0% found this document useful (0 votes)
16 views

Computer Reviewer

The document provides an overview of computers and the internet. It defines computers and their classification including supercomputers, mainframes, mid-range computers, handheld computers, and microcomputers. It then discusses personal computers and their types. It defines the internet and its applications for education, email, business, e-commerce, media and entertainment, and social networking. It also outlines disadvantages like viruses, hackers, spamming and cybercrime. It concludes with discussing the world wide web, webpages, URLs, web browsers, and uses of email.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Computer Reviewer

The document provides an overview of computers and the internet. It defines computers and their classification including supercomputers, mainframes, mid-range computers, handheld computers, and microcomputers. It then discusses personal computers and their types. It defines the internet and its applications for education, email, business, e-commerce, media and entertainment, and social networking. It also outlines disadvantages like viruses, hackers, spamming and cybercrime. It concludes with discussing the world wide web, webpages, URLs, web browsers, and uses of email.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Jake Andre Lozares 10/22/23

9-Amber Score:

COMPUTER REVIEWER

Introduction to Computers
-What is computer?
The computer is an electronic hardware device. It operates and functions under the
control of instructions called programs stored in its memory.
-An information which enters the computer is called "INPUT".

Classification of Computer
1. Supercomputer - are the most powerful computers that continuously are being
used by very large government institutions. Users of supercomputers include
NASA and the US GOVERNMENT.
2. Mainframe compuers - are less powerful than capable of supercomputers but
capable of great processing speed, multitasking capability, and high data
storage. They are mostly used in banks and insurance companies to process
information.
3. Mid-range computers - are used by medium sized companies for a specific
purposes. The size of midrange computers may be as big as a washing machine.
4. Handheld computers - are the smallest computers that are designed to fit into
one hand or palm which is why they are also called palm-top computers
5. Microcomputers - or desktop computers are the most common and widely
used computers today which you can see in homes, schools, and in most
business. There are two types of microcomputers desktop computers and
notebook computers.
Personal computers
1. Desktop Computer
2. Laptop Computer
3. Multi Touch
4. Nettop
5. Netbook
6. Tablet Pc
7. Pocket Pc
8. PDA( personal digital assistant)
9. Smart Phone

Introduction to Internet
-What is Internet?
It is a network of the interlink computer networking worldwide which is accessible to
general public this interconnected computers work by transmitting data through a
special type of packet switching which is known as the IP or the Internet Protocol the
world-wide-web (www) is only a portion of what makes up the internet but it is the
fastest growing part of the internet.

Application of the Internet


1. Education - the internet has become a major tool for effective teaching as well
as a learning tool. Teachers can use it as a teaching tool by posting their
teaching materials (notes and videos) on school website or forum.
2. Email - it is a very popular way of communicating with others over the internet
an application that allows user to send, receive, and read email is called an
email client.
3. Business - enhancing corporative communication.
4. E-commerce - the applications or e-commerce are used in various business
areas such as retail and wholesale and manufacturing.
5. Media and Entertainment - interconnected devices sensors and systems are
being used by media and entertainment companies.
6. Social Network - social networking is the use of interface social media sites to
stay connected with friends, families, colleagues, customers, or clients. Social
networking can have a social purpose or both through sites such as facebook,
twitter, linkedin, and instagram, among others.

Disadvantages of the Internet


-Virus Threat
Programs that damage the computer system normally function.

Hacker
-Kevin David Mitnick (Aug 6 ,1923 - Jul 16, 2023)
An american computer security consultant, author, and convicted hacker arrested in
1995 and 5 years in prison for various computers and communication related to
crimes he is also known as the world's most famous hacker.
-Anonymous
A global hacker group known for online protest and has face legal action due to their
activities.

Common Types of Computer Virus


1. Resident Virus
2. Multipartite Virus
3. Direct Action
4. Browser Hijacker
5. Overwrite Virus
6. Web Scripting Virus
7. File Injector
8. Network Virus
9. Boot Sector Virus

Spamming
-spam is an any kind of unwanted unsolicited digital communication often an email
that gets sent out in bulk.
-a huge waste of time and recources.

Spamming has several disadvantages that makes it an undesirable practice. Some of


the disadvantages of farming include:

Damage company reputation can lead to damage reputation for the company as
recipientsmay view the unsolicited messages intrusive or annoying.
Virus cause significant harm by inspecting users computer with malicious software
capable of damagen systems and personal information.
Waste of time for sale stuff and a waste of money for marketing department
Unresponsive recipients there is a high likelihood that recipients will not respond to
spam emails rendering the effort and resources spent on sending them in effective

Cybercrime
-Illegal activity committed on the internet
Types of Cybercrime
1. Hacking - is simply any unauthorized access of a computer system. White hat
hackers are hired by software companies to find flaws in their system so they
can fix them before black hat or criminal hackers do.
2. Viruses, Worms, Malware and Ransomware - a victim may receive an innocent
looking email that is ostensibly from our worker or trusted individual
containing a link to click on or file to download.
3. Denial-Of-Service (DOS) Attack, Email bombing or Spamming - types of
attacks flood systems with so much information that it can crash the servers
that fiber business depend on.

Cyber Terrorism - is the use of the internet to conduct violent acts that results in or
threaten, loss of life, or significant bodily harm.

Time Wastage - they play games and chat for a long period of time it causes waste of
time and energy.

