0% found this document useful (0 votes)
30 views201 pages

Midterm Topics It Era

Uploaded by

Bea Bianca
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views201 pages

Midterm Topics It Era

Uploaded by

Bea Bianca
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 201

THE IT ERA

LIVING IN THE IT ERA


LIVING IN THE IT ERA
LIVING IN THE IT ERA
LIVING IN THE IT ERA
INFORMATION TECHNOLOGY
• Information technology (IT) is the use of any
computers, storage, networking and other physical
devices, infrastructure, and processes.
• IT use to create, process, store, secure and
exchange all forms of electronic data.
WHAT IS COMPUTER?
• Common Operating Machine Purposely Used for Technological
and Educational Research.
• Computer is one of the most important devices and machines
invented by humans since the beginning of mankind.
• It is known that the computer consists mainly of physical
components (Hardware), intangible components such as
operating systems and software.
WHAT ARE THE COMPUTER COMPONENTS?
The major components of the general-purpose computer system are:
• Output Unit
• The Input Unit
• Storage Unit or Main/Internal Memory
• Central Processing Unit (CPU).
WHAT ARE THE COMPUTER COMPONENTS?

Input units
are the units responsible
for entering programs, and
different data for the
device.

Output units
are the units responsible for all
views, and the results are
executed according to the
instructions that the user issues
to them
WHAT ARE THE COMPUTER COMPONENTS?
The CPU is divided into three parts:
Control Unit (CU):
The Arithmetic Logic Unit (ALU):
Coordinates processes between
Performs arithmetic operations, such
different units of the computer,
as subtraction, division, addition,
controlling all inputs and outputs
comparison, order, and sorting.
to and from various units in the
computer.

Main memory:
This memory is usually used in
storing programs, data being
processed, performing business.
INTERNAL
COMPUTER
COMPONENTS
• Are the computer devices that
you can see inside of the system
unit (inside the chassis)
• Connected or built in to your
computer’s motherboard
INTERNAL COMPUTER COMPONENTS
Power Supply: A device located in the back of a computer's box,
providing power for its work and performance.
INTERNAL COMPUTER COMPONENTS
Motherboard: connects directly or
indirectly to every part of the
computer.
 Its task is to coordinate cooperation
between different devices, and the
transfer of data and the delivery of
information to different parts of the
computer.
 The motherboard is the
computer's main circuit board.
INTERNAL COMPUTER COMPONENTS
Central Processing Unit (CPU)
 also called a processor
 The processor is the mastermind
that receives all the commands
and works to process them and
gives the results in the form of
different information.
 It is sometimes called the brain of
the computer, and its job is to
carry out commands.
INTERNAL COMPUTER COMPONENTS
Memory
There are two types of memory, namely:
a. temporary memory or also known as random memory as well as
permanent memory, as the memory is the memory on which the device
depends mainly on the implementation of various commands and contribute
greatly to increase the speed of the computer and the processing of
different information.

a. As for the permanent memory, it retains the basic information necessary to


maintain the basic system and programs and cannot be changed.
INTERNAL COMPUTER COMPONENTS
Random Access Memory (RAM)
 is your system's short-term memory. Whenever your computer
performs calculations, it temporarily stores the data in the RAM until it
is needed.
 This short-term memory disappears when the computer is turned
off.
INTERNAL COMPUTER COMPONENTS
Hard drive
 The hard drive is where your software, documents, and other files are
stored.
 The hard drive is long-term storage, which means the data is still
saved even if you turn the computer off or unplug it.
INTERNAL COMPUTER COMPONENTS

Expansion cards
 Most computers have expansion slots on
the motherboard that allow you to add various
types of expansion cards.
 These are sometimes called PCI (peripheral
component interconnect) cards.
INTERNAL COMPUTER COMPONENTS
Video card/ graphic card
 The video card is responsible for what you
see on the monitor.
 Most computers have a GPU (graphics
processing unit) built into the motherboard
instead of having a separate video card.
 If you like playing graphics-intensive games, you
can add a faster video card to one of
the expansion slots to get better performance.
INTERNAL COMPUTER COMPONENTS

Network card
 The network card allows your computer to
communicate over a network and access the Internet.
 It can either connect with an Ethernet cable or through
a wireless connection (often called Wi-Fi).
 Many motherboards have built-in network connections,
and a network card can also be added to an expansion
slot.
INTERNAL COMPUTER COMPONENTS

