ICT Theory Work - PDF
Document Details
Uploaded by DevoutMoonstone3279
Curro
Tags
Summary
This document is a theory work on ICT, covering the roles of ICT in the workplace, computers, portable computers, tablets, smartphones, servers, clients, protecting information, and more. It includes relevant details about digital cameras, input, and output devices.
Full Transcript
Module 1.1 The role of ICT in the workplace Work whenever you have access to a computer Communicate more effectively with both employees and customers Identify and adapt to changing trends Perform tasks that are dangerous or difficult for humans to do The com...
Module 1.1 The role of ICT in the workplace Work whenever you have access to a computer Communicate more effectively with both employees and customers Identify and adapt to changing trends Perform tasks that are dangerous or difficult for humans to do The computer Take input from an input device, do something to it, and then they produce some form of output. Computers are linked to other computers and devices in some way so that they can communicate with one another 'Powerful' in computer terms generally describes a combination of a number of factors such as: o The speed and performance of the CPU's o The amount and type of storage it has o And the type of graphics cards installed Portable computers Laptops and notebooks o Specifying that the computers should conserve power by starting to 'sleep' or hibernate when it has not been used for a period of time o Setting the brightness of the screen to reduce the power consumption o Choosing a balance between power consumption and performance, saving power usually decreases the performance of your system Tablets o Ideal for quick, smaller-scale computing o Operating system designed for mobile devices o Longer battery life than computers o Built-in Wi-Fi and cellular connectivity Smartphones o Combine features and technologies of many separate devices o Touch screen for typed input o Mobile operating system o Built-in Wi-Fi and cellular connectivity o GPS for navigation Servers and clients Servers o Powerful computer that provides services and resources to clients Client o Computer that uses services and resources from servers o Not as powerful as a server o Mobile devices also 'clients' in a client-server setup Dedicated devices o Such as Automatic Teller Machines (ATMs) and GPS (Global positioning system) devices, and household appliances like microwave ovens and washing machines, are designed to perform just one specific task. These devices aren't computers. Computers o Are multi-purpose devices, because you can load apps on them which allow them to perform a wide variety of tasks. Protecting your information Loss of hardware often involves loss of information as well Consider the following anti-theft strategies for hardware: o Use devices such as cable locks to anchor equipment to a fairly solid object o Use lockable cabinets in which to place the system units of a desktop computer or serves. o Make use of motion sensors that can detect when a computer is moved and sets off an alarm. Portable devices particularly vulnerable Protection measures- keep backups, passwords-protect or encrypt data, record hardware serial numbers, install 'hidden' security software Uninterruptible power supply (UPS) Protects computers against power outages, power surges, spikes Provides immediate power to connected computers if mains power fails Not designed to sustain PC for an extended time- allows time to save work and shut down PC Module 1.2 Input Provide the running software with instructions on what to do next or, It can be data that must be processed Digital cameras Smartphone cameras to digital (compact) cameras to top-end DSLR (digital single-lens reflex) o Point-and-shoot o A point-and-shoot camera does not allow you to change lenses, small and compact without technical settings o DSLR camera is designed more for professional use- it lets you change your lenses Advantage o Take hundreds or thousands of pictures o See the images immediately o Easily transfer the images o Edit to a computer because they are already in digital format Disadvantages o Cost o Quality o And inability to take photos in low light Specifications Meaning Lenses Larger lenses capture more light, which improves image quality and detail Sensor size Larger sensors can capture light more efficiently and can take photos more accurately in different light conditions Optical zoom and Optical zoom uses lenses on the camera to 'get closer' to Digital zoom the object being photographed. Optical zoom for better quality images Digital zoom is like using the magnifying glass tool in image editing software. As you get 'closer' the blurrier the image gets Resolution This is the total number of pixels that make up the picture (measured in megapixels) ISO rating This is how sensitive the camera sensor is to light Scanners A scanner is an input device that scans images to a computer The quality of an image produced by a scanner is mainly determined by resolution (dpi) and color depth: o Resolution is normally expressed in dpi (dots per inch) o The greater the dpi, the higher the number of pixels in the resulting image and, generally, the better quality of the image o The higher the dpi, the larger the resulting image file will be Color depth refers to the number of different colors that can be represented by a pixel. Advantages o The electronic copies are stored digitally and do not take up office space as paper files do o Barcode scanners are especially useful in libraires and Point Of Sale (POS) systems for speeding up the checkout process. o Scanned copies can be emailed directly instead of having to be faxed o QR codes can be quick way to let people connect to your website without having to type it in a web address Disadvantage o Scanning takes a lot of time, but this does depend on the type of scanner and its purpose o The quality of the digital image depends to a large extent on the quality of the original hard copy Biometric input Biometric input involves capturing unique biological features of a person Advantages o It is more secure than the typical user's passwords o Defeating biometric security is difficult since it is tied to a single person Disadvantage o Expensive to implement and maintain o Needs additional hardware and software Input at ATMs A computing device that people commonly interact with today is the ATM The ATM gets its input from the user through