0% found this document useful (0 votes)
61 views

ITATB Learning Module Week 1 To 7 PM

This document provides information about a course on IT Application Tools in Business offered at St. Vincent's College. It includes the course code, title, instructor details, credit hours, schedule, description, learning outcomes, teaching strategies, grading system, and course outline. The course presents an overview of IT fundamentals and tools used in business environments, including computer terminology, hardware, software, operating systems, and information systems. It will also explore business applications of software like spreadsheets, databases, presentations, word processing, and using the internet for business. Students will learn to distinguish IT concepts, develop an IT culture, understand how computers are used in society, and adapt skills to use common IT tools and software.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views

ITATB Learning Module Week 1 To 7 PM

This document provides information about a course on IT Application Tools in Business offered at St. Vincent's College. It includes the course code, title, instructor details, credit hours, schedule, description, learning outcomes, teaching strategies, grading system, and course outline. The course presents an overview of IT fundamentals and tools used in business environments, including computer terminology, hardware, software, operating systems, and information systems. It will also explore business applications of software like spreadsheets, databases, presentations, word processing, and using the internet for business. Students will learn to distinguish IT concepts, develop an IT culture, understand how computers are used in society, and adapt skills to use common IT tools and software.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

ST.

VINCENT’S COLLEGE INCORPORATED


Padre Ramon St., Dipolog City
Philippines

COLLEGE OF COMPUTER STUDIES

COURSE INFORMATION
Course Number ITATB 12 Course Title IT Application Tools in Business
Course Code Instructor Geneva Caingles Medina
Course Credit 3 units Email Address [email protected] Consultation Hours By appointment
School Year 2020-2021 Class Schedule 01:00 – 03:00 PM (TThS) Room TBA
COURSE DESCRIPTION
This course presents an overview of the IT Fundamentals and Tools used in business environments. This includes computer terminology, hardware, software, operating
systems, and information and application systems. This course will also explore business applications of software, including spreadsheets, databases, presentation graphics,
word processing and business-oriented utilization of the internet.
COURSE LEARNING OUTCOMES
At the end of the course, the students should be able to
• distinguish concepts and principles in Information and Communication Technology (CO1);
• develop a sense of IT culture and an appreciation of the range and power of computer applications (CO2);
• develop and awareness of how computers work and how they are used in the society (CO3);
• adapt skills in using common IT tools and computer software to accomplish tasks (CO4); and
• manage different computer and mobile applications (CO5).
TEACHING STRATEGIES / DELIVERY MODES
Online (Hybrid Model Blended (Asynchronous Model) Offline (Flex Model)
Online teleconferencing lecture/discussion is conducted There will be no classroom meet-ups. Classroom lecture and discussion meet-ups is
only once a week for MWF Classes and once a week for However, web content resources are provided at regular conducted only once a week for MWF Classes and once
TThS classes with two (2) hours per meeting. intervals. a week for TThS classes with two (2) hours per meeting.
Self-directed learning and/or home assignments are to Self-directed learning and/or home assignments are to
be spent with allocated two (2) hours per week. be spent with allocated two (2) hours per week.
The remaining two (2) hours per week is to be devoted Assessment and evaluation will be done at regular The remaining two (2) hours per week is to be devoted
in checking the materials submitted/sent by the students intervals depending on the promptness of the in checking the materials submitted/sent by the students
and giving feedbacks, discussions, and clarifications. compliance of students to every assessment given. and giving feedbacks, discussions, and clarifications.
GRADING SYSTEM
Blended (Asynchronous
Description Online (Hybrid Model Offline (Flex Model)
Model)

Attendance and Class Participation 20.0% 20.0% 20.0%


Major Examinations 30.0% 30.0% 30.0%
Projects 50.0% 50.0% 50.0%
Total 100.0% 100.0% 100.0%

COURSE OUTLINE
Preliminary Term Midterm Semi-Final Term Final Term

Week 1 – 2 Week 3 – 4 Weeks 6 – 7 Week 9


• Industry in the Profession / • Evolution of Computing • Malware • Digital Laws and Ethics in
Appreciation of Computing in Business
Different Fields Week 8
Week 5 • ICT Security
• Key Components of a
Computer Systems, Operating
System

Preliminary Term Major Examination Midterm Major Examination Semi-Final Term Major Examination Final Term Major Examination
(1 day) (1 day) (1 day) (1 day)
INDUSTRY IN THE PROFESSION / APPRECIATION OF COMPUTING IN DIFFERENT FIELDS
Time Duration and Allotment: Week 1-2; 12 hours

Lesson Objectives:
As a result of completing this learning module, students will be able to
• determine the functions that computers do;
• compare data and information;
• distinguish the characteristics of computers;
• determine the various generations of computers;
• determine the effects of the changes brought by Information Technology to your Life; and
• distinguish the advantages and disadvantages of computers.

Topics:
The World of Computers
The Information Technology in your Life: Your Future Now
Advantage and Disadvantage of Computers

Module Guide:

1. Study topic content presented below. (TOPIC CONTENTS)

2. Answer the exercises presented after the topic content below. (ACTIVITY)

TOPIC CONTENTS:

I. The World of Computers

A. Introduction to Computers
Many people believe that knowing how to use a computer, is one of the basic skills needed to succeed in the workplace. In order to use the computer, it is necessary to
understand how the computers works.
Piece by piece. Each of these pieces should be a well-delineated portion of the system, with carefully defined inputs, outputs, and functions.
B. What is Computer?
The computer is an electronic device that accepts data, performs operations on that data, presents the results, and stores the data or results as needed. And give you desired
result. It performs four primary operations, and these are:
1. INPUT – entering data into the computer
2. PROCESSING – performing operations on the data
3. OUTPUT – presenting the results
4. STORAGE – saving the data, or output for future use.

B.1. What is Data?


Data is a collection of facts, figures and statistics related to an object. Data can be processed to create useful information. Data is a valuable asset for an organization.
Data can be used by the managers to perform effective and successful operations of management. It provides a view of past activities related to the rise and fall of an
organization. It also enables the user to make better decision for future. Data is very useful for generating reports, graphs and statistics.
Example: Students fill an admission form when they get admission in college. The form consists of raw facts about the students. These raw facts are student’s name, father
name, address etc. The purpose of collecting this data is to maintain the records of the students during their study period in the college.

B.2. What is Information?


The manipulated and processed form of data is called information. It is more meaningful than data. It is used for making decisions. Data is used as input for processing
and information is used as output of this processing.
Example: Data collected from census is used to generate different type of information. The government can use it to determine the literacy rate in the country. Government
can use the information in important decision to improve literacy rate.

B.3. Characteristics of a Computer


Now-a-days computer is playing a main role in everyday life it has become the need of people just like television, telephone or other electronic devices at home. It solves
the human problems very quickly as well as accurately. The important characteristics of a computer are described below: The characteristics of a computer are:
B.3.a. Speed: The computer is a very high-speed electronic device. The operations on the data inside the computer are performed through electronic circuits according
to the given instructions. The data and instructions flow along these circuits with high speed that is close to the speed of light. Computer can perform millions of billions
of operations on the data in one second.
B.3.b. Spontaneous (Automatic): The computers are automatic. It may execute the process without any intervention of user once they are assigned to a work. Once
the data or instruction are fetched from the secondary devices such as optical disks, hard disks, and etc. Immediately, they get stored into RAM (primary memory) and
then sequentially they get executed.
B.3.c. Storage: A computer has internal storage (memory) as well as external or secondary storage. In secondary storage, a large amount of data and programs (ser
of instructions) can be stored for future use. The stored data and programs are available any time for processing. Similarly, information downloaded from the internet
can be saved on the storage media.
B.3.d. No Feelings: Computer is an electronic machine. It has no feelings. It detects objects on the basis of instructions given to it. Based on our feelings, taste,
knowledge and experience: we can make certain decisions and judgments in our daily life. On the other hand, computer cannot make such judgments on their own. Their
judgments are totally based on instructions given to them.
B.3.d. Consistency: People often have difficulty to repeat their instructions again and again. For example, a lecturer feels difficulty to repeat a same lecture in a class
room again and again. Computer can repeat actions consistently (again and again) without losing its concentration.
B.3.e. Communications: Today computer is mostly used to exchange messages or data through computer networks all over the world. For example, the information
can be received or send through the internet with the help of computer. It is most important feature of the modern information technology.
B.3.f. Diligence: A computer can continually work for hours without creating any error. It does not get tired while working after hours of work it performs the
operations with the same accuracy as well as speed as the first one.

