IT101
IT101
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS
ENVIRONMENTAL IMPACT
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS
LOGARITHMS
• The production and disposal of computers
contribute to electronic waste, which poses • A logarithm is the power which A
environmental challenges due to toxic certain number is raised to get
materials and inefficient recycling practices
another number
DISTRACTION AND ADDICTION (1614)
PASCALINE
• Computers can be a source of distraction,
leading to decreased productivity and
addictive behaviors, especially with • Designed and built by the French
excessive use of social media and online mathematician-philosopher Blaise
entertainment. Pascal between 1642 and 1644. it
CYBERCRIME could only do addition and
subtraction, with numbers being
• Computers are vulnerable to various forms of entered by manipulating its dials.
cybercrime, including phishing, malware, (1642)
ransomware, and online scams, which can
result in financial losses and compromised JACQUARD LOOM
personal data.
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS
CHARACTERISTICS OF MAINFRAME
• A digital interface in which a user COMPUTERS
interacts with graphical components • It is also an expensive or costly computer.
such as icons, buttons, and menus.
(1979) • It has high storage capacity and great
performance.
TYPES OF COMPUTERS
• It can process a huge amount of data (like
SUPER COMPUTER data involved in the banking sector) very
quickly.
• When we talk about speed, then the first
name that comes to mind when thinking of • It runs smoothly for a long time and has a
computers is supercomputers. They are the long life.
biggest and fastest computers (in terms of
speed of processing data). Supercomputers MINICOMPUTER
are designed such that they can process a
huge amount of data, like processing trillions • Minicomputer is a medium size
of instructions or data just in a second. This multiprocessing computer. In this type of
is because of the thousands of computer,
interconnected processors in
supercomputers. It is basically used in • there are two or more processors, and it
scientific and engineering applications such
as weather forecasting, scientific simulations, • supports 4 to 200 users at one time.
and nuclear energy research. It was first
developed by Roger Cray in 1976. • Minicomputer is similar to Microcontroller.
CHARACTERISTICS OF SUPER COMPUTERS • Minicomputers are used in places like
institutes or departments for different work
• Supercomputers are the computers that are like billing, accounting, inventory
the fastest and they are also very expensive. management, etc. It is smaller than a
mainframe computer but larger in
• It can calculate up to ten trillion individual comparison to the microcomputer.
calculations per second, this is also the
reason which makes it even faster. CHARACTERISTICS OF MINICOMPUTER
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS
• It is designed for personal use. • Tablets and Smartphones are the types of
computers that are pocket friendly and easy
• It is easy to use to carry is these are handy. This is one of the
best use of modern technology. These
SERVER COMPUTER devices have better hardware capabilities,
extensive operating systems, and better
• computers that are combined data and multimedia functionality.
programs. Electronic data and applications
are stored and shared in the server • Smartphones and tablets contain a number
computer. The working of a server computer of sensors and are also able to provide
is that it does not solve a bigger problem like wireless communication protocols.
a supercomputer but it solves many smaller
similar ones. Examples of server computer COMPUTER HARDWARE
are like Wikipedia, as when users put a
request for any page, it finds what the user is • Hardware refers to the physical components
looking for and sends it to the user. of a computer. Computer Hardware is any
part of the computer that we can touch these
ANALOG COMPUTER parts. These are the primary electronic
devices used to build up the computer.
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS
COMPUTER SOFTWARE
Computer Software
• Software is a collection of instructions,
procedures, and documentation that
performs different tasks on a computer
system. we can say also Computer Software
is a programming code executed on a
computer processor. The code can be
machine-level code or code written for an
operating system. Examples of software are
MS- Word, Excel, PowerPoint, Google
Chrome, Photoshop, MySQL, etc.
➢ System Software
➢ Application Software
1. System Software:
• System Software is a component of
Computer Software that directly operates
with Computer Hardware which has the work
to control the Computer’s Internal
Functioning and also takes responsibility for
controlling Hardware Devices such as
Printers, Storage Devices, etc. Types of
System Software include Operating
systems, Language
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS
Insertion Point:
• the point at which the cursor is blinking on
the document screen.
Italics:
• Italicized characters appear on the screen
slightly tilted to the right. This text is
italicized.
Line Spacing:
• refers to the number of lines used by each
line of text. In single-line spacing, each line
of text is followed by another line of text, and
there are no blank lines in between. In
double-line spacing, each line of text is
followed by a blank line.
