0% found this document useful (0 votes)
26 views21 pages

IT101

it101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views21 pages

IT101

it101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

CHAPTER I: Introduction to computers


Is a type of computer storage
BRIEF HISTORY OF COMPUTER
containing non-volatile, permanent data
• computer are electronic devices that, normally, can only be read, not written
capable of performing a wide range to.
of tasks by processing and
manipulating data according to a set • Storage devices
of instructions.
Computers use various storage
Components of computer devices to store data persistently,
even when the power is turned off.
• CENTRAL PROCESSING UNIT (CPU) (A piece of computer equipment on
-The CPU is often referred to as the which information can be stored.)
“brain” of the Computer. It
performs the actual processing of • Input devices
data and Instructions, executing
calculations and managing tasks
Is a piece of equipment used to
• CPU provide data and control signals to
an information processing system,
Is the most important processor in a given
computer. Its electronic circuitry such as a computer or information
executes instructions of a computer program, appliance.
such as arithmetic, logic, controlling, and (These devices allow users to input
input/output operations. data and commands into the
• Random access Z (RAM) computer.)

Is a type of volatile memory that • Output devices


provides the computer with fast and
temporary storage for data that is Is a piece of computer hardware that
currently being used or processed. converts information into a human-
perceptible form or, historically, into
• RAM a physical machine-readable form
for use with other non-computerized
Is a form of computer memory that equipment. It can be text, graphics,
can be read and changed in any tactile, audio, or video.
order, typically used to store working (Output devices display or present
data and machine code. the results of processed data to the
user.)
• Read-only memory (ROM)
• Motherboard
This is non-volatile memory that
stores firmware and essential
It holds and allows communication
system instructions. It retains data
between many of the crucial
even when the computer is turned
electronic components of a system,
off.
such as the central processing unit
• ROM
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

and memory, and provides • Speed


connectors for other peripherals.
(Is the main printed circuit board in Computers can execute billions of
general-purpose computers and instructions per second, enabling
other expandable systems.) fast calculations and data
• Expansion cards processing.This speed is crucial for
tasks that require rapid analysis and
Is a hardware device that converts response.
AC electricity into DC electricity and
then distributes it to the rest of the • Accuracy
computer.
(Is an internal card that gives a Computers are highly accurate in
computer additional capabilities, performing calculations and
such as enhanced video performance executing instructions, as they follow
via a graphics card) predefined algorithms without
human error or bias.
• Power supply unit (PSU)
These cards are inserted into slots • Versatility
on the Motherboard to add extra
functionality to the computer. Computers can perform a wide
(Provides electrical power to the variety of tasks by running different
components in the computer.) software applications.

• Cooling system • Storage

Computers generate heat during Computers can store vast amounts


operation, and cooling systems of data,from documents and images
(fans, heat sinks, and sometimes to videos and software.
liquid cooling) are used to prevent
overheating.
(Are active or passive cooling • Diligence
systems designed to dissipate
excessive heat generated through a Computers can work tirelessly
PC.) without getting fatigued or bored,
making them ideal for repetitive and
time-consuming tasks.
ARE MOBILE DEVICES COMPUTERS?
• Automation
The mobile devices can be described as
computers because they operate under the Computers can automate complex
instructions stored in Their own memory, can tasks and processes, reducing the
accept data, process the data according to
specified rules, produce or display information need for manual intervention.
and store the information for future use
• Reliability
CHARACTERISTICS OF COMPUTER

Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

When properly maintained, interfaces (CLIs), enabling users to


computers are reliable interact with the system and
tools.However, they can be software.
susceptible to hardware failures and
software glitches, necessitating • Portability
backup systems and data recovery
plans. With the advent of laptops, tablets,
and smartphones, computers have
• Consistency become more portable, allowing
users to carry their computing power
Computers consistently follow with them.
instructions, ensuring that the same
task executed multiple times yields • Security Concern
the same results, which is crucial for
tasks requiring precision. Security measures are implemented
to protect against unauthorized
• Multitasking access, data breaches, and
cyberattacks.
Modern computers are equipped
with multitasking capabilities, • Upgradability
allowing them to run multiple
applications and Many components of a computer
processessimultaneously. can be upgraded, allowing users to
improve performance, replace
• Connectivity outdated hardware, and keep up
with technological advancements.
Computers can communicate with
other devices and computers • Customizability
through networks, enabling data
sharing, remote access, and Users can customize their
collaborative work. computers with software,
applications, and settings to suit
• Scalability their specific needs and preferences.

Computers can be easily upgraded • Environmental Impact


and expanded by adding more
memory, storage, or processing Computers consume energy and
power to accommodate increasing generate heat, contributing to
demands. environmental concerns.Energy-
efficient designs and responsible
• User Interaction disposal practices are important to
minimize their ecological footprint.
Computers offer various user
interfaces, including graphical user ADVANTAGES OF COMPUTER
interfaces (GUIs) and command-line
SPEED & EFFICIENCY
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

• Computers provide tools for digital art, music


• Computers can process information and composition, video editing, and more. They
perform tasks at incredibly high speeds, far also offer entertainment through gaming,
surpassing human capabilities. This leads to streaming, and virtual experiences
increased productivity and faster decision-
making. EDUCATION AND E- LEARNING

AUTOMATION • Computers have transformed education,


offering online courses, interactive learning
• Computers enable automation of repetitive platforms, and digital resources that enhance
tasks, reducing human effort and minimizing learning experiences.
errors. This is especially useful in industries
like manufacturing, data entry, and customer
service MEDICAL ADVANCEMENTS

STORAGE CAPACITY • Computers play a vital role in medical


diagnostics, imaging, research, and patient
• Computers can process large amounts of management, leading to more accurate
data and perform complex calculations diagnoses and better patient care.
quickly and accurately. This is essential for
scientific research, financial modeling, and
data analysis.
DISADVANTAGES OF COMPUTER
DATA PROCESSING
• Computers enable automation of repetitive
tasks, reducing human effort and minimizing DEPENDENCY
errors. This is especially useful in industries
like manufacturing, data entry, and customer • Overreliance on computers can lead to
service. difficulties when systems fail, potentially
causing significant disruptions in various
sectors like finance, transportation, and
COMMUNICATION healthcare.

