Module 5-6

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

 Malware (malicious software) is a program or code that is designated to infiltrate a system and execute

malicious operations and controls.


 Computer viruses, worms, and Trojan horses are classified as malware, which are programs that act without
a user’s knowledge and deliberately alter the computer’s operations.
 The payload is the destructive event or prank the program is intended to deliver.
 A computer infected by a virus, worm, or Trojan horse often has one or more of the following symptoms:
• Screen displays unusual message or image
• Music or unusual sound plays randomly
• Available memory is less than expected
• Existing programs and files disappear
• Files become corrupted
• Programs or files do not work properly
• Unknown programs or files
• System properties change mysteriously appear

Common Types of Cyber Attacks/ Malware

Denial-Of-Service Attacks
 Also called distributed denial-of-service (DDoS) attack
 It consists of making repeated requests of a computer system or network, thereby overloading it and
denying legitimate users access to it.
 may come from a single computer or from hundreds or thousands of computers that have been taken
over by those intending harm.

Worms
 a program that copies itself repeatedly into a computer’s memory or onto a disk drive.
 Sometimes it will copy itself so often it will cause a computer to crash.
 In 2008–2009, a worm known as Conficker or Downadup, spread through a Microsoft Windows
vulnerability that allowed guessing of network passwords and by people hand-carrying such gadgets as
USB keys, infected millions of computers.
Viruses
 is a “deviant” program, stored on a computer floppy disk, hard drive, or CD, that can cause unexpected
and often undesirable effects, such as destroying or corrupting data.
 The famous email Love Bug (I LOVE YOU), which originated in the Philippines in May 2000 was both a
worm and a virus, spreading faster and causing more damage than any other bug before it.
 A virus called Koobface attacked Facebook.

Trojan Horses
 is a program that pretends to be a useful program, usually free, such as a game or screen saver, but
carries viruses, or destructive instructions, that perpetrate mischief without your knowledge.
 It may allow so-called backdoor programs to be installed.
 A backdoor program is an illegal program that allows illegitimate users to take control of your computer
without your knowledge.

HOW MALWARES ARE SPREAD


Worms, viruses, and Trojan horses are passed in the following ways:
 By infected floppies or CDs
 By opening unknown email attachments
 By clicking on infiltrated websites
 Through infiltrated Wi-Fi hot spots

WAYS TO MINIMIZE VIRUS ATTACKS


Some tips for minimizing the chances of infecting your computer are as follows:
• Don’t open, download, or execute any files, email messages, or email attachments if the source is unknown
• Delete all spam and email messages from strangers. Don’t open, forward, or reply to such messages.
• Back up your data files regularly, and keep the backup hard drive (external) or whatever in a location separate
from your computer
• Make sure you have virus protection software
• Buying a new computer with antivirus software on it does not mean you are automatically protected. You
have to register it with the designer company, and you need to receive antivirus updates.
• Scan your entire system with antivirus software the first time it’s installed; then scan it regularly after that.
• Update your antivirus software regularly.
• If you discover you have a virus, you can ask McAfee or Norton to scan your computer online.

CYBERINTRUDERS
Internet Trolls
 An internet troll is someone who makes intentionally inflammatory, rude, or upsetting statements online to
elicit strong emotional responses in people or to steer the conversation off-topic.
Cyber spies
 Cyber espionage, or cyber spying, is a type of cyberattack in which an unauthorized user attempts to access
sensitive or classified data or intellectual property (IP) for economic gain, competitive advantage or political

1
reasons.

Hackers
 as computer enthusiasts, people who enjoy learning programming languages and computer systems
 as people who gain unauthorized access to computers or networks, often just for the challenge of it.
 Thrill-seeker hackers: Thrill-seeker hackers are hackers who illegally access computer systems simply for
the challenge of it. Although they penetrate computers and networks illegally, they don’t do any damage or steal
anything; their reward is the achievement of breaking in.
 White-hat hackers. White-hat hackers are usually computer professionals who break into
computer systems and networks with the knowledge of their owners to expose security flaws that
can then be fixed. The “white hat” refers to the hero in old Western movies. Kevin Mitnik, a tech
security consultant.

Cyber Thieves
 A cyber thief (known as cybercriminal) is a person who uses his skills in technology to do malicious acts and
illegal activities known as cybercrimes.
 Cyberthieves and cybercriminals are widely available in what is called the “Dark Web” where they mostly
provide their illegal services or products.

