0% found this document useful (0 votes)
23 views5 pages

IT Midterm Lecture1

1) This document provides guidelines for securing hardware, software, and data on a computer. It discusses insuring hardware against damage or theft and using security cables and locks. 2) Software can be protected by backing up data regularly onto external drives or disks in case the original files become corrupted. Firewalls can also protect data from internet intruders. 3) Regular system maintenance is important, such as checking that components are powered on and cables are securely connected if issues arise. Signs of problems include error messages, lights flashing, or no output from printers or monitors.

Uploaded by

Kai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views5 pages

IT Midterm Lecture1

1) This document provides guidelines for securing hardware, software, and data on a computer. It discusses insuring hardware against damage or theft and using security cables and locks. 2) Software can be protected by backing up data regularly onto external drives or disks in case the original files become corrupted. Firewalls can also protect data from internet intruders. 3) Regular system maintenance is important, such as checking that components are powered on and cables are securely connected if issues arise. Signs of problems include error messages, lights flashing, or no output from printers or monitors.

Uploaded by

Kai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

COMPUTER SKILLS AND PROTOCOL Here are some guidelines of hardware and software

Midterm Lecture 1 security:


1) Hardware can be secured through insurance
Introduction policies – if your PC is taken or damaged you can
In the industrialized countries of the world, the avoid potential risk to guarantee that you will be
"information revolution" as of now has essentially able to replace it.
changed numerous parts of life: in banking and trade,
work and business, clinical consideration, national 2) You can help limit the hazard to your hardware by
guard, transportation and entertainment. Therefore, guaranteeing that you lock your office/room and
information technology innovation has started to close the window before you leave.
influence (in both good and bad ways) community life,
family life, human relationships, education, freedom, 3) Security cable can likewise be utilized to secure
democracy, and so on. Computer ethics in the broadest your PC and hardware down.
sense can be comprehended as that part of applied
morals which studies and dissects such social and 4) Your software will likely have been from CD and
moral effects of data innovation. in the event that it becomes corrupted you ought
to have the option to re-install it from your
 Ten commandments of computer ethics are the set original disks (just make sure that these you kept
of moral standards that govern the use of it in a safe place).
computers. It is society's perspectives about the
utilization of computers, both hardware and 5) To limit the impact of occurrences like losing your
software. Privacy concerns, intellectual property data/information, you ought to back up all of your
rights and impacts on the general public are a data/information on your HDD, flash-drive, CD-
portion of the common issues of computer ethics. R/CD-RW or whole drive to DVD or external
drive regularly.
 This basic computer skills and protocol topic will
provide you with an understanding of the current 6) To protect your data/information from intruders
technologies used at home and in the workplace. on the Internet you should install a firewall which
We will explain terminology and impart best serves as a protection between the Internet and
practice skills for productive and secure utilization your computer.
of hardware and software of our computer. We
System Maintenance (Stephen, 2008)
will also discuss about system maintenance,
Stephen (2008) stated that as computer are such an
password protection, legal issues and computer
integral part of our lives, you should be able to do at
virus.
least a little basic system maintenance. Even if you are
not confident trying to fix things for yourself, knowing
Hardware and Software Security (Stephen, 2008)
what to check and what to look for can be useful when
 According to Stephen (2008) a lot of individuals
discussing any problems, you encounter.
use and depend on computers, to be aware of
threats and security of devices and
COMPONENTS NOT WORKING