EXPLORING THE WORD ENVIRONMENT
Margin:
• Exploring the Word 2016 Environment Open
• The amount of blank space, usually
Word by using the Search Windows box or
measured in inches or characters, above and
by double-clicking on the desktop icon for
below and to the right and left of the main
Microsoft Word 2016.
body of a document.
Title Bar
Paragraph:
1. Note the title bar section which has window
• A paragraph is any amount of text separated
controls at the right end, as in other Windows
by a hard return. Microsoft Word sees
programs.
anything from a single word to an entire page
of text as a paragraph.
2. Note that a blank document opens with a
default file name of Document 1.
Paste:
• Adds previously copied or cut text at the Quick Access Toolbar
insertion point. • The Quick Access Toolbar is located all the
way to the left on the title bar.
Print Preview:
• It contains frequently used commands and
• Print Preview lets you see how your
can be customized using the drop-down
document will look on the page before it is
menu.
printed.
1. Point to each small icon to view its ScreenTip.
Wrapping:
2. Be aware that the Undo button is not located
• Text automatically wraps to the next line anywhere else in the application except for the
when typing in Microsoft Word. The only time Quick Access Toolbar.
you need to hit the enter key is when you 3. Click the Customize Quick Access Toolbar
want to start a new paragraph button, click New on the menu, and see the
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS
command get added to the Quick Access ➢ A one-part arrowed button, called a menu
Toolbar. button, will darken completely when you
4. Click the Customize Quick Access Toolbar point to it:
button again, and click Show Below the Ribbon. 1. In the Font group, point to the Text
Click Show Above the Ribbon to move the Quick Effects and Typography button.
Access Toolbar back again. 2. Note there is no difference in
shading between the left and right
Ribbon of the button when you point to
• The ribbon contains all of the tools that you each section.
use to interact with your Microsoft Word file.
It is located towards the top of the window ➢ On a two-part arrowed button, called a split
underneath the title bar. All of the programs button, only one section at a time will darken
in the Microsoft Office suite have one. when you point to it.
1. In the Paragraph group, point to the
• The ribbon has a number of tabs, each of left part of the Shading button. This
which contains buttons, which are organized is the “button proper” section of the
into groups. Depending on the object you button. Note how it is darkened
have selected in the document, several separately from the arrow portion of
contextual tabs may appear, which provide the button.
additional formatting options for the selected 2. Point to the right portion, the section
object with the arrow. This is the “list
arrow” section of the button. Note
Active Tab how it is darkened separately from
• By default, Word will open with the Home tab the left portion.
active on the ribbon. Note how the Active tab 3. The button proper is the section of a
has a white background and blue letters, and two-part button that will carry out
the Inactive tabs have the opposite. the default option or the last used
option.
Contextual Tab 4. The list arrow section will open an
• Contextual tabs are displayed when certain options menu.
objects, such as an images and text boxes,
are selected. They contain additional options File Tab
for modifying the object. Contextual tabs • The File tab provides a Backstage view of
stand out because they are darker in color your document. The Backstage view
and are located to the right of all the other exposes information and metadata about the
tab s. As soon as we start being productive currently active document, lists recently
in the program, we will see contextual tabs opened documents, and provides a variety of
appear. user options, such as opening, saving, and
printing. Instead of just a menu, it is a full-
Groups and Buttons page view, which makes it easier to work
• On each Tab, the Buttons (a.k.a. commands with.
or tools) are organized into Groups. The
groups have names, but the names are not Workspace
clickable. • Underneath the ribbon is the workspace.
• Hover over some of the buttons on the Home
tab to observe the ScreenTips. Status Bar
• The ScreenTip displays the name of the • The Status bar is located below the
button, along with a short description of what document window area.
the button does.
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS
• At the right end are shortcuts to the different A. Click in the middle of the word "Library" on the first
views that are available. Each view displays line of the second paragraph of the practice
the document in a different way, allowing you document.
to carry out various tasks more efficiently.
B. Try the Delete key.
Zoom Slider
• Also at the right end of the Status bar is the
Zoom Slider. This allows you to adjust how Backspace
large the document is displayed on the • Removes characters to the left of the
screen. It does not adjust the actual size of insertion point.
the document—just how big or small it is
displayed on the screen (like moving a A. Try the Backspace key
newspaper away from or closer to your
eyes).
Shift
Insertion point • When typed in conjunction with a letter key,
• Sometimes referred to as the cursor, inserts a capital letter.
insertion point is the name for the blinking
line where anything you insert goes. Note: Word will automatically capitalize the first
There are several ways to move the insertion word of every sentence, as well as the word "I".
point to get it where you want it to be.