Sound card
 Is also called an audio card
 is responsible for what you hear in the
speakers or headphones.
 Most motherboards have integrated sound,
but you can upgrade to a dedicated sound
card for higher-quality sound.
INTERNAL COMPUTER COMPONENTS
Bluetooth card (or adapter)
 Bluetooth is a technology for wireless communication
over short distances.
 It's often used in computers to communicate with
wireless keyboards, mice, and printers.
 It's commonly built into the motherboard or included in
a wireless network card.
 For computers that don't have Bluetooth, you can
purchase a USB adapter, often called a dongle.
INTERNAL COMPUTER COMPONENTS
EXTERNAL
COMPUTER
COMPONENTS
Are the computer devices that
you can see outside of the
system unit
EXTERNAL COMPUTER COMPONENTS
Keyboard
• It is one of the most important
tools used to enter the
information and numbers and
different characters to the
computer to address and get
the results.
EXTERNAL COMPUTER COMPONENTS
Mouse
• It is a tool used to mark
or identify certain
information that appears
on the computer screen,
and it needs a person or
an assistant to manage
it correctly.
EXTERNAL COMPUTER COMPONENTS
Microphone
• A device that specializes
in receiving sounds and
inserting them into the
computer in order to
modify or retain them.
EXTERNAL COMPUTER COMPONENTS
Scanner
• A device that helps to
insert various images
and graphics into a
computer, converting it
from its graphic nature
to another digital nature.
EXTERNAL COMPUTER COMPONENTS
Printer
• Used to output
information, data, such
as numbers, letters, and
images printed on
paper.
EXTERNAL COMPUTER COMPONENTS
Plotters
• Used in the output of
geometric drawings, and
in various sizes, and
then printed on paper.
EXTERNAL COMPUTER COMPONENTS
Camera
• which works to capture
different images and
keep them in the device.
EXTERNAL COMPUTER COMPONENTS
Disc unit/
• Data is entered through
a floppy, digital, and
compact discs.
CD-ROM

Floppy Disk
Drive
COMMON COMPUTER
CONNECTOR TYPES
• A computer port is an interface point between
an electronic device, such as a laptop computer,
and another peripheral device or computer.
• This connection point enables functionalities,
such as the transmission of data, power, audio
and video.
• Ports may serve as sources of input, output or
both.
COMMON COMPUTER CONNECTOR TYPES

HDMI (connects
to monitor, TV, or DVI (connects to monitor,
projector) TV, or projector)
LINE IN
(audio device blue)

LINE OUT
(speaker green) MICROPHONE
VGA PORT (connects to
(pink)
monitor, TV, or projector)
COMMON COMPUTER CONNECTOR TYPES
ETHERNET PORT
PS/2 PORT (connect to the
(connects to the network, internet,
mouse) cable, modem)

USB PORT 2 USB PORT 3


Black port Blue port (to
(to connect and connect and
transfer data) transfer data) AC Power (supply
PS/2 (connects 480 Mbps 4.8 Gbps power to the whole
to the keyboard) system unit)
WHAT IS OPERATING SYSTEM?
Operating system
• It is the system that contains all the commands that
enable the computer to perform various tasks.
• Windows, Linux, and Android are examples of operating systems
that enable the user to use programs like MS Office, Notepad,
and games on the computer or mobile phone.
• It is necessary to have at least one operating system installed in
the computer to run basic programs like browsers.
WHAT IS OPERATING SYSTEM?
Examples of popular operating systems include:
Windows:
 Microsoft Windows is the most popular desktop operating system, used by
over 1 billion users worldwide.
 It has a wide range of features and applications, including the Office suite,
gaming, and productivity tools.
WHAT IS OPERATING SYSTEM?
Examples of popular operating systems include:
MacOS:
• macOS is the desktop operating system used by Apple Mac computers.
• It is known for its clean, user-friendly interface, and is popular among
creative professionals.
WHAT IS OPERATING SYSTEM?
Examples of popular operating systems include:
Linux:
 Linux is an open-source operating system that is available for free and can
be customized to meet specific needs.
 It is used by developers and businesses, as well as individuals who prefer
an open-source, customizable operating system.
WHAT IS OPERATING SYSTEM?
The core functions of an operating system include:
 Managing hardware resources: An operating system manages resources
such as CPU, memory, and disk space, and assigns these resources to
running applications.
 Running applications: An operating system provides an environment in
which applications can run and interact with the user.
 Providing a user interface: An operating system provides a graphical
user interface (GUI) that allows users to interact with the computer.
WHAT IS OPERATING SYSTEM?
Features of Operating Systems
Here is a list of some important features of operating systems:
1. Provides a platform for running applications
2. Handles memory management and CPU scheduling
3. Provides file system abstraction
4. Provides networking support
5. Provides security features
6. Provides user interface
7. Provides utilities and system services
8. Supports application development
WHAT IS APPLICATION SOFTWARE?
Application software (App)
• is a kind of software that performs specific functions for the end user by
interacting directly with it.
• The sole purpose of application software is to aid the user in doing
specified tasks.
WHAT IS APPLICATION SOFTWARE?
Functions of Application Software
Application software programs are generally designed and developed to help with a
wide range of tasks. Here are a few examples:

