Microcomputer Basics Flashcards
Motherboard
Central Processing Unit - on motherboard
Arithmetic and logical calculations
Controls all internal and external devices
Motherboard - Memory
On motherboard
RAM-volatile
Cache stores
Near CPU-instructions and data
ROM
Non-volatile
Start up instructions
Motherboard - Expansion Cards
Sound and video cards
Laptops use integrated components
Provides extra functionality
Fits into slots on motherboard and most have ports on back of computer
Video Card
Translates binary data into images
Includes HDMI ports
Usually have their own video RAM and processors
Sound Card
Cable connects to DVD/Blue Ray
Ports for audio, line, mice and joystick inputs
Motherboard - Network Interface Card (NIC)
Enables computer to connect to other computers and the internet.
Attaches to or is integrated into the motherboard.
Access to ethernet for wired networking or wireless network cards.
Major Component - Power Supply
Provides power for all components and peripherals
Major Component - Hard Drive
Largest storage component of computer system.
In sealed case.
SSD or Platters
Connects to Motherboard
Major Component - DVD/Blue Ray Drive
Not normally available on laptop
Computer Literacy
Understanding the capability and limitations of computers, and knowing how to use them safely and efficiently.
Elements of Computer Literacy
- Avoiding hackers and viruses.
- Protecting your privacy.
- Understanding the real risks.
- Using the web wisely.
- Avoiding online annoyances
- Being able to maintain, upgrade, and troubleshoot your computer.
- Knowing which technologies are on horizon and how to integrate them into your life.
LCD Monitors
Flat panel monitors are popular on new computers and as replacements or upgrades.
Most common
Light and energy efficient.
Fixed grid of pixels.
Cold Cathode Fluorescent Lamps (CCFL) to provide the backlight.
Pixel
Each is comprised of three sub pixels of red, blue, and green.
Blocking or passing of light causes images to form.
LED Monitors
Newer, and use light emitting diode technology.
More energy efficient, better color accuracy, and thinner panels than LCD.
OLED Monitors
Organic light emitting diode display.
Uses organic compounds that produce light when exposed to an electric current.
Do not require a backlight to function, so draw less power and have thinner displays than LCD.
Choosing a Monitor
Two of the most important factors are:
Aspect ratio
Resolution
Consider size, resolution, and brightness.
Aspect Ratio
One of most important factor.
The width to height proportion of a monitor.
Older were 4:3, newer are 16:9 (HD format)
Resolution (monitor)
Dictated by the screen size and aspect ratio.
Clearness/sharpness of the image, reflects the number of pixels on the screen.
Max resolution of 1600x1200=1,600 vertical columns, with 1,200 pixels in each column.
Contrast Ratio
Difference in light intensity between brightest white and darkest black a monitor can produce.
Ratios between 400:1 and 1,000:1 are good
Too low ratios results in fading colors when brightness is adjusted.
Viewing Angle
Measured in degrees; 150 degrees or more preferable.
Too low means you need to sit directly in front to get a good image.
Distance in degrees from which you can move to the side/above/below before the image degrades.
Brightness
300 cd/m2 or greater (candelas per sq meter/nits)
Greatest amount of light showing when the monitor is displaying pure white.
Image hard to see in a bright room.
Response Time
Lowest if viewing live action sports.
High results in jerky images.
Time in milliseconds it takes for a pixel to change color.
Monitors: Bigger always better?
No.
You can display more with a bigger screen, but using two smaller monitors may work.
Monitors - Size Does Matter
HD-DVD-Blu Ray > 1920 x 1080 resolution
Larger monitors can create the effect of 2 separate monitors.
LCD Monitor Sizes
Wide Screen-work with multiple windows or watch a lot of movies.
4:3=H is 3/4 of width (4units w x 3 units h)
Ink Jet Printers
Spray tiny drops of ink onto paper.
Advantages: high-quality color printouts; good quality printers are affordable; images on the right paper look professional.
Laser Printers
Static electricy signals where to print ink.
Faster than inkjet and higher quality printouts.
Price competitive, but more economical than inkjet long term when factoring in ink/toner.
Use toner.