Types of Cyber Thef


1. Phishing and Scam
 Phishing is a type of social engineering attack that targets the user and tricks them by sending fake
messages and emails to get sensitive information about the user or trying to download malicious software and
exploit it on the target system.
2. Identity Theft
 Identity theft occurs when a cybercriminal uses another person’s personal data like credit card numbers or
personal pictures without their permission to commit a fraud or a crime.
3. Ransomware Attack
 Ransomware attacks are a very common type of cybertheft/cybercrime. It is a type of malware that has the
capability to prevent users from accessing all of their personal data on the system by encrypting them and then
asking for a ransom in order to give access to the encrypted data.
4. Hacking/Misusing Computer Networks
 crime of unauthorized access to private computers or networks and misuse of it either by shutting it down or
tampering with the data stored or other illegal approaches.
5. Internet Fraud
Internet fraud is a type of cybercrimes that makes use of the internet and it can be considered a general term
that groups all of the crimes that happen over the internet like spam, banking frauds, theft of service, etc.

Online Safety: Antivirus Software, Firewalls, Passwords, Biometric Authentication, & Encryption
ANTIVIRUS SOFTWARE
 Antivirus software scans a computer’s hard disk, CDs, and main memory to detect viruses and, sometimes,
to destroy them. Such virus watchdogs operate in two ways. First, they scan disk drives for “signatures,”
characteristic strings of 1s and 0s in the virus that uniquely identify it. Second, they look for suspicious virus like
behavior, such as attempts to erase or change areas on your disks. Examples of antivirus programs are McAfee
VirusScan, Norton AntiVirus, Pc-cillin Internet Security, Avast!, and ZoneAlarm with Antivirus. Others worth
considering are CA Internet Security Suite Plus, Panda Antivirus Platinum, and McAfee Virex for Macs.

FIREWALLS
 A firewall is a system of hardware and/or software that protects a computer or a network from intruders. The
firewall software monitors all internet and other network activity, looking for suspicious data and preventing
unauthorized access. Always-on internet connections such as cable modem, satellite, and DSL, as well as
some wireless devices, are particularly susceptible to unauthorized intrusion.

PASSWORDS
 Password is the special words, codes, or symbols required to access a computer system. Protecting your
internet access accounts and files with a password isn’t enough. Passwords (and PINs, too) can be guessed,
forgotten, or stolen.

BIOMETRIC AUTHENTICATION
 Some forms of identification can’t be easily faked—such as your physical traits.
 Biometric authentication devices authenticate a person’s identity by comparing his or her physical or
behavioral characteristics with digital code stored in a computer system.

There are several kinds of devices for verifying physical or behavioral characteristics that can be used to
authenticate a person’s identity.
• Hand-geometry systems: Also known as full-hand palm scanners, these are devices to verify a person’s
identity by scanning the entire hand, which, for each person, is as unique as a fingerprint and changes little over
time.
• Fingerprint scanners: These range from optical readers, in which you place a finger over a window, to
swipe readers, such as those built into laptops and some handhelds, which allow you to run your finger across a
bar-like sensor. Microsoft offers optical fingerprint readers to go with Windows XP/Vista.
• Iris-recognition systems: Because no two people’s eyes are alike, iris scans are very reliable identifiers. In
Europe, some airports are using iris-scanning systems as a way of speeding up immigration controls.
• Face-recognition systems: The technology, which compares a live face image with a digitized image stored
2
in a computer, is even used now as a security system for some notebook computers.
• Voice-recognition systems: These systems compare a person’s voice with digitized voice prints stored in a
computer, which the individual has previously “trained” to recognize his or her speech patterns

ENCRYPTION
 Encryption is the process of altering readable data into unreadable form to prevent unauthorized access.
 Encryption is able to use powerful mathematical concepts to create coded messages that are difficult or even
virtually impossible to break.
There are two basic forms of encryption— private key and public key:
• Private key: Private-key (symmetric) encryption means that the same secret key is used by both sender and
receiver to encrypt and decrypt a message. The encryption system DES (for “Data Encryption Standard”) was
adopted as a federal standard for private-key encryption in 1976.
• Public key: Public-key encryption means that two keys are used—a public key, which the receiver has made
known beforehand to the sender, who uses it to encrypt the message, and a private key, which only the receiver
knows and which is required to decrypt the message.

SHORT SUMMARY:

• Malware (malicious software) is a program or code that is designated to infiltrate a system and execute
malicious operations and controls. Computer viruses, worms, and Trojan horses are classified as malware.
• Cyber-attacks include DoS attack, viruses, works and Trojan horses.
• Internet trolls, cyber spies, hackers and cyber thieves are examples of cyber intruders.
• For online safety of all antivirus software, strong passwords, biometrics and encryption can be applied
to prevent malware.