 Software for healthcare applications for seamless connectivity and quick response
 Managing information and data in an organization
 Managing and checking documents across
 Software for educational purposes such as Learning Management Systems and e-
learning systems
 Development of visuals and video for presentation purposes
WHAT IS APPLICATION SOFTWARE?
Functions of Application Software
Application software programs are generally designed and developed to help with a
wide range of tasks. Here are a few examples:
 Emails, text messaging, audio and video conferencing involved in presentation
 Management of accounting, finance, and payroll helping the HR department and
other businesses
 Enterprise Resource Planning (ERP)
 Customer Relationship Management (CRM)
 Management of any small or large scale project
 Management of smooth and efficient business processes
WHAT IS APPLICATION SOFTWARE?
Examples of Application Software
The most frequent applications used by millions of people on a daily
basis are listed below.

 A collection of Microsoft software including MS Office, PowerPoint,


Word, Excel, and Outlook.
 Common Internet browsers like Google Chrome, Safari, Firefox, etc.
 Graphics and designing software such as Canva, Adobe Photoshop,
CorelDraw, and AutoCAD.
 Real-time online communication tools like Skype, Hangouts, Google
Meet, Zoom, and Whatsapp for video, and audio calls and messages.
WHAT IS APPLICATION SOFTWARE?
Examples of Application Software
The most frequent applications used by millions of people on a daily
basis are listed below.
 Multimedia and music streaming software such as Wynk, Gaana, MX
Player, VLC Media Player, Spotify, Pandora, etc. are used for
entertainment purposes.
• Project management software like Teams, Asana, Zoho, Slack,
Forecast, etc for official purposes
SET UP BASIC
WORKSTATION
NETWORK ACCESS
AND WIRELESS
DEVICE
SET UP BASIC
WORKSTATION
NETWORK ACCESS
AND WIRELESS
DEVICE
What is Computer Network?
A connection between two or more
network devices like computers, routers,
and switches to share network resources.
What is Computer Network?

The establishment of a computer network


depends on the requirements of the
communication channel, i.e., the network
can be wired or wireless.
TYPES OF
NETWORK
DEVICES
ROUTER

TYPES OF
NETWORK
DEVICES
• The gate way is a passage that
interlink two networks together.
• Perform a conversion function, even
two protocols are incompatible, the
gateway can connect them on the
same network and allow them to
function together.
ROUTER
PC
TCP / IP
Protocol

TCP/IP

CONTROL
NET

PLC
Control Net
Protocol
• The bridge is a device that joins any
two or more networks or host
segments together that are running
with the same protocols.
• Can also regenerate the signal
• Combination of repeater and MAC
address reading capacity. ROUTER
PC 1 PC 4 PC 5 PC 7

PC 2 PC 3 PC 6 PC 8

Segment 1 Segment 2
• A local area network
• It is a multi-port repeater that connects
multiple wires from different branches.
ROUTER
• Hubs broadcasts the data to all the
recipient.
• Not intelligent device.
• A local area network.
ROUTER
• Intelligent device, it store the Mac
Address table.
• Switch does unicasting
(it can send the data to the exact
recipient)
• A switch is a multi port device that
enhance network efficiency.
Port Device MAC Address
1 Detected ABC.DEF.GHI.JKL
2 Detected BCA.DEF.HIG.KLJ
3 Detected CBA.EFD.IGH.LJK
4 Detected 123.456.789.0
ROUTER
• What brings the internet into your
home or business.
• It modulates outgoing data from a
computer
• It also demodulates ingoing data
from the internet.
It demodulates ingoing data from the internet.

Analog
signals

Digital
signals

It modulates outgoing data from a computer.


ROUTER

Repeater is two port network


device that regenerates the signal
over a network before it becomes
weak or get damaged.
ROUTER
• A network device that can connect
two or more different LANs that has
two or more different protocol.
• Router can also connect two
different technologies.
ROUTER

TYPES OF
NETWORK
DEVICES
NETWORK TOPOLOGIES
A network refers to the configuration of cables,
computers, and other peripherals.