Choosing a Printer
Speed
Resolution
Color
Cost of consumables
Printer Speed
Measured in pages per minute
Black/white faster, esp. laser
Printer Resolution
A printer's image clarity measured in dpi Recommended dpi: 300 Black and white text 1,200 General purpose images 4,800 Photos
Printer Color v. B and W
Best have separate cartridges for each color.
Inkjet and laser generally have 4:
black, cyan, magenta, yellow - standard
add light cyan and light magenta to high quality
Printer Costs of Consumables
Printer cartridges and paper.
Research in consumer magazines.
Some printer cartridges can exceed the cost of some printers.
How a LCD Monitor Works
A fluorescent panel at the back of the monitor generates light waves. When electric current passes through the solution the crystals mov around, blocking light waves generated or letting them shine through.
Binary Numbers
Based on 0 and 1, off or on.
Each binary digit is called a bit.
Everything storable is encoded into binary.
Computer reads and outputs alpha-numeric characters, graphics.
Base Systems
Place value gives meaning to the digits in a number.
- Decimal - Base 10
- Hexadecimal - Base 16
Decimal System
A 3-digit decimal number has a:
- 100’s place (10 2)
- 10’s place (10 1)
- 1’s place (10 0)
Hexadecimal System
A 3 digit hexadecimal number has a:
- 256’s place (16 2)
- 16’s place (16 1)
- 1’s place (16 0)
Base Conversion
Humans use decimal (base 10) numbers.
Computers use binary (base 2).
Hexadecimal (base 16) is compromise.
-Represents larger numbers with fewer digits.
Comparison of Decimal/Hexadecimal/Binary
Decimal - 256
Hexadecimal - 100
Binary - 000100000000
RGB Systems
Represent color on monitor.
Each of 3 colors has value between 0-255.
The number scale represents how bright the light for that color shines.
Color Values
White:
Red-255 / FF
Green-255 / FF
Blue-255 / FF
Smartphones are Computers
Hardware (CPU and storage) Input/Output devices Ports Software Sensors
Smartphone Input/Output Devices
Touch sensitive screen
Microphone
Keypad
Camera
Smartphone Storage
ROM - OS
RAM - Data and application programs
Size dictates use of special processors and OS’s
Smartphone Display
OLED displays
Resolution up to 1920 x 1080
Up to 6 inches
Smartphone Sensors
Accelerometers GPS Chips Light sensors Proximity sensors Barometers Digital Compases Biometric security (fingerprint/iris) Magnetometer
Accelerometers
Detect shaking or rotation
GPS Sensor
Location aware software.
System of satellites built by US Department of Defense.
Antenna to pick up signal from satellites and translate to latitude and longitude to within 10 feet.
Airplanes/Cars/Boats
Geotriggers
Smartphone Connectivity
Internet - wireless and cellular
Bluetooth
NFC - car or bill paying.
Smartphone Memory and Storage
Up to 256 GB internal memory
Internal or external micro SD cards-memory expansion
iPhone doesn’t allow addition of any memory
Mobile Operating Systems
iPhone iOS
Google Android - most popular
Windows Based - less than 1% of mobile market
Cloud Storage
Backup - easy and safe
Photos - instant and synced
(Google photos available for iOS and Android for free, and is unlimited.)
Main Artificial Intelligence Assistants
iOS - Siri
Android - Google Assistant
AI Assistants
Support voice commands.
Gather information you need based on your location or task lists.
Works in background w/no specific requests.
Google Assistant
What package being delivered by FedEx today
Learns from e-mail and web searches.
Remind you to leave for the airport based upon time.
Locate your frequent flyer number.
Google Assistant
What package being delivered by FedEx today
Learns from e-mail and web searches.
Remind you to leave for the airport based upon time.
Locate your frequent flyer number.
Phone Gadgets
Flir - window leaks Kardia - EKG BacTrac - breathalyzer Ravensburger Smartscope Skulpt Scanner - muscle scanner/analyzer Automatic Pro - car's ODB-II port Hidrate Spark - smart water bottle Photomath - scan and get help solving math problems Wilson X - basketball coach iBobber - Fish finder
Each ___ can represent one letter, number, or symbol?