data/information. It is important that users take
If your computer doesn’t seem to be working, the first
appropriate steps to lessen the danger from these
things to check are:
threats. Your computer devices and data on it, is a
Power – make sure that the plugs are in the sockets
very important resource. Therefore, it is important
and that they are switched on.
that you look after it and take safety measures to
Connections – make sure that all the cables are
guarantee that, everything happens, you can
connected properly. The mouse, keyboard, screen, and
recover it from the circumstance.
printer should be attached to the computer’s system
box.
 Computer security can take two forms: software
Hardware Switched On – many computers have
and hardware security. Software security provides
switched on the actual monitor and printer – so if they
barriers and other cyber-tools that protect
don’t seem to be working, check that they are actually
programs, files, and the data/information flow to
switched on.
and from a computer. Hardware security protects
the machine and peripheral hardware from theft ERRORS INDICATORS
and from electronic intrusion and damage. Your computer will give you clues when something is
wrong. These include:
Flashing Lights – e.g. on a printer to indicate a paper
jam
Nothing Appearing on the Monitor – indicating that 3) You must be able to identify the computer as your
it is switched off, or the screen saver has kicked in or property:
there is some other problem (a) have a unique identifying tag affixed;
Bleeps – when you ask your PC to perform some task (b) record the serial number of the system unit
that it can’t do. in another location and
No Printer Output – if there is no paper or the printer (c) put a tracking software.
is switched off
No Pointer – when mouse is disconnected or missing ✓ PROTECTING YOUR COMPUTER from
or faulty ELCTRICAL DAMAGE (Stephen, 2008)
No Message on the Screen – telling you of the 1. Computer components operate on low-voltage
problem. direct current, which they get by converting
higher-voltage alternating current provided by
Tips on Taking Care of Your Personal Computers local utilities.
(Stephen, 2008) 2. (from Brownouts and Power Outages): Using
In the modern world, almost of the households have Uninterruptible Power Supply (UPS)
their own desktop, personal computers, because 3. (from Voltage Differences while Travelling):
computers are very important. It is very useful in Using Transformers and Plug Adapters
education, business, research, and other functions. As 4. (from Static Electricity): Your hands ad body
computer users, we must always take care of our 56 must be the same charge as the system unit case
computers.
✓ PROTECTING YOUR COMPUTER from
In this lesson we will discuss the basic care and SURGES (Stephen, 2008)
maintenance of your computers (Stephen, 2008). 1) Using power strips (extension cords with
1. Do not leave the computer running nightlong. additional receptacles indicates the presence of
2. Turn off the screen monitor, printer and other circuit breaker.
devices once not in use. 2) Using surge suppressor – blocks sudden changes
3. Avoid extreme temperatures in voltage.
4. Clean your computer weekly
5. Do not block ventilation ✓ PROTECTING YOUR COMPUTER from
6. Use a reliable antivirus program OVERHEATING (Stephen, 2008)
7. Keep smoke and dust from getting inside the 1. The system units are equipped with fans to move
computer outside air through the case and over the
8. Keep beverages away from the keyboard components
9. Plug the computer into a dedicated power line if 2. Special rooms with air-conditions
possible 3. Do not place a computer in an enclosed space
10. Install a built-in disk tool where the heat is trapped (example: desks cabinet,
armoires and closets)
✓ PROTECTING YOUR COMPUTER from
PHYSICAL DAMAGE (Stephen, 2008) ✓ PROTECTING STORAGE MEDIA from
Should be always carried in protective cases. MAGNETIC FIELDS (Stephen, 2008)
1) Magnetic fields can affect the beam of electrons
✓ PROTECTING YOUR COMPUTER from from CRT monitor and distort the picture
HUMIDITY (Stephen, 2008) 2) Hard disk is most sensitive to the influence of
1. Allow the computer to warm up to an ambient magnetic field Examples of Magnetic Field:
temperature before you turn it on.  Refrigerator magnets
2. Printer is one example of peripherals that is very  Cones of speakers
sensitive to humidity which  Electric currents like those on powerful motors
causes paper jam and sparks

