Introduction to IT PDF
Document Details
Uploaded by Deleted User
Uniwersytet Ekonomiczny w Krakowie
dr Anna Karcz
Tags
Summary
These are lecture notes for an Introduction to IT course. The course covers computer history, how computers work, networks, safety, MS Office, IT in business, and digital worlds. The lectures also include rules for class participation.
Full Transcript
Introduction to IT 1 ▪ Lecturer: dr Anna Karcz ▪ Timeframe: 15h ▪ Email: [email protected] ▪ Additional contact by Microsoft Teams ▪ Final exam: at the end of this semester ▪ Attendance: optional ▪ Consultations:? 2 Agenda ▪ 1....
Introduction to IT 1 ▪ Lecturer: dr Anna Karcz ▪ Timeframe: 15h ▪ Email: [email protected] ▪ Additional contact by Microsoft Teams ▪ Final exam: at the end of this semester ▪ Attendance: optional ▪ Consultations:? 2 Agenda ▪ 1. Organization + history of the computers ▪ 2. How computers work? ▪ 3. Networks ▪ 4. Safety ▪ 5. MS Office ▪ 6. IT in business ▪ 7. 0 term exam ▪ 8. Digital world – discussion 3 Exam ▪ 0 term – single choice exam (it will take place on the lecture) ▪ Next two terms – multiple choice exam ▪ Final score: average score of practical lecture + score of the final exam 4 Goals ▪ Rules of computer and network working ▪ MS Office package ▪ IT in business – main points and directions ▪ Safety in digital world - opportunities and threats connected with it 5 Rules ▪ Please remember that others’ people opinion is based on our behaviour. Our behaviour creates our image ▪ Some advices: Be punctual Remember to say hello to each other Listen actively (not only lecturer!) Use proper language Be open and tolerant Do not use mobile phones/ laptops during lecture (or confirm when it is needed with lecturer) Do not eat (or confirm when it is needed with lecturer) 6 ▪ Do not take a picture of my presentation – it is intellectual value which I do not want to share ▪ Instead of this, please take a notes – I believe listening, reading and writing can provide the best results regarding what you will remember after our lecture ▪ Questions should be raised at the end of the meeting and the respond will start the next meeting 7 Code for MS Teams 8 1 HISTORY 9 Historical view ▪ History of calculating machines started 2600 BC, ABACUS – historical counting tool used for arithmetical operations: ▪ Calculations were made by moving beads in proper way – algorithm was done fully by humans (it was based on specific rules which allowed addition, subtraction, multiplication and division) ▪ One of the earliest devices used for mathematical calculations used by ancient Greeks and Romans ▪ ABACUS basis are also used these days – it was precursor for calculators and also had huge influence on computing techniques development and mathematical skills improvement ▪ Important change was discovery of algorithms and calculating machines (XVII century) - they made simple operations like addition, subtraction and sometimes multiplication and division: ▪ Schickard – Calculation Clock ▪ Pascal - Pascaline – the first mechanical calculator ▪ Leibniz - Stepped Reckoner ▪ Babbage and Turing: Two Paths to Inventing the Computer 10 Algorithm “An algorithm is a set of instructions designed to perform a specific task.” "An algorithm is a sequence of computational steps that transform the input into the output." Sources: "Introduction to Algorithms" by Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein https://techterms.com/definition/algorithm 11 Historical view ▪ Real start for IT was in XIX century, when Charles Babbage created conception of analytical engine (1834), it was not implemented during his lifetime ▪ Analytical engine offers a lot of basic funcionalities which we can meet in today’s computers – the difference appears in construction and idea for smooth operations ▪ Universal Turing Machine (UTM, 1936) – logic of its working is the baseline for all today’s computers ▪ UTM has three main parts: ▪ One tape represents the memory that has a left margin and it is devided into an infinite number of cells (it is like computer memory) ▪ Moving read/write head (it is like input/ output devices) ▪ Finite control (it is like processor) 12 Historical view ▪ ENIAC ▪ UNIVAC-1 ▪ IBM RAMAC 350 ▪ In Poland first computer was XYZ which was created by Leszek Łukaszewicz (1958) ▪ Kenback-1 ▪ Osborne 1 ENIAC, Source: https://www.national-geographic.pl/artykul/77-lat-temu- zademonstrowano-pierwszy-komputer-maszyna-wazyla-30-ton 13 END 14 2 HARDWARE & SOFTWARE 15 Computer definition "A computer is an electronic device that accepts data (input), processes it according to specified instructions (program), outputs the results (output), and stores the results (storage)." Source: TechTerms - The Computer Dictionary https://techterms.com 16 How computer work – short overview Processing: fetch Input Storage Output Control decode execute 17 Hardware 18 Main parts - hardware As a central unit CPU executes commands and control other parts working. Commands and data are taken from main Processor memory It consists of cells (which store bit words). Each cel has got Main own address memory They are connected with computer usually by input and External output systems, they allow to connect with users. Examples are keyboard, mouse, monitor, printer, scanner or external devices memory. External devices are usually autonomous units synchronized with processor 19 Processor, Central Processing Unit - CPU ▪ Makes instructions which are in random-access memory ▪ It is based on binary system ▪ It is like a brain for the computer ▪ Multitasking – today’s processors have 2 GHz - 3,5 GHz ▪ Cooling is needed (fans) Source: https://www.currys.co.uk/techtalk/computing/what-is-a-processor.html 20 Motherboard ▪ Element of the computer which allow connection and communication between all other computer parts ▪ Implemented on it are for example: CPU, RAM, hard disk, floppy drive, extensions like graphics card, sound card, etc. ▪ Power supply is also connected to motherboard, it receives it from PCU (Power Supply Unit). It provide power for several components like CPU, RAM, chipsets ▪ It has different slots, example PS/2, USB Source: https://www.britannica.com/technology/motherboard 21 Computer bus and chipset ▪ They allow the data transfer between computer components like procesor, hard disk, peripheral devices, expansion cards, etc. ▪ Bus is physical and Chipset is more process- oriented Source: https://smallbusiness.chron.com/effect-motherboards-bus-speed-cpu-speed-70907.html 22 RAM ▪ Avaliable directly for CPU (RAM, Random Access Memory) ▪ Contains code for executing programs ▪ Contents are lost after power outage - RAM is a type of volatile memory, which means it only retains data while the computer is powered on Source: https://www.easytechjunkie.com/what-is-random-access-memory.htm?utm_content=cmp-true 23 ROM ▪ Pemanently stores critical system instructions and firmware, ▪ Keeps the information regarding model of the computer and its funcionality ▪ Stores BIOS (Basis Input/Output system) – they are main procedures which allow to connection between software and hardware. ▪ The data are saved on production level and editing is possible only by using special equipment Source: https://www.tutorialspoint.com/computer_fundamentals/computer_rom.htm 24 RAM ROM Random Access Read Only Memory Memory Volatile: needs power to prevent data from being erased Non-volatile: data is retained Purpose: used for running applications, Purpose: it permanently storages critical operating systems and active processes, system instructions and firmware mainly for smoothly processing by CPU (includes BIOS) Speed: slower than RAM, but more fast Speed: high-speed memory than HDDs or SSDs Data modification: allows data to be read Data modification: data can be read, and written writing is possible only during production 25 Others non-volatile memories examples ▪ Hard Disk Drives (HDDs) ▪ Solid-State Drives (SSDs) ▪ Optical Drives (CDs, DVDs, Blue-Ray discs) ▪ USB Flash Drives (example pendrive, memory card) ▪ External Hard Drives ▪ Cloud Storage Sources: https://www.britannica.com/technology/compact-disc https://en.fripers.pl/p/memory-card-microsdhc-sandisk-ultra-32-gb-120-mbs/ https://thwartsystemsgh.com/index.php/tech-tips/92-what-is-a-usb-pendrive 26 Hard disk ▪ Saves, keeps and processes the data, it is non-volatile ▪ Two main types are HDD (Hard Disk Drive) and SSD (Solid State Drive) ▪ Software is installed on it (including Data are saved on They use flash memory operation system) magnetic medium They have lower capacity ▪ It is internal computer component, but They have large capacity – – most common is 500GB, most common are 1TB, 1TB or 2TB it can be also external element 2TB or 4TB High shock resistant Low shock resistant Low energy consumption High energy consumption Source: https://www.crucial.com/articles/pc-builders/what-is-a-hard-drive Source: https://www.crucial.com/articles/pc-builders/what-is-a-hard-drive 27 Data storage ▪ Aparat from addiotional HDD or SSD disk data can be stored also by NAS and DAS ▪ DAS – Directly Attached Storage – external drive which is connected with cable to the computer, access is possible only from location of data carrier, advantage is fast working and that we can work directly with the data – connection is made by different standards, example is USB ▪ NAS – Network Attached