the numeric or on-screen keypad and buttons. It also gets input from other sources and sensors that are built into the machine such as: o Card reader o Modern or network connection o Touch screen o Money counter o Money deposit slot ATM thieves o They install a skimmer over the card reader part of the ATM, and they place a small hidden video camera so it can see which keys you press when you type in your pin. The card skimmer reads the data on the card's magnetic strip and stores it. The thieves later download the data from the skimmer and the camera, and can find the right pin for the right card. They make a copy of your card by writing the magnetic data onto a new blank card, and as they also have your pin, they just go to any ATM and draw as much money as they want from your account. Advantages o Allows for banking transactions to take place at any time o Banks have developed a system where you can use the facilities of any banks ATMs Disadvantages o It can be dangerous to use an ATM, as you probably have cash and are therefore a prey to criminals o People can install a skimmer over the ATM's card reader and add a camera, so that they can capture your card details and PIN, pretend to 'be you' and steal your money Input into POS system Barcodes and RFID tags both provide fast, reliable means of identifying an object and are wonderful tools when integrated into POS (point of sales) system in a shop. Here they achieve two main goals: o Faster processing at pay points o Better stock control How does it work? o Scanners are used to record stock that is brought into the shop. The data is immediately stored in a database and a price is allocated for each item o At the till the cashier uses a scanner to record each item that you are buying Advantages o This system works much faster than typing in prices on a keyboard, which makes the customers happy because they spend less time in queue o Prices can be updated and entered with great accuracy o From the business side, they can record exactly how much stock they have left, making it easier to know which items are selling well and to know when they need to order more stock Disadvantage o When the system is offline it is difficult to function o Expensive equipment and software is required Touch screen Allow people to interact with computers and computing devices more naturally Advantages o A touch screen allows more screen space in a device, as no space is needed for a keyboard o There is a type of ‘intimacy’ and ‘immediacy’ in directly ‘touching’ the data or controlling the components o It is intuitive to use- very little training needed o It allows input such as drawing and gestures Disadvantages o Typing on an on-screen keyboard is not as fast or easy as typing on a physical typing o A touch can become dirty, oily and smudged, especially if used with dirty fingers Data collection devices Many specialised, dedicated devices have been developed to capture data. These devices use electrical sensors, switches, cameras and microphone Advantages o Data is captured automatically using sensors, even in remote areas, without human intervention o Data is captured more accurately than by using input o Data is captured faster than by using human input Disadvantages o Sensors can fail without the problem being detected, resulting in incorrect data o Only sensor- detectable data can be collected. This can be a problem if not enough types of sensors are installed or when human observation is needed. o Owing to their often inaccessible location, these devices can be difficult and expensive to update, expand the scope, of repair or replace Input into smartphones and consumer tablets Smartphones and tablets tend to use multiple types of input. They allow for most of these different types of user- controlled input: Touch screen o Used as the main interface- users employ gestures to interact with the software Hardware buttons o Used to control volume, switch on and off Camera or video camera o Used to take photo's and videos. Smartphones apps can also use them for other input like scanning barcodes, or even OCR Accelerometer o Used to detect which way around the device is held or how it is being moved. This allows it to change the orientation of the screen depending on how you hold it Microphone o Used for the phone, voice memos and the sound when recording video Alternative keyboards Devices like smartphones and tablets usually don't have a keyboard. Instead they create virtual keyboards by popping up an image of a keyboard on the screen. You then type on the screen by touching the keys displayed Wireless technology in input devices Wireless technology generally uses radio waves to connect input devices to your computing devices Output Provide the user with feedback during their interactions with a computing devices Provide the user with a more permanent or non-electronic copy of the results of processing Allow the transmission of data between computes or electronic devices Display device Displaying options that allows the user to make choices or interact with the program and operating system Displaying the results of processing that has taken place Advantages o The provide immediate feedback to the user about what the computer is doing o They allow interaction between the user and computer o Display content is easily changed and quickly updated o Text can be enlarged for the visually impaired, or high contrast can be used. Types of output Visual output o Visual output is presented as texts and images on a screen Sound output o Sound output is mostly used for enhancing interactions with the computer or for entertainment Touch output o Touch output is used when peripherals like joysticks and controllers vibrate or provide resistance, to enhance the experiences of playing games Other output o This output involves the transmission of data between devices, or the use of electrical signals to control machines or equipment Disadvantages o Output is not permanent o Output is difficult to share o Can lead to eyestrain and headaches o Work is not private o Difficult to read in very bright light Specifications that determine quality Specifications Meaning Screen size Screen size is measured diagonally in inches Resolution The resolution is the number of horizontal and vertical pixels that a screen can display. The higher the resolution, the more you can fit in the screen, but your text and images become smaller Contrast ratio The contrast ratio is the number of shades