✓ PROTECTING YOUR COMPUTER from ✓ IDENTIFYING COMMON PROBLEMS that


THEFT (Stephen, 2008) may be avoided by Regular Cleaning(Stephen,
1) Special anti-theft devices such as cables with 2008)
locks can secure the computer to its physical ➢ Overheating due to dust accumulation
location Processor is overheating (sending out beeps through
2) Companies or educational institutions may have a the systems unit speaker)
policy that requires locked doors and limited ➢ Sticky keyboard
access to rooms. ➢ Malfunctioning mouse or trackball
➢ Printing problems due to clogged Ink Jets or Dirty Legal Issues (Stephen, 2008)
Rollers There are also a number of legal issues that computer
users should be aware of:
Password Protection (Stephen, 2008)  Copyright – In simpler terms, copyright is the
Stephen (2008) explained that when working in right to copy. Copyright protects the legal right of
a networked environment you will use a user ID and a the proprietor’s intellectual property. This implies
password to access the system, these are used to the original inventors of products and anyone they
recognize you. These rights give you access to the give authorization to are the only ones with the
drives that you have to use to read and/or write to file exclusive right to reproduce the work.
documents.
There are different levels of password  Software copyright legislation is in place to give
protection accessible to ensure that authorized users the authors and developers of software the same
only can access the system and open and edit the files rights as authors of published written or musical
held on it. works. When you buy a software, you don’t
actually purchase the package, just a license that
➢ User-Level allows you to use the software. The terms of the
1. Password protection can be given at a user level licence are known as the End User Licence
(through the operating system) accordingly, only Agreement (EULA).
authorized users can access the system. With this
kind of password protection, the PC will pause as  Freeware - is software that is free to use. Not like
it boots up and you need to enter your username commercial software, it doesn’t need any payment
and password before you can go any further. or licensing fee. It is similar to shareware package,
2. Careful consideration ought to be given to the however it won’t eventually ask you for payment
passwords that you use to confirm that they can’t to continue using the software. You can legally
be guessed easily. download and use freeware for as long as you
 Don’t use things somebody can connect with you want without having to pay for it.
(e.g. your name or your child’s), your birth date or Note: If you use shareware or freeware try to ensure
vehicle registration. that it comes from a reputable source or is
 Use a combination of letters, numbers and even recommended in PC magazine, etc. the software may
symbols characters with the minimum length, (e.g. not have been tested as thoroughly as commercial
8 characters) that you can recall yet that you think software and it may contain bugs or viruses. There is
it will be hard for someone to guess. however some very good, useful and safe shareware
 Don’t tell anybody about your password and and freeware software available – just be careful!
change it regularly.
 Open Source – refers to any program whose
➢ Folder/ Directories source code is made available for use or
Some folders on the file server can be shared to some modification as users or other developers see fit.
users, they can have access also to your files. To Open source software is typically developed as a
ensure that authorized users only access those files, public collaboration and created freely available
passwords might be used (Stephen, 2008). under a copyright license. Users are permitted to
1. Files - If you have documents on any PC (not just use, change and improve the software and to
on a network) that you don’t want other users to redistributes it is modified or unmodified form.
view or edit, you may be able password-protect
them (most present-day applications allow the  Data Protection Act – The Data Protection Act
user to password-protect individual files). 1984 Purpose of the Act. The Act gives new rights
2. USB / Flash Drive – you can likewise protect the to people about whom data/information is
contents of some memory sticks by assigning a recorded on PC; individuals may find out
password to them. The contents can be checked if information about themselves, challenge it if
you enter the correct password. appropriate and claim compensation in specific
3. Screen Saver – screen saves were originally conditions.
designed to prevent the visual display unit (VDU)
from becoming damaged as a result of a static Computer Viruses and Anti- Viruses
image being displayed on it for a long period of (slideplayer.com, n.d.)
time. When a password is set, you will have to
enter the password to cancel the screen saver. What is COMPUTER VIRUS?
✓ Computer virus refers to a program which damages 7. Trojan Horse Virus - is a kind of malware that is
computer systems and/or destroys or erases data files. ( often disguised as real software. Trojans can be
www.slideplayer.com ) utilized by cyber-thieves and hackers attempting
✓ A computer virus is software that has been written to gain access to clients’ systems. Users are
with the specific purpose of causing havoc on typically tricked in some form it pretends as
computer systems. It is called a virus because it has computer games or application software,
been programmed to 61 spread through the system and whenever executed, computer system will be
on to other computer systems, just like an infectious damaged. Usually comes with monitoring tools
virus spread through the general population. and key loggers, for example a saxophone.wav
✓ Some virus may be harmless, they do no serious file that interests a person gathering sound
damage to your system, but serve to remind you just samples of instruments.
how vulnerable your system may be. Other viruses can
have disastrous effects, deleting files, corrupting disk, DISADVANTAGES OF COMPUTER VIRUS
etc. (slideplayer.com, n.d.)
TYPES OF COMPUTER VIRUS  Format hard disk
(slideplayer.com, n.d.)  Copy, rename and delete files
1. Time Bomb - is a virus program that plays out an  Modify files dates and extensions
action on a specific date. A malicious program  Display false message every few times
that is programmed to "detonate" at a specific time  Damage data
and release a virus onto the computer system or  Damage software
network.
COMPUTER ANTI-VIRUS (Stokes &Johnston,
2. Logical Bomb - is a destructive program that 2020)