• Computers facilitate communication through


various means, including email, social HEALTH CONCERNS
media, video conferencing, and instant
messaging. They have revolutionized how • Prolonged computer use can lead to health
people connect globally. issues such as eyestrain, carpal tunnel
syndrome, and sedentary lifestyle-related
GLOBAL INFORMATION ACCESS problems

• internet allows computers to access PRIVACY AND SECURITY


information from all over the world. This
access to a wealth of knowledge benefits • Privacy and Security Computers store vast
education, research, and staying informed amounts of personal and sensitive data,
making them susceptible to hacking, identity
MULTI-TASKING theft, and breaches of privacy.

• Modern operating systems enable computers JOB DISPLACEMENT


to perform multiple tasks simultaneously.
This is crucial for productivity, as users can • Job Displacement Automation driven by
switch between various applications computers can lead to job loss in certain
seamlessly industries, as machines replace human
workers in tasks like manufacturing and
CREATIVITY AND ENTERTAINMENT customer service.

ENVIRONMENTAL IMPACT

Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

LOGARITHMS
• The production and disposal of computers
contribute to electronic waste, which poses • A logarithm is the power which A
environmental challenges due to toxic certain number is raised to get
materials and inefficient recycling practices
another number
DISTRACTION AND ADDICTION (1614)

PASCALINE
• Computers can be a source of distraction,
leading to decreased productivity and
addictive behaviors, especially with • Designed and built by the French
excessive use of social media and online mathematician-philosopher Blaise
entertainment. Pascal between 1642 and 1644. it
CYBERCRIME could only do addition and
subtraction, with numbers being
• Computers are vulnerable to various forms of entered by manipulating its dials.
cybercrime, including phishing, malware, (1642)
ransomware, and online scams, which can
result in financial losses and compromised JACQUARD LOOM
personal data.

DIGITAL DIVIDE • The jacquard machine is a device


fitted to a loom that simplifies the
• Not everyone has equal access to computers process of manufacturing textiles
and the internet, creating a digital divide that with such complex patterns as
can exacerbate socioeconomic disparities.
brocade, damask and matelassé.
LOSS OF HUMAN INTERACTION (1804-1805)
DIFFERENCE ENGINE
Excessive use of computers can lead to
decline in face-to-face social interactions, • A difference engine is an automatic
affecting communication skills and mechanical calculator designed to
interpersonal relationships. tabulate polynomial functions.
ETHICAL CONCERNS (1825)

• The rise of artificial intelligence raises ethical ANALYTICAL ENGINE


questions about issues like bias in
algorithms, job displacement, and the ethical • first described in 1837 as the
use of autonomous systems in various successor to Babbage’s difference
contexts. engine, which was a design for a
simpler mechanical calculator.
CHAPTER II: EVOLUTION OF COMPUTING (1833)
THE FIRST PROGRAMMER
• HISTORY OF COMPUTERS
• Ada Lovelace became the first
computer programmer
ABACUS (1843)
• an abacus is a calculation tool used BY
SLIDING counters along rods or grooves, HERMAN HOLLERITH’S CENSUS TABULAR
used to perform mathematical functions.
(1100 BCE) • Consisted of electrically-operated
components that captured and
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

processed census Z by "reading"


holes on paper punch cards. UNIVAC
(AUGUST 30, 1890)
• The first general-purpose electronic
HARVARD MARK digital computer design for business
application produced in the united
• The Harvard Mark I, was one of the states.
earliest general-purpose (MARCH 1952)
electromechanical computers used
in the war effort during the last part IBM
of world war ii.
(1939-1942) • The first family of computers
designed to cover both commercial
TURNING MACHINE and scientific applications and a
complete range of applications from
• A turning machine is a finite small to large.
automaton that can read, write, and (APRIL 7,1964)
erase symbols on an infinitely long
tape. the tape is divided into MINI COMPUTER
squares, and each square contains
a symbol. • Used for scientific and engineering
computations, business transaction
COLOSSUS MARKI processing, file handling, and
database management.
• Colossus was the first of the (1965)
electronic digital machines with
programmability, albeit limited in MICRO COMPUTER
modern terms.
(DEC 1943-JAN 1944) • A microcomputer is a complete
computer on a small scale, designed
ENIAC for use by one person at a time.
(1973)
• The eniac, or electronic numerical
THE CREATION OF MICROSOFT
integrator and computer, was the
result of a U.S government-funded • Microsoft was founded by bill gates
project during world war ii to build an and Paul Allen on April 4, 1975, to
electronic computer that could be develop and sell basic interpreters
programmed. for the Altair 8800.
(FEBRUARY 15, 1946) (APRIL 4,1975)
TRANSISTOR THE CREATION OF APPLE INC.

• A miniature semiconductor that • Apple INC. (apple) designs,


regulates or controls current or manufactures, and markets
voltage flow in addition amplifying smartphones, tablets, personal
and generating these electrical computers and wearable devices.
signals and acting as a switch/gate (APRIL 1, 1976)
for them.
(1947) GRAPHICAL USER INTERFACE

Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

CHARACTERISTICS OF MAINFRAME
• A digital interface in which a user COMPUTERS
interacts with graphical components • It is also an expensive or costly computer.
such as icons, buttons, and menus.
(1979) • It has high storage capacity and great
performance.
TYPES OF COMPUTERS
• It can process a huge amount of data (like
SUPER COMPUTER data involved in the banking sector) very
quickly.
• When we talk about speed, then the first
name that comes to mind when thinking of • It runs smoothly for a long time and has a
computers is supercomputers. They are the long life.
biggest and fastest computers (in terms of
speed of processing data). Supercomputers MINICOMPUTER
are designed such that they can process a
huge amount of data, like processing trillions • Minicomputer is a medium size
of instructions or data just in a second. This multiprocessing computer. In this type of
is because of the thousands of computer,
interconnected processors in
supercomputers. It is basically used in • there are two or more processors, and it
scientific and engineering applications such
as weather forecasting, scientific simulations, • supports 4 to 200 users at one time.
and nuclear energy research. It was first
developed by Roger Cray in 1976. • Minicomputer is similar to Microcontroller.
CHARACTERISTICS OF SUPER COMPUTERS • Minicomputers are used in places like
institutes or departments for different work
• Supercomputers are the computers that are like billing, accounting, inventory
the fastest and they are also very expensive. management, etc. It is smaller than a
mainframe computer but larger in
• It can calculate up to ten trillion individual comparison to the microcomputer.
calculations per second, this is also the
reason which makes it even faster. CHARACTERISTICS OF MINICOMPUTER

