IT Essentials - Lec 6,7,8,9,10-1 PDF
Document Details
Uploaded by IdolizedNickel6889
Giza Engineering Institute
Tags
Summary
This document is a set of lecture notes on various topics related to computer networks, including computers, the internet, and communication. The key concepts are elaborated upon.
Full Transcript
Lesson 20 Managing the System Lesson 20 – Managing the System Managing the System Device Manager ◼ Device Manager shows all information about the hardware components of the computer. ◼ In case of any hardware problem, check the Device Manager. ◼ We can also troubleshoot any...
Lesson 20 Managing the System Lesson 20 – Managing the System Managing the System Device Manager ◼ Device Manager shows all information about the hardware components of the computer. ◼ In case of any hardware problem, check the Device Manager. ◼ We can also troubleshoot any hardware problems from Device Manager. Lesson 20 – Managing the System Control Panel ◼ We can configure computer and manage other hardware parts and devices like printers, modems, network etc are managed from Control Panel. Lesson 20 – Managing the System Task Manager ◼ Any software that is currently running can be viewed and managed by using Task Manager. ◼ Task Manager may be displayed by pressing (Ctrl + Alt + Del) keys together. Section 5 Information Networks Lesson 22 LAN, WAN and WLAN Lesson 22 – LAN, WAN & WLAN Network ◼ Two or more computers connected together is called a Network. ◼ In any network, computers can share resources and information. ◼ Receiving information from a network is called downloading data. ◼ Sending information over a network is called Uploading data. Types of Network ◼ Local Area Network (LAN) ◼ Wide Area Network (WAN) Lesson 22 – Information Networks Local Area Network (LAN) ◼ LAN is a network of computers in a building or in a limited area. ◼ Maximum area of network should be less than 1 square kilometre. ◼ Examples are Network of a university or small office. ◼ Wireless LAN (WLAN) is a LAN without cables. Lesson 22 – Information Networks Wide Area Network (WAN) ◼ WAN is a network of computers connected over longer distances. ◼ There is no distance limitation in WAN. ◼ Examples are Internet or network of a multi-national company. Lesson 22 – Information Networks A network may be: ◼ Workgroup Network ◼ Client/Server Network Workgroup ◼ This is a group of people or computers working together. ◼ All computers are independent of each other and can send and receive information directly. Client/Server Network ◼ In this network, all data is stored on a main high speed computer (Server). ◼ Users can access data from slow speed computers (Clients) Lesson 23 The Telephone Network Lesson 23 – The Telephone Network The Telephone Network Due to Technology, we can connect computers to telephone system to make world wide WAN. Public Switched Data Network (PSDN) ◼ PSDN is simply the technical name for the telephone system in use today. Integrated Services Digital Network (ISDN) ◼ ISDN allows transfer of digital data between telephone exchanges. ◼ It has much faster transfer rate, like 64K or 128Kbps Asymmetric Digital Subscriber Line (ADSL) ◼ It allows transfer rates up to 40 times faster than PSTN. ◼ Through ADSL, we can use internet and phone at the same time. Lesson 23 – The Telephone Network Cable Broadband ◼ It uses cable of TV instead of phone line. ◼ It provides high speed connection. Wireless Networks (WiFi) ◼ User can use internet via a wireless router and adapter. ◼ Wireless Access Point (WAP) will be via ADSL or cable. Satellite Internet ◼ It is used where normal access is not available like ships. ◼ Its available in all world but its expensive. Broadband ◼ This connection is available on monthly charges. ◼ It provide high speed connection. Lesson 23 – The Telephone Network The Telephone Network Type of Network Properties PSTN Public Switched Telephone Basic system, analogue, dial up Network connection, slow ISDN Integrated Services Digital Faster than PSTN, no modem Network needed, no dial-up ADSL Asymmetric Digital Subscriber Line Faster than PSTN and ISDN, Special modem required, no dial- up Cable Faster than telephone access, available in highly populated areas. Wireless Access point is via ADSL or cable, via wireless technology Satellite Used where normal access is unavailable Lesson 24 The Internet Lesson 24 – The Internet The Internet ◼ Internet is a global network of interconnected networks. ◼ Internet is open for everyone. Any body can use internet. ◼ It was started by US Military. ◼ Internet has a huge amount of information about everything of the world. ◼ Internet is provided via Internet Service Provider (ISP). ◼ Internet is used for: Communication Online Shopping Online Banking Online education Lesson 24 – The Internet Search Engines ◼ Search engines are websites which are