Storage – drive is connected to the network, advantages are the same as storaging the data in (public) cloud and at the same time it doesn’t have cloud’s biggest disadvantage– the data is not in foreign hands. It is very popular in Corporations where internal sharepoints are created for employees – it is like private cloud 28 Cloud storage ▪ Cloud storage refers to a service where digital data is stored and managed remotely on servers accessed via the internet ▪ Users typically upload files to the cloud, where they are stored securely and can be accessed from any device with an internet connection ▪ It offers scalability, convenience, and often includes features like data backup, synchronization across devices, and collaboration tools 29 Cloud computing ▪ 3 types of clouds: ▪ Public cloud (whole infrastructure is in Supplier location, service is delivered by Internet, client does not need own IT system) ▪ Private cloud (the bigest level of safety and control, it is used only by one enterprise, host is located in enterprise location or dataceter) ▪ Hybrid cloud (it is merge between public and private cloud, the most important applications are located on own servers and the rest on Supplier’s cloud) 30 Public clouds ▪ IBARD (Comarch) ▪ Google Drive (Google) ▪ Google Cloud Storage ▪ iCloud ▪ Dropbox ▪ One Drive ▪ BOX ▪ SYNC 31 Peripheral devices ▪ Main input devices: ▪ Keyboards ▪ Mouses ▪ Microphones ▪ Main output devices: ▪ Monitors ▪ Printers ▪ Loudspeakers ▪ Examples of input/ output devices: ▪ Graphics card ▪ Network card ▪ Sound card 32 Graphics card ▪ Generates signal for monitor ▪ It has own memory ▪ Cooling needed ▪ Graphic processing units (GPU) – chip which itself is a small, integrated circuit (IC) usually located on the graphics card's Source: https://www.eurogamer.net/digitalfoundry-best-graphics-card-every-amd-nvidia-tested-7001 33 Core element 34 Binary system ▪ Memory stores binary digits ▪ Bit – binary digit – it is 0 (no voltage) or 1 (presence of voltage) ▪ Binary values can be interpreted as data (example numbers, text, pictures, etc) or instructions ▪ Binary system is the base for computer working because of low complexity: 0 – OFF; 1 – ON 35 Data organization ▪ Main memory is set of systems which is capable of storing 1 bit ▪ Systems are organized in units which are called cells or words ▪ Usually in one cell there are 8 bits, 8 bits are 1 byte ▪ Each cell has unique address ▪ Access to each cel is independent of accesses to other cells 36 Memory size units ▪ 1 bit 1b ▪ 1 byte 1B 1B=8b ▪ 1 kilobyte 1KB 1KB=2^10B (1024B) ~10^3 ▪ 1 megabyte 1MB 1MB=2^20B (1048576B) ~10^6 ▪ 1 gigabyte 1GB 1GB=2^30B (1073741824B) ~10^9 ▪ 1 terabyte 1TB 1TB=2^40B (11099511627776B) ~10^12 ▪ 1 petabyte 1PB 1PB=2^50B ▪ 1 exabyte 1EB 1EB=2^60B ▪ One byte can represent 256 different values, which can show different pieces of information, they are different thanks to information coding 37 Logical operations ▪ 1 – TRUE; 0 – FALSE ▪ Logical operations in the binary system are fundamental to the functioning of digital electronics and computer systems, they are essential for processing, controlling, and manipulating binary data in virtually all aspects of computer systems and digital electronics ▪ Logic gates – devices based on input data create output value which is complient with logical operation – it is basic element for computer construction. Usually they are electronic systems in which 0 and 1 are represent by different level of voltage ▪ Logical operations in the binary system include AND, OR, NOT, NAND, NOR, XOR (exclusive OR), and XNOR (exclusive NOR) 38 Logical Operations in binary system 39 Hexadecimal notation Computers keep the data in bit string. Hexadecimal notation is used to make simpler representation of bit strings 40 Hexadecimal notation - excercise ▪ 8-bite string 10100100 ▪ 16-bite string 1110011010110110 41 Software 42 Text coding ▪ Text coding plays a crucial role in computer work by enabling the creation, manipulation, and display of digital information ▪ Text in computers is stored as a sequence of bits, where each character has its corresponding binary value (bits). Character encoding standards examples are ASCII (American Standard Code for Information Interchange) or UNICODE (UTF-8, UTF-16, etc.) ▪ Text coding invloves also for example programming languages, markup languages or database query languages 43 Sounds and images coding ▪ Sounds – numbers which shows voltage which represents sound pressure at a given frequency ▪ Image (raster): rectangular array of points (pixels) – pixel has one color – color has 3 primary components – brightness of the basic color of light (red, green, blue) – value of brighteness is saved with numbers ▪ Image (vector): shapes are saved with mathematical equations and co-ordinates 44 How does the computer work? ▪ Computer processes the data in binary system. It makes a lot of calculations in the shortest possible time. Words, pictures, sounds, everything is represented by digits ▪ Each computer makes 4 basics actions: download, storage, process and take out the data ▪ Data are downloaded from input devices, storage in computer memory, proces by processor and taken out by output devices Processing: fetch Input decode Storage Output Control execute 45 How does the computer work? ▪ Software contains instructions which are understandable for computer machine ▪ Instructions for the computer are based on algorithms and programs ▪ Main goal of a computer is program execution ▪ During program execution instructions and data are stored in computer system memory 46 Commands ▪ The entire operation of the computer is based on list of commands. ▪ Command realization is made by different components of the computer. Command cycle allows to make sequence of commands, first command determine next one and next one… ▪ Program in internal computer language is collection of words which initiates realization of sequence of commands. This rules comes from John von Neumann (1950) 47 Algorithms and programms ▪ Algorithm „A finite sequence of well-defined instructions or rules that leads to the solution of a problem or task”(1) In other word we can say that it is set of steps to accomplish a task or method which solves the problem in a finite number of steps ▪ Computer program „A collection of instructions that enable a computer to perform a specific task or set of tasks”(2) In other words it is description of an algorithm which is understable for a computer or sequence of instructions which processes data Sources: 1. Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2009). Introduction to algorithms (3rd ed.). MIT Press. 2. Brookshear, J. G., & Brylow, D. (2014). Computer science: An overview (12th ed.). Pearson Education. 48 Algorithms and programms ▪ Programming language „A vocabulary and set of grammatical rules for instructing a computer or computing device to perform specific tasks”(1) In other words formal language that can be used for algorithm description ▪ Transaltion „The process of converting a program written in one programming language into an equivalent program in another programming language or into machine code”(1) In other words transformation of computer program wrtitten in a given programming language into binary form. Computer program which performs translations is called Translator Source: 1. Brookshear, J. G., & Brylow, D. (2014). Computer science: An overview (12th ed.). Pearson Education. 49 Software ▪ Software „Programs that provide the instructions that a computer needs to work”(1) In other words is a collection of instructions and programs thanks to which computer know what to do next. Together with hardware it is computer system Source: Brookshear, J. G., & Brylow, D. (2014). Computer science: An overview (12th ed.). Pearson Education. 50 Computer programs ▪ Two main elements: ▪ Description of operations (a sequence of operations which should be performed to solve given problem) ▪ Description of data (definition of pieces of information which should be processed by instructions) 51 Operating system ▪ It is the essential software part ▪ It manages computer system resources (memory, CPU, storage systems, input and output devices) ▪ It acts as an interface between computer and user ▪ It allows to execute the programs. Programs executed under individual operating system are called aplications. Examples for programs are: ▪ Compilers ▪ Utility programs ▪ Graphical programs ▪ Engineering and design programs 52 Tasks for operating systems ▪ Managing of computer resources ▪ Assigning for programs memory and its control ▪ Assigning for processes (which are inside the programs) processor time ▪ Data collecting and managing ▪ Interface sharing ▪ Communicating and operating other devices ▪ Showing errors 53 User interface The way of comunication between computer and user is called user interface. There is two main types of it: ▪ GUI (Graphical User Interface) ▪ Pieces of information are presented by graphical elements, example windows and icons ▪ TUI (Text User Interface) ▪ Pieces of information are presented by text and signs in text mode 54 Different kinds of data ▪ Logical values (TRUE/ FALSE) ▪ Signs (a-z, A-Z, 0-9,:,;@,#,$,%,...) ▪ Numbers (integers and non-integers) ▪ Images ▪ Sound signals 55 File systems ▪ Each operating system has system files. They are rules for entering data on