Physical topology should not be confused with logical


topology which is the method used to pass information
between workstations.
TYPES OF NETWORK TOPOLOGIES
TYPES OF NETWORK TOPOLOGIES
LINEAR BUS TOPOLOGY
• Consists of a main run of cable with a terminator at each end.
• All nodes (file server, workstations, and peripherals) are
connected to the linear cable.
• Ethernet and LocalTalk networks use a linear bus topology.
ADVANTAGE AND DISADVANTAGE
• Easy to connect to computer or peripheral to linear bus.
• Entire network shuts down if there is a break in the main
cable.
TYPES OF NETWORK TOPOLOGIES
RING TOPOLOGY
• Ring topology is where nodes are arranged in a circle (or
ring).
• The data can travel through the ring network in either one
direction or both directions, with each device having exactly
two neighbors.
ADVANTAGE AND DISADVANTAGE
• Each device is only connected to the ones on either side,
when data is transmitted, the packets also travel along the
circle, moving through each of the intermediate nodes until
they arrive at their destination.
• if one node goes down, it can take the entire network with it.
TYPES OF NETWORK TOPOLOGIES
STAR TOPOLOGY
• Designed with each node (file server, workstations, and
peripherals) connected directly to a central network hub or
concentrator.
• Data on a star network passes through the hub before
continuing to its destination.
ADVANTAGE AND DISADVANTAGE
• No disruption to the network when connecting and removing
devices
• If the central hub goes down, the rest of the network can’t
function.
TYPES OF NETWORK TOPOLOGIES
TREE TOPOLOGY
• A sort of trunk for the network, with nodes extending outward in
a branch-like fashion.
• Tree topology has a parent-child hierarchy to how the nodes
are connected.
ADVANTAGE AND DISADVANTAGE
• Troubleshooting errors on the network can be a straightforward
process, as each of the branches can be individually assessed
for performance issues.
• the entire network depends on the health of the root node in a
tree topology structure.
TYPES OF NETWORK TOPOLOGIES
MESH TOPOLOGY/FULLY CONNECTED
• an intricate and elaborate structure of point-to-
point connections where the nodes are
interconnected.
• a few nodes with only two or three connections or
it could be fully interconnected.
ADVANTAGE AND DISADVANTAGE
• no single device going down can bring the network
offline.
• Each interconnection between nodes requires a
cable and configuration once deployed, so it can
also be time-consuming to set up
PURPOSE OF NETWORK AND
ALTERNATIVE TECHNOLOGIES

• Interaction and communication between various people at different


locations, using different types of hardware and software.
• Sharing of data and resources so that there is consistency of data.
• Sharing of expensive devices such as printers and scanner.
WORKING WITH FILES,
FOLDERS, AND APPLICATIONS
WORKING WITH FILES,
FOLDERS, AND APPLICATIONS
In this lesson, we'll show you the basics of
working with files, including how
to open files, move your files into folders,
and delete files.
WHAT IS A FILE?
• There are many different types of files.
• Ex. Microsoft Word documents, digital photos,
digital music, and digital videos.
• Its like a digital version of a real world things you
can interact with your computer.
• When you use different applications, you’ll often
be viewing, creating, and editing files.
• Files are usually represented by an icon.
TYPES OF FILES
Documents
.doc/.docx, .pptx, .xls/.xlsx, .pdf, .html, .txt
Pictures
.jpeg, .png, .tiff or .tif, .svg, .gif
Videos
.mov, .mp4, .avi, .flv, .avchd
Songs
.mp3, .m4a, .wav
Application
.exe
WHAT IS A FOLDER?

• Windows uses folders to help you to


organize files.
• You can put files inside a folder.
• You can see some folders on the desktop
WHAT IS A FILE EXPLORER?
You can view and organize files and folders
using a built-in application known as File
Explorer.

Address Bar
WAYS TO OPEN A FILE

Open the application, go to file

Double left click the icon menu, select open, select the file

right click then open


MOVING, RENAMING,
DELETING FILES
MOVING FILES
Windows allows you to move files to different folders.

Go to desire folder then


Right click then select
paste.

Right click the file or


folder, click (cut)

Drag the file/folder to


another folder.
RENAMING FILES
Windows allows you to rename files and create unique
name will make it easier to remember what type of
information is saved in the file or folder

Right click the


file/folder then select
rename Enter your desire
name
DELETING FILES You can also drag the
file to the recycle bin
Windows allows you to delete files you (from desktop)

are no longer use.

When open Recycle Bin


the file you delete was there

Now its gone

Right click the file/


folder, select delete
CREATING AND SELECTING
FILES
CREATE A NEW FILE/FOLDER
Windows allows you to create new file/folder

Right click the empty area,


toggle new, select file you
want to create
SELECTING MORE THAN ONE FILE
Windows allows you to select more files

Drag your mouse to draw To select or deselect specific


a box around the files you files, press control key from
want to select keyboard then click the file
you want.

To select a group of Files


press Shift then select first file and
the last file, and all files between
first and last will be selected
SHORTCUTS
• Windows allows you to create shortcuts on your desktop for the files that
you frequently used to save time.
• A shortcut will have a small arrow in the lower-left corner of the icon.