MODULE 5
MICROSOFT EXCEL

Microsoft Excel
 is an example of a spreadsheet program.
 A spreadsheet is used to perform mathematical calculations and financial decision- making and you can
process, summarize, sort, extract, analyze, and store information using a spreadsheet.

Microsoft Excel
 is a powerful electronic spreadsheet program you can use to automate accounting work, organize data, and
perform a wide variety of tasks
 designed to perform calculations, analyze information, and visualize data in a spreadsheet. Also, this application
includes database and charting features.

Workbook
 Another name for an Excel document
 consists of a number of sheets, called worksheets.
 The default number of worksheets visible when you open Excel is 1 (Sheet1). You can add a new sheet at any time
or set the default option to display more sheets upon opening each workbook.
 A sheet is similar to a page in a book.
 A workbook consists of a collection of worksheets.
 Another name for a worksheet is a spreadsheet.

The Excel document window consists of the following:


Rows that are numbered vertically from 1 to 1,048,576 on each sheet
Columns marked horizontally from A-Z, AA-ZZ, up to XFD—16,384 columns on each sheet
The purpose of the window features is to enable the user to perform routine tasks related to the Microsoft applications.
All the Office applications share a common appearance and similar features. The window features provide a quick
means to execute commands.
Spreadsheet Terms
1 Quick Access Toolbar - Displays quick access to commonly used
commands.
2 Search Bar - Advance search will help you find and perform tasks.
3 Title Bar - Displays the name of the application file.
4 File Tab - The File tab has replaced the Office button. It
helps you to manage the Microsoft application and provide access to its options such as Open, New, Save,
As Print, etc.
5 Name Box - Displays the active cell location.
6 Cell - The intersection of a row and column; cells are always named with the column letter followed by the
row number (e.g. A1 and AB209); cells may contain text, numbers and formulas. 7 Range - One or more
adjacent cells. A range is identified by its first and last cell address, separated by a colon. Example ranges are
B5:B8, A1:B1 and A1:G240.
8 Status Bar - Displays information about the current worksheet.
9 New Sheet - Add a new sheet button.
10 Ribbon - Displays groups of related commands within tabs. Each tab provides buttons for commands.
11 Formula Bar - Input formulas and perform calculations.
12 Worksheet - A grid of cells that are more than 16,000 columns wide (A-Z, AA-AZ, BA- BZ…IV) and
3
more than 1,000,000 rows long.
13 View Options - Display worksheet view mode
Spreadsheet Navigation

The following table provides various methods to navigation around a spreadsheet.

ENTER AND EDIT DATA


How to Enter and Edit Data in Excel
Open a Blank Excel File
a. Select cell A1, and then type Budget for Guest
Speakers.
b. Select cell A3, type Item, and then press the Tab key.
c. Select cell B3, type Fall, and then press the Tab key.
d. Select cell C3, type Spring, and then press the Tab
key.
e. Select cell D3, type Summer, and then press the Tab
key.
f. Select cell E3, type Annual, and then press the Tab key.

Adjust Column Width


 Initially all columns have the same width in a spreadsheet.
 Often you will need to make columns wider or narrower
Type Text and Numbers
 Use the plus sign mouse pointer to select a cell then begin
typing in that cell to enter data. If there is existing text/data in a
cell, the new text will replace the existing text.
 Press the Enter or Tab key after typing text in a cell.

Undo and Redo


 Use the Undo button to undo (reverse) previous actions in reverse sequence.
 Choose this option immediately after performing an unwanted action.
 Note that Undo is not available for all commands.
 The Redo button will restore the process that was just undone.

Insert and Delete Rows and Columns


 Insert rows and columns to add information between
existing rows or columns of information.
Text and Number Alignment
 Microsoft Excel aligns data in a cell in three ways; left,
center, and right.
 Also, a range of cells can be merged into one cell; this is
good for text titles.
 The default text alignment is left, and the default
number alignment is right.
 Alignment can be changed by using the alignment icons located on the Home ribbon in the Paragraph group.
 Select a range before changing alignment to more than one cell at a time

Entering data into a set range


 If you know the extent of the range you are needing to enter in a worksheet, then the best way is to select a
range of cells and type up the data.
- Select a range on the worksheet.
- Type the first value and press the Enter key to confirm.
- The cursor will move to the next cell.
- Type the next value, and so on…

Entering data in non-contiguous ranges


 A non-contiguous range means cells not next to each other.
 We will learn how to select non- contiguous cells and then enter data into this range. Selecting using this
method is also very useful when needing to apply formatting to selected cells at once.
- Click on a cell in the worksheet.
- While holding down the Ctrl keyboard key, select other cells in the worksheet.
- Let go of the Ctrl key and start typing values or text into the selected cells.

