CHP 5 f5
CHP 5 f5
COMPUTERS
LESSON 16: INFORMATION TECHNOLOGY CAREERS (IT PERSONNELS)
The following careers are common in the domain of information and
communication technology.
1. Programmer: It is a person who understands the problem or the task that a
computer is suppose to work on and translate it into the language that the computer
understands. This process is called programming.
2. Software engineer: Manages the development of a large scale software as a project,
striving and making sure that designs, specification, implementation, etc are carried out
on time, within budget, according to users need and of high quality.
3. Database administrator/manager: This is a management position in an organization.
He/she oversees the database activities of an organization.
4. Database developer: He analyse businesses/projects environment, design, develop and
implements database solutions to support various processes of the organization.
5. Network administrator: He designs, implement and maintains the technical hardware
and software necessary to run a network.
6. Web Engineer: He designs, develop and implement solutions for web based activities
such as company portals and online shopping.
7. System analyst: He works with users to develop a list of requirements so that a possible
computer solution to support those requirements may be designed and implemented.
8. System Network Manager: He installs, maintain and manage computer networks.
9. Data Processing Manager; He ensures the overall running of the data processing department.
10. Computer Engineer: These are engineers that focus on the designed of hardware.
11. Computer System Analyst: They designed, develop and oversee the installation of new systems.
12. Programmer: This is someone who understands a problem, writes and document computer
software using programming language like C, C++, JAVA, etc.
13. Computer Operator: He oversees the running of computer systems, install, maintain
and repair computers and other peripheral devices such as printers.
14. Data Input Staff: Ensures the overall running of the data processing department.
15. Maintenance Technician: This is a person who repairs, install, update computers and
servers.
16. Computer scientist: This is a person who has acquired knowledge of computer science.
✓ Virus
A virus is a computer program that can copy itself and infect a computer where it destroys files
and disrupts the operation of the computer.
✓ Worm
A worm is a self-replicating malicious program which uses a computer network to send copies of
itself to other computers (nodes) on the network and it may do so without any user intervention.
Unlike a virus, it does not need to attach itself to an existing program. Worms cause harm to the
network by consuming bandwidth whereas viruses corrupt or modify files on a targeted
computer.
✓ Trojan horse
A Trojan horse is malware that appears to perform a desirable function for the user prior to run
or install but instead facilitates unauthorized access of the user's computer system. Once a Trojan
horse has been installed on a target computer system, a hacker may have access to the computer
remotely and perform various operations, limited by user privileges on the target computer
system and the design of the Trojan horse.
✓ Spyware
Spyware is software that monitors a computer user’s activity without their knowledge and
reports it to a central location.
✓ Logic bomb
A logic bomb also known as slag code, is a piece of computer code that executes a malicious
task such as clearing a hard drive or deleting specific files, when it is triggered by a specific
event.
A hacker is someone who illegally attempts to access a computer system without authorization in
order to steal, modify or damage the data that the system contain.
A cracker in the other hand is someone who uses code to access strictly restricted software.
2.1.7. Cyber Stalking
Cyber stalking is a crime in which the attacker harasses a victim using electronic
communication, such as e-mail or instant messaging (IM), or messages posted to a web site or a
discussion group.
Computer security has three main goals, confidentiality, integrity and availability, which can be
conveniently summarized by the acronym "CIA":
✓ Confidentiality ensures that information is not accessed by unauthorized persons. In other
words, it ensures that information is kept secret or private.
✓ Integrity ensures that information is not altered by unauthorized persons in a way that is
not detectable by authorized users. That means that there is an external consistency in the
system - everything is as it is expected to be.
✓ Availability ensures that the system is accessible and useable upon appropriate demand by
authorized users. In other words, this means preventing denial-ofservice.
Different mechanisms used to ensure the security of computer systems are authentication,
encryption, firewalls, digital signatures, etc.