between the whitest white and the blackest black the screen can display. The higher the contrast ratio, the clearer and sharper the image will appear and the better the colours will look Aspect ratio Aspect ratio is the ratio between the width and the height of the screen. Response time Response time measured in milliseconds, is how quickly the monitor updates its pixels. A faster response time means that fast action sequences in movies and games will be sharper and less blurry Lumens for data Data projectors also have lumens as a technical specification. projectors This measures the brightness of the image they project. The higher the lumen rating, the more effective the projector will be- especially when trying to project very large images DVI and HDMI The HDMI interface transmits high definition video and sound via a single cable Other features Range of height and swivel adjustments of the monitor The viewing angle- basically how far you can move to the side of the screen before the display is no longer clearly visible Some monitors come with built- in USB ports, a webcam, speakers or a combination of these Printers Laser printers Inkjet printers Specification Meaning Speed Speed is usually measured in pages per minute (ppm). Laser printers are generally faster than the inkjet printers Resolution Resolution is measured in dpi (dots per inch) and is specified in a similar fashion to a monitor. The higher the dpi, the better the quality of the printed output Monthly duty This is an indication of the maximum number of pages that can cycle be printed in a month without the printer failing Number of Colour printers work by combining cyan, magenta, and yellow colours inks. Cheap printers only have these three colours and combine them to create black. High end inkjet printers offer more colours to improve the quality of photo prints Paper options You need to consider what you want to print in terms of paper sizes and types. Some more expensive printers also allow you to print on both sides of the paper automatically. Inkjet printer have glossy inkjet paper Connections Virtually every printer connects to a USB port. Some printers have media card slots and additional ports to connect portable media devices and print directly to the printer from these devices In comparison with inkjet printers, laser printers are generally More reliable Easier to maintain Better for black and white and general colour, but inkjets are much better for creating photo quality prints Cheaper to run, especially for higher volumes of printing 3D printers 3D printers allow you to create physical, three dimensional objects from designs that you have created on your computer using CAD or 3D modelling software Wireless technology in output devices Increase the flexibility and usefulness of output devices. They simplify the way things work together and reduce the messy bunch of wires Wireless printing- printers with wireless capability can be placed anywhere within the range and set to join a wireless network. Then any device connected to the network can print with the printer without the need for physical connection Sound without wireless- Bluetooth technology is used for stereo headphones, speaker systems and even car audio systems to allow mobile devices to play better quality sound than their small internal speakers allow Wireless video and images- Some cameras and video cameras have a built- in feature that allows them to transmit their images to computers wirelessly, but most cameras need add-on accessories to make this possible Interactive whiteboards A whiteboard connected to a computer that acts like a large touch screen. Data projectors display images of computer screens. User manipulates computer functions by drawing, gestures, etc. on whiteboard Advantages o The person using it can manipulate the computer functions on the board o It allows for better interaction and participation to enhance the process of learning and teaching o Notes made on the board during the lesson cane be saved on the computer and called up again during the next lesson Disadvantages o If the board is too small it can be difficult to read o It usually needs dimly lit venue for the projected images to be seen properly o You must not use normal whiteboard markers on them Driver Software used to control a specific hardware device Built- in drivers work with standard devices Manufacturer must supply driver for non- standard devices Download latest version of driver from the manufacturer's websites A driver is software that allows your computer to communicate with hardware or devices and control them Plug- and- play Technologies where the operating system automatically detects and configures a device Driver is installed (automatically by OS, or supplied by users if non- standard) Input and output for physically challenged users Visually impaired/ blind o Braille keyboard and braille display device o Magnification devices o Large- key keyboards o Braille printers Hearing impaired/ deaf o On- screen notices or flashing screens instead of sound o Vibration devices Motor control o Eye tracking devices o Head movement devices o Joysticks o Foot pedal control devices Improper use of input/output devices can cause health problems o Use ergonomically designed equipment o Move around every hour or so o Do appropriate exercises o Adjust monitor settings Module 1.3 Memory Where the computer holds all the programs (instruction) and o data is busy working on. Memory only keeps its contents whilst it is supplied with power, it is volatile o More expensive than storage RAM (random access memory) o RAM comes in 'sticks' called DIMMs (dual inline memory modules) that plug into the motherboard. RAM is usually measured in the low Gigabytes range Storage o Storage is where programs and data are kept permanently. It does not lose its contents when the power is turned off, it is non- volatile o Storage is measured in Gigabytes or low Terabytes (1TB= 1024GB) SSD (solid state drive) o An SSD (solid state drive) is a completely electronic alternative to the traditional hard drives, they use the same technology as flash drives o A computer with a SSD will perform much faster than the same computer with a hard drive instead of the SSD Comparison: Memory versus storage Memory Storage Memory holds the data and Storage holds programs and data far more instructions that the computer is permanently using whilst it is on and working Memory is electronic Storage is either