data carrier (especially hard drive) ▪ File system determines methods and ways of the storaging files and also determine access to individual files and folders ▪ Windows usually use NTFS (New Technology File System) ▪ ACL (Access Control List) is the primary method for defining and enforcing access controls in NTFS 56 File ▪ File – data set of finite lenght and specific attributes ▪ Directory – it is a file which contains references to other files and directories which are its contents ▪ Folder – usually used alternately to directory, in real folder does not have to have physical location and can be only logical thing in operational system, directory needs to have own location and it is physically on hard disk ▪ Lenght for names: ▪ MS-DOS - 8 signs + 3 extension ▪ Windows 95 and new, UNIX and derivatives - 256 signs, extension is a part of name, after dot 57 File types and examples ▪ Text files: ▪ TXT, RTF ▪ HTML, XML, KML ▪ CSS ▪ CSV ▪ SVG ▪ Binary files: ▪ DOC, DOCX, ODT, PDF ▪ XLS, XLSX, ODS ▪ BMP, JPG, GIF, PNG ▪ MP3 ▪ AVI, MPG 58 Operating systems examples Microsoft Windows: Developed by Microsoft (1985, the initial version was known as Windows 1.0) It is the main operating system for PCs (current examples are Windows 10 or Windows 11) MacOS: Developed by Apple Inc. (1984, the initial version was known as System Software or Macintosh System Software) It is the operating system for Apple's computers (MacBooks, iMacs, Mac Pros) Linux: It is open-source operating system developed by Linus Torvalds in 1991 Examples of popular Linux distributions for desktop computers include Ubuntu, Fedora, Debian, and Linux Mint 59 END 60 3 NETWORK 61 Network ▪ Network „A computer network is a collection of autonomous computers interconnected by a single technology”(1) In other words these are multiple computers and other devices which are connected together in the way that allows to exchange the data ▪ Network allows to: ▪ Common using of the files and programms ▪ Common using of devices (for example printers), mass memory, etc. ▪ Common using of data bases ▪ Common data sharing that allows to work many people on the same file ▪ Using mailbox Source: Tanenbaum, A. S., & Wetherall, D. J. (2011). Computer networks (5th ed.). Pearson. 62 Network split (scope) ▪ Global network: example Internet ▪ Local network: example school network 63 Netwrok split (architecture) ▪ peer to peer (P2P) ▪ Each computer can be a client, or server, or be both ▪ Usually for small networks (up to 10 computers) ▪ Each user decide about his own computer ▪ client – server ▪ Devices devided into those offering resources/ services (server) and those using resources/ services (client) ▪ Used in larger networks ▪ Network managed by administrator 64 Network split (size) ▪ LAN – Local Area Network ▪ Consists of small area, example room or building ▪ High data delivery capabilities ▪ Maximum range with amplifiers is 1 kilometer ▪ MAN – Metropolitan Area Network ▪ Range is the city size ▪ Usually high data delivery capabilities ▪ Allows to connect local networks, example academic or administration networks ▪ WAN – Wide Area Network ▪ Range is wide and often more than continental ranges ▪ Based on public communication networks, example telephone, radio, satellite ▪ Best example – Internet 65 LAN types ▪ Wired network – cables and fiber optics are used to connect elements ▪ Wireless network (WLAN) – all elements or their part are connected wirelessly (using radio waves), example WIFI ▪ Virtual network (VLAN) – network elements are connected by programm protocols which manage network movement (it is based on the technology of logically segmenting local area networks (LANs) into smaller) 66 Network topologies Physical topologies Bus ▪ They define the physical or logical Ring arrangement of how devices (nodes) are interconnected and how data flows between Star them Extended star Mesh ▪ Physical topologies are concerned on configurations formed by the connections Hybrid technology between workstations (they are connected with LAN, MAN and WAN physical Logical topologies infrastructure) Virtual Local Area Network (VLAN) ▪ Logical topologies are defined based on how Virtual Private Network (VPN) data is handled, routed, and managed at a Overlay Networks higher level, typically using software-defined Software-Defined Networks (SDN) configurations rather than physical infrastructure Peer-to-Peer (P2P) Networks Overlay Multicast Networks 67 Bus topology ▪ Connection based on one coaxial cable (bus) ▪ Used in small networks ▪ Easy to connect with new workstation ▪ It is hard to find where the damage is on a cable - if there is an issue, a whole network has an outage Source:https://cedtinet.blogspot.com/2013/06/bus-topology.html ▪ One transmission in one moment 68 Ring topology ▪ Each workstation has two connections with neighbours – together they create a loop (ring) ▪ Data is sent in one direction ▪ An issue in one place causes a whole network outage ▪ It is difficult to connect new devices Source: https://www.computerhope.com/jargon/r/ringtopo.htm 69 Star topology ▪ Connections comes from central point – hub ▪ High bandwidth, easy to allocate issues, possible only local issues ▪ High demand for cables, hub is the central point so its issues caused global issues for network Source: https://www.computerhope.com/jargon/s/startopo.htm ▪ It dominates in LAN networks 70 Extended star ▪ Based on star topology ▪ Used in big networks Source: http://units.folder101.com/cisco/sem1/Notes/ch2-topologies/toplogies.htm 71 Mesh topology ▪ Workstations are connected each others ▪ High costs and complicated architecture ▪ Reliability ▪ In the Internet there is partial mesh topology – not all workstations are connected to each others, but there are a lot of connections – nodes are routers which allow to connect to the Source: https://www.computerhope.com/jargon/m/mesh.htm local networks. Internet is based on hybrid technology 72 Internet „A worldwide computer network that provides information on very many subjects and enables users to exchange messages” Source: Internet in Polish - Cambridge Dictionary ▪ It has been started in XX century ▪ Global computer worldwide network, a set of interconnected networks ▪ It is connection between many small local networks (private, public, academic, business, government) which are connected by special stnadards and protocols ▪ Connection is based on IP – Internet Protocol 73 Internet – historical part ▪ Internet has been started in military industry ▪ DARPA agency received order to create such network – damage in one its part should not cause any disruption to other parts ▪ DARPA agency built network between 4 universities – first use was based on simple text messages (APARNET) ▪ Because of security reasons MILNET network was created ▪ APARNET evolved and expanded and became to be fundament for commercial network which was later the base for Internet creation (one of the important expansion for APARNET was in 1981 and it was connected with adoption of TCP/IP protocols) 74 Network elements – hardware 1. Network Interface Cards (NICs) 2. Routers 3. Switches 4. Cables (e.g., Ethernet cables, fiber optic cables) 75 Network elements – software 1. Network Operating System (NOS) 2. Network Protocols (e.g., TCP/IP, DHCP, DNS) 3. Firewall Software 4. Network Management Software 76 Network Interface Cards (NICs) ▪ Connects computer with local network – they change data packages into the signals sending by network ▪ The most common is Ethernet (it has unique MAC address which is assigned in ROM to individual computer) ▪ MAC has 48 bits – shown in hexadecimal notation, example: 00:0A:E6:3E:FD:E1 ▪ Example of the speed is 100Mb/s or 1GB/s 77 Routers ▪ Used for network connections to determine the best path for data packets to travel ▪ It is customizable ▪ Example is connection between LAN and Internet ▪ Provide safety and efficiency through firewalss and VPN support ▪ Provide additional funcitions like DHPC (Dynamic Host Configuration Protocol) or NAT (Network Address Transaltion) ▪ DHCP is protocol which determines IP for other devices ▪ NAT is a technique which allows for multiple devices within a local network to share a single public IP address 78 Switch ▪ Switch has a lot of connection ports, it connects multiple devices with LAN. It uses MAC addresses to forward data to the correct destination ▪ It has similar role as hub and bridge (only the role can be compared, those components are different from functional and operational part) ▪ Hub is device which basic fuction is to make transmission of received by one port signal to other ports – allows to create star topology. Hubs operate at a simpler level, broadcasting data to all connected devices within a LAN without any intelligence to selectively forward packets based on destination addresses ▪ Bridge has two ports which allow to connect network segments. It remembers MAC addresses for individual ports. It makes analysis on signal and MAC addresses and based on this block or send further the data to goal location ▪ Both hubs and bridges can be replaced by switches 79 Cables ▪ Provide physical connection between devices ▪ Types: ▪ Coaxial Cable ▪ Fiber Optic Cable ▪ Ethernet Cable 80 Other components ▪ Modem – changes digital computer data into analog signal and analog signal into digital computer data during data transfer. It