• Note that creating a shortcut does not create a duplicate copy of the folder;
• it's simply a way to access the folder more quickly.
• If you delete a shortcut, it will not delete the actual folder or the files it contains.
• Also note that copying a shortcut onto a flash drive will not work;
• if you want to bring a file with you, you'll need to navigate to the actual location of
the file and copy it to the flash drive.
CREATE SHORTCUTS

You can also press Alt key


on your keyboard, then
click and drag the file/folder
to the desktop to create
shortcut.
Right click the file, toggle
send to then click desktop
(create shortcut)

A shortcut folder will


appear on the desktop.
Notice the arrow in the
lower-left corner of the icon
FINDING / SEARCHING
FILES ON YOUR COMPUTER
FINDING FILES
• there may be times when you have trouble finding a certain file. If this
happens to you, don't panic!
• The file is probably still on your computer, and there are a few simple ways
to find it.

Default, If you deleted a file by


downloaded files - Downloads mistake, it may still be in
MS Word documents – documents the Recycle Bin.
Photos - pictures
SEARCHING FILES
• If you're struggling to find a file, you can always search for it.
• Searching allows you to look for any file on your computer.

Click the Start button, then type


to search. result will appear
above the search box.
COMPRESS AND EXTRACT
• A compressed file takes up less storage space.
• A smaller file can be transferred faster between
locations e.g. on the Internet.
• Several files and folders are combined into one
package that is easy to manage; it is usually easier to
handle one file than a set of, say, 10,000 files.

.zip windows, linux, and macOS can handle zip files


without having to install a separate zip program

.rar requires installing a separate compression/extraction


program (WinRAR)

.gz common in Linux and unix, which usually have their


own default application for handling them such as qzip

.7z a file extension of the 7 zip packing application.


COMPRESS AND EXTRACT TO EXTRACT
Right click the file,
Click “Extract file”
or “Extract All”
TO COMPRESS
Right click the file,
Toggle “send to”
Click “compressed (zipped) folder
COMPRESS AND EXTRACT TO EXTRACT
Right click the file,
Click “Extract file”
or “Extract All”
TO COMPRESS
Right click the file,
Toggle “send to”
Click “compressed (zipped) folder
COMMON COMPUTER TASKS
THE MENU BAR
Most applications have a Menu bar at the top of the window. Each menu has a set
of commands that will perform a specific action within the program.
THE MENU BAR
You'll find the File menu on the leftmost side of the Menu bar in almost every application.
The File menu will usually have the same type of commands.
CUT, COPY, AND PASTE
Many applications allow you to copy items from If there's something you want to move
one place and then paste them to another. from one place to another, you can cut
and paste instead.
CUT, COPY, AND PASTE
UNDOING AND REDOING CHANGES
Let's say you're working on a text document and
accidentally delete some text.
Most applications allow you to undo your most
recent action when you make a mistake like this.
WHY YOU SHOULDN’T
SHARE YOUR UNDERWEAR
TO SOMEONE ELSE?
SECURING
COMPUTING
DEVICES
SECURING
COMPUTING
DEVICES
SECURITY THREAT BEST PRACTICES WEB BROWSING

SECURING COMPUTING
DEVICES
• Computers and the internet have transformed
almost every aspect of our personal and
professional lives.
• Most modern organization depend on computers,
yet this necessity also carries risk.
• Protecting business data is an important
consideration for any organization, making
computer safety a priority.
• Sensitive information is often valuable, making
computer systems targets to thieves and hackers.
SECURITY THREAT BEST PRACTICES WEB BROWSING

COMPUTER SECURITY
• Computer security refers to measures and
controls that ensure the confidentiality, integrity
and availability of the information processed and
stored by a computer.
• This includes everything from protecting physical
information assets, to data security and computer
safety practices.
• Computer security ensures that a business’s data
and computer systems are safe from breaches
and unauthorized access.
SECURITY THREAT BEST PRACTICES WEB BROWSING

COMPUTER SECURITY THREATS

DENIAL OF SERVICE DATA THEFT BACKDOORS MALWARE


ATTACKS
Denial of Service (DoS) Data theft involves No computer system is malware is a class of
attacks aim to shut accessing secured, perfect, and many pieces computer software
down a machine or private data assets for of software contain designed to disrupt a
network with a flood of the purpose of stealing backdoors, unintentional computer system in
traffic to make service the data itself or gaining vulnerabilities that can order to gain access to,
unavailable for targeted ongoing access to give bad actors access to take control over, steal
users. databases for the a system without going or damage digital
purpose of corporate through normal security assets.
espionage. procedures
SECURITY THREAT BEST PRACTICES WEB BROWSING