B.4. Generations of Computers


The term generation indicates the type of technology used in the computer construction. As new technology was emerging, it was being used in the making of computer.
The new technology improved the speed, accuracy and storage capacity of the computers. Different technologies have been used for computers
in different times. Therefore, computers can be divided into five generations depending upon the technologies used. These are:
B.4.a. First Generation (1942-1955): The vacuum tube technology was used in first-generation computers. Mark-1m, ENIAC, EDSAC, EDVAC, UNIVAC-1 etc.
machines belong to the first generation of computers. The machine language only was used in first-generation computers. The Advantages are: (1) these computers were
fastest of their time, and (2) they were programmed using machine language. The disadvantages are: (1) unreliable, (2) very costly, (3) generate lot of heat, (4) huge size,
(5) need of Alternating Current (AC), (6) non-portable, (7) consumed lot of electricity, and (8) constant (or frequent) maintenance required.
B.4.b. Second Generation (1955-1964): This generation using the transistor were cheaper, consumed less power, more compact in size, more reliable and faster than
the first-generation machines made of vacuum tubes. The Advantages are: (1) use of transistors, (2) reliable as compared to First generation computers, (3) smaller size
as compared to First generation computers, (4) generate less heat as compared to First generation computers, (5) consumed less electricity as compared to First generation
computers, (6) faster than first generation computers, and (7) assembly language was introduced. The disadvantages are: (1) still very costly, (2) A.C. needed, and (3)
constant (or frequent) maintenance required.
B.4.c. Third Generation (1964-1975): The third generation of computer is marked by the use of Integrated Circuits (IC’s) in place of transistors. A single I.C has
many transistors, resistors and capacitors. This development made computers smaller in size, reliable and efficient.
The Advantages are: (1) more reliable, (2) smaller size, (3) generate less heat, (4) faster, (5) lesser maintenance, (6) consumed lesser electricity, (7) support high level
language, (8) magnetic disk, used for external storage, (9) more storage capacity, and (10) many input/output devices were introduced such as mouse and keyboard etc..
The disadvantages are: (1) still costly, and (2) A.C. needed.
B.4.d. Fourth Generation (Since 1975): The fourth generation of computers is marked by the use of Very Large Scale Integrated (VLSI) circuits. VLSI circuits
having about 5000 transistors and other circuit elements and their associated circuits on a single chip made it possible to have microcomputers of fourth generation. Fourth
Generation computers became more powerful, compact, reliable, and affordable. As a result, it gave rise to personal computer (PC) revolution. The Advantages are: (1)
very large-scale integration (VLSI) technology used, (2) Very cheap, (3) portable and reliable, (4) use of Personal Computer’s (PC’s), (5) smaller in size, (6) production
cost is very low, (7) very high processing speed, and (8) very large internal and external storage capacity. The disadvantages are: (1) highly sophisticated technology
required for the manufacturer of microprocessor chips.
B.4.e. Fifth Generation (Since 1980): The main drawback of first to fourth generation computers is that the computers have not their own thinking power. These
are totally depending upon the instructions given by the users. Fifth generation computers are supposed to be the ideal computers, but do not exist. The scientists are
working to design such computers that will have the following features: (1) having their own thinking power, (2) making decisions themselves, (3) having capabilities of
reasoning, (4) having large capacity of internal storage, (5) having extra high processing speed, and (6) faster than first generation computers. The main features of Fifth
Generations are: (1) Ultra Large Scale Integration Circuits (ULSIC) technology, (2) development of true artificial intelligence, (3) advancement in parallel processing, (4)
more user friendly interfaces with multimedia features, and (5) very powerful and compact computers at cheaper rates.
II. The Information Technology in your Life: Your Future Now
As the result of developments in information technology, smartphones and tablet computers are changing nearly everything we do. Information technology refers to any
technology that helps produce, manipulate, store, communicate, and/or disseminate information. Information technology affects almost all aspects of our lives, including
education health, finance, recreation and entertainment, government, jobs and careers, and your personal life.

A. Definition of Computer Technology & Communications Technology


A.1. Computer Technology. A computer is a programmable, multiuse machine that accepts data – raw facts and figures – and processes, or manipulates it into information
we can use.
A.2. Communications Technology. Also called as telecommunications technology, consists of electromagnetic devices and systems for communicating over any distance.

B. Education: The Promise of More Interactive & Individualized Learning


B.1.Online Learning, or distance learning, is becoming common. Not all online schools/courses are accredited; students should check. Online courses are less expensive
than traditional courses. Distance learning is useful to students in rural areas.
B.2. Tutoring, simulation, and avatars are also aspects of IT in education.

C. Health: High-Tech for Wellness


Computers are playing important roles in our personal lives.
C.1.Telemedicine: Medical care via telecommunications lets doctors treat patients from far away.
C.2. The 3D Computer models allow accurate cancer location inside a brain; X-rays, MRIs, CT scans can be done remotely.
C.3. The Robots – automatic devices that perform functions ordinarily performed by human beings – permit precise microsurgery.
C.2. Health websites provide medical information.
C.2. Many health records are stored electronically.

D. Money & Business: Toward the Cashless Society


Information technology is reducing the use of traditional money.
Virtual means something that is created, simulated, or carried on by means of computer or a computer network. Virtual money includes cash-values cards, automatic
transfers, and digital money.
▪ “Electronic wallets” (e.g. PayPal)
▪ Electronic payroll deposit
▪ Online bill paying via debit and credit cards
▪ Micropayments for online products and to help charities
Smartphones are used for “showrooming” and shopping.
Technology can also be used to telecommute (e-work) and to start businesses and earn money.

E. Government & Electronic Democracy: Participating in the Civic Realm


Information technology is helping governments to deliver services and its affecting political activism.
▪ Information T can help governments to improve services, including police services, which use databases, computer systems with a collection of interrelated files.
▪ Online voting is becoming common.
▪ Information is easier to disseminate.
▪ Watchdog websites are growing.
▪ Easier fund raising from small donors.
But:
▪ Gerrymandering is becoming easier – redrawing voting districts for partisan advantage.
▪ Voting machine problems can occur.
▪ Invasion of privacy is becoming an important issue.

F. Jobs & Careers


People now use computers to post resumes (CVs) and find jobs.
▪ IT is used in starting new business ventures.
▪ IT is used to prepare resumes and find jobs on many websites.
▪ To help find jobs, participate in social media and write comments on blogs (weblogs), frequently updated sites on the web intended for public consumption that
contain a writer’s observations, opinions, images, and links to other websites. (But be aware of privacy issues and DON’T POST inappropriate pictures or text!)
(Internet postings live forever!)
▪ Basic computer skills are needed for most jobs:
- Know how to use a keyboard.
- Use email.
- Be able to use a word processor (usually Microsoft Word).
- Know basic spreadsheet and database skills.
- Understand the basics of file sizes, computer memory limitations, and network arrangements.
- Know what the basic computer system components are.