can be internal (inside the computer) or external (separate device) ▪ Repeater – usually dependent on other devices. It amplifies or regenerates the signal to strengthen network coverage, usually with own electricity power ▪ Access point – provides for wireless stations access to network resources. It is bridge between wireless network and wired network and together with router can be merged into one device 81 Network Operating System (NOS) ▪ NOS is a software designed to manage and operate computer networks ▪ It runs on dedicated servers or network devices like routers and switches to enable efficient and effective network operation 82 Firewall Software ▪ Firewall software is a security program designed to monitor and control incoming and outgoing network traffic based on predetermined security rules ▪ It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet, to protect against unauthorized access, cyber attacks, and malware 83 Network Management Software ▪ Network management software is a tool designed to monitor, maintain, and optimize computer networks reliability and performance ▪ It helps administrators manage network resources, troubleshoot issues, and ensure network performance and reliability 84 Network Protocols ▪ Network protocols are sets of rules and standards that govern how data is transmitted and received across networks ▪ Examples include TCP/IP, UDP, HTTP, FTP, and SMTP, each serving different purposes, such as data transfer, web browsing, file exchange, and email communication 85 Sending data over the networks (TCP/IP) RECIPIENT Data are sent in small packages from one location to another They include data and the information how to merge them on the receipient side SENDER 86 IP addressing ▪ IP addressing – address on which we send the request to show the Internet site, it is numerical value assigned to each device connected to the computer network that uses IP for communication ▪ IP address is a 32 bit number (4 bytes), we write it usually in decimal notation Example:10101100 00010000 11111110 00000001 -> 172.16.254.1 ▪ DNS server (Domain Name Server) can be local or public – it is addressing book which mapp IP adress, name and inform which domain name was assign to individual IP adress and also which IP adress was assign to individual name Example: IP address for facebook.com is 33.13.81.36 87 IP addressing excercise ▪ Please provide below IP addresses from binary notation into decimal notation and vive-versa: ▪ 192.168.1.1 ▪ 11000000.10101000.00000001.00000001 ▪ 172.16.254.1 88 TCP/IP and OSI model ▪ Conceptual frameworks used to understand and design network protocols and communication TCP/IP OSI 1. Application 1. Application 2. Transport 2. Presentation 3. Internet 3. Session 4. Link 4. Transport 5. Network 6. Data Link 7. Physical 89 Internet links ▪ Internet is based not only on land links, but also on underwater ▪ Connection is not based on one cable, but milion cables and connections between them ▪ On the picture there are underwater links Source:https://www.reddit.com/r/MapPorn/comments/73ekox/map_of_underwater_cables_that_supply_the_worlds/?rdt=45786 90 Types of internet connections ▪ Wired telephone connection DSL and ADSL (Internet is provided by telephone cable, modem is connected by telecommunications cable with copper telephone line ▪ Cable landline Internet (computer is connected to local wired network, there is need to install cable installation, fast and stable connection) ▪ Fiber optic connection (best parameters, connection is based on thin glass fiber wires, it used light waves) ▪ Radio and satellite network (especially useful in places where cable cannot be fed in, poor stability depends on atmospheric conditions, high costs of installation) 91 END 92 4 SAFETY 93 Safety in network ▪ Despite of adventages of the Internet, we need to remember also about the danger it brings. A lot of cybercriminals use the opportunity which are created by the Internet ▪ Internet became important part of our life, we even cannot imagine life without it this days. On daily routine we check mailboxes, speak with others, pay the bills, do the shopping, learn, work or relax – everything is made based on network. Each of above can lead to cyber attack risk, that is why we should try to do everything what can prevent this 94 Types of threats on the Internet Privacy Security Cyberbullying Threats for children Misinformation Economic 95 Privacy threats examples 96 Identity theft ▪ Cybercriminals can use data like PESEL number (in USA SSN – Social Security Number), identity scan, address or date of birth to steal identity. Such acions can have a lot of negative consequences, example: loans ▪ Secure of identity in network should be priority, do not share your identity on website which you do not know, also be careful with emails – each email which require to insert private data should be treated as threat 97 Data theft– valuable loot for cybercriminals ▪ Data thef is one of the most common thefts in network ▪ Cybercriminals break in to companies or institutions databases and then manipulate them, they can have a lot of negative scenarios, like identity theft, financial fraud or loss of privacy ▪ They use different techniques to break in to the network and computer systems, they use gaps in security 98 Online tracking ▪ Privacy threats are based on collecting and using data of users without thier conscious permission. They can be used for marketing, political goals or internet fraud ▪ Not only personal data are valuable, but also IP address, location or actions in network. Usually, we are not aware how many information about us are accessible and how easy is to get them and use them. That is why awarness is really important if we would like to keep our privacy 99 Security threats example 100 Phishing ▪ It is technique which is used by cybercriminals to reach informations which can be useful for them, like passwords, card numbers or identity data. It is the most common and effecive form of Internet fraud, which is based on manipulation and abuse of trust ▪ Criminals pretend to be trusted source (internet websites or companies). They can for example send an email which looks like message from bank with the request to change of password. Remember, always check the websites, if it is real or not. Sometimes the differences can be small, but still we are able to allocate them 101 Spear phishing ▪ Hackers usually spend more time to prepare phishing messages. They try to prepare their messages based on open-source intelligence – OSINT ▪ They look for the information inside the Internet which can adjust attack to individual person/company. Thanks to this for example they can try to pretend to be client and to prepare messages in similar way as orginal messages ▪ For example they use one letter with sign ‚ӑ’ despite of ‚a’ in email domain, companies usually have automatic information if the email comes from outside the organization but a lot of employees ignore this kind of pop up messages ▪ Phishing messages usually have pressure inside, for example „confirm your password immadiately”, „your urgent action is required” – this is because they try to built the pressure not to give a time for thinking about the message source ▪ We should be careful especially with the attachments or links 102 Ways of phishing ▪ Emails – usually lead to fake website inside which you will be cheated, this will lead to reach for example your login and password. It is often connected with fake attachments ▪ MS Teams – here again hackers try to persuade to clik into fake link ▪ Voice communication – contact is initiate by telephone or popular communicators, and again it is connected with reachning confidential data ▪ SMS message – text message is sent by GSM network or by Messenger or other communicators, again they include links for example which try to reach your login data to the bank ▪ Fake mobile application – used to spy your actions and files or take over device and demand a ransom ▪ Social media platforms – hackers usually try to built relationship to steal the money or they pretend to be other people 103 Malware – malicious software ▪ It is one of the most common threats on the Internet ▪ It’s goal is to reach access to user computer or information and data which are stored inside it ▪ It can be like viruses, trojans and spyware. Usually it is sent by attachments inside emails or infected websites or downloaded unconsciously programms ▪ Hackers often attach malicious files into phishing messages. Documents have similar view as normal documents, but they include inside malicious software. If you already opened such file, do not turn on edition possibility or macros. 