Entering dates and times


 You will find steps to add the current date and time into a worksheet cell.
Note: Neither of these entries will update should the workbook be closed and opened at another date or time:
1. To enter the current date into the worksheet, ( =CTRL + ; )
2. To enter the current time into the worksheet, ( =CTRL + : )
To insert a date and time that updates automatically every time the workbook is opened, do the following:
1. Insert =today() into a cell to return the current date.
4
2. Insert =now() into a cell to return the current date and time format
Copying data using AutoFill
 The AutoFill handle allows you to copy information to an adjacent range of cells.

FORMAT DATA AND CELLS

Wrapping text
 Data can appear on multiple lines within a single cell.
 Text wrapping is set using more than one method.
 Use the Wrap Text icon on the Home tab, the Format Cells dialog box, or by inserting a line break manually.

Using a line break to wrap text manually gives the user more control over where the text should wrap:
1. Click on an empty cell on the worksheet, and then type the text Safest Solutions into the cell.
2. Directly after the typed words, press Alt + Enter on the keyboard, which will insert the line break
and move the cursor down to the next line in the cell.
3. Type the word Group.
4. Press Enter on your keyboard to accept the text or click on another cell to exit.

5. To use the ribbon to wrap text, click on the Home tab, and then locate the Alignment
group.
6. Click on the Wrap Text icon, and the text is wrapped.

Merging cells
 Merging cells means combining a number of cells.
 The Excel merge tool is often used to combine and center the contents of cells across parts of the
worksheet.
 It is not possible to split cells in Excel, but you are able to merge two cells above two columns to
make it appear as if the cells were split.
Hiding and showing rows and columns
 You have the option to hide columns and rows should you wish to print your worksheet without them
showing, or if another person needs to view the workbook and you do not want them to see a particular
column of data.
 To select a column or row, simply click on the column letter or row number. To select multiple columns and
rows, hold down the mouse and keep it depressed until all the columns or rows have been highlighted.

Setting column widths and row heights


Column widths are set to 8.43 (64 pixels) and rows are set to 15 (20 pixels) by default. Select the column or
columns you wish to resize. Use one of the following methods to change the column width:
1. Right-click over the highlighted column or columns and choose Column Width
2. Enter a value to resize the column or columns into the dialog box provided, and then click on OK to confirm.
Or
1. Locate the Cells group, and then select the Format option.
2. Choose Column Width from the drop-down list provided.
3. Enter a value to resize the columns/s in the dialog box provided.
4. Click on OK to confirm. Alternatively, use the AutoFit Column Width and AutoFit Row Height feature to
automatically size rows and columns to fit the contents within them. Either double-click on the column or row
separator line between a column or a row to resize automatically or select a row and/or column, and then visit
the Format tab of the Cells group, from which you will choose AutoFit Row Height or AutoFit Column Width

EXCEL BASIC FORMULAS


Microsoft Excel
 is an electronic spreadsheet that automates manual calculations involved in accounting and
bookkeeping.

 Do not use any spaces in formulas.


 Also, when creating formulas, you may choose to either type the cell address or use the mouse to
select the cell address.

Create Formula You can create any type of math calculation on your own using the following mathematical
operators:

The numeric keypad on the right side of the keyboard provides most of these operators.
Excel follows the mathematical order of hierarchy where operators are processed in the order:
- negation
- Exponentiation
- multiplication/division
- addition/subtraction.
Use parentheses to clarify the order of calculation in a formula.

Basic steps for creating a formula:


1. Click in the empty cell which will contain the formula.
2. Type an equal sign (=).

5
3. Type the cell address or click the cell that contains the first number.
4. Type the math operator (+ - / * ^).
5. Type the cell address or click the cell that contains the second number.
6. Continue in this manner until the formula is complete.
7. Use parenthesis for clarification.
8. Press the Enter key.

AutoSum
 Adding is the most common math operation performed in Excel. T
 The Home ribbon includes an AutoSum button for adding.
 This button provides a shortcut to typing formulas.

Formula Functions
 Functions provide an automated method for creating formulas
 Excel contains more than 200 functions.
 For example, specific functions are available to calculate a sum, an average, a loan payment, logarithms and
random numbers.
 Functions can be typed, if you know the syntax, or can be inserted by clicking on the Function button located
left of the formula bar.
 All functions are formatted in a similar manner
 The parameters vary depending upon the function.
 Functions and cell addresses may be typed in upper case or lower case.

Sum
 Adding is the most common function performed in Excel.
 The SUM function adds values. Specify values, individual cell addresses, and/or range addresses in the
number x variables.
 Syntax =SUM(number1,number2,...)