G. Your Personal Life


Computers are playing important roles in our personal lives.
▪ Online relationship sites, or online dating sites provide electronic forums that people may join in the hope of meeting compatible companions or mates.
▪ “Digital is embedded into the fiber or every aspect of our culture and our personal lives” – public safety and security; in the home; entertainment; finance;
communications; traveling; shopping; medical care; and so on.

III. Advantage and Disadvantage of Computers


A. Advantages of Computer
• Easy processing of complex tasks.
• It saves time by quick manipulation of data as compared to when done manually.
• The errors in data processing are minimized when a computer is used.
• It has helped in making communication easier by using internet.
• It stores, retrieves, and processes a large amount of data.
• It helps in multitasking of various jobs.

B. Disadvantages of Computer
• Unemployment
• Cyber-crimes
• Computer can perform only what it is programmed to do.
• Computer need well defined instructions to perform any operation.

ACTIVITY
Answer the following questions below:
1. Describe computers and their features. (5 points)
2. Compare the differences of data and information (5 points)
3. Explain the various generations of computers. (5 points)
4. As a student, how are you affected by the changes brought by Information Technology to your life? (5 points)
5. What are the pros and cons of computers? Name at list 2 pros and 2 cons. (5 points)
Activities, Resources, and Assessment
Online (Hybrid Model) Blended (Asynchronous Model) Offline (Flex Model)
Resources: Resources: Resources:
Schoology App/Messenger Schoology App/Messenger Schoology App/Messenger
E-book: Fundamentals of Computers E-book: Fundamentals of Computers E-book: Fundamentals of Computers

Activities: Activities: Activities:


Topic discussion will be through GoogleMeet App., during Topic discussion will be through GoogleMeet App., during Topic discussion will be during classroom meetups, and
which the activities will be supplied with answers. which the activities will be supplied with answers. Such during which the exercises will be supplied with answers.
teleconferencing will be recorded, the video of which will
be made available to you via Messenger Group Chat or
Gmail address.

Assessment: Assessment: Assessment:


Topic quiz will be published at Schoology App. Topic quiz will be published at Schoology App. Topic quiz will be issued to you and will be answered at
Instructions as to the time allocated for answering and Instructions as to the time allocated for answering and home, which will be immediately due for submission the
deadline for submission of quiz will be announced via deadline for submission of quiz will be announced via following day at the box placed at the SVCI guard house.
Messenger Group Chat. Messenger Group Chat. Communication as to the receipt the said quiz will be
through text messaging.

REFERENCES:

• Basic of Computer Introduction – World of Computers (slideshare.net)


• Introduction to Information Technology: The Future Now – ppt download (slideplayer.com)
EVOLUTION OF COMPUTING
Time Duration and Allotment: Week 3-4; 12 hours

Lesson Objectives:
As a result of completing this learning module, students will be able to
• compare the varieties of computers; and
• determine the types of computers.

Topics:
“All Purpose Machine”: The Varieties of Computers
Types of Computers

Module Guide:

1. Study topic content presented below. (TOPIC CONTENTS)

2. Answer the exercises presented after the topic content below. (ACTIVITY)

TOPIC CONTENTS:

I. “All Purpose Machine”: The Varieties of Computers


Computers are classified according to their data processing speed, amount of data that they can hold and price. Generally, a computer with high processing speed and large
internal storage is called a big computer. Due to rapidly improving technology, we are always confused among the categories of computers. Depending upon their speed and
memory size, computers are classified into following four main groups:

A. Supercomputers
Supercomputer is the most powerful and fastest, and also very expensive. It was developed in 1980s. It is used to process large amount of data and to solve the complicated
scientific problems. It can perform more than one trillion calculations per second. It has large number of processors connected parallel. So, parallel processing is done in
this computer. In a single supercomputer thousands of users can be connected at the same time and the supercomputer handles the work of each user separately.
Supercomputer are mainly used for: (1) weather forecasting, (2) nuclear energy research, (3) aircraft design, and (4) to control industrial units.

B. Mainframe Computers
Mainframe computers are also large-scale computers but supercomputers are larger than mainframe. These are also very expensive. The mainframe computer specially
requires a very large clean room with air-conditioner. This makes it very expensive to buy and operate. It can support a large number of various equipment. It also has
multiple processors. Large mainframe systems can handle the input and output requirements of several thousands of users. For example, IBM, S/390 mainframe can
support 50,000 users simultaneously. There are basically two types of terminals used with mainframe systems. These are: (1) dumb terminal (Dumb terminal does not
have its own CPU and storage devices. This type of terminal uses the CPU and storage devices of mainframe system. Typically, a dumb terminal consists of monitor and
a keyboard (or mouse).), and (2) intelligent terminal (Intelligent terminal has its own processor and can perform some processing operations. Usually, this type of terminal
does not have its own storage.). The mainframe computers are specially used as servers on the World Wide Web. The mainframe computers are used in large organizations
such as Banks, Airlines and Universities etc. where many people (users) need frequent access to the same data, which is usually organized into one or more huge databases.
IBM is the major manufacturer of mainframe computers.

C. Minicomputers
These are smaller in size, have lower processing speed and storage capacity as compared to mainframe. They are also less expensive than mainframe. Hence, their
performance also will be less than that of mainframes. The minicomputers are used in business, education and many other government departments. Although some
minicomputers are designed for a single user but most are designed to handle multiple terminals. Minicomputers are commonly used as servers in network environment
and hundreds of personal computers can be connected to the network with a minicomputer acting as server like mainframes, minicomputers are used as web servers.

D. Microcomputers
The invention of microprocessor (single chip CPU) gave birth to the much cheaper microcomputers. They are further classified into: (1) desktop computers (Desktop
computers are also known as personal computers or simply PCs. They are usually easier to use and more affordable. They are normally intended for individual users for
their word processing and other small application requirements.), (2) laptop computers (Laptop computers are portable computers. They are lightweight computers with a
thin screen. They are also called as notebook computers because of their small size. They can operate on batteries and hence are very popular with travelers. The screen
folds down onto the keyboard when not in use.), and (3) handheld computers (Handheld computers or Personal Digital Assistants (PDAs) are pen-based and also battery-
powered. They are small and can be carried anywhere. They use a pen like stylus and accept handwritten input directly on the screen. They are not as powerful as desktops
or laptops but they are used for scheduling appointments, storing addresses and playing games. They have touch screens which we use with a finger or a stylus.).

E. Microcontrollers
It is a tiny computer on a single metal-oxide semiconductor integrated circuit chip. These are also referred to specialized microprocessors installed in “smart” appliances
and automobiles. They are also called as embedded computers which contains one or more CPUS (processor cores) along with memory and programmable input/output
peripherals.

II. Types of Computers


Computers can also be divided into three categories depending upon their instruction and form of input data that they accept and process. These are:

A. Analog Computers
The word "Analog" means continuously varying in quantity. The analog computers accept input data in continuous form and output is obtained in the form of graphs. It
means that these computers accept input and give output in the form of analog signals. The output is measured on a scale. The voltage, current, sound, speed, temperature,
pressure etc. values are examples of analog data. These values continuously increase and decrease. The analog computers are used to measure the continuous values. The
thermometer is an example of analog device because it measures continuously the length of a mercury column.
B. Digital Computers
The word "Digital" means discrete. It refers to binary system, which consists of only two digits, i.e. 0 and 1. Digital data consists of binary data represented by OFF (low)
and ON (high) electrical pulses. These pulses are increased and decreased in discontinuous form rather than in continuous form. The digital computer is designed using
digital circuits in which there are two levels for an input or output signal. These two levels are known as logic 0 and logic 1. Digital Computers can give more accurate
and faster results. Digital computer is well suited for solving complex problems in engineering and technology. Hence digital computers have an increasing use in the field
of design, research and data processing. Digital computers can be further classified as, (1) General Purpose Computers, and (2) Special Purpose Computers. Special
purpose computer is one that is built for a specific application. General purpose computers are used for any type of applications. They can store different programs and do
the jobs as per the instructions specified on those programs. Most of the computers that we see today, are general purpose computers.