1. Click in the middle of the first line of the first Caps Lock
paragraph of the practice document. • Makes all letters come out as uppercase
2. Refer to the chart below to practice moving the
insertion point around using the keyboard CHAPTER IV: MALWARE
KEYBOARD KEYS
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS
HOW MALWARE IS SPREAD ➢ Back up your data files regularly, and keep
the backup hard drive (external) or whatever
Worms, viruses, and Trojan horses are passed in in a location separate from your computer).
the following ways: Then if a virus (or a fire) destroys your work
files, your data won’t be totally devastated.
➢ By infected floppies or CDs: The first way
is via an infected floppy disk or CD, perhaps ➢ Make sure you have virus protection
from a friend or a repair person. software, such as McAfee Virus Scan
(www.mcafee.com) or Norton Antivirus
➢ By opening unknown email attachments: activated on your machine. You can
The second way is from an email download it from these companies; then
attachment. This is why a basic rule of using follow the installation instructions.
the internet is: Never click on an email
attachment that comes from someone you ➢ Buying a new computer with antivirus
don’t know. This advice also applies to software on it does not mean you are
unknown downloaded files, as for free video automatically protected. The software could
games or screen savers. be six months old and not cover new viruses.
You have to register it with the designer
➢ By clicking on infiltrated websites: Some company, and you need to receive antivirus
crackers “seed” web pages with contagious updates.
malware that enables them to steal personal
data, so that by simply clicking on a website ➢ Scan your entire system with antivirus
you can unwittingly compromise your PC. software the first time it’s installed; then scan
The risk can be minimized if you have a it regularly after that. Often the software can
firewall and keep antivirus software on your be set to scan each time the computer is
computer up to date, as we describe below. rebooted or on a periodic schedule. Also
(You might also consider switching to Mozilla
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS
scan any new drives and the like before Comment sections: The comment sections of places
using them. such as YouTube and news websites are also popular
areas for trolls to feed. You'll find a lot of obvious
➢ Update your antivirus software regularly. trolling here, and they frequently generate a lot of
There are virus and security alerts almost responses from angry readers or viewers.
every day. Most antivirus software is
automatically linked to the internet and will SIGNS SOMEONE IS TROLLING
add updated antivirus code to your system
whenever the software vendor discovers a • It can sometimes become difficult to tell the
new threat. difference between a troll and someone who
just genuinely wants to argue about a topic.
➢ If you discover you have a virus, you can ask However, here are a few tell-tale signs that
McAfee or Norton to scan your computer someone is actively trolling.
online. Then follow the company’s directions
for cleaning or deleting it. Off-topic remarks: Completely going off-topic from
the subject at hand. This is done to
CYBER INTRUDERS annoy and disrupt other posters.
Refusal to acknowledge evidence: Even when
presented with hard, cold facts, they
ignore this and pretend like they never saw it.
INTERNET TROLLS
Dismissive, condescending tone: An early indicator of
a troll was that they would ask
➢ If you've been on the internet for any period an angry responder, "Why you mad, bro?" This is a
of time, you've likely run into a troll at some method done to provoke someone
point. even more, as a way of dismissing their argument
➢ An internet troll is someone who makes altogether.
intentionally inflammatory, rude, or upsetting
statements online to elicit strong emotional Use of unrelated images or memes: They reply to
responses in people or to steer the others with memes, images, and gifs. This is
conversation off-topic. They can come in especially true if done in response to a very long text
many forms. Most trolls do this for their own post.
amusement, but other forms of trolling are Seeming obliviousness: They seem oblivious that
done to push a specific agenda. most people are in disagreement with
➢ Trolling is distinct from other forms of them. Also, trolls rarely get mad or provoked.
cyberbullying or harassment. It is normally
not targeted towards any one person and CYBER SPIES
relies on other people paying attention and
becoming provoked. • Cyber espionage, or cyber spying, is a type
➢ Trolling exists on many online platforms, of cyberattack in which an unauthorized user
from small private group chats to the biggest attempts to access sensitive or classified
social media websites. Here's a list of places data or intellectual property (IP) for economic
online where you're likely to see online trolls: gain, competitive advantage or political
reasons.