magnetic (hard drive) optical (CD, DVD), or electronic (flash drives and SSD) Memory is fast to access Because magnetic and optical storage works mechanically, it is slow. Even electronic storage operates at lower speeds than memory Needs power to keep its contents Keep its contents even when the computer is (volatile) switched off (non- volatile) Online storage Online storage refers to a disk space that is allocated to you on a server on the internet What you have uploaded is then available to you wherever you are in the world or whatever computer or device you are using, if you have internet access Advantages o Accessible from anywhere on any device with internet access o Saves space on the user's computer o Easy to share files with other people o Data is accessible even if your computer 'crashes', or is stolen Disadvantages o Only accessible when you have an internet access o Some data may be unusable over slow connections o If the computer goes bankrupt you may lose all your data Online storage differs from cloud computing because it only involves storing files online Real cloud computing means that actual programs run on a server on the internet and you access those programs through your web browser 'in the cloud' simply means that your data is on a server on the internet Examples of popular online storage facilities are Dropbox, Google Drive, iCloud and Microsoft's OneDrive Backing up Backing up involves making copies of your data and preferably storing the copies in a different place from where you keep your computer Prevent data loss in case of accidental deletion or when your computer is stolen or damaged or destroyed in some sort of disaster or accident, like a fire or earthquake Hardware will fail, software has bugs, theft and natural disasters or accidents happen It is easy to restore the data from the backup media It is quick and easy to make a backup Most popular backup strategy o Flash drives o Portable hard drive o Online backup services Since portable hard drives and flash drives are faster and more reliable, and have a much bigger capacity, these media have been become the more popular choice for backups The concepts of backups and archives are often confused Backups are made so that you have a copy or 'duplicate' of files in case something goes wrong (a file is deleted or becomes corrupt or overwritten) You can schedule a backup to run at fixed intervals, and even choose which folders to backup The idea of backups is that you keep copies of working files that you can restore if something goes wrong- so that you can continue working on them Archiving refers to making copies of files, where the copies are not meant to be accessed regularly but are kept for references when needed. You might make a PDF copy of all the reports at the end of the year and store them on an external hard drive, as you are not likely to need to work on them once every learner has received their report. You don't need to work with the data, but you still need to be able to look up a report if someone asks you to Archiving is a manual process, where you take files that are not going to change, or that are not likely to be used in the near future, and move them off the main system to free up space Basic troubleshooting Managing backups (read page 38) Problems with CDs and DVDs (read page 38) Disk scanning Fix problems on hard drives Check drive for errors and bad sectors on the disk, and try to fix them In Windows/ File explorer right- click on the icon of the drive you want to scan and select the properties option Tools tab, you will find some options including the one for error checking Disk defragmentation The more you use your computer (adding programs, creating, saving, moving and deleting files), the more the files (and parts of the file) get scattered on the disk. The more scattered the files parts are, the slower your computer becomes. This is known as disk fragmentation A disk defragmenter is a utility that puts the parts of files back together again and speeds your computer up again Disk filling up (too little space) Windows provide a very useful utility, namely Disk Cleanup, to perform a lot of your housekeeping in one step by removing the following: o Temporary files downloaded from the internet o Deleted files and folders from the Recycle bin o Temporary files created by Windows o Components of Windows that you are no longer using o Installed programs that you no longer or seldom use Processing CPU (central processing unit) Motherboard o The motherboard is a large circuit board that all components plug into CPU o The CPU does all the processing that takes place in a computing device. Speed is measured in GHz. Describe a CPU, this tells you how many physical CPUs are on the chip RAM o RAM is where the CPU goes to fetch the instructions and data that it needs to work on. A DIMM is shown at the top of the motherboard whilst another DIMM is plugged into the slot at the bottom of the picture ROM o ROM is one or more chip on the motherboard that hold the programs that control the basic hardware of the computer and that are used to get the computer ready for use when you switch it on How the computer starts itself up 1. When the computer is switched on, the instructions in ROM are sent to the CPU so it can start the boot process 2. The boot program then checks the hardware of the computer for errors. If any error occur here the computer will usually not start- instead it will tell you what the problem is, either by beeping or by displaying an error message on the screen 3. The boot program then looks for the program used for loading the operating system on the specified storage device. The operating system is loaded and the computer is ready for you to use Module 2.1 Types of networks Local area network (LAN). This is a network which connects computers in a small area as a school, university campus, or company offices in one building An intranet is an organisation's private network and is an internet- like environment consisting of web pages relating to the organisation's business. The information stored on the intranet is only available to the organisation's employees An intranet can be used for publishing the organisation's documents such as the latest policy documents, newsletters, training manuals Basic components of a network Hardware Communication Network software Hardware Computers and peripherals o The three general terms used for computers linked in a network are workstations, clients