C. Hybrid Computers
A hybrid computer combines the desirable features of analog and digital computers. It is mostly used for automatic operations of complicated physical processes and
machines. Now-a-days analog-to-digital and digital-to-analog converters are used for transforming the data into suitable form for either type of computation. For example,
in hospital’s ICU, analog devices might measure the patient’s temperature, blood pressure and other vital signs. These measurements which are in analog might then be
converted into numbers and supplied to digital components in the system. These components are used to monitor the patient’s vital sign and send signals if any abnormal
readings are detected. Hybrid computers are mainly used for specialized tasks.

Difference between Analog and Digital


ANALOG DIGITAL
Accept input data in continuous form and output is measured on a scale Accept input data in digital form and output is received in digital form.
It may have some errors in output. Output is accurate.
Have low internal memory. Have large internal memory.
Have fewer functions. Have large number of functions.
It is used only in scientific, industrial and medical fields. It is general purpose in use.
It is costly. It is low in cost.
It is not easily programmed. It is easily programmed.

ACTIVITY
Answer the following questions below:
1. Make a table of comparison for the varieties of computers. (10 points)
2. What is an analog computer and how is it different from a digital computer? (5 points)
Activities, Resources, and Assessment
Online (Hybrid Model) Blended (Asynchronous Model) Offline (Flex Model)
Resources: Resources: Resources:
Schoology App/Messenger Schoology App/Messenger Schoology App/Messenger
E-book: Fundamentals of Computers E-book: Fundamentals of Computers E-book: Fundamentals of Computers
Activities: Activities: Activities:
Topic discussion will be through GoogleMeet App., during Topic discussion will be through GoogleMeet App., during Topic discussion will be during classroom meetups, and
which the activities will be supplied with answers. which the activities will be supplied with answers. Such during which the exercises will be supplied with answers.
teleconferencing will be recorded, the video of which will
be made available to you via Messenger Group Chat or
Gmail address.

Assessment: Assessment: Assessment:


Topic quiz will be published at Schoology App. Topic quiz will be published at Schoology App. Topic quiz will be issued to you and will be answered at
Instructions as to the time allocated for answering and Instructions as to the time allocated for answering and home, which will be immediately due for submission the
deadline for submission of quiz will be announced via deadline for submission of quiz will be announced via following day at the box placed at the SVCI guard house.
Messenger Group Chat. Messenger Group Chat. Communication as to the receipt the said quiz will be
through text messaging.

REFERENCES:

• Basic of Computer Introduction - World of Computers (slideshare.net)


• Introduction to Information Technology: The Future Now - ppt download (slideplayer.com)
KEY COMPONENTS OF A COMPUTER SYSTEMS, OPERATING SYSTEM
Time Duration and Allotment: Week 5; 6 hours

Lesson Objectives:
As a result of completing this learning module, students will be able to
• determine the necessary components of a computer system;
• distinguish the functions of input and output devices; and
• determine the essential functions of an operating system.

Topics:
Components of Computer System: Hardware and Software
Input and Output Devices
Functions of Operating System

Module Guide:

1. Study topic content presented below. (TOPIC CONTENTS)

2. Answer the exercises presented after the topic content below. (ACTIVITY)

TOPIC CONTENTS:

I. Components of Computer System: Hardware and Software


Computers are classified according to their data processing speed, amount of data that they can hold and price. Generally, a computer with high processing speed and large
internal storage is called a big computer. Due to rapidly improving technology, we are always confused among the categories of computers. Depending upon their speed and
memory size, computers are classified into following four main groups:

