Uploaded by Catherine Aperocho

EMTECH REVIEWER 1

advertisement
components of a computer
LESSON 1
COMPUTER
▪
electronic device, operating under the
control of instructions stored in its own
memory
generation of computers
❖ A computer contains many electric,
electronic, and mechanical
components known as hardware
Allows you to input data into a computer
ex: Keyboard, Mouse, Microphone
Hardware component that conveys
information from one person tp another and
displays the results of that processing.
ex: Monitor, Projector, Speakers
first generation




(1951 – 1959)
UNIVAC I
FORTRAN (programming language)
manufactured the first Integrated Circuit
(IC)
second generation





(1959 – 1965)
IBM System/360
COBOL (programming language)
PDP-I (1st minicomputer)
BASIC (programming language)
third generation




(1965 – 1971)
Internet started (1969)
Intel 4004 microprocessor chip
PASCAL (programming language)
fourth generation






(1971 – present)
Altair 8800 (1st microcomputer)
Microsoft
Apple Computer
IBM PC
Macintosh Computer
fifth generation
 (present – beyond)
 Cloud Computing: storing and
accessing data and programs over the
Internet instead of your computer's hard
drive.
 Virtual Reality
 Robotics
 devices based on Artificial Intelligence
 The goal of fifth-generation computing is to
develop devices that:
a) respond to natural language input
b) capable of learning and selforganization.
Case that contains electronic
components of the computer
that are used to process data.
Records (writes) or
Retrieves (reads) items to
and from storage media.
Enables a computer to
send and receive data to
and from one or more
computer or mobile
devices.
CATEGORIES OF COMPUTERS
•Can perform all input, processing,
output, and storage activities on
itself. (Desktop PC)
•e.g. Notebook computers, Tablet PCs,
SmartPhones and
•PDAs, e-book reader, portable media,
digital players
•a mobile computing device
designed for single‐player or
multiplayer video games
•controls access to the hardware, software,
and other resources on a network
•a large, expensive, powerful computer
that can handle hundreds or thousands of
connected users simultaneously
•capable of processing more than
one quadrillion instructions in a single
second
•a special‐purpose computer that
functions as a component in a
larger product
© Catherine Aperocho | 12 ABM 9
ict

 Information and Communications
Technology
 UNESCO: scientific, technological and
engineering disciplines and the
management techniques used to handle
transmit information with men and
machines.


information technology
 Role: Unified Communications
communication technologies

 mobile phones, intelligent landlines, Internet
 locate, save, send, and edit information
digital communication

 blogging, email, data presentations, etc.
roles of ict
1.
2.
3.