and servers o Workstations originally referred toa desktop computer connected to the network o Clients has a boarder meaning and refers generally to computing devices o Server is a powerful computer that provides shared resources, such as files, email and internet facilities, and printers, to network users A file saver, it is used to store files, both the users' own files in their 'home folder' and other files that have been placed in shared folders. Advantages are that users are able to access these files from any computer on the network, and that users are able to access these files from any computer on the network, and that users do not have to worry about backing up these files themselves Email servers are used to handle all email needs of the organisations An internet or proxy serves allow security control for viruses and internet usage monitoring to be implemented at one central point Web servers can be used to host websites, for an organisation's interact Printer servers are used to handle all the printing requirements of a network with many computers and printers Database servers provide access to data stored in a central database Large companies or organisations use many servers working together to provide the information requested. These are called server farms or data centres How do you know that you are connected to a network? Presence of extra drivers such as U:, V: and T: which are simply folders on a server that appear and act as drivers Presence of other computers Access to devices such as printers not directly attached to the computer is possible Indicators showing network activity in the notification area Network interface controller Every computing device in the network either must be wireless- enabled to connect to a network wirelessly, or must have a Network Interface Controller (NIC) to connect to the network via a cable. The wireless adapter and the NIC are usually both built into the device, depending on the device Switch A switch is a device used to connect computers in a network (such as LAN) with cables so that communication can occur between the computer- but it is not used for internet access One end of the network cable plugs into the network port of the computer, and the other plugs into a port on the switch can then send the data received from one computer to other computers on the network and manage the communication on the network efficiently Communication methods A WLAN (wireless LAN) has the following advantages compared to a LAN: o Installation is far easier than with a cabled LAN as cables do not need to be pulled through walls or ceilings, in factories and in older building o It is easier and more practical to make use of wireless connectivity between buildings o It is easy to add or move computers and devices as the network points are not- fixed- no cabling is required o Adds mobility for users with mobile devices o It avoids any clutter in terms of cables that might get in the way Wired connection The types of cable most commonly used to connect computers in a LAN is UTP (unshielded Twisted Pair) cable, easy and cheap to install Fibre optic cable uses light to send data and is therefore very fast. These cables are difficult and expensive to install The differences between UTP cable and fibre cable are the following: o Fibre cable provides for much faster data transmission than the UTP cable o UTP cables can only span a certain distance before the signal strength gets weaker and you have a loss of signal on the cable. Fibre cables can span much longer distance o With the right equipment one can 'eavesdrop' on a UTP cable and intercept the data being transmitted. Fibre cable is immune to eavesdropping o UTP cables can be affected by electrical sources- sometimes termed EMI (electromagnetic interference). Fibre cable is not affected in this way Wireless connections When a wireless network is installed. Wireless access points allow wireless communication between devices. These access points are in turn connected via cable to a switch on the cabled network- for access to the server and other devices An access point consists of a sender/transceiver and an antenna which transmit and receive radio waves so that the devices that are wireless- enabled are able to communicate with one another and the network The data transmission speed of a network is the rate at which data is transferred over the media used For cabled network equipment such as switches and NICs, you will see a specification such as 100/1000 in computer adverts. This refers to the data transmission speed that the switch or the NIC can support When you see '802.11' you know that your computer has a wireless adapter. There are various standards of '802.11' such as 802.11g and 802.11n Data transmission over WLAN is slower than over a LAN Network software Network software is software that controls all the communication and security in a network. Most desktop operating systems have built- in networking capabilities Advantages and disadvantages of a LAN Advantage of a LAN (and a WLAN) o Files are stored on a central computer allowing users access from any computer in the network o Files can be transmitted without the use of devices such as portable hard drives o Software applications can be shared by users o Hardware such as printers can be shared by users o Security in the network can be controlled, ensuring that users only have access to certain files and application o A single internet connection can be shared by users Disadvantages of a LAN (and a WLAN) o A network administrator is necessary to manage the network o Network security must be maintained to ensure that the data on the network is kept secure o If the file server is faulty, nobody can access their files Disadvantages of a WLAN o Performance can decreases as the number of computers connected increases o Signal could get lost or interfered with due to electronic or electrical interference Basic network security Network security refers to the policies put in place to ensure the security of a network by preventing unauthorized access to information and misuse of the computer networks The following few rules should be applied when creating a password o Choose a password that is at least 8 characters long o The password must contain a mixture of upper and lowercase letters, numbers, and special characters o Meaningless passwords are the best o Be careful not to use passwords that follow a pattern like '123' or 'asdf' o You should