A. The Computer System


Computer is an electronic machine that is used to solve different kinds of problems according to a set of instructions given to it. Computer consists of different units that
perform various functions. All the operations of the computer are controlled by the program instructions. These program instructions are known as software. A system is
a group of related components that make up a body to perform a specific function. Therefore, computer system is defined as: “The computer along with various units
and software that performs different activities in data processing are collectively known a computer system.” A computer system is divided into two subsystems: (1)
Computer Software, and (2) Computer Hardware.
A.1. Computer Software
A set of instructions given to the computer in machine code that tells the computer what to do and how to perform the given task of the user is known as computer software.
The software is developed in computer programming languages. You cannot feel, touch or see software inside the computer memory. The Computer software is classified
into two main categories:
A.1.a. Application Software
A set of programs used to solve particular problems of user through computer is called Application software. It is also known as application package. The ready
packages are also available in market on CDs for various purposes. These are used by user who does not know the computer programming. The users solve their
problems by using ready packages more easily and quickly. Some of application packages are:
A.1.a.1. Word Processing software (e.g. Word)
A.1.a.2. Spreadsheet software (e.g. Excel)
A.1.a.3. Database Management System software (e.g. Oracle Microsoft Access)
A.1.a.4. Communication software (e.g. Internet Explorer)
A.1.b. System Software
The operating system and utility programs are the two major categories of system software. Just as the processor is the nucleus of the computer system, the operating
system is the nucleus of all software activity. The operating system is the most important program that runs on a computer. Every general-purpose computer must have
an operating system to run other programs. Operating systems perform basic tasks, such as:
A.1.b.1. Recognizing input from the keyboard
A.1.b.2. Sending output to the display screen
A.1.b.3. Keeping track of files and directories on the disk
A.1.b.4. Controlling peripheral devices such as disk drives and printers.
It is the first program loaded into memory when the computer is turned on and, in a sense, brings life to the computer hardware. Without it, you cannot use your word
processing software, spreadsheet software, or any other applications.
Without an operating system, you cannot communicate with your computer. When you give the computer a command, the operating system relays the instructions to
the 'brain' of the computer, called the microprocessor or CPU. You cannot speak directly to the CPU because it only understands machine language. When you are
working
in an application software program, such as Microsoft Word, commands that you give the application are sent through the operating system to the CPU. Windows2000,
Window95/98, Mac OS, Unix and DOS are all examples of operating systems.
Utility programs help manage, maintain and control computer resources. These programs are available to help you with the day-today chores associated with personal
computing and to keep your system running at peak performance. Some examples of utility programs include:
• Virus scanning software are utility programs designed to protect your computer from computer viruses.
• Backup software is software that assists you in backing up your files and even the entire computer hard drive.
• Scandisk is a utility provided with Windows computers. Scandisk scans your disks to see if there are any potential problems on the disk, such as bad disk areas.
• Disk defragmenter assists you in keep reorganizing your disk drives. After files are saved, deleted and resaved again, the disk can become fragmented --- available
space is in small blocks located throughout the disk. Disk defragmenters gather those free spots and put them together to enable you to continue to save your data in
the most efficient manner.
A.2. Computer Hardware
The physical parts of a computer are known as computer hardware. You can touch, see and feel the hardware. The hardware consists of electronic circuits and mechanical
equipment etc. used to perform various functions in the computer. The hardware components are: (1) input devices, (2) output devices, (3) Central Processing Unit (CPU),
(4) Memory Unit, and (5) Other peripheral devices.
A.2.a. Input Devices
Input is any data or instructions entered into the computer in the form of signals. The input into the computer can be entered:
• Through keyboard (by typing characters).
• By selecting commands (icons) on the screen and then clicking with mouse.
• By pressing finger on a touch screen.
• By speaking into a microphone.
• By scanning data printed on paper through scanner etc.
• Therefore, the devices that are used to enter data and instructions or commands into the computer are called input devices or units. The input devices are the eyes
and ears of computers. In old computers the punched card readers, paper tape readers were used as input devices.
A.2.b. Output Devices
The processed input data into a useful form is called output when input data is processed, computer generates several types of output, depending upon the hardware
and software used and the requirements of the user. The user use output on a screen, prints it on the printer or hear it through speakers or headsets.
Therefore, output is normally classifieds as:
• Softcopy Output. The output received on the display screen or in the audio or video form is called softcopy output. This kind of output is not tangible and cannot
the touched. The most popular and commonly used softcopy output device is display screen
• Hardcopy Output. The output printed on the paper is called hardcopy. The printers and plotters devices are used for this purpose.
• Sound Output. The output received into the form of sound is called sound output. The speakers are most commonly used to receive the sound output.
An output device is a hardware component used to get output from the computer. A number of output devices are available. The commonly used output devices include
display device (Monitor), printer, speaker and headset, fax machine etc.
A.2.c. Central Processing Unit (CPU)
The central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic,
logical, control, and input/output (I/O) operations specified by the instructions. The term has been used in the computer industry at least since the early 1960s.
Traditionally, the term “CPU” refers to a processor, more specifically to its processing unit and control unit (CU), distinguishing these core elements of a computer
from external components such as main memory and I/O circuitry.
The form, design and implementation of CPUs have changed over the course of their history, but their fundamental operation remains almost unchanged. Principal
components of a CPU include the arithmetic logic unit (ALU) that performs arithmetic and logic operations, processor registers that supply operands to the ALU and
store the results of ALU operations, and a control unit that fetches instructions from memory and “executes” them by directing the coordinated operations of the ALU,
registers and other components.
A.2.d. Memory Unit
Memory refers to chip-based storage. When the term “memory” is used alone, it refers to chip –based storage used by the computer-usually the amount of the computer’s
main memory (called RAM), which is located inside the system unit. In contrast, “storage” refers to the amount of long-term storage available to a PC- usually in the
form of the PC’s hard drive or removal storage media such as CDs, DVDs, and USB flash drives. There are two main types of memory: (1) Random Access Memory
(RAM), and (2) Read Only Memory (ROM).
A.2.d.1. Random Access Memory (RAM). When the computer is powered on, certain operating system files load into RAM from the storage device such as a hard
disk. Then operating system remains in RAM as long as the computer has continuous power.
• Holds its data as long as the computer is switched on;
• All data in RAM is lost when the computer is switched off;
• Described as being volatile; and
• It is direct access as it can be both written to or read from in any order.
The RAM is further divided into: (1) DRAM (DRAM stands for Dynamic Random-Access Memory. DRAM is the most common type of RAM used to store data &
instructions. In order to maintain data in DRAM chip, the chip is refreshed frequently (hundreds of time a second), otherwise data may be lost. During the refreshing
process the CPU has to wait to read & write data in DRAM. It is because DRAM decreases the processing speed of the computer.), and (2) SRAM (SRAM stands for
Static Random-Access Memory. It is faster than DRAM because it does not have to be refreshed frequently and the CPU has not to wait to read & write data. SRAM
chips however are more expensive than DRAM chips. Special applications such as cache use SRAM chips.) The differences between SRAM & DRAM:
• The SRAM is static while the DRAM is dynamic.
• The SRAM is faster compared to the DRAM.
• The SRAM consumes less power than the DRAM.
• The SRAM uses more transistors per bit of memory compared to the DRAM.
• The SRAM is more expensive than the DRAM.
• The cheaper DRAM is used in the main memory while the SRAM is commonly used in the cache memory.
A.2.d.2. Read Only Memory (ROM). The ROM stands for Read Only Memory. The ROM contains instructions that are permanently stored by the manufacturers
when they manufacture the chips. In fact, recording data and instructions permanently into this kind of memory is called "burning in the data". The instructions stored
in ROM can only be read but cannot be modified. This is the reason why it is called Read Only Memory. The ROM is a semiconductor chip programmed at the time
of its manufacture and is not re-programmable by the user. It is a non-volatile memory. The contents of ROM are not lost when the computer is turned off. The ROM
contains the Basic Input / Output System (BIOS) which is a set of instructions that are automatically activated when the computer is turned on. It means that computer
uses the instructions of ROM at the time of booting for the following purposes: (1) to check different units of computer system, and (2) to load the operating system
into computer memory etc. Data can be read by the CPU in any order so ROM is also direct access. The contents of ROM are fixed at the time of manufacture. Many
other devices also contain ROM chips. For example, a printer has a ROM chip that contains data or information for fonts. You can say that each electronic device has
ROM chip that contains information about that device. The ROM is further divided into: (1) PROM (The PROM stands for Programmable Read Only Memory. PROM
is a blank ROM chip on which the user can write his own program instructions and data but only once. However, once the program or data is written in PROM chip, it
cannot be changed. The programmer uses micro-code instructions to write information in a PROM chip. Once the programmer writes the micro-code on the PROM
chip, it functions like a normal ROM chip.); (2) EPROM (Once ROM or PROM is programmed, its contents cannot be changed. However, there is another type of
memory chip called EPROM that overcomes this problem. The EPROM stands for Erasable Programmable Read Only Memory. It is another important form of read
only memory. Like PROM, it is initially blank and the user or manufacture can write his own program or data by using special devices. Unlike PROM the data written
in EPROM chip can be erased by using special purpose devices and ultraviolet rays. So, program or data written in EPROM chip can be changed and new data can
also be added on this form of ROM. When EPROM is in use, its contents can only be read.); and (3) EEPROM (The EEPROM stands for Electrically Erasable
Programmable Read Only Memory. This kind of ROM can be re-written by using electrical devices and so data stored on this ROM chip can be easily modified.).
A.2.d.3. Cache Memory. Data and program instructions are moved from RAM to CPU's registers during data processing. It is most time-consuming method and
CPU has to waste a lot of time to access data from memory. Cache memory is similar to RAM but it is extremely fast than RAM. It is normally used between RAM
and CPU. Cache speeds up processing speed of computer because CPU stores frequently used instructions and data in it. When the program is running and the CPU
needs a specific data or program instructions, the CPU first checks it in cache memory. If the data is not there, the CPU reads the data from RAM into its registers, but
it also loads a copy of the same data or instruction in cache memory. The next time the CPU uses it if required again and saves the time needed to load it from RAM.
A.2.e. Other peripheral Devices. Devices that are connected to the computer to perform specific functions. They all work at different speed, use different codes, transfer
different amounts of data at a time and even work at different voltages.
II. Input and Output Devices

A. Input Devices
Now-a-days, the commonly used input devices are:
• Keyboard. The keyboard is still the commonest way of entering information into a Computer.
• Mouse. A pointing device is any human interface device that allows a user to input spatial data to a computer.
• Scanner. A scanner allows you to scan printed material and convert it into a file format that may be used within the PC.
• Microphone. Microphone is an input device used to enter the sound signals of user into the computer. It is used to record the
voice of the user in a computer. It is also used to talk to others on the Internet. The user talks to another user on the Internet by sending his message through the microphone
and receives the response on the speaker attached to the computer. For this purpose, you must have the microphone and a sound card with your computer
• Digital Camera. Digital Camera is an input device used to take pictures and to store directly in computer in digital form. It operates on the same basic principle as a
traditional or conventional camera but digital camera sends images directly inside the PC in digital form instead of storing it on a conventional film. When a picture is
taken with digital camera, the electric image of the picture is stored in digital form on the floppy disk or CD-R attached with the camera. The stored picture can be loaded
into the computer from the disk for editing.
• Optical Bar Code Reader. Data coded in the form of small vertical lines forms the basis of bar coding. Alphanumeric data is represented using adjacent vertical
lines called Bar Codes. These are of varying widths and spacing between them used to uniquely identify books, merchandise in stores, postal packages etc.
• Optical mark recognition (OMR). The OMR devices can sense marks on computer readable paper. This kind of device is typically used by academic institutions to
grade aptitude tests whether candidates need to mark the correct option from a number of alternatives, on a special sheet of paper. These answer sheets can then be directly
read by the optical mark recognition devices and can be used for further processing by the computer.
• Touch Screen. The touch screen can detect exactly where on its surface it has been touched. Touch screen are used in lot of fast food and restaurants because they
are easy to keep clean reprogram if changes need to be made to menu.
• Joystick. The main function of joystick is to play computer games by controlling the way that something moves on the screen. Joysticks can be used to control
movement from side by side, up and down and diagonally.
• Magnetic Ink Character Recognition (MICR). The MICR is similar to optical mark recognition and is used exclusively by the bank industry. MICR devices are
used by the banking Industry to read the account numbers on cheques directly and subsequently do the necessary processing. It must be noted that floppy drives, hard
disks and CD drives are used for both input and output devices.