• It is used in the stock market or big • Its weight is low.


organizations for managing the online
currency world such as Bitcoin etc. • Because of its low weight, it is easy to carry
anywhere.
• It is used in scientific research areas for
analyzing data obtained from exploring the • Less expensive than a mainframe computer.
solar system, satellites, etc.
• It is fast
MAINFRAME COMPUTER
WORKSTATION COMPUTER
• Mainframe computers are designed in such a
way that they can support hundreds or • A workstation computer is designed for
thousands of users at the same time. It also technical or scientific applications. It consists
supports multiple programs simultaneously. of a fast microprocessor, with a large amount
So, they can execute different processes of RAM and a high-speed graphic adapter. It
simultaneously. All these features make the is a single-user computer. It is generally
mainframe computer ideal for big used to perform a specific task with great
organizations like banking, telecom sectors, accuracy.
etc., which process a high volume of data in
general.

Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

CHARACTERISTICS OF WORKSTATION • Analog Computers are particularly designed


COMPUTER to process analog data. Continuous data that
changes continuously and cannot have
• It is expensive or high in cost. discrete values are called analog data. So,
an analog computer is used where we don’t
• They are exclusively made for complex work need exact values or need approximate
purposes. values such as speed, temperature,
pressure, etc. It can directly accept the data
• It provides large storage capacity, better from the measuring device without first
graphics, and a more powerful CPU when converting it into numbers and codes. It
compared to a PC. measures the continuous changes in
physical quantity. It gives output as a reading
• It is also used to handle animation, data on a dial or scale. For example
analysis, CAD, audio and video creation, and speedometer, mercury thermometer, etc.
editing.
DIGITAL COMPUTER
PERSONAL COMPUTER (PC)
• computers are designed in such a way that
• Personal Computers is also known as a they can easily perform calculations and
microcomputer. It is basically a general- logical operations at high speed. It takes raw
purpose computer designed for individual data as input and processes it with programs
use. It consists of a microprocessor as a stored in its memory to produce the final
central processing unit (CPU), memory, input output.
unit, and output unit. This kind of computer is
suitable for personal work such as making an
HYBRID COMPUTER
assignment, watching a movie, or at the
office for office work, etc. For example,
Laptops and desktop computers. • As the name suggests hybrid, which means
made by combining two different things.
CHARACTERISTICS OF PERSONAL COMPUTER Similarly, the hybrid computer is a
(PC) combination of both analog and digital
computers. Hybrid computers are fast like
• In this limited number of software can be analog computers and have memory and
used. accuracy like digital computers

• It is the smallest in size. TABLET AND SMARTPHONES

• It is designed for personal use. • Tablets and Smartphones are the types of
computers that are pocket friendly and easy
• It is easy to use to carry is these are handy. This is one of the
best use of modern technology. These
SERVER COMPUTER devices have better hardware capabilities,
extensive operating systems, and better
• computers that are combined data and multimedia functionality.
programs. Electronic data and applications
are stored and shared in the server • Smartphones and tablets contain a number
computer. The working of a server computer of sensors and are also able to provide
is that it does not solve a bigger problem like wireless communication protocols.
a supercomputer but it solves many smaller
similar ones. Examples of server computer COMPUTER HARDWARE
are like Wikipedia, as when users put a
request for any page, it finds what the user is • Hardware refers to the physical components
looking for and sends it to the user. of a computer. Computer Hardware is any
part of the computer that we can touch these
ANALOG COMPUTER parts. These are the primary electronic
devices used to build up the computer.

Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

Examples of hardware in a computer are the processors, and Device Drivers.


Processor, Memory Devices,
Monitor, Printer, Keyboard, Mouse, and 2. Application Software:
Central Processing Unit. • Application Software are the software that
works the basic operations of the computer.
TYPES OF COMPUTER HARDWARE It performs a specific task for users.
Application Software basically includes Word
1. Input Devices: Input Devices are those Processors, Spreadsheets, etc. Types of
devices through which a user enters data Application software include General
and information into the Computer or simply, Purpose Software, Customized Software,
User interacts with the Computer. Examples etc.
of Input Devices are Keyboard, Mouse,
Scanner, etc. Difference between Hardware and Software
2. Output Devices: Output Devices are
devices that are used to show the result of
the task performed by the user. Examples of
Output Devices are Monitors, Speakers, etc.
3. Storage Devices: Storage Devices are
devices that are used for storing data and
they are also known as Secondary Storage
Data. Examples of Storage Devices are CDs,
DVDs, Hard Disk, etc
4. Internal Component: Internal
Components consists of important hardware
devices present in the System. Examples of
Internal Components are the CPU,
Motherboard, etc.

COMPUTER SOFTWARE

Computer Software
• Software is a collection of instructions,
procedures, and documentation that
performs different tasks on a computer
system. we can say also Computer Software
is a programming code executed on a
computer processor. The code can be
machine-level code or code written for an
operating system. Examples of software are
MS- Word, Excel, PowerPoint, Google
Chrome, Photoshop, MySQL, etc.