change your passwords every 2 months or so o Do not use the same password for different sites Ethical use of networks AUP- acceptable use policy- outlines the rights and responsibilities of network users Included in the AUP o Promotion of basic netiquette rules and importance of sticking to ethical, legal and safe practices. And that includes not sending spams and hoaxes o Restrictions in terms of what may be accessed online o Restrictions on amount of data downloaded o Details of when and where portable storage devices may be used o Restrictions about installing hardware or software Module 2.2 Readability Things to improve the readability of a website includes: o Headings, short paragraphs, and columns o Numbered or bulleted lists, and keeping text short and to the point o Group together related ideas in a logical order o Type, size and colour of fonts o Avoid text in all upper case o Page backgrounds that are easy on the eye Navigation Good websites navigation means being able to move around the web page or website easily and intuitively o The main links, or menu system, should be easy to locate and identify. They should appear in a consistent position on the page in all related pages o The links should be short and one should understand what the link is leading to o There should be no 'broken links'/ links that don't work o The links should be formatted in a consistent and standard way Layout How the various elements of a web page are arranged o Keep the intended audience in mind o Page contents to fit standard monitor size and resolutions Typography Involves the placing and formatting of text. This includes aspects like the length of a line of text, the type and size of the font, the amount of space between letters, words, lines and paragraphs, and the use of punctuation To improve the typography of a website make sure that: o Fonts are easy to read and that they match their content o Commonly- used fonts that are likely to be on the user's system o Not too many different types of fonts Other factors that affect the browsing experience Speed o Pages should be designed to load quickly Privacy Consider what may take place when you go online: o Websites may analyse your activity and use this to produce 'targeted' advertising. Adverts then pop up automatically on your screen based on your surfing habits Spyware o Any technique or software that tries to monitor and track the way you use your computer, and then reports this information to a third party o Your use of the internet is tracked in order to build a profiles of you- for use in targeted advertising o More menacing versions of spyware are used for stealing confidential information Adware o 'free software' that is ad- sponsored and pops up adverts while the program is running o Adware in the browser is when some websites display unwanted advertisements Module 2.3 Internet access Fixed access Mobile access Fixed access Includes ADSL and fibre options Limitations: Lack of portability, requires telephone line or fibre connection Can be expensive, depending on packages you choose; influenced by amount of bandwidth & size of cap in package May not be in an area that has ADSL or fibre coverage Fibre to Home (FTTH) & Fibre to the Business (FTTB) refer to installation and use of fibre cables to homes and businesses to provide high-speed internet access Mobile internet access Wi-Fi o Wireless technology that uses radio waves to transmit data o Allows computers, smartphones & tablets to connect to internet (via router linked to ADSL or fibre internet connection) o Communicate with one another wirelessly within small area o Computers also able to use Wi-Fi to print to printer connected on same Wi-Fi network o Wifi access points can cover area measured in square meters Hotspots o Where wifi network has been created so people can connect to network and through that connect to internet o Organisation that set up hotspot will likely have wireless network connected to ISP via fibre or ADSL connection o Area which devices can connect is quite small o Hotspots are found in locations like airports, restaurants, coffee shops, libraries, convention centres, shopping malls and hotels o Provide people on the move with opportunity to access internet to check emails, surf internet, do their banking and access social network sites whilst on move o Some hotspots offer free connections, while others require subscription to WISP (Wireless Internet Service Provider) for which you pay per connection, per amount of data, per day or month o Wireless internet access can also be made available to all devices in home by means of router which include Wifi receiver/transmitter o Router will connect computer to fibre or ADSL line & all other devices in house connect wirelessly to router WiMAX o Worldwide Interoperability for Microwave Access is upgrade to Wifi o More secure wireless networking technology that allows wireless devices to communicate with one another over wider area than Wifi o WiMAX towers can cover an area measured in km o Provides secure, broadband access for business and home users o Viable option where fibre connections are not available 3G and 4G (LTE) o Generations of mobile phone technology that makes use of infrastructure of cellular networks o Offered by companies like CellC, MTN, Telkom & Vodacom Digital communications Social networking sites Where individuals and organisations can post their likes, dislikes, interests, comments, photographs and activities for friends, and anyone else unless blocked, to see and read Most have apps for smartphones and tablets Advantages o Easy and cost-effective method to communicate w friends and family all over the world o Allow you to send and receive messages, update your ‘status’ and upload photos and videos o Allow people who would normally not meet in person, to interact & form communities o You are not bound by geographical or cultural differences. Get to meet new people who have similar interests o Can be used as tool to market business, service, product or website Disadvantages o Increased risk of identity theft, fraud, online stalking and harassment o Many people have false info on their profiles and are not always who they say they are o People often create fake life online to make their lives look better o Loss in productivity if employees spend too much time online o Social networking sites often analyse your posts and likes and dislikes to target advertising & sell info to make money Best