Byte
What is a laptop that can convert into a tablet-like device?
A 2-in-1 PC
Touch-screen devices usually feature _____ keyboards.
Virtual
The fastest computer port is the:
Thunderbolt.
10 gigabits per second
Which computer component drains the battery the fastest?
Display screen
Ergonomics
Important consideration for all computing devices.
The most common output device for soft output is:
The display screen.
Display Monitor
Can be both an input and output device.
Optical Storage Media
CD-ROM
DVD-ROM
DVD-RAM
Blu-Ray
Types of Ports
Thunderbolt
HDMI
USB
A power control option that performs a warm boot:
Restart
Byte
8 bits of data
Can hold a number between 0-255
Bits
Short for binary digit
Kilobyte
KB
1,024 bytes
Bytes
Kilobyte - one thousand (1,024) Megabyte - one million (1,048,576) Gigabyte - one billion (1,073,741,824) (786,432 pages of text) Terabyte - one trillion Petabyte - one quadrillion (1k terabytes)
Hertz
Machine Cycles per second
Terabyte
More than 1 trillion bytes
System Unit
Hard drive unit Optical drive unit Motherboard Fan Expansion Slots Connectors Power supply and fan
Expansion Hub
An expansion hub is a powered hub that is 2.0 and USB. It simply allows you to connect to devices that you were not able to connect to with a regular hub.
Flash Memory
Can store 256 GB of data
Often used in smartphones
PCMCIA Type I and Type II memory cards (used as solid-state disks in laptops)
Can be plugged directly into a USB port
Ethernet Port
Connects a computer to a cable modem or a network.
USB Port
Commonly used for connecting input and output devices
DVI Port
Not generally for audio
Same capability as HDMI
Used to connect projectors to a computer system
HDMI Port
Used for home theater systems
VGA Port
Used to connect CRT monitors
Fastest Data Transfer Rate
USB 3.0
What kind of numbering system is ordinarily used by people?
Decimal
Hexadecimal represents numbers by using which base?
Sixteen
In the RGB system, when all three component colors are set to zero, the result is?
Black
How many colors are used by the RGB system?
Three
A single hexadecimal number is represented by how many digits in the binary numbering system?
Four
What numbering system uses base 2?
Binary
When storing information in a computer, the binary system uses what to represent an on switch?
1
When storing information in a computer, the binary system uses what to represent an off switch?
0
For each numbering base system, the far right always has a place value of what?
1
For each numbering base system, as you move to the left, the value of each digit becomes how much greater?
Exponentially
What numbering system is used in place of binary numbers because binary numbers are difficult to read?
Hexadecimal
In the RGB system, each color can have a value from what to what?
0-255
In the hexadecimal numbering system, each place value digit is how many times greater than the digit to its right?
16
In the binary numbering system, each digit can have how many possible values?
2
In what numbering system does each place value digit have ten times greater than the digit to its right?
Decimal
Computers store information in which numbering system, which is difficult, if not impossible for humans to read?
Binary, base two
The Internet
A network of networks connecting billions of computers globally.
Evolved from a U.S. Government funded project called the Advanced Research Projects Agency Network (ARPANET). Needed a computer network that wouldn’t be disrupted in case of attack.
Established a secure form of communications.
Created a means of communication for all computers.
Client/Server Network
Client asks for data.
Server receives request and returns data.
Internet Protocol (IP) Address
How computers identify each other.
Websites have unique IP addresses.
Text versions of IP addresses because IP addresses too hard to remember.
IP Address
Set of four groups of numbers separated by periods.
Dotted quad or dotted decimal.
Identifies a website.
Identifies a computer connecting to the internet.
Web 2.0
Social Web.
Collaboration tools.
Social Media.
Includes social networking, wikis, blogs, podcasts, and webcasts.
Social Networking
Facebook
Twitter
Many precautions for using social networking sites.
Project Collaboration and File Sharing Tools
Wikis
Project management tools
Blogs
Blogs
Blog - weblog
Video log - vlog
A personal log or journal posted on the web.