Types of Computer Software

➢ System Software
➢ Application Software

1. System Software:
• System Software is a component of
Computer Software that directly operates
with Computer Hardware which has the work
to control the Computer’s Internal
Functioning and also takes responsibility for
controlling Hardware Devices such as
Printers, Storage Devices, etc. Types of
System Software include Operating
systems, Language

Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

• The operating system uses password


FUNCTIONS OF AN OPERATING SYSTEM protection to protect user data and similar
other techniques. it also prevents
Process management unauthorized access to programs and user
• in operating systems involves a variety of data. The operating system provides various
tasks, including creating, scheduling, and techniques which assure the integrity and
terminating processes. The operating confidentiality of user data.
system must ensure that each process and
application has enough time on the CPU to Following security measures are used to protect
run smoothly while using as many CPU user data:
cycles as possible for the real task.
➢ Protection against unauthorized access
Memory Management through login.
• The operating system manages the Primary ➢ Protection against intrusion by keeping
Memory or Main Memory. Main memory is firewall active.
made up of a large array of bytes or words
where each byte or word is assigned a ➢ Protecting the system memory against
certain address. Main memory is fast malicious access.
storage and it can be accessed directly by
the CPU. For a program to be executed, it ➢ Displaying messages related to system
should be first loaded in the main memory. vulnerabilities.
An operating system manages the allocation
and deallocation of the memory to various Job Accounting
processes and ensures that the other • The operating system Keeps track of time
process does not consume the memory and resources used by various tasks and
allocated to one process. users, this information can be used to track
resource usage for a particular user or
File management group of users. In a multitasking OS where
• A file system is organized into directories for multiple programs run simultaneously, the
efficient or easy navigation and usage. OS determines which applications should
These directories may contain other run in which order and how time should be
directories and other files. An Operating allocated to each application.
System carries out the following file
management activities. It keeps track of Secondary Storage Management
where information is stored, user access • Secondary storage is used as an extension
settings, the status of every file, and more. of main memory in operating systems.
These facilities are collectively known as the Secondary storage devices can hold the
file system. An OS keeps track of data permanently.
information regarding the creation, deletion,
transfer, copy, and storage of files in an • Storage devices consist of Registers,
organized way. It also maintains the integrity Cache, Main-Memory, Electronic-Disk,
of the data stored in these files, including Magnetic-Disk, Optical-Disk, Magnetic-
the file directory structure, by protecting Tapes. Each storage system provides the
against unauthorized access. basic system of storing a datum and of
holding the datum until it is retrieved at a
Device Management later time. All the storage devices differ in
speed, cost, size and volatility. The most
• An OS manages device communication via common Secondary-storage device is a
its respective drivers. It performs the Magnetic-disk, which provides storage for
following activities for device management. both programs and data. Disks are the
Keeps track of all devices connected to the mainly used secondary storage devices.
system. Designates a program responsible The main activity that is performed in
for every device known as the Input/output
controller. • secondary storage management is disk
scheduling.
Security
Networking

Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

• The OS provides network connectivity and


manages communication between Centering:
computers on a network. • the placement of a line of text in the center of
the screen or page where the left-most and
• It also manages network security by right-most characters in the line are the
providing firewalls and other security same distance from the left and right
measures. margins.

Coordination between Other Software and Users Clip Art:


Operating systems • pre-designed images that can be placed
• also coordinate and assign interpreters, within a document.
compilers, assemblers, and other software to
the various users of the computer systems. Close:
• closes the document and offers to save the
CHAPTER III: MICROSOFT WORD changes you made to the document without
exiting the program.
• A word processor is a computer program that
allows you to create, edit and produce text Copy:
documents, such as letters. Microsoft Word • creates a duplicate of highlighted/selected
is a word processor created by Microsoft. text and saves to the clipboard to be pasted
The first version of Microsoft Word was elsewhere.
released in 1983 as a competitor to
WordStar, the most popular word processor Cut:
at the time. • removes highlighted/selected text and saves
to the clipboard to be pasted elsewhere.
• Microsoft Word is the word processing
component of the Microsoft Office Suite. It is Default:
used primarily to enter, edit, format, save, • A default setting is the software
retrieve and print documents. manufacturer's preset option for a particular
command or function. Default settings can
• The term “Microsoft Office” refers to be changed.
Microsoft’s entire suite of office productivity
applications. Microsoft Word is one of the Document:
many applications that are grouped under • another name for a file created using
the “Microsoft Office” umbrella Microsoft Word.

MICROSOFT WORD TERMINOLOGY Font:


• a style of typeface, such as: Times New
Alignment Roman, Arial Black, Arial, and Freestyle
• refers to the position of lines in a paragraph Script. A font is a set of all the characters
in relation to the documents left and right available in one typeface and size, including
margins. uppercase and lowercase letters,
punctuation, and numerals.
Backspace
• deletes data to the left of the insertion point. Font Formatting:
• changes the appearance of the text. Font
Bold formatting includes enhancements such as
• characters in bold appear on the screen in a font style (bold, centering, and underline),
higher intensity. This text is bold. Bold should point size (12 pt), and font typeface (Times
be used for emphasis, but like all formatting New Roman, Arial, and Courier New).
characteristics, should be used sparingly.
Format Painter:
Bullets • enables you to copy the formatting of one
• special characters or symbols that are used word or paragraph and apply it to another
to set off a paragraph. word or paragraph.
• This is item one in a bulleted list.
• This is item two in a bulleted list. Hard Return:

Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

• You can force Word to end a paragraph and


move to the next line by pressing the enter
key. The resulting “hidden” command is
called a Hard Return.

I-beam Mouse Pointer:


• The mouse pointer turns into an I-beam
mouse pointer when it is within the document
area. Use the I-beam mouse pointer to place
the insertion point in a document.
Indentation: the amount of space measured
from the page margin that is applied to a
paragraph or an area of a document.

Insertion Point:
• the point at which the cursor is blinking on
the document screen.

Italics:
• Italicized characters appear on the screen
slightly tilted to the right. This text is
italicized.