performs an activity when a certain action has Antivirus software is a computer program that
happened. It is sometimes referred to as slag code, distinguishes, prevents, and takes action to disarm or
is a string of malicious code used to cause harm to remove malicious software programs, such as viruses
a network. and worms. Antivirus software helps protect your
computer against malware and cybercriminals, looks at
3. Worm - is a kind of malware that spreads data in a web pages, files, software, applications
duplicates of itself from computer to computer. A traveling over the network to your devices. It searches
worm is also a destructive program that fills a for known threats and monitors the behavior of all
computer system with self-replicating programs, flagging suspicious behavior. It seeks to
data/information, obstructing the system so that its block or remove malware as fast as could reasonably
operations are slowed down or stopped. be expected.
4. Boot Sector Virus - infects boot sector of
computers or boot sector of floppy disks or the  Stokes and Johnston (2020). There are so many
Master Boot Record (MBR) of hard disks (some anti-viruses which works against viruses but some
infect the boot sector of the hard disk instead of anti-viruses are trusted and are very famous. There
the MBR). During system boot, the boot sector are 10 ranked anti viruses by
viruses infect at a BIOS level, they use DOS www.toptenreviews.com
commands to spread to other floppy disks. 1. Bit Defender Anti-Virus
2. Kaspersky Anti-Virus
5. Macro Virus - is a computer virus written in the 3. Norton Anti-Virus
similar full-scale language that is utilized for 4. F-Secure Anti-Virus
software applications, such as word processing 6. BullGuard Anti-Virus
(MS Word) and spreadsheet (MS Excel) 7. G-Data Anti-Virus
programs. When opening the infected document, 8. Panda Anti-Virus
macro virus is loaded into main memory and 9. Avast Anti-Virus
destroys the data stored in hard disk.
ADVANTAGES OF COMPUTER ANTI-VIRUS
6. Script Virus - is any type of malicious code that (Stokes & Johnston, 2020)
is executed after a client visits a page that has 1. Protection from Viruses - The basic aim of an
promotions, records or code running out in the Anti-virus is to protect your computer from
background that contains the malicious code. viruses. An anti-virus will keep you away from
Commonly found script viruses are written using getting infected from computer viruses such as
the Visual Basic Scripting edition (VBS) and the trojans, malware and spyware.
JavaScript programming languages
2. Protecting Personal Information - Hackers and someone else. For example, using website's
viruses go hand in hand. A good anti-virus data/information and publishing a book without
program will secure you while you surf the the source to earn benefit.
Internet, preventing hackers from accessing your
personal things such as credit card information 7) Thou shalt not appropriate other people’s
and bank account access. The firewall feature intellectual output. It is a crime, if you copy text
included with most anti-virus software will hinder or images from a website and post them on your
any unauthorized incoming connections to your own website and definitely it is not ethical. For
network or computer, it will prevent from the example, posting new movie that just came out on
hackers from digging their hooks into your life YouTube.
and your computer.
8) Thou shalt think about the social consequences of
Ten Commandments of Computer Ethics (Bynum, the program you are writing or the system you are
2018) designing. Use your IT talents for good purposes.
Ethics is a branch of philosophy that deals with For example, a computer game for kids should not
defining what is right and wrong. Itemized below are have content that can influence them negatively.
10 commandments to help you appreciate computer Similarly, composing malicious software or
ethics. Anybody working in the field of IT is going to making program that can spy on other people's
experience a great deal of moral issues. (Bynum, computer is ethically wrong.
2018).
9) Thou shalt use a computer in ways that show
1) Thou shalt not use a computer to harm other consideration and respect. While communicating
people. You should not program a computer to do over the Internet, one should treat others with
dangerous things to people. For example, to respect by not intruding others' private space and
developed a robot to kill individuals, create not using abusive language. One should be
viruses, or weapons of mass destruction. courteous while communicating over the web and
should respect others' time and resources. For
2) Thou shalt not interfere with other people’s example, chatting with somebody using curse
computer work. Everybody has the right to words.
utilized computers. As the hippies used to say:
“Live and let live!”. For example, deleting friend's Summary
essay document and saying I was just playing. This module discussed the following:
 Occupational Health and Safety Procedure: OHS
3) Thou shalt not use a computer to steal. This one is refers to the legislation, policies, guidelines and
clear; stealing is bad with or without a computer. activities that aim to protect the health, safety and
For example, taking somebody's personal welfare of all individuals at their work
information or idea to use without any consent. environment. People rely on computers to handle
the more tedious details of their social, business,
4) Thou shalt not use a computer to bear false and financial lives.
witness. This commandment means that you  We have also discussed the two aspects of
shouldn’t use a computer to create false facts. For computer hardware security such as the security of
example, photoshopping a picture to make an the hardware itself and how hardware enables
innocent man look guilty or posting something secure software.
like "He or she did ...." without any proves.  System Maintenance
 Tips on Taking Care of Your Personal Computers
5) Thou shalt not use or copy software for which you  Password protection
have not paid. Consider that it is so difficult to  Legal Issues
develop a good software, consider all the  Computer Viruses and Anti- Viruses
individuals and costs included. You have two  10 Commandments of Computer Ethics
options: 1) purchase a license or 2) find an open
source software as an alternative. For example,
cracking demo program and using it forever.

6) Thou shalt not use other people’s computer


resources without authorization or proper
compensation. It is illegal and not ethical to do
bad things on a computer while logged in as

You might also like