4.
Education
Business
Industry
Transportation
Military Forces
Communication
Economic Structure
Scientific Exploration
Banking
trends in ict
convergent technologies
➢
o It is coming together of two or more
distinct entities or phenomena
 Google+ & Facebook
BOOKMARKING SITES
 store and manage links to various
websites and resources.
SOCIAL NEWS
 post their own news items or links to
other news sources
 Reddit and Digg
MEDIA SHARING
 upload and share media content
 images, music, and video.
 Flickr, YouTube, and Instagram
MICROBLOGGING
 focus on short updates from the
users
 Twitter and Plurk
BLOGS AND FORUMS
 personal posts
 Blogger, WordPress and Tumblr
➢
 able to move from one place to
another
➢
 Platform enables multiple
transmission of data in one
channel
➢
 provide aid or assistance
➢
 help people who have impairments.
user-generated content (ugc)
 appears as supplements to online
platforms
 ex: social media, websites, blog
posts, Wikis, videos, e-commerce
different operating systems of mobile
devices:
➢
 combination of two or more
technologies in a single device
 ex: surfing the web on television;
taking pictures using a cellphone
social, mobile, and assistive media
A. iOS – used in Apple devices such as the iPhone
and iPad.
B. Android – an open source operating system
developed by Google.
C. Blackberry OS – used in Blackberry devices.
➢
 activities with others
➢
 variety of internet applications that
allows users to create content and
interact with each other
types of social media
D. Windows Phone OS – a closed source and
proprietary operating system develop by Microsoft.
E. Symbian – The original smartphone OS; used by
Nokia devices.
F. WebOS – originally used by smartphones; now
used by smart TVs.
 SOCIAL NETWORK
© Catherine Aperocho | 12 ABM 9
G. Windows Mobile – developed by Microsoft for
smartphones and pocket PCs.
internet & the web
internet
LESSON 2
technopreneur
▪
▪
➢ Global communication system
world wide web / web
➢ is a network of online content
➢ INTERLINKED HTML
evolution of the web
web 1.0
▪
▪
▪
▪
▪
readable phase
flat data
information portal
limited interaction between sites and web
user
can not post review, feedback, and
comment.
web 2.0
•
•
•
•
writable phase
interactive data
interaction between sites and web users
encourages participation, collaboration and
information sharing
web 3.0
✓ executable phase
✓ with dynamic applications, interactive
services, and “machine-to-machine”
interaction.
✓ computers can interpret information
✓ intelligently generate and distribute useful
data.
basic file naming
1.
2.
3.
4.
5.
6.
7.
Be descriptive
Never use the word final in a file name
Be consistent
Use lowercase only
Don’t use special characters
Use dates in your file names
Use version numbers in files you create
▪
▪
▪
▪
▪
▪
An entrepreneur
A new age entrepreneur who makes use of
technology to come out with something new
to make some innovation
Technology savvy
Creative
Innovative
Dynamic
Dares to be different
Passionate
personal entrepreneurial
competencies and skills (pecs)
➢ Key characteristics of successful
entrepreneurs
1. Initiative
2. Sees and acts on opportunities
3. Persistence
4. Information Seeking
5. Concern for High Quality of Work
6. Commitment to Work Contract
7. Efficiency Orientation
8. Systematic Planning
9. Problem-Solving
10. Self-Confidence
11. Assertiveness
12. Persuasion
13. Use of Influence Strategies
14. Willingness to take Risks
LESSON 3
online safety & security
THE INTERNET ⇛ a powerful tool
BENEFITS OF THE INTERNET
✓
✓
✓
✓
promote business
gain new friends
stay in touch with friends from the past
source of entertainment
DANGERS / RISKS
 the flip side of the coin – “another side of
the coin”
© Catherine Aperocho | 12 ABM 9
 attached to an executable file, which means
the virus may exist on a system but will not
be active or able to spread until a user
runs or opens the malicious host file or
program.
 spread when the software or document they
are attached to is transferred from one
computer to another using the network, a
disk, file sharing, or infected e-mail
attachments.
 damaging data or software and causing
denial-of-service (DoS) conditions.
worm
COMMON SAFETY CONCERNS ON THE
INTERNET
 MALICIOUS USERS
 SPAM: unwanted email mostly from
bots or advertisements.
 PHISHING: practice of sending
emails purporting to be from
reputable companies in order to
induce individuals to reveal personal
information
 PHARMING: a more complicated
way of phishing where it exploits
the DNS (Domain Name Service)
systems.
 cyberbullying
 cyberstalking
 WEBSITES AND SOFTWARE
 malware
 computer viruses
 VARIOUS TYPES OF OBSCENE OR
OFFENSIVE CONTENT CRIMES
 fraud
 identity theft
MALWARE
 malicious code
 short for malicious software
 code or software that is specifically designed
to damage, disrupt, steal
 in general inflict illegitimate action on data,
hosts, or networks.
TYPES OF MALWARE
virus
 propagates by inserting a copy of itself into
and becoming part of another program.
 spreads from one computer to another,
