HDD [Hard disk drive] SSD [Solid state drive] Tap drive CD [Compact Disk] DVD [Digital Versatile Disk] USB External hard disk Blue-ray Disk Memory units: ▪ Machine Language [0 & 1] ▪ Smallest memory unit – Bits ▪ 8 Bits – 1 byte ▪ 1024 Bytes – 1 KB [Kilo Byte] Input devices A device that help us to give DATA into computer 1.keyboard 2.pointinf devices 3.gaming controller 4. Image scanner 5. Webcam 6. Digital camera 7. Finger print 7.microphone 8. Bar code reader 9. MICR 10. OCR 11. QR Output Devices A device that helps us to receive the result[information] from the computer. 1. Monitor 2.printers 3. Plotters 4 3D printer 4. Speakers 5. Projectors Software: Software’s are programs that tells hardware what to do. ▪ WhatsApp ▪ Microsoft Word ▪ Android System Software ✓ Windows 10 [system software – Operating system] ✓ Android [It’s for the system – system software – Operating system] ✓ IOS – ✓ LINUX Application Software [for special Job/specific task] ✓ PowerPoint [make presentation] ✓ WhatsApp [to send message/chat] ✓ MS Teams [online meetings] ✓ Photoshop [edit/design photos] Software Copyright Software copyright protects the right of the company who developed the software from unauthorized copying of their software. EULA [End user license agreement] this is the contract between the company who build the software and the user. Shareware A software that you can use for FREE for a limited period Example: maybe 60 days, or 1 month, etc., after this period, if you want to continue using the software, you need to PAY money for the software. ✓ MS office ✓ Photoshop ✓ MS Teams Freeware A software that is FREE to install and use with NO time limit. ✓ WhatsApp ✓ Facebook App Proprietary Software Open source software [The code is open to the public] You are NOT allowed to modify the source code. Examples: MS Office MS Teams Open source software [The code is open to the public] As a user, you are allowed to modify [You can change code] the software. Ergonomics: It’s the science of designing safe workplace and work equipment. o Enough lightening and ventilation. o A comfortable and adjustable chair. o A suitable size monitor with a good level of brightness and contrast. o Take a regular short interval breaks. ❖ Why do we have to follow Ergonomics measures? To avoid health problems which may lead to long term-disability ▪ Repetitive strain injury. ▪ Back and neck pain ▪ Joint pain and muscle stiffness. ▪ Computer vision syndrome. ▪ Headaches. Desktop and Icons ❑Files & Folders Files : Word files, Excel Files etc. Folders :Yellow colour container and we can keep files, shortcuts, another folder etc. Subfolder :A folder inside another folder is called a subfolder. Compressed A technique which is used to save the data in a format which takes less space in the memory is called Data Compression Extract the file: And re-opening the compressed data in original size is called Data Extraction What is a computer network? A computer network is a collection of computers that are linked together so that one computer can connect with another ▪ Share resources ▪ Share information/data ▪ Share applications[software]. PAN [Personal Area Network] connected your laptop with your mobile phone using cable/Bluetooth LAN [Local Area Network] A Network in a small area such as a building for example: School, Company, Shopping Mall MAN [Metropolitan Area Network] Different LANs connected each other in a City/Town. WAN [Wide area network] Group of LANs or MANs Connected over a large area. Internet Is the global wide area network that connects computer systems across the world. What we can do with internet ? Online Shopping/Pay online Social Media Online meeting, work from Home To search information Email/Communication YouTube, Watch Online Movies/Videos WWW [WORLD WIDE WEB] Collection of websites you can access through internet. Web browser: A software that help us to open and view websites on internet. ❑ Google Chrome ❑ Firefox ❑ internet explorer ❑ Microsoft Edge ❑ Apple SAFARI ❑ Opera What is Cloud Storage? Cloud storage is a cloud computing model that stores data on the Internet through a cloud computing provider that manages and operates data storage as a service. Examples: Google Drive, Dropbox, One Drive Information security: Protection of information in the system/network from unauthorized access [access without permission], use, modification, disruption, and disclosure. Computer Malware [Malware Programs] Malware which is malicious software designed specifically to damage computers without the user’s consent. Program or software designed to damage the computer/network. Example: Virus Worms Trojan horse Spyware VIRUS : A virus is malicious software that is designed to take control of system operations and destroy some or all files stored on the computer or even the computer itself. WORM : The worm is a self-replicating program that usually consumes system and network resources TROJAN HORSE : It’s a malware which looks like a legitimate [true/real] program. Trojan neither replicate[copy] itself to the other computer. SPYWARE : It’s a malware program that watches your activities on your computer without your consent or knowledge. like Web browsing habits, e-mail messages, usernames and passwords, and credit card Safeguards against Computer Malware Methods that guarantee a computer or network is safe from the different malicious software are simply do not exist. SAFEGUARDS AGAINST COMPUTER MALWARE PASSWORD Password length: Minimum 8 characters. Character Mix: ▪ mix of numbers ▪ capital letters ▪ small letters ▪ special characters [@, #,?, $, &] BACK-UP It means copying of information or files from one source to another [such as hard disk, USB etc...] This method allows users to prevent data loss caused by system failure or hardware/software/information theft. Recovery It’s a tool that help you to restart your computer in case of a system failure. ENCRYPTION & DECRYPTION ❖ Encryption – A security technique that converts plaint-text to cipher-text ❖ Decryption – it’s the opposite of Encryption. the encrypted message to plain text so that an authorized person can read the message. Encryption – Plain-text to Cypher-text Decryption – Cypher-text to plain-text Digital certificates A digital certificate is a notice that guarantees a user or a Web site is legitimate. FIREWALL A hardware/software that controls the traffic into/from a NETWORK. Sometimes firewall in the college network will not allow you to open a particular website. Anti-virus: A program that help us to remove[delete] virus from our computer. Security Features in Windows 10 The three main security tools in Windows 10 are: 1. User Account Control 2. Windows Defender 3. Windows Firewall OMAN DATA PROTECTION LEGISLATION The electronic transactions law and The Cyber Crimes Law are the two main pieces of legislation in this area LAW to prevent internet cheating, and punish those who commit crimes. The Cyber Crimes Law confidentiality of data and systems and some of the penalties for hacking crimes are increased if they involve the misuse of personal data. The Electronic Transactions Law This legislation is aimed specifically at e-commerce, it does provide certain safeguards and criminal sanctions against the illegal use of such data. Questions ? Practical Part

Use Quizgecko on...
Browser
Browser