used to search any information on the Internet. ◼ Within the search engine you enter a word or phrase and it will retrieve documents and information about that word or pharase from the Internet. ◼ Google and Yahoo are example of Search Engine. Lesson 25 Intranet & Extranet Lesson 25 – Intranet & Extranet Intranet ◼ A private network of an organization is called Intranet. ◼ Intranet is accessible only from within the organization. ◼ Its not open for all users. It’s open for authorised users only. ◼ Intranet provides information, forms and newsletters of the organization. Lesson 25 – Intranet & Extranet Extranet ◼ It is intermediate between intranet or internet. ◼ It is partly accessible only to limited external users via internet. ◼ Any company can provide specific information to other through extranet. ◼ External users can have access by Username and Password. ◼ It is used where different companies are working together. Lesson 26 Electronic Mail Lesson 26 – Electronic Mail Electronic Mail (E-mail) ◼ This is an electronic message sent over the internet from one computer to another computer. ◼ Both computers should be connected to internet to send or receive the email. ◼ We can send any file as attachment with email. ◼ Email is used for Communication Attachments Messages News Section 6 The Use of IT in Everyday Life Lesson 28 Computer at Work Lesson 28 – Computer at Work Computer at Work The use of computer and internet has been increased a lot now. Some usage are as follows: ◼ e-Commerce ◼ e-Banking ◼ e-Government ◼ Computer in Education ◼ e-Learning ◼ Working from home (Tele-working) Lesson 28 – Computer at Work e-Commerce ◼ Online shopping ◼ Buying or selling via the internet ◼ Payment is through credit card e-Banking ◼ We can operate bank accounts via the internet. ◼ Payment of bills, transfer of cash, check statements ◼ There are still some security issues. Lesson 28 – Computer at Work e-Government ◼ Most departments have websites to deliver information, services, policies, laws and much more. Computers in Education ◼ Helping software for students ◼ Homework may be delivered via internet. ◼ e-Learning : Online education ◼ Computer Based Training CDs (CBTs) Lesson 28 – Computer at Work Teleworking ◼ Work from home via internet ◼ No need of office, building and so many things. Advantages Disadvantages Employees have flexible schedules Disturbances at home Reduces waste of time in gathering Self discipline is required of people No need of company space Lack of human requirements interaction/Teamwork Focus on specific task Feelings of isolation Lesson 28 – The Electronic World The Electronic World Information Superhighway ◼ Information of any kind is available to anyone at anywhere in the world. ◼ Access of information via a PC and internet Information Society ◼ A society that can get a lot of information via internet. ◼ No need to leave home for anything or any task. ◼ Communication with anyone is easy now. Lesson 29 The Electronic World Lesson 29 – Communication & Virtual Communities Communication ◼ Communication via internet ◼ Email – electronic message ◼ Internet forums – websites for discussion ◼ Chat rooms – place to meet friends online ◼ Instant Messaging – transfer of message in real time ◼ VOIP (Voice Over Internet Protocol) Communication via internet by using microphone and headphone Skype, Google Talk Lesson 29 – Communication & Virtual Communities Sharing ◼ Sharing of information via internet ◼ Web log (Blog) – websites for discussions, comments ◼ Podcast – broadcasting of media files over the internet ◼ RSS feeds (Really Simple Syndication) Website having updated news, material Content is updated frequently Lesson 29 – Communication & Virtual Communities ◼ Social Networking Sites Websites to communicate and share information with other people MySpace, Facebook Lesson 30 Communication & Virtual Communities Lesson 30 – Communication & Virtual Communities Communication & Virtual Communities Precautions ◼ Create a private profile to protect personal information ◼ Be careful when sending personal information ◼ Beware of strangers. Section 7 Health & Safety Environment Lesson 32 Health and Safety Lesson 32 – Health and Safety Ergonomics ◼ Relationship between workers and their working environment. ◼ HASAW – Health and Safety at Work Factors of Working environments ◼ Proper connections of cables and joints ◼ Availability of suitable lighting[ ◼ Suitable ventilation ◼ Video Display Units and screens of good picture quality ◼ Use of monitor filters ◼ Suitable and comfortable chair ◼ Suitable position of keyboard and mouse ◼ Frequent breaks away from the computer Lesson 32 – Health and Safety Good Working Environment for PCs ◼ Possibility to recycle waste paper ◼ Possibility to recycle ink/toner cartridges ◼ Possible efficient use of electricity in monitors ◼ Use of