Average
 An average sum all values and divides by the total number of values.
 Specify values, individual cell addresses and/or range addresses in the numbers variables.
 syntax =AVERAGE(number1,number2,...)

Maximum (MAX)
 Maximum indicates the largest value in the designated list of numbers.
 syntax =MAX (number1, number2,...)

Minimum (MIN)
 Minimum indicates the smallest value in the designated list of numbers.
 syntax =MIN(number1,number2,...)

Relative versus Absolute Cell Addresses


 As you move and copy formulas, Excel automatically adjusts the part of the cell reference in the formula
that changes as you move down or to the right.
 Excel assumes that everything is relative; that is, relocated and copied formulas will reference information
according to the number of columns and rows they have moved.
 There are situations where automatic adjustment of the cell references does not calculate correctly.
 This is especially true with percentage formulas where the denominator should remain constant.
 A dollar sign ($) placed before the column letter and row number (e.g. $B$6) will lock the address or make it
absolute.

Payment (PMT)
 Payment returns the periodic payment of an annuity based on constant payments and a constant interest
rate.
 syntax =PMT(rate,nper,pv)
When using interest rates, the rate may need to be converted to a percentage and divided by 12 (assuming an
annual percentage rate).

CREATE CHARTS
Charts
 Microsoft Excel can display data graphically in a chart.
 Presenting data in a chart can make it easier to read and more interesting to interpret.
 Charts can also help you evaluate your data and make comparisons between different values.

A. Enter Data
The following exercise will create a simple spreadsheet that will provide the data from which a chart will be created.
- Type the information in the cells
B. Create a Chart
C. Chart Tools
 Microsoft Excel provides many editing options for your chart. When your chart is selected, the Chart Tools
tab will appear on the Ribbon.
 This enables you to edit your chart with a variety of designs, layouts, and formats.
6
D. Add Chart Title
 When a chart is created from the spreadsheet data the text Chart Title will appear above your chart data.
1. Click on the Chart Title text box.
2. Select or delete text.
3. Type your desired title. For this class exercise, type Fiscal Year Comparisons.
E. Create Pie Chart
 Noncontiguous cell ranges can be selected from your spreadsheet to view specific data groupings
1. Select A1:A5, then compress the Ctrl key, and select D1:D5.
2. Click on the Insert tab, click on the Pie button location in the Chart group, and then select the first 2-D Pie
button from the options panel.
3. Your created Pie chart will appear on the spreadsheet.

TYPES OF CHARTS

The following are the most common types of charts used in data visualization:
A. Column and Bar Charts - Excel distinguishes between vertical and horizontal bar charts, calling the former column
charts and the latter bar charts.
 A clustered column chart compares values across categories using vertical rectangles; a stacked column
chart displays the contribution of each value to the total by stacking the rectangles
 100% stacked column chart compares the percentage that each value contributes to a total.
 Column and bar charts are useful for comparing categorical or ordinal data, for illustrating differences
between sets of values, and for showing proportions or percentages of a whole.
B. Line charts provide a useful means for displaying data over time.
C. A pie chart displays this by partitioning a circle into pie-shaped areas showing the relative proportion.
D. An area chart combines the features of a pie chart with those of line charts. Area charts present more information than
pie or line charts alone but may clutter the observer’s mind with too many details if too many data series are used; thus,
they should be used with care.
E. Scatter charts show the relationship between two variables.
F. A bubble chart is a type of scatter chart in which the size of the data marker corresponds to the value of a third
variable; consequently, it is a way to plot three variables in two dimensions.
G. A stock chart allows you to plot stock prices, such as the daily high, low, and close. It may also be used for
scientific data such as temperature changes.
H. A surface chart shows 3-D data.
I. A doughnut chart is similar to a pie chart but can contain more than one data series
J. A radar chart allows you to plot multiple dimensions of several data series.

MODULE SUMMARY
 Microsoft Excel is an example of a spreadsheet program. Other types of spreadsheets are available—
for example, Calc from OpenOffice, and Sheets from Google Docs. A spreadsheet is used to perform
mathematical calculations and financial decision making— for example, for budgets, company reports,
wage sheets, cash flows—to analyze data, and for graphical representation of data. You can process,
summarize, sort, extract, analyze, and store information using a spreadsheet.
 In entering, editing and formatting data in Microsoft Excel various functions are applicable to different
reports depending on the use, type of data and reports to be presented and analyze.
 Basic formulas in excel includes Sum, AutoSum, Average, Min and Max.
 Charts are effective in presenting data visually.

7
8

You might also like