World Wide Web


● Webpage - is a document commonly written in html that is viewed in an
internet browser.
- can be accessed by entering a url address into browsers address bar
- may contain text, graphics, and hyperlinks to other web pages and files

Types Of Webpages
1. Personal Page - it could be a static or dynamic site where a person post CV,
information about themselves or links to projects.
2. Blog - is a discussion or informational website published on the world wide
web consisting of discrete, often informational diary-style text entries.
3. Forum - an internet forum or message board is an online discussion site where
people can hold conversations in the form of posted messages.
4. Search Engine - is a software system that is designed to carry out web search,
which means to search the world wide web in a systematic way of particular
information specified in a textual web search query.
5. Online Store - electric commerce which allows consumers to directly by goods
or services from a seller over the internet using web browser.
6. Social Media Site - interactive computer mediated technologies that facilitate
the creation of sharing of information, ideas, career, interest and other.
7. Wiki - knowledgebase websites on which users collaboratively modify content
and structure directly from the web browser.
8. Video Site - platforms which allows users to upload, share videos, or live
stream their own videos to the internet.
9. Interactive Web Application - is application software that runs on a web server
unlike computer based software programs that are stored locally on the
operating system (OS) of the device.
10. Learning Management System - is a software application for the
administration documentation tracking report of the delivery of educational
courses training programs or learning and development.

Uniform Resource Locator (url) - colloquially termed a web address, is a reference to a


web resource that specifies its location on a computer network or a mechanism for
retrieving it.
-Path consisting of a sequence of fat segment separated by a slash (/)
-Query preceeded by a question mark (?), containing a query string of
non-hierarchical data.
-Fragment preceeded by a hash (#)
-Protocol beginning of the URL the most common protocols are Hypertext Transfer
Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS).
-Domain name a unique reference that identifies a website on the world wide web. It
comes directly after the protocol and is separated by a colon and to forward slashes.

Web browser - is a software application for accessing information on the World Wide
Web.

Email (electronic mail) - is the exchange of computer stored messages by


telecommunication.
Email Messages - are usually encoded in american standard code for informational
interchange text (ASCII).

Uses of Email
● It enables user to easily send and receive documents images, links, and other
files.
● Provides users with the flexibility are communicating with others on their own
schedule.
● One-to-one or a small group communication could be sending professional
follow-up email after appointments, meetings, or interviews.
● Companies can use email to convey information to large amounts of
employees, customers and potential customers.
● Frequently used for newsletters where mailing list subscribers are sent a
specific promoted content from a company and direct email marketing
campaigns where an advertisement or promotion is sent to a targeted of
customers.

Types Of B2B Emails


Business to Business (B2B) email marketing
- is used by businesses that are trying to facilitate the exchange of information
products or services between their organizations and other.
● Welcome Emails - are sent to possible bias after they subscribe to a business
opt-in activities such as mailing list or webinar.
● Promotional Emails - offers some sort of deal to buyers, such as a percentage of
the purchase price.
● Lead-nurturing Emails - are use to educate potential buyers on the solutions
and services available.
● Newsletter Emails - are routinely sent to all mailing list subscribers, either
daily, weekly or monthly.
● On-boarding Emails (Post sales Emails) - are often used to strengthen
customers loyalty.
ADVANTAGES OF EMAIL
-Cost Effective, there are various free email services available to individuals and
organizations.
-Email provides users with a non urgent communication process.
- If the user has access to the internet then email can be accessed from anywhere at
anytime.
- Speed And Simplicity, emails are quick and easy to compost with information and
contacts readily available.
-Mass sending, email makes it possible and easy to send one message to large groups
of people.
- Email enables user to filter and categorize their messages.
- Email ail exchanges can be saved and search for easily.
Examples Of Email Attacks
-email is the most common vector for cyberattcaks.
● Spamming - email spam also known as junk email is unsolicited bulk messages
sent through email.
● Spambots - automated programs that crawl the internet looking for email
address.
● Pshing - a form of fraud in which an attacker masquerades as a reputable entity
or person in email or other communication channel.
● Spoofing - email spoofing is the forgery of an email header so that the message
appears to have originated from someone or somewhere other than the actual
source.
● Spear-Phsing - email spoofing is an attack that targets a specific organization
or individual taking an authorized access to sensitive information.
● Business email compromise (BEC) - is an exploit in which the attacker gains
access to a corporate email account.
● Ransomware - is a subset of malware in which the data on a victims computer
is locked typically by encryption.
● Payment is often demanded in a virtual currency - such as bitcoin.

Email Security
- to protect sensitive information kept in email communications and accounts from
an authorized access, loss, or destruction.
Email Gateways
- process and scan all receive emails to check for threats that should not be allowed
into the system.
Automated email encryption solutions
- are used to scan all outgoing messages for potentially sensitive formation.
Netiquette
- is a combination of the words network and etiquette and is defined as a set of rules
of acceptable online behavior.

Construction of the words internet and citizens and refers to both a person who uses
the internet.

FOR SOCIETY
● Recognizing that the internet is an extension of society
● Applying the same standards online as we do in public
● Refusing to empower abuse and harassment while online
● Acknowledging cultural differences
FOR BUSINESSES
● Respecting rights of privacy for offline employees
● Maintaining transparency in information policies
INTERNET ACRONYMS
BTW-by the way
AYOR-at your own risk
TTYL-talk to you later
B4N-bye for now
TYT-take your time
DH-dear husband
LOL-laughing out laud
DF-dear friend
ROTFL-rolling on the floor laughing
EML-email me later
FWIW-for what it's worth
JK-just kidding
POV-point of view
SFW-safe for work
AAMOF-as a matter of fact
TYVM-thank you very much
B/C-because
OIC-oh i see
AFAIK-as far as i know
IIRC-if i recall correctly
EOD-end of day
EOM-end of message
C&P-copy and paste
HTH-hope this helps
NNTR-no need to reply
YAM-yet another meeting
ICYMI-in case you missed it
SMH-shaking my head
TBA-to be announce
B2K/BTK-back to keyboard
WFM-works for me

End Of The Reviewer

You might also like