104 Malvertising – dangerous ads ▪ Malvertising is method where ads are used to distribute malicious code. Ad in the beginning looks like standard one, but after click on it, a malicous code can be activated, this leads to infecting the device. Usually they are used with the safety gaps on websites ▪ To avoid such attack it is worth to install antivirus program (paid or free) which will scan all files before opening. It is also important to update software on regular basis. This can take the risk into lower level 105 Watering hole attacks – targeted attacks on a specific group ▪ Watering hole attacks are based on attack which is based on one website or preparation of special crafted website which is visited by individual group of people (example websites dedicated to individual industry). Next criminal used this website to distribute malicious software or other harmful activities ▪ Such attacks are for specific groups what makes them unaware. The key protect for such attacks is again regular software update, strong passwords and antivirus programs 106 Ransomware ▪ Ransomware it is special kind of malware which block access to the computer or files until receiving ransom ▪ The goal of ransomware is to encrypt and/or steal confidential data. Then hackers request ransom to unlock or do not send to public information the data which were reached by them ▪ Ransom can be even up to milion dollars ▪ In last years ransomware became one of the biggest threats for users in network. Often they are mass attacks into the companies or even standard users of networks. One of the thing which can help to avoid it is creating backups 107 Company attacks ▪ In companies it can also be that employees are the person who would like to attack the company, they are called insiders. They can be accidential, negligent and malicious ▪ Accidential – is for example the employee who by accident cliks the link in phising message ▪ Negligent – is for example the person who ignores internal trainings or insert company data on external sharepoints ▪ Malicious – is for example the person who takes the know-how from the organization and sell it to competitors 108 Spoofing – fraudster pretend to be someone else ▪ Spoofing is the attack in which fraudster is pretend to be someone else, he/she try to impersonate another person or organization. Criminal can pretend to be bank or other public institution to persuade to provide data which are necessary to install on the device malicious software or to provide login data or other important information ▪ It is especially risky because a lot of people can unconsciously provide private data to scammers. It is important to always verify if other side is real and do not share private data on suspicious websites 109 DDoS attacks ▪ They are based on server overload with huge usage which leads to website or service malfunction. It can paralyze actions on website for few hours or even few days or weeks ▪ DDoS can be done for banks, government websites, internet shops, companies websites or standard blogs. To prevent this there are special services and security solutions required 110 Cyberbullying threats 111 Cyberbullying – online harassment ▪ Cyberbullying is based on using technology to harass, intimidate or ridicule others ▪ It can be based on doxxing (share private information about the individual person in netwrok), hate, sending offensive messages or psychological harassment by the Internet, it can be also sharing the fake information about others or threats of physical violence ▪ Cyberbullying is especially dangerous because it can lead to serious issues with emotional and psychological health for victims. It is really important to react and report such situations 112 Threats for children 113 Content dangerous for children – access control to network ▪ Inside the Internet we can meet a lot of contents which are dedicated to adults, children should not have access to them, it is pornography and violence content. Access control is important to keep children and their emotional and psychical health safe ▪ Parents and legal guardians should use tools which allow to parental control, they can help with content filter, time control (limit the time with the computer devices), monitor network activity ▪ Education on how to use network safety also is crucial 114 Misinformation threats 115 Man-in-the-middle attacks – data interception during transmission ▪ Man-in-the-middle attacks are based on interception and potential modification of the data during the transmission between two sides without their awarness. Criminals might for example intercept login data or payments information ▪ The best way to secure is using of safety connection (HTTPS) which encrypt data sending between devices servers. It is worth also to use VPN which is additional secure 116 Economic threats 117 Internet fraud– be careful who you meet online ▪ Internet fraud is the wide category of threats. Inside it there are all online frauds which we can unconsciously meet. They are for example frauds on auction portals like OLX, Vinted, Facebook or Allegro, frauds based on BLIK, money extortion, fake e-mail and SMS messages ▪ Users of the Internet need to be aware that not everything which they see inside is real. They need to be especially careful during online transactions, confidential data sharing and entering inside the links received by emails or SMS 118 Vinted example ▪ You put on Vinted for example a dress and receive message that lady is interested but Vinted has change the way of buying and she needs your email – after sending, there is a link and the person write that you need to accept sale inside it and after this it is standard phining message usually with malware ▪ It is like normal message from other user, but the way of processing the sale is different, it is easy to believe if we are new on the platform 119 Facebook fake messages ▪ It was during my studies, my mate from study group wrote to me if I can lend him 100 PLN. I was surprised because we were not so close friends, in the past week we started common project in one classes because of third mate who was close with me and him, but it was all. I decided that I will lend him this amount but told him that I will give him this on the next day in University, he did not agree and ask if I can make money transfer and that was the time when I realized that it is probably fraud ▪ Another examples are links sent from infected facebook accounts if we see our photo somewhere, etc., I belive all of you had such situation at least once 120 Jacket trade example ▪ Few years ago my mother in low bought jacket. After long time she did not receive it, we discovered that the website on which she bought had really bad opinions and not only she did not received her order and the payment was already done ▪ We made investigation regarding this also on facebook and there I found in comments the person who wrote me that also was cheated, this person provided me KRS number and also telephon number to thief – I called him and told that if the money is not send back I will call the police and the man told me that he was supossed to inform that the package was lost and money will be paid back and they was ▪ So the lesson from this story is that even when we are victims of fraud we should try to receive money back, sometimes it is possible 121 OLX example ▪ You receive message that scan someone bought your product and that you need to QR-Code to finalize the transaction ▪ The way of working is similar to the description for Vineted example, under QR- Code there is phishing or malware – standard online theft 122 YOUR STORIES 123 REMEMBER! The most important defense is awarness! Tracking new types of attacks can help to avoid them on ourselves. 124 Always report the attacks! ▪ CERT.PL supported by NASK and UKE ▪ 799 448 084 ->SMS attacks should be forwared ▪ https://incydent.cert.pl/domena#!/lang=pl 125 CERT – Computer Emergency Response Team ▪ CERT = CSIRT (Computer Security Incident Response) is global organization which is responsible for reacting for cybersecurity incidents ▪ In Poland it has been started in 1996 ▪ It is in NASK structure which is National Research Institute 126 NASK „NASK is a National Research Institute whose mission is to develop and implement solutions which facilitate the development of information and communication networks in Poland, in addition to improving their effectiveness and security. We carry out research and development projects as well as projects aimed at improving the security of Polish civilian cyberspace. Another of our important activities is educating users and promoting the concept of an information society, primarily with the goal of protecting children and young people from hazards posed by new technologies” Source: https://en.nask.pl/ 127 UKE „The President of the Office of Electronic Communications (UKE) is a regulatory authority responsible for telecommunications and postal activities and frequency resources management. It’s also a supervisory authority responsible for controlling compliance of products emitting or vulnerable to emission of electromagnetic field, including” Source: https://www.uke.gov.pl/en/about-us/ radio equipment placed on the market in Poland 128 15 rules of online safety 129 Protect access to your devices ▪ Do not create the space for access to your devices like smartfon, tablet or computer for unauthorized person ▪ Create password, use fingerprint reader, face recongnition or other tools offered by your device 130 Make backups ▪ Make backups on your devices on regular base ▪ Keep them on external device or in cloud (the best option is few locations). It is good in case of ransomware, theft or malfunction 131 Be careful with the e-mails contents ▪ Do not open links or attachments which are from unexpected or untrusted sources ▪ Check email address from sender first, even if in the first place it seems to be from trusted sender ▪ Remove emails which you do not use 132 Keep the control on aplications ▪ Download files and