practices o Most social networking sites provide settings to protect your privacy. o Restrict who can have access to different types of info on your profile & who can comment or post on your profile or tag you o Only enter or give out info that you need to o Think carefully about who you allow to be your “friend” o Don’t post damaging, insulting or provocative content about anyone o Restrict amount of time you spend on social networking sites Examples o Facebook o Instagram o Twitter o Pinterest o LinkedIn VoIP Voice over Internet Protocol is technology that allows telephone calls to be made over LANs, WANs and internet, allowing you to talk to anyone who also has VoIP system anywhere in the world When using VoIP, voice is transmitted on network Messaging apps such as WhatsApp and FaceTime also use VoIP Advantages o Cheaper than normal phone calls o Software is generally free o Allows one to transfer files o Allows one to make video conference calls Disadvantages o Call quality might be poor if you have slow internet connection o You can use up a lot of your data cap, especially when using video Best practices o Check local times before calling someone in another country (might not be in same time zones) o Only use video when necessary – or turn off video if call quality deteriorates o Quality can be significantly improved by using decent headset and microphone o Pay attention to contact’s status Video conferencing Allows to or more people to hold online conferences at different locations, using computer network to transmit audio and videos if they are all in same room Each participant must have webcam, microphones and speakers linked to computer Advantages o You can see the people you are communicating with & read facial expressions and body language o Much cheaper than travelling to meeting Disadvantages o Video/audio quality may be poor if you have slow internet connection o Use a lot of data Best practices o Make sure you are in well-lit location o Protect your privacy by making sure you know what your camera can ‘see’ o Test sound & video before you make a call Chat rooms / applications Online environment that allows people to meet and “chat” with other people with common interests Advantages o Can chat w more than one person in real time o Provides opportunity to interact with people regardless of their geographic location o Some applications (WhatsApp) can be used on a variety of operating systems such as iPhone & Android Disadvantages o No way to ensure people are who they claim to be o Users can spend more time in chat rooms than doing work or socialising in ‘real world’ o Creates opportunities for cyber-stalking, cyber-bullying, identity theft, etc Best practices o Don’t give out personal info (address, phone numbers, etc.) o Don’t arrange to meet in person unless you are very sure you know wgo the person really is o Don’t bully or get involved in flame wars (exchange of personal comments and insults) RSS feeds Really Simple Syndication Technology that automatically provides users with updated content, such as new blog entries, feeds from websites and news headlines RSS document – called a channel, feed or web feed – can include full or summarised content Content can be accessed from central application (RSS reader) without having to go and check each of websites separately To subscribe to a feed: o Register for account with RSS reader o Select the link, tab or icon identified as ‘RSS’ or ‘Subscribe’ on blog or website you would like to subscribe to o Add link to reader Advantages o You can find all news in one place instead of having to visit many different sites – big time saver o RSS avoids spam as updates are not sent to email addresses Disadvantages o People often subscribe to too many RSS feeds, get overloaded and end up reading nothing o Sometimes graphics & photos are not included Best practices o Use a dedicated RSS reader as it makes easier to manage and read feeds o Only subscribe to feeds you know you’ll read FTP File transport Protocol Protocol used for fast, easy transfer of files between remote computers that have an internet connection Files can be uploaded to an FTP server or downloaded from an FTP server Cloud storages like Google Drive, OneDrive & Dropbox have taken over for most users Online services E-commerce o General term for any type of business transaction that involves communication across internet o Refers to buying and selling of goods or services & the marketing of goods and services o Payment on internet is done by credit transactions, EFT (Electronic Funds Transfer) or using systems like PayPal Internet banking Offers ability to connect your bank via internet and perform online transactions such as o Viewing your account balances o Paying bills o Transferring money to another bank account o Ordering credit cards o Buying prepaid data and airtime for smartphones Advantages o Convenience of being able to do your banking 24/7 in comfort of your own home or when you are in another city or country o Transactions are normally faster and usually cost less o Safer – you don’t have to carry large amounts of cash on you No real disadvantages to internet banking Shopping and reservations Advantages o Convenient – can purchase goods or make reservations online 24\7 in comfort and safety of your own home o Able to compare prices more easily o Prices can be cheaper o Businesses can reduce overhead costs in terms of salaries and shop rentals & can trade world-wide o Businesses do not have to carry huge quantities of stock Disadvantages o Sometimes better to see goods physically o Usually have delivery costs, and if from overseas = import taxes How does online shopping work? 1. Register by giving username & password to log in 2. Able to browse site and choose goods – gets added to virtual shopping cart or basket 3. Once you have completed purchase, you are them prompted to continue virtual checkout counter where you will be shown cost of purchases & delivery cost 4. Able to add or remove items at any time during process 5. Pay w credit card or EFT or PayPal Protecting yourself online Cyber-bullying and cyber-stalking = online harassment Cyber bullying includes spreading rumours, gossip & general bullying of other person using digital communication methods Usually involves aggression ad repetitive negative actions Often a group activity cyber stalking is usually carried out by individual who is obsessed w someone takes form of using digital technologies to track & follow victim’s activities often crosses over into real life as stalker physically follows or tries to involve him/herself in victim’s digital life (befriending & following victim), by ‘digging up’ as much info about victim as possible info is sometimes used by stalker to control, harass or intimidate victim Malware and security software malicious software software written w negative intentions range from highly destructive software like viruses to software that is more of an annoyance like adware Can generally be detected in 2 ways: most malware leaves “trace” on files on computer o a.k.a. virus definition or signature suspicious actions such as “unknown” software trying to make changes to settings Anti-virus & anti-spyware software Anti-virus software detects viruses by scanning computer’s files and memory & looking for patterns that match database of virus definitions Anti-spyware keeps lists of websites known to contain and distribute spyware as part of its database Effectiveness of software depends on: o Database of definitions/signatures being as complete as possible (software creator responsibility) o Database being up to date on computer (your responsibility – set up automatically or update it yourself frequently) o Frequency of use (your responsibility) Firewall software Software that allows you to control which programs can access internet, and protects your computer or network from unauthorised access Windows provides basic firewall facility Safe e-commerce When you do any transactions online (internet banking or online shopping/reservations) always make sure site is secure o = URL begins w https:// o Icon of small closed lock appears next to URL Safe internet banking o When signing up for internet banking, you will be given access code & will have to choose password and pin o Some banks use on-screen keypads to eliminate danger of keyloggers o Most banks have instituted SMS notifications of all online transactions o Automatic time-out of banking sessions after period of inactivity o Banks usually issue “per-session” passwords via SMS for certain transactions o Banks put prominent warnings & safety tips on websites How should users protect themselves when banking online? o Do not use public computers for banking o Follow good password practices o Never give out personal details (like PIN codes and password) to strangers & never write it down o Make sure system software, including anti-virus, is updated o Take note of any security warnings on bank’s website & activate and use all safety measures they offer Safe online shopping and reservations o Make sure you have organisation’s contact details o Look for security guarantees and return policy on site o Be aware of terms & conditions (fine print) o Check payment methods and delivery details o Be aware that when purchasing overseas you may be liable for import duties, making goods more expensive o Be aware of exchange rate o Only give credit card details – never pin, password or other banking information Workplace and employment practice Office automation = centralising & automating or “computerising” all tasks and systems in office Office automation enables employees to work more efficiently and improves communication Mobile office o Laptop, tablet or smartphone & internet access = mobile office o Phone = reachable anywhere o Laptop or tablet contains all documents you need Virtual office o Set of services which you rent according to your needs o Include things like service of assistant, telephone receptionist or call centre, physical or mailing address or even office space Outsourcing or decentralised labour o Speed and efficiency of working online means that companies are no longer limited to workers in cities which are main office based – or same country o Possible to employ workers anywhere in world without negative impact on efficiency of business Module 2.4 Managing email Email access Email is most effective when you can access it wherever you are – on computer, phone or tablet What is CAPTHA? o Completely Automated Public Turing test to tell Computers and Humans Apart o To stop “bots” from signing your email up for blogs, you must prove that you are human when signing up o Can take form: check box (I Am Not A Robot) or CAPTHA input (distorted letters and words that no computer software can recognise, but humans can) Searching your email Click on search icon (magnifying glass) to start search (press after typing term) You can search on multiple criteria = who email was from, subject line, content of email, whether email had attachment & date range it was sent/received Email messages that meet criteria are listed Click on Inbox to display all email messages again Sorting email messages All email is sorted by date Flagging email messages Flagging involves marking email messages with an icon or colour Easier to see at glance what email consists of Usually used to indicate type of email Flagging facilities: Add stars o Default = yellow star Mark as Important o The tag to right of star can be ticked to indicate that message is important o Tag will change colour Grouping messages into folders Creating labels / folders Label in Gmail is organisation tool Labels allow you to group email messages Most other email applications have same feature but call it ‘folders’ not labels Each label name acts as folder Gmail has system labels like Inbox, Sent Mail, Drafts & Spam It’s possible for mail to have more than one label, meaning that mail will be displayed in more than one ‘label’ even though there is only one copy Deleting a label is not like deleting a folder – if you delete label (in Settings) it will be removed from all emails, but emails themselves will not be deleted Assigning a label 1. Move message to another label / folder yourself o Move mouse to left edge of email message in inbox o A grab handle (double row of vertical dots) will appear o Click & drag message to folder on left side of window 2. Use mail toolbar When opening email, Toolbar will allow: o Add label to an email o Move message to different label / folder 3. Use filter o Gmail moves all emails that look like spam to Spam folder Automating with filters / rules Gmail it works like: To start applying automated filter of email, you first set up a search – this defines which emails will be affected by automated processing When you have set up search, click on Create filter option at bottom right of search drop-down dialog Contact groups Distribution list Create