Line Spacing:
• refers to the number of lines used by each
line of text. In single-line spacing, each line
of text is followed by another line of text, and
there are no blank lines in between. In
double-line spacing, each line of text is
followed by a blank line.
EXPLORING THE WORD ENVIRONMENT
Margin:
• Exploring the Word 2016 Environment Open
• The amount of blank space, usually
Word by using the Search Windows box or
measured in inches or characters, above and
by double-clicking on the desktop icon for
below and to the right and left of the main
Microsoft Word 2016.
body of a document.
Title Bar
Paragraph:
1. Note the title bar section which has window
• A paragraph is any amount of text separated
controls at the right end, as in other Windows
by a hard return. Microsoft Word sees
programs.
anything from a single word to an entire page
of text as a paragraph.
2. Note that a blank document opens with a
default file name of Document 1.
Paste:
• Adds previously copied or cut text at the Quick Access Toolbar
insertion point. • The Quick Access Toolbar is located all the
way to the left on the title bar.
Print Preview:
• It contains frequently used commands and
• Print Preview lets you see how your
can be customized using the drop-down
document will look on the page before it is
menu.
printed.
1. Point to each small icon to view its ScreenTip.
Wrapping:
2. Be aware that the Undo button is not located
• Text automatically wraps to the next line anywhere else in the application except for the
when typing in Microsoft Word. The only time Quick Access Toolbar.
you need to hit the enter key is when you 3. Click the Customize Quick Access Toolbar
want to start a new paragraph button, click New on the menu, and see the
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

command get added to the Quick Access ➢ A one-part arrowed button, called a menu
Toolbar. button, will darken completely when you
4. Click the Customize Quick Access Toolbar point to it:
button again, and click Show Below the Ribbon. 1. In the Font group, point to the Text
Click Show Above the Ribbon to move the Quick Effects and Typography button.
Access Toolbar back again. 2. Note there is no difference in
shading between the left and right
Ribbon of the button when you point to
• The ribbon contains all of the tools that you each section.
use to interact with your Microsoft Word file.
It is located towards the top of the window ➢ On a two-part arrowed button, called a split
underneath the title bar. All of the programs button, only one section at a time will darken
in the Microsoft Office suite have one. when you point to it.
1. In the Paragraph group, point to the
• The ribbon has a number of tabs, each of left part of the Shading button. This
which contains buttons, which are organized is the “button proper” section of the
into groups. Depending on the object you button. Note how it is darkened
have selected in the document, several separately from the arrow portion of
contextual tabs may appear, which provide the button.
additional formatting options for the selected 2. Point to the right portion, the section
object with the arrow. This is the “list
arrow” section of the button. Note
Active Tab how it is darkened separately from
• By default, Word will open with the Home tab the left portion.
active on the ribbon. Note how the Active tab 3. The button proper is the section of a
has a white background and blue letters, and two-part button that will carry out
the Inactive tabs have the opposite. the default option or the last used
option.
Contextual Tab 4. The list arrow section will open an
• Contextual tabs are displayed when certain options menu.
objects, such as an images and text boxes,
are selected. They contain additional options File Tab
for modifying the object. Contextual tabs • The File tab provides a Backstage view of
stand out because they are darker in color your document. The Backstage view
and are located to the right of all the other exposes information and metadata about the
tab s. As soon as we start being productive currently active document, lists recently
in the program, we will see contextual tabs opened documents, and provides a variety of
appear. user options, such as opening, saving, and
printing. Instead of just a menu, it is a full-
Groups and Buttons page view, which makes it easier to work
• On each Tab, the Buttons (a.k.a. commands with.
or tools) are organized into Groups. The
groups have names, but the names are not Workspace
clickable. • Underneath the ribbon is the workspace.
• Hover over some of the buttons on the Home
tab to observe the ScreenTips. Status Bar
• The ScreenTip displays the name of the • The Status bar is located below the
button, along with a short description of what document window area.
the button does.

Buttons with Arrows Current Information


• Note that some buttons have images on • The left end displays a variety of information
them and some have images and an arrow. about the document, such as the page
The arrow indicates that more information is number in the document, and whether there
needed to carry out the function of the are any spelling errors.
button. Some arrowed buttons have two Views
parts: the button proper and the list arrow

Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

• At the right end are shortcuts to the different A. Click in the middle of the word "Library" on the first
views that are available. Each view displays line of the second paragraph of the practice
the document in a different way, allowing you document.
to carry out various tasks more efficiently.
B. Try the Delete key.
Zoom Slider
• Also at the right end of the Status bar is the
Zoom Slider. This allows you to adjust how Backspace
large the document is displayed on the • Removes characters to the left of the
screen. It does not adjust the actual size of insertion point.
the document—just how big or small it is
displayed on the screen (like moving a A. Try the Backspace key
newspaper away from or closer to your
eyes).
Shift
Insertion point • When typed in conjunction with a letter key,
• Sometimes referred to as the cursor, inserts a capital letter.
insertion point is the name for the blinking
line where anything you insert goes. Note: Word will automatically capitalize the first

There are several ways to move the insertion word of every sentence, as well as the word "I".
point to get it where you want it to be.
1. Click in the middle of the first line of the first Caps Lock
paragraph of the practice document. • Makes all letters come out as uppercase
2. Refer to the chart below to practice moving the
insertion point around using the keyboard CHAPTER IV: MALWARE

KEYBOARD KEYS

Keyboard keys There are several other keyboard MALWARE


keys that are important to know.
• (malicious software) is a program or code
Enter that is designated to infiltrate a system and
• Moves the insertion point to a new line, but execute malicious operations and controls.
also creates a new paragraph. When you are Computer viruses, worms, and Trojan horses
typing in Word, the insertion point will move, are classified as malware, which are
showing where the next character you type programs that act without a user’s
will appear. When the insertion point reaches knowledge and deliberately alter the
the right margin, the word you are typing will computer’s operations. Unscrupulous
move to the next line. This is called word programmers write malware and then test it
wrap. Because of this, you should only tap to ensure it can deliver its payload. The
enter to start a new paragraph. payload is the destructive event or prank the
program is intended to deliver.
Space Bar
• Creates a small space between words. • A computer infected by a virus, worm, or
Trojan horse often has one or more of the
A. Click after the word "Library" on the first line of the following symptoms:
first paragraph of the practice document. ➢ Screen displays unusual message or image
➢ Music or unusual sound plays randomly
B. Try the Space Bar ➢ Available memory is less than expected
➢ Existing programs and files disappear
Delete ➢ Files become corrupted
• Removes characters to the right of the ➢ Programs or files do not work properly
insertion point. ➢ Unknown programs or files
➢ System properties change mysteriously
appear

Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

COMMON TYPES OF CYBER Jaschan, 18, who admitted programming


ATTACKS/MALWARES the Sasser and other worms and who was
arrested in Germany in May 2004, was
➢ Internet users, especially home users, are responsible for 70% of the virus
not nearly as safe as they believe, according infections in the early part of that year
to a study by McAfee and the nonprofit
National Cyber Security Alliance. 36 ➢ In 2008–2009, a worm known as Conficker
Consumers suffer from complacency and a or Downadup, spread through a Microsoft
lack of expert advice on keeping their Windows vulnerability that allowed guessing
computer systems secure. The study found of network passwords and by people hand-
that 92% of adults believed that they were carrying such gadgets as USB keys, infected
safe from viruses; however, only 51% and millions of computers. The Conficker authors
73% thought they had a firewall installed, cleverly updated the worm through several
but only 64% actually had it enabled. Little versions, playing a cat-and-mouse game that
more than half had anti-spyware protection, kept them one step ahead of security
and only about 12% had phishing experts. Some researchers feared that
protection. As we will explain, these kinds of Conficker could be turned into a powerful
protections are musts in guarding against offensive weapon that could disrupt the
important cyber-attacks such as denial-of- internet itself. April 1, 2009, was supposed
service attacks, worms, viruses, and Trojan to be the day the worm would launch a
horses and other kinds of “malware.” massive cyber-attack, but the day came and
went without inciden.
Denial-Of-Service Attacks
➢ A denial-of-service (DoS) attack, or
distributed denial-of-service (DDoS) attack, Viruses
consists of making repeated requests of a ➢ A virus is a “deviant” program, stored on a
computer system or network, thereby computer floppy disk, hard drive, or CD, that
overloading it and denying legitimate users can cause unexpected and often undesirable
access to it. Because computers are limited effects, such as destroying or corrupting
in the number of user requests they can data.
handle at any given time,
➢ The famous email Love Bug (its subject
➢ a DoS onslaught will tie them up with line was I LOVE YOU), which originated in
fraudulent requests that cause them to shut the Philippines in May 2000 and did perhaps
down. The assault may come from a single as much as $10 billion in damage worldwide,
computer or from hundreds or thousands of was both a worm and a virus, spreading
computers that have been taken over by faster and causing more damage than any
those intending harm. other bug before it.

Worms ➢ The Love Bug was followed almost


➢ A worm is a program that copies itself immediately by a variant virus. This new
repeatedly into a computer’s memory or onto Love Bug didn’t reveal itself with an I LOVE
a disk drive. YOU line but changed to a random word or
words each time a new computer was
➢ times it will copy itself so often it will cause a infected.
computer to crash. Among some famous
worms are Code Red, Nimda, Klez, Sasser, ➢ More recent viruses have targeted Twitter,
Bagle, Blaster, Sobig, and Melissa. The YouTube, website advertising, and digital
2002 worm Klez, dubbed the most common photo-holding frames. A virus called
worm ever, spread its damage through Koobface attacked Facebook. Fast-
Microsoft products by being inside email spreading Clampi took aim at business
attachments or part of email messages financial accounts A fired computer
themselves, so that merely opening an programmer embedded a malicious virus in
infected message could infect a computer servers run by financial institution Fannie
running Outlook or Outlook Express. The Mae.
Sasser worm was estimated to account
for 26% of all virus infections in the first ➢ The virus usually attaches itself to your hard
half of 2004. Incredibly, one person, Sven disk. It might then display annoying
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

messages (“Your PC is stoned—legalize Firefox from Internet Explorer as your


marijuana”) or cause Ping-Pong balls to browser.)
bounce around your screen and knock away
text. More seriously, it might add garbage to ➢ Through infiltrated Wi-Fi hot spots: As
your files and then erase or destroy your mentioned earlier, if you’re a user of Wi-Fi
system software. It may evade your wireless
detection and spread its havoc elsewhere,
infecting every floppy disk, CD/DVD, and ➢ access points, or hot spots, you have to be
even digital-camera flash memory used by aware that your laptop or PDA could be
the system. exposed to wireless transmitted diseases
from illegal users. Many hot spots do not
Trojan Horses require passwords; which means that
➢ A Trojan horse is a program that pretends to anyone with a wireless connection and
be a useful program, usually free, such as a hacking know-how can hop aboard the
game or screen saver, but carries viruses, or network. Here, too, having wireless firewalls
destructive instructions, that perpetrate can reduce risks
mischief without your knowledge.
WAYS TO MINIMIZE VIRUS ATTACKS
➢ One particularly malicious feature is that a
Trojan horse may allow so-called backdoor Some tips for minimizing the chances of infecting
programs to be installed. A backdoor your computer are as follows:
program is an illegal program that allows
illegitimate users to take control of your ➢ Don’t open, download, or execute any files,
computer without your knowledge. An email messages, or email attachments if the
example is the kind of program that records source is unknown or if the subject line of an
what people type, logging individual email is questionable or unexpected.
keystrokes, paying particular attention to
user names and passwords, which can be ➢ Delete all spam and email messages from
used to access and even open bank strangers. Don’t open, forward, or reply to
accounts online. such messages.

HOW MALWARE IS SPREAD ➢ Back up your data files regularly, and keep
the backup hard drive (external) or whatever
Worms, viruses, and Trojan horses are passed in in a location separate from your computer).
the following ways: Then if a virus (or a fire) destroys your work
files, your data won’t be totally devastated.
➢ By infected floppies or CDs: The first way
is via an infected floppy disk or CD, perhaps ➢ Make sure you have virus protection
from a friend or a repair person. software, such as McAfee Virus Scan
(www.mcafee.com) or Norton Antivirus
➢ By opening unknown email attachments: activated on your machine. You can
The second way is from an email download it from these companies; then
attachment. This is why a basic rule of using follow the installation instructions.
the internet is: Never click on an email
attachment that comes from someone you ➢ Buying a new computer with antivirus
don’t know. This advice also applies to software on it does not mean you are
unknown downloaded files, as for free video automatically protected. The software could
games or screen savers. be six months old and not cover new viruses.
You have to register it with the designer
➢ By clicking on infiltrated websites: Some company, and you need to receive antivirus
crackers “seed” web pages with contagious updates.
malware that enables them to steal personal
data, so that by simply clicking on a website ➢ Scan your entire system with antivirus
you can unwittingly compromise your PC. software the first time it’s installed; then scan
The risk can be minimized if you have a it regularly after that. Often the software can
firewall and keep antivirus software on your be set to scan each time the computer is
computer up to date, as we describe below. rebooted or on a periodic schedule. Also
(You might also consider switching to Mozilla
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