aplications only from trusted sources, the best way is to use official shops like Google Play or AppStore ▪ Before the installation check their rights and limit their access to data, location or devices (camera, microphon) ▪ Remove the programs and aplications which you do not use on regular basis – it allows to increase safety and improve efficiency of the device 133 Do not pospone actualizations ▪ All actualizations for system, programms, aplications, browsers and plugs should be made as fast as possible ▪ It allows to eliminate safety gaps which were discovered recently ▪ Use the newst applications’ version 134 Protect login data ▪ Keep in safe place your login data (login, password) to all Internet accounts ▪ They should not be saved on desktop with the text file or on paper sheet which can be visible via camera device ▪ For important accounts use two way login methods (2 levels authentication), for example to the bank account (apart from password there is code sending by SMS or mail) 135 Use strong passwords ▪ Do not use the same password to many of your accounts ▪ Set for each of them strong password which contain small and big letters, digit, special signs ▪ Change your passwords on regular base ▪ You do not need to remember all of them – use password manager tool 136 Rules for safety passwords 1. Password should not be the same as user name or part of it 2. Password should not be the name of our closest family members, friends or animals 3. Password should not contain your or your family personal data. It should not be date of birth, telephone number, car registration number, name of the street, number of flat, etc. 4. Do not use sequence of subsiquent letters, digits or other signs, example: abcd, 1234, QWERTY 5. Do not use one word in any language standard or backwards, or such word starting or ending with number or special sign 6. Do not use more than 3 next signs from keyboard (example: 123) 7. Do not use more than two consecutively repeating strings of characters (bbbb2bbb) 8. Do not use obvious expressions like „letmein” 9. You can use 3 well-chosen random words or first letters from selected phrase or change inside selected phrase letters into spcial signs, example: a into @ or s into $ 10.Password should has minimum 8 characters, it is recommended to choose 12 or 14 characters, including special signs, big and small letters and digits 137 Check www websites ▪ Always check website address, before you will take any other action on it. Hackers often use similar website addresses which are different only by one letter or sign ▪ Even when website looks correct in first place, check it deeply, especially when it is connected with your bank account or payments 138 Control camera access ▪ Cover your camera if you do not use it ▪ You can use camera overlay ▪ Check and limit camera access to programms and aplications which are installed by you 139 Monitor children behaviuor in network ▪ Control websites which are checked by children, block the websites which can be harmful and dangerous ▪ Monitor online activity, new relationships, downloaded aplications and time which is spent online ▪ There is possibility to create account for children with limited access or special programs for parental control 140 Protect your Internt browser ▪ Configure your browser to ensure all settings have the higest possible safety and privacy ▪ Check accessories which are installed automatically, remove all which are unnecessary ▪ Keep your browser updated on regular base 141 Be careful with hotspots ▪ Using of public, unsafe WIFI networks, like in library or cofeehouse, should be on minium level ▪ During their usage do not login to bank account or other critical accounts or use VPN to use them safety ▪ Turn off the connection when you finish using of it ▪ Do not use automatic network connection when you travel or you are in public place 142 Limit usage of USB ▪ Do not use USB which are not yours ▪ Do not borrow your USB devices to others ▪ Do not check and use USB which was accidentally found 143 Stay alert ▪ Be aware that online attack can be dedicated to anyone, also you ▪ Be carefoul during daily Internet usage, keep your privacy on high level, do not belive in special offers and prizes ▪ Do not accept invitations from strangers in your social media portals 144 …use experts knowledge when needed ▪ Use verified antivirus solutions on all your devices ▪ Check if they have advanced implementation of safety solutions ▪ Take under consideration not only standard protection, but also extended protect for all new threats 145 Safety rules chart 1 10 15 2 9 8 14 7 3 6 5 4 13 3 4 2 1 0 12 5 11 6 10 7 9 8 146 Mental health in digital world 147 END 148 5 MS OFFICE 149 Microsoft Office ▪ Microsoft Office suite is software developed by Microsoft company. It offers tools designed for both personal and busienss use. It includes Office apps which provide possibility of documents, presentations, spreadsheets creation, inteligent clouds, advanced security, etc. ▪ Office aplication suite was introduced in 1989, it is commerial product, today’s version is MS Office 365 150 Productivity applications ▪ MS Word, ▪ MS Excel, ▪ MS PowerPoint, ▪ MS Access ▪ MS OneNote ▪ MS Publisher ▪ Power BI 151 Collaboration tools ▪ MS Outlook ▪ MS Teams ▪ OneDrive ▪ SharePoint ▪ Microsoft Planner ▪ Microsoft Forms ▪ Microsoft To Do ▪ MS Stream ▪ Yammer ▪ MS Sway 152 Security and Protection ▪ Azure AD ▪ MS Defender: ▪ Microsoft Defender Antivirus ▪ Microsoft Defender for Office 365 ▪ Microsoft Defender for Endpoint ▪ Microsoft Defender for Identity ▪ Microsoft Defender for Cloud 153 MS WORD ▪ It is used for text writing and editing; main goal is to allow to insert, edit, format and share text documents ▪ Implemented in 1983 ▪ Contain a lot of text and graphic tools inside ▪ It has simple and intuitive interface 154 MS Word Interface ▪ Interface has 3 main parts: ▪ Ribbon and toolbar ▪ Document window ▪ Status bar 155 Text Fortmatting Integration Editing Tools MS Layout Options Word Templates Tables and Collaboration graphic 156 MS Word features ▪ Inside the program it is possible to choose different types of formats: font, zoom in/out options, font colour, text effects like superscript/ subscript, underline, bold, etc. ▪ Text can be expanded, narrowed, raised or lowered ▪ Paragraph formatting is possible, left, right or bilateral indentation, text alignment, line spacing ▪ Page setting is possible, orientation, size, margins can be defined ▪ Text in document can be split into sections, columns, etc. ▪ It is possible to insert headers and footers, page numbers, table of contents, list of figures (if headlines will be used table of contents and figures can be automatically generated) ▪ It is also possible to insert special characters, mathematical equations, charts, diagrams, tables 157 General rules for text writing ▪ Punctuation marks should be immediately displayed after the word preceding them and separate from the word following them with space ▪ Brackets and quotation marks must adhere to the text contained within them on the inside ▪ Words consisting only with one letter (w, z, i, a, u) should not be left at the end of the line, so it is worth using non-breaking space (CTRL+SHIT+ENTER) after them, it will prevent to the word connected by it from being separated when dividing the text into lines (especially important in official texts) ▪ There should not be any spaces between two paragraphs of text or between paragraph of text and document object (image, table, etc.) using the so-called empty paragraphs (made by pressing of the Enter more than once) ▪ The first line of a given paragraph should not be left of the bottom of the page (column), this is the so-called shoemaker or orphan ▪ The last line of a given paragraph should not be left of the top of the page (column) 158 Excel ▪ Implemented for operating system Windows in 1987 ▪ Since 1993 program has Visual Basic (5.0 version) inside ▪ Spreadsheet is technicaly advanced system: ▪ Allows to creating, organizing and analyzing data in tabular form ▪ Includes more than 500 functions which are connected with maths, logic or statistic ▪ Offers various tools for data visualization like charts, graphs or conditional formatting ▪ PivotTable and PivotCharts allow users to summarize, analyze, and explore large datasets interactively ▪ Excel integrates with other MS Office apps and also other external data sources ▪ Supports automation by macros and VBA (Visual Basic for Application) 159 Excel usefulness ▪ It is comprehensive program for processing, analyzing and presenting the data which is especially useful for companies, organizations, academic environments and social scientists ▪ In companies and organizations it allows to easy and fast data processing which is useful for fast and accurate business decisions. It is commonly used for data analysis and managing databases ▪ In finance and accounting, thanks to its functions, creation of balance sheets, profit and loose statements and other financial reports is possible in easier way ▪ For academic and social scientific researches it is used especially for analysis of research results, mathematical and statistical models and charts or diagrams creation 160 General overview ▪ The basic element of MS Excel is workbook which is built at least with one sheet ▪ Each workbook can include