Anonymous online forums: Places like Reddit,
4chan, and other anonymous message message Cyber Espionage Targets
boards are prime real-estate for online trolls. Because • The most common targets of cyber
there's no way of tracing who someone is, trolls can espionage include large corporations,
post very inflammatory content without repercussion. government agencies, academic institutions,
This is especially true if the forum has lax or inactive think tanks or other organizations that
moderation. possess valuable IP and technical data that
can create a competitive advantage for
X (formerly Twitter): X also has the option to be another organization or government.
anonymous, and has become a hotbed for internet
trolls. Frequent X trolling methods involve hijacking • Targeted campaigns can also be waged
popular hashtags and mentioning popular X against individuals, such as prominent
personalities to gain attention from their followers.
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS
Cyber spies most commonly attempt to access the ➢ Cyber thieves and cybercriminals are widely
following assets: available in what is called the “Dark Web”
where they mostly provide their illegal
➢ Research & Development data and activity services or products.
➢ Academic research data
➢ IP, such as product formulas or blueprints Types of Cyber Theft
➢ Salaries, bonus structures and other
sensitive information regarding 1. Phishing and Scam:
organizational ➢ Phishing is a type of social engineering
➢ finances and expenditures attack that targets the user and tricks them
➢ Client or customer lists and payment by sending fake messages and emails to get
structures sensitive information about the user or trying
➢ Business goals, strategic plans and to download malicious software and exploit it
marketing tactics on the target system.
➢ Political strategies, affiliations and
communications 2. Identity Theft
➢ Military intelligence ➢ Identity theft occurs when a cybercriminal
uses another person’s personal data like
HACKERS credit card numbers or personal pictures
without their permission to commit a fraud or
➢ Hackers are defined (1) as computer a crime.
enthusiasts, people who enjoy learning
programming languages and computer 3. Ransomware Attack
systems, but also (2) as people who gain ➢ Ransomware attacks are a very common
unauthorized access to computers or type of cyber theft/cybercrime. It is a type of
networks, often just for the challenge of it. malware that has the capability to prevent
Considering the second kind of hacker, those users from accessing all of their personal
who break into computers for relatively data on the system by encrypting them and
benign reasons, we can say there are then asking for a ransom in order to give
probably two types: access to the encrypted data.
scans a computer’s hard disk, CDs, have more than one computer and
and main memory to detect viruses you are linked to the internet by a
and, sometimes, to destroy them. cable modem or DSL, you probably
Such virus watchdogs operate in two need a hardware firewall, such as a
ways. First, they scan disk drives for hub/ router.
“signatures,” characteristic strings of
1s and 0s in the virus that uniquely PASSWORDS
identify it. Second, they look for ➢ Password is the special words,
suspicious virus like behavior, such codes, or symbols required to
as attempts to erase or change access a computer system.
areas on your disks.
➢ Protecting your internet access
Examples of antivirus programs are McAfee accounts and files with a password
Virus Scan, Norton Antivirus, Pc-cillin isn’t enough. Passwords (and PINs,
Internet Security, Avast!, and Zone Alarm too) can be guessed, forgotten, or
with Antivirus. Others worth considering are stolen. To foil a stranger’s guesses,
CA Internet Security Suite Plus, Panda experts say, you should never
Antivirus Platinum, and McAfee Virex for choose a real word or variations of
Macs. your name, your birth date, or those
of your friends or family. Instead you
FIREWALLS should mix letters, numbers, and
➢ A firewall is a system of hardware punctuation marks in an oddball
and/or software that protects a sequence of no fewer than eight
computer or a network from characters.
intruders. The firewall software
monitors all internet and other Examples of some good passwords are
network activity, looking for 2b/orNOT2b% and Alfred!E!Newman7. Or
suspicious data and preventing you can also choose an obvious and
unauthorized access. Always-on memorable password but shift the position
internet connections such as cable of your hands on the keyboard, creating a
modem, satellite, and DSL, as well meaningless string of characters—the best
as some wireless devices, are kind of password.
particularly susceptible to
unauthorized intrusion. BIOMETRIC AUTHENTICATION
➢ A hacker or cracker can easily
➢ If you have one computer—software breach a computer system with a
firewall: If you have just one guessed or stolen password. But
computer, a software firewall is some forms of identification can’t be
probably enough to protect you while easily faked—such as your physical
you’re connected to the internet. traits. Biometrics, the science of
(Windows XP/Windows Vista and measuring individual body
Mac OS X have built-in software characteristics, tries to use these in
firewalls that can be activated security devices.
quickly.)
➢ Biometric authentication devices
➢ If you have more than one authenticate a person’s identity by
computer—hardware firewall: If you comparing his or her physical or
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS
CHAPTER SUMMARY
Nicole Busgano
BSA 2113