COMPUTER SECURITY THREATS

DENIAL OF SERVICE DATA THEFT BACKDOORS MALWARE


ATTACKS
Denial of Service (DoS) Data theft involves No computer system is malware is a class of
attacks aim to shut accessing secured, perfect, and many pieces computer software
down a machine or private data assets for of software contain designed to disrupt a
network with a flood of the purpose of stealing backdoors, unintentional computer system in
traffic to make service the data itself or gaining vulnerabilities that can order to gain access to,
unavailable for targeted ongoing access to give bad actors access to take control over, steal
users. databases for the a system without going or damage digital
purpose of corporate through normal security assets.
espionage. procedures
SECURITY THREAT BEST PRACTICES WEB BROWSING

COMPUTER SECURITY THREATS

DENIAL OF SERVICE DATA THEFT BACKDOORS MALWARE


ATTACKS
Denial of Service (DoS) Data theft involves No computer system is malware is a class of
attacks aim to shut accessing secured, perfect, and many pieces computer software
down a machine or private data assets for of software contain designed to disrupt a
network with a flood of the purpose of stealing backdoors, unintentional computer system in
traffic to make service the data itself or gaining vulnerabilities that can order to gain access to,
unavailable for targeted ongoing access to give bad actors access to take control over, steal
users. databases for the a system without going or damage digital
purpose of corporate through normal security assets.
espionage. procedures
SECURITY THREAT BEST PRACTICES WEB BROWSING

COMPUTER SECURITY THREATS

DENIAL OF SERVICE DATA THEFT BACKDOORS MALWARE


ATTACKS
Denial of Service (DoS) Data theft involves No computer system is Malware is a class of
attacks aim to shut accessing secured, perfect, and many pieces computer software
down a machine or private data assets for of software contain designed to disrupt a
network with a flood of the purpose of stealing backdoors, unintentional computer system in
traffic to make service the data itself or gaining vulnerabilities that can order to gain access to,
unavailable for targeted ongoing access to give bad actors access to take control over, steal
users. databases for the a system without going or damage digital
purpose of corporate through normal security assets.
espionage. procedures
SECURITY THREAT BEST PRACTICES WEB BROWSING

COMPUTER SECURITY THREATS


MALWARE ATTACK
• Users may be asked to take an action, such as clicking a link or opening an attachment.
• Malware uses vulnerabilities in browsers or operating systems to install themselves
without the user’s knowledge or consent.

TROJAN VIRUS Tricks a user into thinking it is a harmless file.


RANSOMWARE Prevents access to the data of the victim and threatens to delete or publish it unless a ransom is
paid.
WORMS To exploit backdoors and vulnerabilities to gain unauthorized access to operating systems.
WIPER MALWARE Intends to destroy data or systems, by overwriting targeted files or destroying an entire file
system.
FILELESS MALWARE Does not require installing software on the operating system. It makes native files such as
PowerShell and WMI editable to enable malicious functions, making them recognized as
legitimate and difficult to detect.
SPYWARE This malware enables malicious actors to gain unauthorized access to data, including sensitive
information like payment details and credentials.
SECURITY THREAT BEST PRACTICES WEB BROWSING

COMPUTER SECURITY THREATS

SOCIAL ENGINEERING ATTACKS


• Social engineering attacks work by psychologically manipulating users into performing
actions desirable to an attacker, or divulging sensitive information.

PHISING Attackers send fraudulent correspondence that seems to come from legitimate sources, usually via
email.
MALVERTISING Online advertising controlled by hackers, which contains malicious code that infects a user’s
computer when they click, or even just view the ad.
BAITING A malware-infected physical device, like a USB, where the target can find it.
Once the target inserts the device into their computer, they unintentionally install the malware.
SECURITY THREAT BEST PRACTICES WEB BROWSING

TYPES OF COMPUTER SECURITY

Application Security

• Application security refers to the measures taken to


Information Security secure software applications from cyber-attacks.

• Examples include two-step authentication, high-


Network Security level encryption, logging, firewalls, intrusion
prevention systems (IPS) and more.
Internet of Things (IoT)
Security
SECURITY THREAT BEST PRACTICES WEB BROWSING

TYPES OF COMPUTER SECURITY

Application Security

• Information security involves the protection of


Information Security digital information, such as data stored in
databases, files, or other repositories.

Network Security • It includes various security measures such as access


control, encryption, and backups.
Internet of Things (IoT)
Security
SECURITY THREAT BEST PRACTICES WEB BROWSING

TYPES OF COMPUTER SECURITY

Application Security
• Network security is the practice of securing a
Information Security computer network from unauthorized access or
attacks.

