Computer Reviewer
Computer Reviewer
9-Amber Score:
COMPUTER REVIEWER
Introduction to Computers
-What is computer?
The computer is an electronic hardware device. It operates and functions under the
control of instructions called programs stored in its memory.
-An information which enters the computer is called "INPUT".
Classification of Computer
1. Supercomputer - are the most powerful computers that continuously are being
used by very large government institutions. Users of supercomputers include
NASA and the US GOVERNMENT.
2. Mainframe compuers - are less powerful than capable of supercomputers but
capable of great processing speed, multitasking capability, and high data
storage. They are mostly used in banks and insurance companies to process
information.
3. Mid-range computers - are used by medium sized companies for a specific
purposes. The size of midrange computers may be as big as a washing machine.
4. Handheld computers - are the smallest computers that are designed to fit into
one hand or palm which is why they are also called palm-top computers
5. Microcomputers - or desktop computers are the most common and widely
used computers today which you can see in homes, schools, and in most
business. There are two types of microcomputers desktop computers and
notebook computers.
Personal computers
1. Desktop Computer
2. Laptop Computer
3. Multi Touch
4. Nettop
5. Netbook
6. Tablet Pc
7. Pocket Pc
8. PDA( personal digital assistant)
9. Smart Phone
Introduction to Internet
-What is Internet?
It is a network of the interlink computer networking worldwide which is accessible to
general public this interconnected computers work by transmitting data through a
special type of packet switching which is known as the IP or the Internet Protocol the
world-wide-web (www) is only a portion of what makes up the internet but it is the
fastest growing part of the internet.
Hacker
-Kevin David Mitnick (Aug 6 ,1923 - Jul 16, 2023)
An american computer security consultant, author, and convicted hacker arrested in
1995 and 5 years in prison for various computers and communication related to
crimes he is also known as the world's most famous hacker.
-Anonymous
A global hacker group known for online protest and has face legal action due to their
activities.
Spamming
-spam is an any kind of unwanted unsolicited digital communication often an email
that gets sent out in bulk.
-a huge waste of time and recources.
Damage company reputation can lead to damage reputation for the company as
recipientsmay view the unsolicited messages intrusive or annoying.
Virus cause significant harm by inspecting users computer with malicious software
capable of damagen systems and personal information.
Waste of time for sale stuff and a waste of money for marketing department
Unresponsive recipients there is a high likelihood that recipients will not respond to
spam emails rendering the effort and resources spent on sending them in effective
Cybercrime
-Illegal activity committed on the internet
Types of Cybercrime
1. Hacking - is simply any unauthorized access of a computer system. White hat
hackers are hired by software companies to find flaws in their system so they
can fix them before black hat or criminal hackers do.
2. Viruses, Worms, Malware and Ransomware - a victim may receive an innocent
looking email that is ostensibly from our worker or trusted individual
containing a link to click on or file to download.
3. Denial-Of-Service (DOS) Attack, Email bombing or Spamming - types of
attacks flood systems with so much information that it can crash the servers
that fiber business depend on.
Cyber Terrorism - is the use of the internet to conduct violent acts that results in or
threaten, loss of life, or significant bodily harm.
Time Wastage - they play games and chat for a long period of time it causes waste of
time and energy.
Types Of Webpages
1. Personal Page - it could be a static or dynamic site where a person post CV,
information about themselves or links to projects.
2. Blog - is a discussion or informational website published on the world wide
web consisting of discrete, often informational diary-style text entries.
3. Forum - an internet forum or message board is an online discussion site where
people can hold conversations in the form of posted messages.
4. Search Engine - is a software system that is designed to carry out web search,
which means to search the world wide web in a systematic way of particular
information specified in a textual web search query.
5. Online Store - electric commerce which allows consumers to directly by goods
or services from a seller over the internet using web browser.
6. Social Media Site - interactive computer mediated technologies that facilitate
the creation of sharing of information, ideas, career, interest and other.
7. Wiki - knowledgebase websites on which users collaboratively modify content
and structure directly from the web browser.
8. Video Site - platforms which allows users to upload, share videos, or live
stream their own videos to the internet.
9. Interactive Web Application - is application software that runs on a web server
unlike computer based software programs that are stored locally on the
operating system (OS) of the device.
10. Learning Management System - is a software application for the
administration documentation tracking report of the delivery of educational
courses training programs or learning and development.
Web browser - is a software application for accessing information on the World Wide
Web.
Uses of Email
● It enables user to easily send and receive documents images, links, and other
files.
● Provides users with the flexibility are communicating with others on their own
schedule.
● One-to-one or a small group communication could be sending professional
follow-up email after appointments, meetings, or interviews.
● Companies can use email to convey information to large amounts of
employees, customers and potential customers.
● Frequently used for newsletters where mailing list subscribers are sent a
specific promoted content from a company and direct email marketing
campaigns where an advertisement or promotion is sent to a targeted of
customers.
Email Security
- to protect sensitive information kept in email communications and accounts from
an authorized access, loss, or destruction.
Email Gateways
- process and scan all receive emails to check for threats that should not be allowed
into the system.
Automated email encryption solutions
- are used to scan all outgoing messages for potentially sensitive formation.
Netiquette
- is a combination of the words network and etiquette and is defined as a set of rules
of acceptable online behavior.
Construction of the words internet and citizens and refers to both a person who uses
the internet.
FOR SOCIETY
● Recognizing that the internet is an extension of society
● Applying the same standards online as we do in public
● Refusing to empower abuse and harassment while online
● Acknowledging cultural differences
FOR BUSINESSES
● Respecting rights of privacy for offline employees
● Maintaining transparency in information policies
INTERNET ACRONYMS
BTW-by the way
AYOR-at your own risk
TTYL-talk to you later
B4N-bye for now
TYT-take your time
DH-dear husband
LOL-laughing out laud
DF-dear friend
ROTFL-rolling on the floor laughing
EML-email me later
FWIW-for what it's worth
JK-just kidding
POV-point of view
SFW-safe for work
AAMOF-as a matter of fact
TYVM-thank you very much
B/C-because
OIC-oh i see
AFAIK-as far as i know
IIRC-if i recall correctly
EOD-end of day
EOM-end of message
C&P-copy and paste
HTH-hope this helps
NNTR-no need to reply
YAM-yet another meeting
ICYMI-in case you missed it
SMH-shaking my head
TBA-to be announce
B2K/BTK-back to keyboard
WFM-works for me