many sheets which can be linked to each other 161 General overview ▪ Values which we insert during the work with the spreadsheet are put into cells. A cell is the basic element of the sheet. Examples of the sheet cell content can be text, number, formula, time, or a logic value (true or false) ▪ Combination of column letter and row number is cell address ▪ Selecting an area of cells can be defined as block of cells, it’s address is written as: „left top corner cell adress:right down corner cell address” ▪ Block of cells which contain whole column or whole row can be put in exceptional way, example is: B:B (whole B column) or 2:2 (whole 2 row) ▪ Each cell or block of cells can be named ▪ Cell content can be also another cell value – in such situation we insert into the cell other cell address 162 Relative and absolute address ▪ Relative address is the address that corresponds to the change of formula cell location - also references to other cells inside the formula will proportionally change ▪ Example: moving formula from cell C1 -> A1+B1 into D2 -> B2+C2 ▪ Absolute address – contain $ character inside the cell address – it is direct cell address which will not change inside the formula even if it will be moved from one cell to another, it can be: ▪ Completely blocked: $A$1 ▪ Column absolute address: $A1 ▪ Row absolute address: A$1 ▪ Example: moving formula from C1 -> $A$1 into D2 -> $A$1 163 Formulas ▪ Always starts with „=„ ▪ To built them math operators are used: + - * / ^ & ▪ Can contain other cells addresses (used their value not content) ▪ Can contain Excel functions which are pre-defined ▪ With „()” characters the order of performing actions can be set ▪ Needs to be confirm by pressing „Enter” -> to see the value not content 164 Functions ▪ They have their own name, like SUM(…), AVERAGE(…), etc. ▪ Must contain brackets to include inside arguments (even if the function is no-argument function like PI(), NOW(), TODAY()) ▪ Argument for the function can be the text, number, date, another cell address, another function ▪ Arguments inside the function are separate by ; ▪ For some of the functions arguments can be the block of cells ▪ Correct function always shows value ▪ Functions are inside the formulas 165 Excel functions Math Text Lookup&Refernece Date&Time Logical Financial Information Statistical Engineering Compatibility Cube Web 166 Examples of the functions ▪ Logical: AND(…), OR(…), IF(…) ▪ Math: SUM(…), ROUND(…) ▪ Date & Time: TODAY(), NOW(), YEAR(…), MONTH(…) ▪ Text: CONCAT(…), LEFT(…), RIGHT(…) ▪ Statistical: AVERAGE(…), MIN(…), MAX(…) ▪ Lookup & Reference: VLOOKUP(…) 167 Sorting ▪ Data need to have proper format to sort them correctly, numbers are always placed before text ▪ Data can be sort by text, numbers, dates, etc. It is also possible to sort by format like font color, cells color or icons ▪ There is possibility to sort by more than one column or row thanks to custom list creation 168 Filters ▪ It is possible to create validation of data which should be shown, for example: greather than, between, etc. ▪ It is also possible to choose the data which should stay visible one by one 169 Subtotals ▪ They are used to summarize individual rows and columns ▪ Useful for big data bases, for example it can be used to summarize the sale of individual company departments ▪ The fisrt step for their creation is sorting the data by column or row which will be variable for summarizing another column or row 170 Subtotals 171 PivotTables ▪ Interactive and dynamic way to summarize large amount of data ▪ Based on them PivotCharts can be created to provide visualization of the data from pivot table ▪ They consist of 4 basic elements: value, column, row and filter fields ▪ In pivot table sorting is possible only for text and numbers, we cannot sort by colour, icons, etc. ▪ Base table for pivot table should fulfil below requirements: ▪ Not have empty cells ▪ All columns should have titles 172 173 Examples for pivot table creation ▪ Record counting, example: orders for different production lines ▪ Information about percentage, example: percentage of orders for individual production lines ▪ Unique values with mistakes control in descriptions ▪ Grouping numerical variables into ranges, example: grouping of the sale into quarters 174 Charts ▪ Charts are useful for data visualization ▪ They allow to better understand complex data bases ▪ Excel includes a lot of chart types: line, column, pie, area, radar, scatter, combo, etc. ▪ Charts can be modified in many different ways, labels, axes, headings, titles, etc. ▪ Chart is connected with the table based on which it was created – so the change inside of it determines change of the chart 175 Macros ▪ If the task is repeatable, in Excel it can be automate with macro, it is series of commands and functions kept in the module of Visual Basic language ▪ Macros are avaliable in Developer tab, they can be manually recorded or written by VBE (Visual Basic Editor) language 176 177 Visual Basic for Application ▪ Visual Basic – programming language developed by Microsoft in 1991 ▪ Key milestone was in 1993, it was firstly implemented into Excel 5.0 and it is called Visual Basic for Application (VBA) ▪ VBE (Visual Basic Editor) can be open in Excel by Alt+F11 178 3 steps of macro recording 179 1. Start recording 180 2. Perform actions ▪ In the second step the repeatable steps are record, for example insert the list of names and on the end ‚Stop Recording’ ▪ REMEMBER all actions will be repeat, each mouse movement and click until ‚Stop Recording’ button will be chosen 181 3. Stop Recording ▪ When all steps where recorded, choose ‚Stop Recording’ ▪ Macro will be visible in macros list (Alt+F8) and can be turn on by ‚Run’ button ▪ Details of the code which was created at backgound is visible under ‚Edit’ button 182 Macro Recording background 183 Code example in VBE 184 VBE ▪ VBA Project - top-level container that includes the entire VBA project connected with your workbook or document ▪ In VBA Project, there are various modules which are main containers for VBA code, they can be: ▪ Standard modules used to store general procedures Sub() and functions Function() that can be write or edit ▪ Class modules which are used to define custom objects with their own properties, methods, and events ▪ User Forms which includes graphical interface and handle it with code 185 User forms 186 Example of the commands in VBA ▪ MsgBox - displays a message box to the user ▪ InputBox - prompts the user to enter data ▪ If...Then...Else - executes different code blocks depending on a condition ▪ With...End With - simplifies code by applying multiple actions to the same object ▪ UserForm.Show - displays a UserForm ▪ Dim - declares a variable ▪ FindMaxValue (xy:zc) – function which finds and returns the maximum value from a specified range of cells 187 TIP 188 Power Point ▪ Developed in 1987, implemented in 1990 ▪ It allows to create computer presentations ▪ There are two groups of rules for preparation of the presentation : ▪ General rules for content creation ▪ General rules for slide formatting 189 Rules for presentations General rules for content General rules for slide creation formatting KISS (Keep it Short and Theme and colors Simple) Font size and type Colors SSS (Say what you are going Images to say, Say it, Say what you Graphics said) Sound effects Animation 190 KISS ▪ KISS – slide content should be signaling or displaying transmitted content ▪ Presentation should be simple and as short as possible: ▪ Information should be splitted reasonably between the slides ▪ On slide only the most important information should be put ▪ The best way to present text on slides are sentence equivalents ▪ Presentation should include graphic part (images, diagrams, charts are easier in perception) 191 To keep this principle, below structure can be SSS implemented: Title slide Title Author ▪ SSS – to make your speech stick in Insitution audience’s memory, it is worth Presentation plan presenting its plan at the beginning, „say what you are going to say” then expanding, and finally Goal summerizing it (repeating the most The most important parts of the speech important elements) Presentation main content „say it” Summarize „say what you said” Repeating of the most important parts of the speech conclusions End slide Qestions Thanks for atention 192 Tips for slide formatting ▪ PowerPoint offers ready-made themes and color sets ▪ One or two font types (size, color and effects (example: underline, bold) can be changed) ▪ Main color should be chosen on the beginning ▪ Number of images on individual slides – one, up to two ▪ Graphic should be stylistically equal ▪ Presentation cannot be dominated by sounds effects or animations 193 Example of presentation preparation scheme ▪ Creating of the new presentation (save it with the final name and destination) ▪ Desing / theme, colors, fonts and effects selection ▪ Slide numbering ▪ Title slide creation ▪ Inserting of slides with their layout ▪ Content inserting into the slides (text and images) ▪ Animation for individual slides ▪ End slide creation ▪ Animation and sound effects for whole presentation 194 Outlook ▪ Implemented as hotmail (1996) ▪ Microsoft bought it for 400 mln $ in 1997 ▪ Rebranding started in 2012, finished in 2013 ▪ Funcionalities: ▪ Emails can be split into the different folders - rules for splitting can be set to avoid manual splitting ▪ Calendar can be shared with co-workers with 3 options: full details, limited details, only availability ▪ Manager can insert tasks into eployee calendars ▪ Outlook can be integrated with other software like Zoom, Microsoft Teams, etc. ▪ Also meetings can be inserted via outlook, after meeting set, email is sent and it can be accepted, rejected or new term can be proposed ▪ Access can be reached from any devices ▪ It is safe – messages are encrypted, include anti-spam, viruses and hackers protection 195 Microsoft Teams ▪ Implemented in 2017 ▪ It is based on cloud technology and can be integrated with other Microsoft services ▪ Safe because of encryption and accessible from various devices ▪ It was created for easy virtual connections, it allows to: ▪ Working on the files with more than one person in real time without meeting in person (Word, Excel, Power Point) ▪ Virtual meetings for 2 or more people and recordings from them (optional, after users agreement) ▪ Chats and group chats ▪ Common or personal data storage 196 Power BI ▪ Implemented in 2015 ▪ Used for data visualization and business intelligence and data analysis ▪ Safe because of encryption and accessible from various devices ▪ Can be integrated with other Microsoft services ▪ Main advanatges: ▪ Data can be connected from various sources and refresehed automatically in scheduled intervals or manually anytime ▪ Advanced reports and dashboards can be created and shared with co-workers 197 END 198 6 IT IN BUSINESS 199 Information Technology „The science and activity of using computers and other electronic equipment to store and send information” Source: https://dictionary.cambridge.org/dictionary/english/information-technology 200 Over the decades The beginning of computers -> ENIAC as example of first electronic computers 1940 Developing of programming languages and ability to process large amounts of data 1950 Development of minicomputers and increasing of accessability 1960 Aparnet as Internet precursor, development of PCs thanks to microprocessors 1970 Personal computers introduction and software advances like MS Office and GUIs 1980 Internet era – World Wide Web introduced in 1991, explosion of the Internet 1990 The Age of Mobility and Cloud Computing, reducing the need for physical infrastructure 2000 201 Over the decades Big Data AI 2010 IoT AI 5G Cybersecurity 2020 Quantum computing 202 AI definition ▪ European Commission's Communication on AI – definition of Artifical Intelligence: “Artificial intelligence (AI) systems are software (and possibly also hardware) systems designed by humans that, given a complex goal, act in the physical or digital dimension by perceiving their environment through data acquisition, interpreting the collected structured or unstructured data, reasoning on the knowledge, or processing the information, derived from this data and deciding the best action(s) to take to achieve the given goal. AI systems can either use symbolic rules or learn a numeric model, and they can also adapt their behaviour by analysing how the environment is affected by their previous actions. As a scientific discipline, AI includes several approaches and techniques, such as machine learning (of which deep learning and reinforcement learning are specific examples), machine reasoning (whi ch includes planning, scheduling, knowledge representation and reasoning, search, and optimization), and robotics (which includes control, perception, sensors and actuators, as well as the integration of all other techniques into cyber-physical systems).” 203 AI definition ▪ “Artificial intelligence (AI) refers to systems that display intelligent behaviour by analysing their environment and taking actions – with some degree of autonomy – to achieve specific goals. AI-based systems can be purely software-based, acting in the virtual world (e.g. voice assistants, image analysis software, search engines, speech and face recognition systems) or AI can be embedded in hardware devices (e.g. advanced robots, autonomous cars, drones or Internet of Things applications).” 204 AI ▪ The term "AI" could be attributed to John McCarthy of MIT (Massachusetts Institute of Technology), 1956 conference at Dartmouth College ▪ AI is used in many different ways, main fields are: ▪ Image recognition and processing technologies ▪ Language processing technologies ▪ Virtual assistants ▪ Autonomous robots and codes ▪ Machine learning 205 Machine learning „The process of computers improving their own ability to carry out tasks by analysing new data, without a human needing to give instructions in the form of a program, or the study of creating and using computer systems that can do this” Source: https://dictionary.cambridge.org/dictionary/english/machine-learning 206 Big Data „Very large sets of data that are produced by people using the internet, and that can only be stored, understood, and used with the help of special tools and methods” Source: https://dictionary.cambridge.org/dictionary/english/big-data 207 5 Vs VOLUME The large amount of data generating VELOCITY The speed of data creating, processing and collecting VARIETY The diversity of data types VERACITY The quality and accuracy of the data VALUE Insights, patterns and trends extracting 208 IoT „Objects with computing devices in them that are able to connect to each other and exchange data using the internet” Source:https://dictionary.cambridge.org/dictionary/english/internet-of-things 209 Cybersecurity „Things that are done to protect a person, organization, or country and their computer information against crime or attacks carried out using the internet” Source: https://dictionary.cambridge.org/dictionary/english/cybersecurity 210 5G „Technology that gives mobile phone and internet users more advanced features than 4G. 5G is short for ‚fifth generation’ ” Source: https://dictionary.cambridge.org/dictionary/english/5g 211 Quantum computing „Computing that does certain types of complicated calculations much faster than traditional computing, using qubits (= units of computer information that have quantum characteristics ) instead of bits (= units of computer information that must be either 0 or 1)” Source: https://dictionary.cambridge.org/dictionary/english/quantum-computing 212 Information systems ▪ Management is connected with issues solving from the informational and decisional point of view ▪ Decision is non-random choice of one from at least two possible variants. Decision process is more to it – it includes collecting, processing, alternativ solution preparing and chosing one best solution from all other possible variants ▪ Useful information in decision process needs to be fast, actual, complete and accurate. Information management terminology was implemented in XX century. It became popular together with technology revolution connected with computer data processing ▪ Three main types of activities related to information are storage, proces and transmission. Analyzing and filtering are most challenging, because of number of the information we have today – the main point of decision is having accurate information on time ▪ To fulfil information requirements, information systems are used. Today almost all of them (or even all) use computers. They allow to provide information on time in decision process, so the decision can be made in conditions of more complete information and therefore can be more accurate 213 ERP systems evolution Early resource management systems – MRP (Material Requirements planning) 1960 Focus on managing inventory and production scheduling MRP II (Manufacturing Resource Planning) 1970 Include other aspects of manufacturing like capacity planning, quality control and finance management Integrating various busienss systems like finance, human resources, sales, production and distribution – ERP (Enterprise Resource Planning) 1980 SAP R/2 – 1979 – first integrated ERP system Wide adoption of ERP 1990 Expansion of funcionalities from finance to supply chain management ERP in cloud – access via Internet 2000 ERP accessible for small and medium companies Integration of ERP with Big Data, AI and IoT 2010 SAP S/4HANA -> faster data processing and advanced analitycal functions Rise of modular ERP systems 2020 Development of mobile and AI-driven solutions 214 MRP and ERP systems differences ▪ First integrated systems were MRP (Material Requirements Planning) which main goal was to identify material and components’ needs. The main tasks was to: ▪ count numer of raw materials, ▪ Be an inventory of the materials and components, ▪ indentify needs ▪ schedule production or purchase ▪ Next to MRP new modules wre added. They were connected with production planning and supplies management. Those systems were called MRP II (Manufacturing Resource Planning). MRP were only focused on production planning, MRP II allows to resource planning based on all company departments ▪ ERP was created by adding to MRP II next modules. They were financial resource planning, human resources management, accounting, finance, project management ▪ By adding Internet functions, mobile technologies and XML standards – ERP II were implementing 215 ERP ▪ ERP is one of the most complex information systems used in the business ▪ ERP (Eneterprise Resource Planning) is information system that integrates bu