• It includes the use of firewalls, intrusion detection


Network Security
and prevention systems, and virtual private networks
(VPNs).
Internet of Things (IoT)
Security
SECURITY THREAT BEST PRACTICES WEB BROWSING

TYPES OF COMPUTER SECURITY

Application Security
• Internet of Things (IoT) refers to the network of
Information Security connected devices, such as smartphones, smart
homes, and wearables.

• IoT security involves securing the devices


Network Security
themselves, as well as the network that connects
them.
Internet of Things (IoT)
Security
SECURITY THREAT BEST PRACTICES WEB BROWSING

WHY IS COMPUTER SECURITY IMPORTANT?

• Cybercrime is incredibly common


• Facebook accounts are hacked every single day. Many of these breaches could have been
avoided with proper security practices.
• Having your identity stolen or your accounts compromised can involve hours lost with
account recovery — as well as significant financial losses.
• Computer security is important because it keeps your information protected.
• It’s also important for your computer’s overall health; proper computer security helps
prevent viruses and malware, which allows programs to run quicker and smoother.
SECURITY THREAT BEST PRACTICES WEB BROWSING

Install anti-virus software and


keep all computer software Log off public computers Limit social network information
patched.

Update operating systems,


Back up important and verify
applications, and antivirus Download file legally
that you can restore
software regularly.

Secure your laptop, smart phone


Use a strong password Keep personal information safe
or other mobile devices.
SECURITY THREAT BEST PRACTICES WEB BROWSING

Use a Secure Browser Update Web Browser Don’t store password Be careful about entering
Beware suspicious emails, links, and downloads in your web browser private data on public
computers
Be aware when reading email and browsing the web.
Internet Explorer
The senderisofnot Malicious
an email can software
be spoofed. If an email is If you store your Public computers may
recommended
suspicious,asdoa not follow
often
any takes advantage
links or download passwords in your be infected with
general-use browser. IfIf you
attachments. of security
you are unsure, flaws
hover overina link to browser they may be malware intended to
use an online service
see where that
it points. common programs and viewable by someone steal private data. Avoid
requires Internet Explorer, operating systems. else using your entering private data
reserve it solely for that These flaws are computer, or retrievable including passwords and
use, and use a modern routinely discovered by an attacker. credit card numbers on
browser for general web and fixed in updates. public computers.
browsing.
SECURITY THREAT BEST PRACTICES WEB BROWSING

Beware suspicious emails, links, and downloads

Be aware when reading email and browsing the web.


The sender of an email can be spoofed. If an email is
suspicious, do not follow any links or download
attachments. If you are unsure, hover over a link to
see where it points.
The Four
Elements which
form an effective
security system
Protection is the physical
barrier, such as walls and
fences, which separates
your property from the
rest of the world.
Detection is the
technology which will
alert you to any intruders
which attempt to breach
your perimeter fences or
walls.
Verification is your CCTV
system. It will allow you to
verify exactly what level of
threat an intruder poses
to your site when they are
detected breaching your
perimeter.
Reaction can be as
simple as a phone call to
the local police, or it
could be a security team
for larger sites.
“Password are like underwear.
Don’t let people see it,
Change it very often, and
You shouldn’t share it with strangers”
- Chris Pirilio
WHICH ARE YOU?
A B C
WHICH ARE YOU?
A B C
WHICH ARE YOU?
A B C
WHICH ARE YOU?
A B C
Ergonomics
• The term itself means the “laws of work”.
• It comes from the Greek word ergon (“work”)
and nomos (“laws”).
• The basic principle of ergonomics is to make sure
the job environment is well-matched to the worker,
minimizing stress on that worker’s body.
Ergonomics
is the study of a
person’s efficiency at the
workplace as it relates to
his or her health, safety,
and productivity.
Ergonomics Best Practice
Keyboard and Mouse
Should be directly in front
of the person and within a
comfortable reach.
Ergonomics Best Practice
Keyboard and Mouse
Should be directly in front
of the person and within a
comfortable reach.
Ergonomics Best Practice
Office Furniture
Adjustable chairs or tables
are a must and should also
provide lower-back
support.
Ergonomics Best Practice
Monitor
Needs to be at eye level to
reduce eye and neck
strain.
Ergonomics Best Practice
Ergonomics Principles
1. Work in a neutral position
2. Keep materials within easy reach
3. Work at the proper height
4. Leave adequate clearance
5. Move and stretch throughout the day
6. Keep your environment comfortable
Ergonomics Principles
1. Work in a neutral position
2. Keep materials within easy reach
3. Work at the proper height
4. Leave adequate clearance
5. Move and stretch throughout the day
6. Keep your environment comfortable
Ergonomics Principles
1. Work in a neutral position
2. Keep materials within easy reach
3. Work at the proper height
4. Leave adequate clearance
5. Move and stretch throughout the day
6. Keep your environment comfortable
Ergonomics Principles
1. Work in a neutral position
2. Keep materials within easy reach
3. Work at the proper height
4. Leave adequate clearance
5. Move and stretch throughout the day
6. Keep your environment comfortable
Ergonomics Principles
1. Work in a neutral position
2. Keep materials within easy reach
3. Work at the proper height
4. Leave adequate clearance
5. Move and stretch throughout the day
6. Keep your environment comfortable
Ergonomics Principles
1. Work in a neutral position
2. Keep materials within easy reach
3. Work at the proper height
4. Leave adequate clearance
5. Move and stretch throughout the day
6. Keep your environment comfortable
If you find yourself gazing at screens all day…… USE