3.1. Authentication
Authentication is the process of determining if someone is who they declare to be. In simple
terms, it is proving someone’s identity. Authentication can be obtained by the user providing
something they know (password), something they have (smart card) or something they are
(biometrics).
3.1.1. Passwords
A password is a secret sequence of characters that is required to login to a system, thus
preventing unauthorized persons from gaining access to the system. Passwords can be guessed or
cracked and so if anyone is using a password to protect their system, the following guidelines
will help make it more secure:
✓ Don’t choose an obvious password (like your name, date of birth or name of relative)
✓ Keep your password secret. Don’t share it!
✓ Change your password regularly but not too often.
✓ Make your password at least eight characters long.
✓ Do not use common or proper words of phrases - these can be found using a dictionary
cracker.
✓ Use a mixture of upper and lower case letters and numbers.
3.1.2. Smart Card
A smart card is a small card that holds user authentication information. When the card is inserted
into a card reader, electrical fingers wipe against the card. The information in the card is read
and used to authenticate the person. Cards can be stolen and so are not as reliable as biometrics.
3.1.3. Biometrics
Biometrics is the science and technology of measuring and analyzing biological data. In
computer security, it refers to the use of measurable biological characteristics such as
fingerprints, eye retinas, iris patterns, facial patterns, voice patterns, hand measurements and
DNA, to identify a person. It is the safest authentication technique.
Answer: The limitation and control of access to a system through identification and
authentication.
Or
The process of limiting access to a system only to authorized users. This can be achieved
through identification and authentication.
3.2. Encryption
Encryption is the process of transforming a message using an algorithm into a form unreadable
by anyone except the intended recipient. The original message is known as plaintext, the
algorithm is cipher and the encrypted text is ciphertext. To read an encrypted message, one must
have access to a key that will enable them to decrypt it.
3.3. Firewall
A firewall is a system designed to prevent unauthorized access to or from a private network.
Firewalls are implemented in either hardware or software form, or a combination of both. They
prevent unauthorized Internet users from accessing private networks connected to the Internet.
All messages entering or leaving the network must pass through the firewall which examines
each message and blocks those that do not meet the specified security criteria. Some Operating
Systems like Windows XP, 7 and Mac OS X, have built-in firewalls.
Computer ethics refers to standards of good conduct applied within the use of computers.
It defines principles for judging computing acts whether they are good or bad.
✓ A Patentis a grant to inventors that give them exclusive monopoly over their
invention. It gives them the right to stop others from producing, selling or using
their invention. Unlike copyrights, patents protect the ideas or design of the
invention rather than any tangible form of the invention.
4.1. Fundamental Principlesof ComputerEthics
The fundamental principles of computer ethics formulated by the Computer Ethics Institute
(CEI) as the“ten commandments” of computer ethics are:
1. Thou shall not use a computer to harm other people.
2. Thou shall not interfere with other people’s computer work.
3. Thou shall not snoop around in other people’s files.
4. Thou shall not use a computer to steal.
5. Thou shall not use a computer to bear false witness.
6. Thou shall not copy or use proprietary software for which you have not paid.
7. Thou shall not use other people’s computer resources without authorization or proper
compensation.
8. Thou shall not appropriate other people’s intellectual output.
9. Thou shall think about the social consequences of the program you write or the system
you design.
10. Thou shall use a computer in ways that show consideration and respect for your fellow
humans.
4.3. Netiquette
Netiquette is short for network etiquette. It is a set of rules about acceptable behavior when
communicating over the Internet. Some basic rules of netiquette are:
✓ Avoid flaming i.e. using obscene or inappropriate language in your emails or posts
✓ Avoid using capital letters in your emails/comments, it is considered like YOU ARE
SHOUTING and it is harder to read.
✓ Avoid sloppiness i.e. avoid spelling and grammatical errors. Re-read and edit your
emails/comments before you send/post
✓ Do not send huge file attachments unless they are requested
✓ Always fill the subject field of an email before you send
✓ Do not format your emails with colored text or background color. They may cause them
hard to read.