leaving infections as it travels.
 replicate functional copies of themselves and
can cause the same type of damage.
 standalone software and do not require a
host program or human help to propagate.
 enters a computer through a vulnerability
in the system and takes advantage of filetransport or information-transport features
on the system, allowing it to travel unaided.
trojan
 Attaches itself to a program and interpret as
useful software.
 It permits an intruder to obtain some
confidential information about a computer
network.
 typically tricked into loading and executing
it on their systems, it can achieve any
number of attacks on the host, from irritating
the user (popping up windows or changing
desktops) to damaging the host (deleting
files, stealing data, or activating and
spreading other malware, such as viruses).
 DO NOT REPRODUCE BY
INFECTING OTHER FILES nor do they
self-replicate.
 must spread through user interaction such as
opening an e-mail attachment or
downloading and running a file from the
Internet.
bot
 derived from the word “robot”
 often automate tasks and provide
information or services that would
otherwise be conducted by a human being
 A typical use of bots is to:
a) gather information (such as web
crawlers)
b) interact automatically with instant
messaging (IM)
c) Internet Relay Chat (IRC) or other
web interfaces.
© Catherine Aperocho | 12 ABM 9
online safety
➢ the knowledge of maximizing the user's
personal safety and security risks to private
information and property associated with
using the internet
➢ the self-protection from computer crime in
general.
internet safety
 a branch of computer security specifically
related to the Internet, often involving
browser security but also network security
on a more general level as it applies to other
applications or operating systems on a
whole.
 OBJECTIVE: establish rules and measures
to use against attacks over the Internet.
5 tips to be safe
1. Be Aware
2. Check for Website Safety
 website uses a Web address that
starts with "https" and has a
padlock symbol either in the address
bar or at the bottom of the browser.
 site encrypts your information,
making the data nearly useless to any
thieves or hackers who may intercept
the transmission.
3. Choose strong and varied passwords
4. Avoid spyware
 SPYWARE: any piece of software
the top commandments of
computer ethics
1. Thou shalt not use computer to harm other
people
2. Thou shalt not interfere with other people’s
computer work
3. Thou shalt not snoop around in other people’s
files
4. Thou shalt not use a computer to steal
5. Thou shalt not use a computer to bear false
witness
6. Thou shalt not use or copy software for which
you have not paid
7. Thou shalt not use other people’s computer
resources without authorization
8. Thou shalt not appropriate other people’s
intellectual output
9. Thou shalt think about the social consequences
of the program you write
10. Thou shalt use a computer in ways that show
consideration and respect
Philippine copyright law
intellectual property
o creations of the mind, such as
inventions; literary and artistic
works; designs; and symbols, names
and images (used in commerce).
that records your actions or information
without your knowledge
 MUST HAVE ANTI-VIRUS AND
ANTI-SPYWARE
5. It’s not all about spyware and scams
✓ Locking your screen or device
✓ Securing your password
✓ Signing-in and -out
✓ Using secured networks
✓ Limiting the personal information
that you share online
COMPUTER ETHICS
 through ethics you become a more ethical
person, who knows how to do the right thing
(Bowyer, 2001)
 we should think of computer ethical issues
as new species of moral issues (Johnson,
2001)
types of intellectual property
I.
patent
 an exclusive right granted for an invention
 technical information about the invention
must be disclosed to the public in a patent
application.
 DURATION: 20 YEARS
II.
trademark
 a word, phrase, symbol, and/or design that
identifies and distinguishes the source of the
goods of one party from those of others
 SERVICE MARK: a word, phrase, symbol,
and/or design that identifies and
distinguishes the source of a service rather
than goods.
 DURATION: As long as it is used.
III.
copyright
 legal right granted to an author, composer,
playwright, publisher, or distributor to
exclusive publication, production, sale, or
© Catherine Aperocho | 12 ABM 9
distribution of a literary, musical, dramatic,
or artistic work.
 protects “original works of authorship”
that are fixed in “a tangible form of
expression.”
 FAIR USE: an intellectual property may be
used without a consent as long as it is used
in commentaries, criticisms, search engines,
parodies, news reports, research, library
archiving, teaching and education.
 DURATION: 50 years plus age of the
author (after death)
CYBERCRIME
 a crime committed or assisted through the
use of the internet.
 CYBERBULLYING: bullying that takes place
using electronic technology.
hehe goodluck <3 <3
© Catherine Aperocho | 12 ABM 9
Download