scan any new drives and the like before Comment sections: The comment sections of places
using them. such as YouTube and news websites are also popular
areas for trolls to feed. You'll find a lot of obvious
➢ Update your antivirus software regularly. trolling here, and they frequently generate a lot of
There are virus and security alerts almost responses from angry readers or viewers.
every day. Most antivirus software is
automatically linked to the internet and will SIGNS SOMEONE IS TROLLING
add updated antivirus code to your system
whenever the software vendor discovers a • It can sometimes become difficult to tell the
new threat. difference between a troll and someone who
just genuinely wants to argue about a topic.
➢ If you discover you have a virus, you can ask However, here are a few tell-tale signs that
McAfee or Norton to scan your computer someone is actively trolling.
online. Then follow the company’s directions
for cleaning or deleting it. Off-topic remarks: Completely going off-topic from
the subject at hand. This is done to
CYBER INTRUDERS annoy and disrupt other posters.
Refusal to acknowledge evidence: Even when
presented with hard, cold facts, they
ignore this and pretend like they never saw it.
INTERNET TROLLS
Dismissive, condescending tone: An early indicator of
a troll was that they would ask
➢ If you've been on the internet for any period an angry responder, "Why you mad, bro?" This is a
of time, you've likely run into a troll at some method done to provoke someone
point. even more, as a way of dismissing their argument
➢ An internet troll is someone who makes altogether.
intentionally inflammatory, rude, or upsetting
statements online to elicit strong emotional Use of unrelated images or memes: They reply to
responses in people or to steer the others with memes, images, and gifs. This is
conversation off-topic. They can come in especially true if done in response to a very long text
many forms. Most trolls do this for their own post.
amusement, but other forms of trolling are Seeming obliviousness: They seem oblivious that
done to push a specific agenda. most people are in disagreement with
➢ Trolling is distinct from other forms of them. Also, trolls rarely get mad or provoked.
cyberbullying or harassment. It is normally
not targeted towards any one person and CYBER SPIES
relies on other people paying attention and
becoming provoked. • Cyber espionage, or cyber spying, is a type
➢ Trolling exists on many online platforms, of cyberattack in which an unauthorized user
from small private group chats to the biggest attempts to access sensitive or classified
social media websites. Here's a list of places data or intellectual property (IP) for economic
online where you're likely to see online trolls: gain, competitive advantage or political
reasons.
Anonymous online forums: Places like Reddit,
4chan, and other anonymous message message Cyber Espionage Targets
boards are prime real-estate for online trolls. Because • The most common targets of cyber
there's no way of tracing who someone is, trolls can espionage include large corporations,
post very inflammatory content without repercussion. government agencies, academic institutions,
This is especially true if the forum has lax or inactive think tanks or other organizations that
moderation. possess valuable IP and technical data that
can create a competitive advantage for
X (formerly Twitter): X also has the option to be another organization or government.
anonymous, and has become a hotbed for internet
trolls. Frequent X trolling methods involve hijacking • Targeted campaigns can also be waged
popular hashtags and mentioning popular X against individuals, such as prominent
personalities to gain attention from their followers.

Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

political leaders and government officials, as cybercrimes. They can be individuals or


business executives and even celebrities. teams.

Cyber spies most commonly attempt to access the ➢ Cyber thieves and cybercriminals are widely
following assets: available in what is called the “Dark Web”
where they mostly provide their illegal
➢ Research & Development data and activity services or products.
➢ Academic research data
➢ IP, such as product formulas or blueprints Types of Cyber Theft
➢ Salaries, bonus structures and other
sensitive information regarding 1. Phishing and Scam:
organizational ➢ Phishing is a type of social engineering
➢ finances and expenditures attack that targets the user and tricks them
➢ Client or customer lists and payment by sending fake messages and emails to get
structures sensitive information about the user or trying
➢ Business goals, strategic plans and to download malicious software and exploit it
marketing tactics on the target system.
➢ Political strategies, affiliations and
communications 2. Identity Theft
➢ Military intelligence ➢ Identity theft occurs when a cybercriminal
uses another person’s personal data like
HACKERS credit card numbers or personal pictures
without their permission to commit a fraud or
➢ Hackers are defined (1) as computer a crime.
enthusiasts, people who enjoy learning
programming languages and computer 3. Ransomware Attack
systems, but also (2) as people who gain ➢ Ransomware attacks are a very common
unauthorized access to computers or type of cyber theft/cybercrime. It is a type of
networks, often just for the challenge of it. malware that has the capability to prevent
Considering the second kind of hacker, those users from accessing all of their personal
who break into computers for relatively data on the system by encrypting them and
benign reasons, we can say there are then asking for a ransom in order to give
probably two types: access to the encrypted data.

4. Hacking/Misusing Computer Networks


Thrill-seeker hackers: Thrill-seeker hackers are ➢ This term refers to the crime of unauthorized
hackers who illegally access computer systems access to private computers or networks and
simply for the challenge of it. Although they penetrate misuse of it either by shutting it down or
computers and networks illegally, they don’t tampering with the data stored or other illegal
do any damage or steal anything; their reward is the approaches.
achievement of breaking in.
White-hat hackers: White-hat hackers are usually 5. Internet Fraud
computer professionals who break into ➢ Internet fraud is a type of cybercrimes that
computer systems and networks with the knowledge makes use of the internet and it can be
of their owners to expose security flaws that considered a general term that groups all of
can then be fixed. 44 (The term “white hat” refers to the crimes that happen over the internet like
the hero in old Western movies, who often spam, banking frauds, theft of service, etc.
wore a white hat, as opposed to the villain, who
usually wore a black hat—see below.) Kevin
Mitnik, for instance, became a tech security consultant ONLINE SAFETY: ANTIVIRUS SOFTWARE,
after serving five years in prison for breaking into FIREWALLS, PASSWORDS,
corporate computer systems in the mid-1990s. BIOMETRIC AUTHENTICATION, & ENCRYPTION