RULE
RULE

Every mins spent on using screens


RULE

Look away at something that is feet away from you


RULE

For a total of seconds


DONATE
SELL
RECYCLE
VENDOR
DONATE Donating it to a local school or nonprofit organization

SELL
RECYCLE
VENDOR
DONATE Donating it to a local school or nonprofit organization

SELL Selling it at a garage sale or through an online auction site.

RECYCLE
VENDOR
DONATE Donating it to a local school or nonprofit organization

SELL Selling it at a garage sale or through an online auction site.

Bringing to recycling center bring it to a location authorized in hardware


RECYCLE recycling.

VENDOR
DONATE Donating it to a local school or nonprofit organization

SELL Selling it at a garage sale or through an online auction site.

Bringing to recycling center bring it to a location authorized in hardware


RECYCLE recycling.

VENDOR Shipping to vendors many computer manufacturers and computer hardware


manufacturers also have their own recycling and/or trade-in programs
• CRT monitors have a high
concentration of lead, which
could be a safety hazard if not
disposed them properly.
• CRTs should never be thrown
into the garbage.

CRT Monitor
• Scanners contain toxic materials
that, if thrown in the trash, may
prove an environmental hazard.
• Donate the scanner to a
manufacturer or retailer or contact
a waste management authority.

Scanner
• Manufacturers of alkaline
batteries today have largely
eliminated mercury from their
products, so disposing of these
batteries in the trash is safe.

Batteries
• Different ink and toner
manufacturers may include
different materials in their product.
• You should avoid throwing these
cartridges in the trash.

Ink and Toners


• Functioning hard drives are good
candidates for donation or re-selling,
but you should take care to wipe all
data on the drive before giving it away.
• Malfunctioning or obsolete hard drives
can usually be disposed of in the trash,
as they do not normally contain toxic
materials.

Hard Drive
• LCDs consume much less energy than
CRTs and do not emit nearly as much
electromagnetic radiation as CRTs do.

Liquid Crystal Display


(LCD)
• version 4.0 wireless mouse or
keyboard battery can last up to 5 or 10
years before needing to be replaced.

Bluetooth
POWER STRIP
a device that attaches to a power outlet in
order to provide more outlets for you to use.

SURGE PROTECTOR
provides additional outlets of a power strip
with the added benefit of protecting
connected devices from surges.
Uninterruptible Power Supply (UPS)
A device that provide power to connected
devices in the event of a general power
failure without interruption.
Data backup
A type of information protection
scheme that enables you to store
copies of critical files and folders
on another medium for
safekeeping.
Backup Frequency and Schedules
• Should be regularly done
• Schedule of back up must be set
Backup Storage Device
• Back up storage device
• Locally attached storage
• Offsite/cloud-based
• Network-attached storage (NAS)
Data Restoration
• a type of information
protection scheme that
enables you to recover
stored copies of critical
files and folders from
another medium.
Data Restoration
• Software management involves installing and updating operating
system features, applications, and drivers, as well as obtaining
the appropriate licenses.

• Software versions are changed every time the software is


upgraded, or newer features have been added to it
Considerations on Installing Software
• Hardware Requirements
• Operating System compatibility
ASUS Prime A320M-K

Hyper-X Fury
Ryzen 5 DDR4 3200MHz
2400GE(3.2GHz,
35W,L3:4M,4C)

NVMe M.2 SSD


• A software update is the process of replacing a software application
completely with a newer version.
• It can be done in two ways: either by replacing a few selected files
only, or by completely overwriting the software.
2007 2010 2016 2019 2021 365
General Troubleshooting Tips
• Use common sense
• Check the physical connections
• Check external issues
• Check the adapter to which the
device is connected
General Troubleshooting Tips
• Check Device Manager
• Use the Help and Support Center
• Check for a number of causes
Common Operational Problems

• No input is sent when keys


are pressed on a keyboard
• Mouse is not working
Common Operational Problems

• Unable to print
• No network connectivity
• Hardware device not
working properly

You might also like