B. Output Devices
Now-a-days, the commonly used output devices are:
• Monitor. The monitor is a popular and most commonly used output device. The monitor consists of a screen and the electronic components that produce the output
on the screen for a temporary period. The output received on the screen is called softcopy. Most monitors used in personal computers display text, graphics and video
information.
• Plotter. A plotter is a special output device used to produce hardcopies of graphs and designs on the paper. A plotter is typically used to print large-format graphs or
maps such as construction maps or engineering drawings.
• Speaker. A speaker gives you sound output from your computer. Some speakers are built into the computer and some are separate.
• Printer. These are most commonly used output devices used to get prints of documents on the paper. The output printed on the paper is called hard copy. The hard
copy is also called as print out. Two (2) types of printers: (1) Impact printer prints characters and graphics on the paper with the strikes of hammer on a ribbon. A simple
example of an impact printer is typewriter, which uses small hammers to strike the ribbon. Each hammer is embossed with the shape of alphanumeric character that shape
is printed on the paper through inked ribbon. There are many types of impact printers but the most popular and commonly used is the dot matrix printer (are called Impact
printers because they print by hammering the pins on the inked ribbon to leave ink impressions on a paper. Hence, they can be used to produce multiple copies by using
carbon paper or its equivalent. A dot matrix printer makes a hard copy by printing one character at a time.), and (2) Non-impact printer produces the output on a paper
without striking the paper are known as non-impact printers. The main features of non-impact printers are: (a) faster than impact printer, (b) print high quality output, and
(c) produce no noise during printing. Examples of non-impact printers are Laser printer (is the fastest and high-quality non-impact printer. Laser printers are most
expensive than Inkjet printers and their print quality is also higher. The print quality and printing speed of Laser printers make them ideal for offices and business. The
price of Laser printer depends on the quality and printing speed. The color printers are most costly than black and white Laser printers. The higher the resolution and speed
the more expensive the printer.), Inkjet printer (are called Non-Impact printers because they print by spraying ink on the paper. Being of non-impact type, they cannot be
used to produce multiple copies of a document in a single printing.) and etc.

III. Functions of Operating System


The operating system covers many roles and functions due to the myriad designs and uses of computers. Computing started as an experiment to determine what could be dine
and quickly moved to fixed-purpose systems for military uses, such as code breaking and trajectory plotting, and governmental uses, such as census calculation. Those early
computers evolved into general-purpose, multifunction mainframes, and that’s when operating systems were born.
In the 1960s, Moore’s Law predicted that the number of transistors on an integrated circuit would double every eighteen months, and that prediction has held true. Computers
gained in functionality and shrunk in size, leading to a vast number of uses and a vast number and variety of operating systems.
In general, we have no completely adequate definition of an operating system. Operating systems exist because they offer a reasonable way to solve problem of creating a
usable computing system. The fundamental goal of computer systems is to execute user programs and to make solving user problems easier. Computer hardware is constructed
toward this goal. Since bare hardware alone is not particularly easy to use, application programs are developed. These programs require certain common operations, such as
those controlling the I/O devices. The common functions of controlling and allocating resources are then brought together into one piece of software: the operating system.
Moreover, we have no universally accepted definition of what is part of the operating system. A simple viewpoint is that it included everything a vendor ships when you order
“the operating system”. The features included, however, vary greatly across systems. Some systems take up less than a megabyte of space and lack even a full-screen editor,
whereas others require gigabytes of space and are based entirely on graphical windowing systems. A more common definition, and the one that we usually follow, is that the
operating system is the one program running at all times on the computer—usually called the kernel. (Along with the kernel, there are two other types of programs: system
programs, which are associated with the operating system but are not necessarily part of the kernel, and application programs, which include all programs not associated
with the operation of the system.)
In 1998, the United States Department of Justice filed suit against Microsoft, in essence claiming that Microsoft included too much functionality in its operating systems and
thus prevented application vendors from competing. (For example, a Web browser was an integral part of the operating systems.) As a result, Microsoft was found guilty of
using its operating-system monopoly to limit competition.
Today, however, if we look at operating systems for mobile devices, we see that once again the number of features constituting the operating system is increasing. Mobile
operating systems often include not only a core kernel but also middleware—a set of software frameworks that provide additional services to application developers. For
example, each of the two most prominent mobile operating systems—Apple’s iOS and Google’s Android—features a core kernel along with middleware that supports
databases, multimedia, and graphics.

ACTIVITY
Answer the following questions below:
1. What is a computer system? Explain its components. (10 points)
2. Name at least 2 latest computer input devices and at least 2 latest computer output devices. (5 points)
3. What are the functions of an operating system? (5 points)
Activities, Resources, and Assessment
Online (Hybrid Model) Blended (Asynchronous Model) Offline (Flex Model)
Resources: Resources: Resources:
Schoology App/Messenger Schoology App/Messenger Schoology App/Messenger
E-book: Fundamentals of Computers E-book: Fundamentals of Computers E-book: Fundamentals of Computers

Activities: Activities: Activities:


Topic discussion will be through GoogleMeet App., during Topic discussion will be through GoogleMeet App., Topic discussion will be during classroom meetups, and
which the activities will be supplied with answers. during which the activities will be supplied with during which the exercises will be supplied with answers.
answers. Such teleconferencing will be recorded, the
video of which will be made availa
d. Real-time
e. Distributed
ble to you via Messenger Group Chat or Gmail address.
Assessment: Assessment:
Topic quiz will be published at Schoology App. Assessment: Topic quiz will be issued to you and will be answered at
Instructions as to the time allocated for answering and Topic quiz will be published at Schoology App. home, which will be immediately due for submission the
deadline for submission of quiz will be announced via Instructions as to the time allocated for answering and following day at the box placed at the SVCI guard house.
Messenger Group Chat. deadline for submission of quiz will be announced via Communication as to the receipt the said quiz will be
Messenger Group Chat. through text messaging.

REFERENCES:

• Basic of Computer Introduction - World of Computers (slideshare.net)


• Introduction to Information Technology: The Future Now - ppt download (slideplayer.com)
• Reading: The Central Processing Unit | Introduction to Computer Applications and Concepts (lumenlearning.com)
MALWARE
Time Duration and Allotment: Week 6-7; 12 hours

Lesson Objectives:
As a result of completing this learning module, students will be able to
• determine various cyber-attacks and malwares; and
• distinguish different cyber intruders: trolls, spies, hackers, and thieves.