CYBER THIEVES ANTIVIRUS SOFTWARE


➢ A cyber thief (known as cybercriminal) is a ➢ A variety of virus-fighting programs
person who uses his skills in technology to are available. Antivirus software
do malicious acts and illegal activities known
Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

scans a computer’s hard disk, CDs, have more than one computer and
and main memory to detect viruses you are linked to the internet by a
and, sometimes, to destroy them. cable modem or DSL, you probably
Such virus watchdogs operate in two need a hardware firewall, such as a
ways. First, they scan disk drives for hub/ router.
“signatures,” characteristic strings of
1s and 0s in the virus that uniquely PASSWORDS
identify it. Second, they look for ➢ Password is the special words,
suspicious virus like behavior, such codes, or symbols required to
as attempts to erase or change access a computer system.
areas on your disks.
➢ Protecting your internet access
Examples of antivirus programs are McAfee accounts and files with a password
Virus Scan, Norton Antivirus, Pc-cillin isn’t enough. Passwords (and PINs,
Internet Security, Avast!, and Zone Alarm too) can be guessed, forgotten, or
with Antivirus. Others worth considering are stolen. To foil a stranger’s guesses,
CA Internet Security Suite Plus, Panda experts say, you should never
Antivirus Platinum, and McAfee Virex for choose a real word or variations of
Macs. your name, your birth date, or those
of your friends or family. Instead you
FIREWALLS should mix letters, numbers, and
➢ A firewall is a system of hardware punctuation marks in an oddball
and/or software that protects a sequence of no fewer than eight
computer or a network from characters.
intruders. The firewall software
monitors all internet and other Examples of some good passwords are
network activity, looking for 2b/orNOT2b% and Alfred!E!Newman7. Or
suspicious data and preventing you can also choose an obvious and
unauthorized access. Always-on memorable password but shift the position
internet connections such as cable of your hands on the keyboard, creating a
modem, satellite, and DSL, as well meaningless string of characters—the best
as some wireless devices, are kind of password.
particularly susceptible to
unauthorized intrusion. BIOMETRIC AUTHENTICATION
➢ A hacker or cracker can easily
➢ If you have one computer—software breach a computer system with a
firewall: If you have just one guessed or stolen password. But
computer, a software firewall is some forms of identification can’t be
probably enough to protect you while easily faked—such as your physical
you’re connected to the internet. traits. Biometrics, the science of
(Windows XP/Windows Vista and measuring individual body
Mac OS X have built-in software characteristics, tries to use these in
firewalls that can be activated security devices.
quickly.)
➢ Biometric authentication devices
➢ If you have more than one authenticate a person’s identity by
computer—hardware firewall: If you comparing his or her physical or

Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

behavioral characteristics with digital used now as a security system for


code stored in a computer system. some notebook computers.

➢ There are several kinds of devices ❖ Voice-recognition systems: These


for verifying physical or behavioral systems compare a person’s voice
characteristics that can be used to with digitized voice prints stored in a
authenticate a person’s identity. computer, which the individual has
previously “trained” to recognize his
❖ Hand-geometry systems: Also or her speech patterns
known as full-hand palm scanners,
these are devices to verify a ENCRYPTION
person’s identity by scanning the ➢ Encryption is the process of altering
entire hand, which, for each person, readable data into unreadable form
is as unique as a fingerprint and to prevent unauthorized access.
changes little over time. Encryption is able to use powerful
mathematical concepts to create
❖ Fingerprint scanners: These range coded messages that are difficult or
from optical readers, in which you even virtually impossible to break.
place a finger over a window, to
swipe readers, such as those built TWO FORM OF ENCRYPTION
into laptops and some handhelds,
which allow you to run your finger There are two basic forms of
across a bar like sensor. Microsoft encryption— private key and public key:
offers optical fingerprint readers to
go with Windows XP/Vista. Private key:
➢ Private-key (symmetric) encryption
❖ Iris-recognition systems: Because means that the same secret key is
no two people’s eyes are alike, iris used by both sender and receiver to
scans are very reliable identifiers. In encrypt and decrypt a message. The
Europe, some airports are using iris- encryption system DES (for “Data
scanning systems as a way of Encryption Standard”) was adopted
speeding up immigration controls. as a federal standard for private-key
The Nine Zero, an upscale hotel in encryption in 1976.
Boston, has experimented with
letting guests enter one of its more Public key:
expensive suites by staring into a ➢ Public-key encryption means that
camera that analyzes iris patterns. two keys are used—a public key,
which the receiver has made known
❖ Face-recognition systems: Facial- beforehand to the sender, who uses
recognition systems may come to it to encrypt the message, and a
play an important role in biometric private key, which only the receiver
photos embedded in U.S. passports knows and which is required to
and those of other industrialized decrypt the message. Examples of
nations during the next few years. public key encryption technologies
The technology, which compares a are PGP (for “Pretty Good Privacy”),
live face image with a digitized RSA encryption, and
image stored in a computer, is even FortezzaCOLOSSUS MARKI

Nicole Busgano
BSA 2113
IT 101: APPLICATION TOOLS IN BUSINESS

COLLEGE OF ACCOUNTANCY, BUSINESS, ECONOMICS, AND INTERNATIONAL HOPITALITY MANAGEMENT


1st SEMESTER A.Y. 2023 – 2024

• Colossus was the first of the


electronic digital machines with
programmability, albeit limited in
modern terms.
(DEC 1943-JAN 1944)

CHAPTER SUMMARY

➢ Malware (malicious software) is a


program or code that is designated
to infiltrate a system and execute
malicious operations and controls.
Computer viruses, worms, and
Trojan horses are classified as
malware.
➢ Cyber-attacks include DoS attack,
viruses, works and Trojan horses.
➢ Internet trolls, cyber spies, hackers
and cyber thieves are examples of
cyber intruders.
➢ For online safety of all antivirus
software, strong passwords,
biometrics and encryption can be
applied to prevent malware.

Nicole Busgano
BSA 2113

You might also like