Standby mode for HDDs and Monitors when not in use ◼ Switch off the PC if it will not in use for long time Section 8 Security Lesson 34 Security Issues Lesson 34 – Security Issues Backup ◼ The most important thing on your computer is information. ◼ A hard disk may store years of work. If the hard disk stops working one day, all data of will be lost. ◼ Backup is a copy of important data. ◼ Its important to take regular backups of the information that is stored on the computer. ◼ Some software are available which can take regular backup automatically. ◼ Backups can be stored on HDDs, CDs/DVDs, Tapes. ◼ Backup may be incremental or complete. ◼ Backups should be placed at some far and safe place. Lesson 34 – Security Issues Security Measures / Prevention of Data Theft ◼ A password must be used to login to a computer. ◼ User ID and Password should be used to access the network and other resources. ◼ Password Protection should be used for secret or confidential data. ◼ A password must be used to make any changes in the file. ◼ Proper Security Arrangements for hardware and office equipments. Lesson 34 – Security Issues Good Password Policy ◼ Password should be at least 8 characters long. ◼ In password, use a mixture of letters and numbers. ◼ Personal data like phone no, date of birth, name should not be used as password. ◼ Change the password regularly. ◼ Do not tell password to anyone. Lesson 35 Computer Virus Lesson 35 – Computer Virus Virus ◼ Virus is a small computer program that can affect computer and data. ◼ Viruses hide themselves on the disks (hard disk, floppy disk, flash memory). ◼ Different viruses are activated in different ways like at some specific data or time. ◼ Viruses can spread from one computer to other computers via infected disk or network or internet. Lesson 35 – Computer Virus Types of Viruses ◼ Macro Viruses These viruses are added in executable files of programs. ◼ Worm It does not affect the files but it replicates itself with in the system and jam all resources of computer. ◼ Trojan Horse This virus is like a file, game or picture and it is activated when user opens this file. ◼ e-mail Attachment This virus comes via email and it sends emails to all contacts automatically. Lesson 35 – Computer Virus Anti-virus Measures/ How to Prevent from Viruses ◼ Use some good antivirus programs. ◼ Update antivirus program regularly. ◼ Scan your computer regularly. ◼ Scan any disk before using it. ◼ Be careful when downloading any data from internet. ◼ Be careful about email attachments. ◼ Do not open anything suspicious. ◼ Use a Firewall This is a filter which monitors the traffic signals (data) on internet. Lesson 36 Copyright Lesson 36 – Copyright Copyright ◼ Copyright is a law/legislation. ◼ Most programs/software are copyrighted. We should not use them without a licence. ◼ Be aware or software copyright issues. ◼ License should be purchased to use or copy any software. ◼ Data of some website is also under copyrights. ◼ Any downloaded Software or data should be used after getting licenses Lesson 36 – Copyright ◼ End User Licence Agreement During installation of any software, we have to accept an End User Licence Agreement. This agreement contain information about licence and use of software. ◼ Product ID Each licensed Software has its Registration Number which is known as Product ID. It can be checked by clicking Help Menu---About. Lesson 36 – Copyright Software ◼ Shareware These software are free for a limited time or trial period. After that limited time, software may stop working. License has to purchase after trial period. ◼ Freeware These software are free for use. No license is required. ◼ Open Source Software With these software, source code is also provided. User can make changes and improve the software. Lesson 37 The Data Protection Act Lesson 37 – Data Protection Act Data Protection Act ◼ Data Protection Act (1998) regulates the use of personal data by all businesses. ◼ Any data holding organisation should not provide personal information to any unauthorised person. ◼ Leakage of information is a serious crime. ◼ In many countries this right is implemented under data protection laws. ◼ Data Controller A person who is responsible for holding and distributing the personal information. Lesson 37 – Data Protection Act Rules for Data Controllers Personal data must be: ◼ Obtained and processed fairly and lawfully. ◼ Processed information for a specific purpose. ◼ Accurate and kept up to date. ◼ Removed after using it. ◼ Secure and protected. Lesson 37 – Data Protection Act Data Subject This is the person who are owner of the data. They have some rights: ◼ To be informed when information is being held. ◼ To be told the purpose for which it is held. ◼ To know to whom the data will be disclosed. ◼ To refuse to allow their details to be used for direct marketing.