Topics:
Cyber-Attacks and Malwares
Cyber Intruders: Trolls, Spies, Hackers, and Thieves

Module Guide:

1. Study topic content presented below. (TOPIC CONTENTS)

2. Answer the exercises presented after the topic content below. (ACTIVITY)

TOPIC CONTENTS:

I. Cyber-Attacks and Malwares


When a criminal is trying to hack an organization, they won’t re-invent the wheel unless they absolutely have to: They’ll draw upon common types of hacking techniques that
are known to be highly effective, such as malware, phishing, or cross-site scripting (XSS). Whether you’re trying to make sense of the latest data breach headline in the news
or analyzing an incident in your own organization, it helps to understand the different attack vectors a malicious actor might try to cause harm.

A. Common Types of Cybersecurity Attacks


Here are some of the most common types of attacks:

A.1. Malware
If you've ever seen an antivirus alert pop up on your screen, or if you've mistakenly clicked a malicious email attachment, then you've had a close call with malware.
Attackers love to use malware to gain a foothold in users' computers—and, consequently, the offices they work in—because it can be so effective. “Malware” refers to
various forms of harmful software, such as viruses and ransomware. Once malware is in your computer, it can wreak all sorts of havoc, from taking control of your
machine, to monitoring your actions and keystrokes, to silently sending all sorts of confidential data from your computer or network to the attacker's home base. Attackers
will use a variety of methods to get malware into your computer, but at some stage it often requires the user to take an action to install the malware. This can include
clicking a link to download a file, or opening an attachment that may look harmless (like a Word document or PDF attachment), but actually has a malware installer hidden
within.
A.1.a. Malware Definition
Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain
access to sensitive information. As Microsoft puts it, "[malware] is a catch-all term to refer to any software designed to cause damage to a single computer, server, or
computer network." In other words, software is identified as malware based on its intended use, rather than a particular technique or technology used to build it. This
means that the question of, say, what the difference is between malware and a virus misses the point a bit: a virus is a type of malware, so all viruses are malware (but
not every piece of malware is a virus).
A.1.b. Types of Malware
There are a number of different ways of categorizing malware; the first is by how the malicious software spreads. You've probably heard the words virus, trojan, and
worm used interchangeably, but as Symantec explains, they describe three subtly different ways malware can infect target computers:
A.1.b.1. Worm: is a standalone piece of malicious software that reproduces itself and spreads from computer to computer.
A.1.b.2. Virus: is a piece of computer code that inserts itself within the code of another standalone program, then forces that program to take malicious action
and spread itself.
A.1.b.3. Trojan: is a program that cannot reproduce itself but masquerades as something the user wants and tricks them into activating it so it can do its damage
and spread.
Malware can also be installed on a computer "manually" by the attackers themselves, either by gaining physical access to the computer or using privilege
escalation to gain remote administrator access.

Another way to categorize malware is by what it does once it has successfully infected its victim's computers. There are a wide range of potential attack techniques
used by malware:
A.1.b.4. Spyware: is defined by Webroot Cybersecurity as "malware used for the purpose of secretly gathering data on an unsuspecting user." In essence, it
spies on your behavior as you use your computer, and on the data you send and receive, usually with the purpose of sending that information to a third party. A
keylogger is a specific kind of spyware that records all the keystrokes a user makes—great for stealing passwords.
A.1.b.5. Rootkit: is, as described by TechTarget, "a program or, more often, a collection of software tools that gives a threat actor remote access to and control
over a computer or other system." It gets its name because it's a kit of tools that (generally illicitly) gain root access (administrator-level control, in Unix terms)
over the target system, and use that power to hide their presence.
A.1.b.6. Adware: is malware that forces your browser to redirect to web advertisements, which often themselves seek to download further, even more malicious
software. As The New York Times notes, adware often piggybacks onto tempting "free" programs like games or browser extensions.
A.1.b.7. Ransomware: is a flavor of malware that encrypts your hard drive's files and demands a payment, usually in Bitcoin, in exchange for the decryption
key. Several high-profile malware outbreaks of the last few years, such as Petya, are ransomware. Without the decryption key, it's mathematically impossible
for victims to regain access to their files. So-called scareware is a sort of shadow version of ransomware; it claims to have taken control of your computer and
demands a ransom, but actually is just using tricks like browser redirect loops to make it seem as if it's done more damage than it really has, and unlike ransomware
can be relatively easily disabled.
A.1.b.8. Cryptojacking: is another way attackers can force you to supply them with Bitcoin—only it works without you necessarily knowing. The crypto mining
malware infects your computer and uses your CPU cycles to mine Bitcoin for your attacker's profit. The mining software may run in the background on your
operating system or even as JavaScript in a browser window.
A.1.b.9. Malvertising: is the use of legitimate ads or ad networks to covertly deliver malware to unsuspecting users’ computers. For example, a cybercriminal
might pay to place an ad on a legitimate website. When a user clicks on the ad, code in the ad either redirects them to a malicious website or installs malware on
their computer. In some cases, the malware embedded in an ad might execute automatically without any action from the user, a technique referred to as a “drive-
by download.”

Any specific piece of malware has both a means of infection and a behavioral category. So, for instance, WannaCry is a ransomware worm. And a particular
piece of malware might have different forms with different attack vectors: for instance, the Emotet banking malware has been spotted in the wild as both a trojan
and a worm.
A look at the Center for Internet Security's top 10 malware offenders for June of 2018 gives you a good sense of the types of malware out there. By far the most
common infection vector is via spam email, which tricks users into activating the malware, Trojan-style. WannaCry and Emotet are the most prevalent malware
on the list, but many others, including NanoCore and Gh0st, are what's called Remote Access Trojans or RATs—essentially, rootkits that propagate like Trojans.
Cryptocurrency malware like CoinMiner rounds out the list.

A.2. Phishing
The physical parts of a computer are known as computer hardware. You can touch, see and feel the hardware. The hardware consists of electronic circuits and mechanical
equipment etc. used to perform various functions in the computer. The hardware components are: (1) input devices, (2) output devices, (3) Central Processing Unit (CPU),
(4) Memory Unit, and (5) Other peripheral devices. Of course, chances are you wouldn't just open a random attachment or click on a link in any email that comes your
way—there has to be a compelling reason for you to take action. Attackers know this, too. When an attacker wants you to install malware or divulge sensitive information,
they often turn to phishing tactics, or pretending to be someone or something else to get you to take an action you normally wouldn’t. Since they rely on human curiosity
and impulses, phishing attacks can be difficult to stop. In a phishing attack, an attacker may send you an email that appears to be from someone you trust, like your boss
or a company you do business with. The email will seem legitimate, and it will have some urgency to it (e.g. fraudulent activity has been detected on your account). In the
email, there will be an attachment to open or a link to click. Upon opening the malicious attachment, you’ll thereby install malware in your computer. If you click the link,
it may send you to a legitimate-looking website that asks for you to log in to access an important file—except the website is actually a trap used to capture your credentials
when you try to log in. In order to combat phishing attempts, understanding the importance of verifying email senders and attachments/links is essential.

A.3. SQL Injection Attack


SQL (pronounced “sequel”) stands for structured query language; it’s a programming language used to communicate with databases. Many of the servers that store critical
data for websites and services use SQL to manage the data in their databases. A SQL injection attack specifically targets this kind of server, using malicious code to get
the server to divulge information it normally wouldn’t. This is especially problematic if the server stores private customer information from the website, such as credit
card numbers, usernames and passwords (credentials), or other personally identifiable information, which are tempting and lucrative targets for an attacker. An SQL
injection attack works by exploiting any one of the known SQL vulnerabilities that allow the SQL server to run malicious code. For example, if a SQL server is vulnerable
to an injection attack, it may be possible for an attacker to go to a website's search box and type in code that would force the site's SQL server to dump all of its stored
usernames and passwords for the site.

A.4. Cross-Site Scripting (XSS)


In an SQL injection attack, an attacker goes after a vulnerable website to target its stored data, such as user credentials or sensitive financial data. But if the attacker would
rather directly target a website's users, they may opt for a cross-site scripting attack. Similar to an SQL injection attack, this attack also involves injecting malicious code
into a website, but in this case the website itself is not being attacked. Instead, the malicious code the attacker has injected only runs in the user's browser when they visit
the attacked website, and it goes after the visitor directly, not the website. One of the most common ways an attacker can deploy a cross-site scripting attack is by injecting
malicious code into a comment or a script that could automatically run. For example, they could embed a link to a malicious JavaScript in a comment on a blog. Cross-
site scripting attacks can significantly damage a website’s reputation by placing the users' information at risk without any indication that anything malicious even occurred.
Any sensitive information a user sends to the site—such as their credentials, credit card information, or other private data—can be hijacked via cross-site scripting without
the website owners realizing there was even a problem in the first place.

A.5. Denial-of-Service (DoS)


Imagine you're sitting in traffic on a one-lane country road, with cars backed up as far as the eye can see. Normally this road never sees more than a car or two, but a
county fair and a major sporting event have ended around the same time, and this road is the only way for visitors to leave town. The road can't handle the massive amount
of traffic, and as a result it gets so backed up that pretty much no one can leave. That's essentially what happens to a website during a denial-of-service (DoS) attack. If
you flood a website with more traffic than it was built to handle, you'll overload the website's server and it'll be nigh-impossible for the website to serve up its content to
visitors who are trying to access it. This can happen for innocuous reasons of course, say if a massive news story breaks and a newspaper's website gets overloaded with
traffic from people trying to find out more. But often, this kind of traffic overload is malicious, as an attacker floods a website with an overwhelming amount of traffic to
essentially shut it down for all users. In some instances, these DoS attacks are performed by many computers at the same time. This scenario of attack is known as a
Distributed Denial-of-Service Attack (DDoS). This type of attack can be even more difficult to overcome due to the attacker appearing from many different IP addresses
around the world simultaneously, making determining the source of the attack even more difficult for network administrators.

A.6. Session Hijacking and Man-in-the-Middle Attacks


When you're on the internet, your computer has a lot of small back-and-forth transactions with servers around the world letting them know who you are and requesting
specific websites or services. In return, if everything goes as it should, the web servers should respond to your request by giving you the information you're accessing.
This process, or session, happens whether you are simply browsing or when you are logging into a website with your username and password. The session between your
computer and the remote web server is given a unique session ID, which should stay private between the two parties; however, an attacker can hijack the session by
capturing the session ID and posing as the computer making a request, allowing them to log in as an unsuspecting user and gain access to unauthorized information on the
web server. There are a number of methods an attacker can use to steal the session ID, such as a cross-site scripting attack used to hijack session IDs. An attacker can also
opt to hijack the session to insert themselves between the requesting computer and the remote server, pretending to be the other party in the session. This allows them to
intercept information in both directions and is commonly called a man-in-the-middle attack.

A.7. Credential Reuse


Users today have so many logins and passwords to remember that it’s tempting to reuse credentials here or there to make life a little easier. Even though security best
practices universally recommend that you have unique passwords for all your applications and websites, many people still reuse their passwords—a fact attackers rely on.
Once attackers have a collection of usernames and passwords from a breached website or service (easily acquired on any number of black market websites on the internet),
they know that if they use these same credentials on other websites there’s a chance they’ll be able to log in. No matter how tempting it may be to reuse credentials for
your email, bank account, and your favorite sports forum, it’s possible that one day the forum will get hacked, giving an attacker easy access to your email and bank
account. When it comes to credentials, variety is essential. Password managers are available and can be helpful when it comes to managing the various credentials you
use. This is just a selection of common attack types and techniques (follow this link to learn more about web application vulnerabilities, specifically). It is not intended to
be exhaustive, and attackers do evolve and develop new methods as needed; however, being aware of, and mitigating these types of attacks will significantly improve
your security posture.

II. Cyber Intruders: Trolls, Spies, Hackers, and Thieves


Cyber Intruder is someone who uses the internet to illegally enter a computer system without permission, for example in order to get secret information or to damage the
system.
A. Trolls
Trolls aren’t necessarily destructive, but they can be disruptive on online comment boards. A troll is a person who posts intentionally offensive, incendiary, or off-topic
comments online, to upset people.

B. Spies
Many companies have extensive data-collection efforts that constantly track (spy on) our personal activities.

C. Hackers
Hacker is an individual who uses computers, networking or other skills to gain unauthorized access to data.
C.1. Malicious Hackers: break into computers for malicious purposes.
C.2. Script Kiddies: are technically unsophisticated teenagers who use downloadable software for perform break-ins.
C.3. Hacktivists: are hacker activists who break into systems for a political or a socially motivated purpose.
C.4. Black-hat Hackers: break into computers to steal or destroy information or to use it for illegal profit.
C.5. Cyberterrorists: attack computer systems so as to bring physical, political or financial harm to groups, companies, or nations.
C.6. Benign Hackers: (thrill-seeker hackers) illegally access computer systems simply for the challenge of it, not to damage or steal anything; their reward is the
achievement of breaking in.
C.7. Benevolent Hackers: (ethical hackers or white-hat hackers) are usually computer professionals who break into computer systems and networks with the knowledge
of their owners to expose security flaws that can then be fixed.

D. Thieves
May be a company’s employees or suppliers or professionals.
D.1. Employees
D..2. Outside Partners & Suppliers
D.3. Hardware Thieves
D.4. Con-artists, Scammers, & Counterfeiters

ACTIVITY
Answer the following questions below:
1. Provide one (1) example for each cyber-attacks. (10 points)
2. How can malware damage a computer system? (5 points)
3. Among the types of cyber-intruders, which do you think is dangerous? (5 points)
Activities, Resources, and Assessment
Online (Hybrid Model) Blended (Asynchronous Model) Offline (Flex Model)
Resources: Resources: Resources:
Schoology App/Messenger Schoology App/Messenger Schoology App/Messenger
E-book: Fundamentals of Computers E-book: Fundamentals of Computers E-book: Fundamentals of Computers
Activities: Activities:
Topic discussion will be through GoogleMeet App., during Topic discussion will be through GoogleMeet App., Activities:
which the activities will be supplied with answers. during which the activities will be supplied with Topic discussion will be during classroom meetups, and
answers. Such teleconferencing will be recorded, the during which the exercises will be supplied with answers.
video of which will be made availa
d. Real-time
e. Distributed
ble to you via Messenger Group Chat or Gmail address.

Assessment: Assessment: Assessment:


Topic quiz will be published at Schoology App. Topic quiz will be published at Schoology App. Topic quiz will be issued to you and will be answered at
Instructions as to the time allocated for answering and Instructions as to the time allocated for answering and home, which will be immediately due for submission the
deadline for submission of quiz will be announced via deadline for submission of quiz will be announced via following day at the box placed at the SVCI guard house.
Messenger Group Chat. Messenger Group Chat. Communication as to the receipt the said quiz will be
through text messaging.

REFERENCES:

• Basic of Computer Introduction - World of Computers (slideshare.net)


• Introduction to Information Technology: The Future Now - ppt download (slideplayer.com)
• Reading: The Central Processing Unit | Introduction to Computer Applications and Concepts (lumenlearning.com)
• Types of Cyber Attacks | Hacking Attacks & Techniques | Rapid7
• What is malware: Definition, examples, detection and recovery | CSO Online
• CYBERINTRUDER | definition in the Cambridge English Dictionary
• Chapter 6 : Communications, Networks, and Cyberthreats: 6.5 Cyberintruders (Trolls, Spies, Hackers, and Thieves) (itrocksforever.blogspot.com)

You might also like