Wikipedia
A wiki, a web application that allows users to add, remove, or edit its content.
Google Drive
Has wiki-like features to promote online collaboration.
Specific wiki software, such as Wikispaces and MediaWiki
Wikipedia Foundation
Hosts other collaborative projects such as Wikibooks, Wikiversity, and Wikisource.
Project Management Tools
Incorporate tasks and calendars so the individual components and project can stay on schedule.
Microblog
Blogs with limits on how much text can be used.
Problems with Blogs
Spam blogs - splogs
Podcast
A form of digital media composed of a series of audio or video files that are distributed over the internet.
Delivered via RSS
RSS
Really Simple Syndication
Delivers podcast automatically to an aggregator.
Aggregator
Receives RSS podcast feeds.
Locates all the RSS series to which you’ve subscribed and automatically downloads the new content.
Webcast
Broadcast of audio or video over the internet.
Media Sharing Platforms
YouTube, Flickr, Instagram, Sound Cloud
Communicating over the Web
E-mail
Instant Messaging
Texting
VOIP
Primary means of communication over the internet.
Fast and convenient means of exchanging and collaborating on documents via attachments.
Two types are web based and using e-mail client
Asynchronous
More private than social media
Asynchronous
Users don’t need to be communicating at the same time.
Instant Messaging
Real time
AIM, Google Chat, Windows Messenger are proprietary IM services
Synchronous
Proprietary IM Services
Chat with only those who share the same IM service and are on buddy list.
Universal Chat Services
Allow you to chat with users of all popular IMs
Texting
Sending of messages between devices.
Voice over Internet Protocol (VOIP)
Uses the internet to make phone calls.
e-Commerce Business Models
Business to Consumer (B2C)
Business to Business (B2B)
Consumer to Consumer (C2C)
Business to Consumer (B2C)
Business sells to consumers
Amazon.com
Business to Business (B2B)
Business sells to other businesses
Paper company that distributes paper to other companies.
Omahapaper.com
Consumer to Consumer (C2C)
Consumers sell to other consumers
ebay.com, craigslist.com
Electric Commerce (e-commerce) Safeguards
Use secure websites - secure sockets layer protocol.
Well-known, reputable sites
Pay by Credit, not Debit card.
Copy order, confirmation number and return policy
Avoid shopping on public computers.Bro
Secure Website
SSL protocol
URL is “https://”
Browser
Software that lets you locate, view, and navigate the web. Most are graphical. Google Chrome Microsoft Edge Firefox Safari
Graphical Browsers
Can display pictures in addition to text, sound, and video.
Google Chrome
Most popular browser
Can run on any device and with any OS
Sync between devices open tabs, bookmarks recent search results.
Microsoft Edge
Available only on Windows 10
Requires Microsoft Account
Firefox
Open source
Mozilla
Lets you keep only the features you want.
Safari
Developed by Apple for Mac
Has a Windows version for PCs
Universal Resource Locator (URL)
Use to access a website.
Identify the web document it stands for.
Protocol
Set of rules used to retrieve a document.
- Hypertext Transfer Protocol
- File Transfer Protocol
- BitTorrent
Domain Name
Main domain name is a site’s home page.
http://newyorktimes.com
URL
http://www.nytimes.com/pages/technology Protocol: http: Domain: www.nytimes Top Level: .com Path/sub-directory: pages/technology
Hyperlinks
Specially coded elements that let you jump from one web page to another within the same website or to another website.
Breadcrumb Trail
Help navigate more quickly through a website.
A navigation aid that shows users the path they have taken to get to a web page.
History
List that shows all the websites and pages you’ve visited over a certain period of time.
Organized by day, up to 3 weeks.
Bookmarks
Allows you to return to a specific web page without having to remember the address.
Live Bookmark
A feature in Firefox that adds the technology of RSS feeds to bookmarking.
Tagging/Social Bookmarking
Saves your favorite website to a social bookmarking site so you can share it with others.
Delicious.com
Search Engine
A set of programs that searches for keywords and returns a list of websites on which those keywords are found.
Search only sites that are relevant.
Metasearch searches other search engines.
Metasearch Engine
Searches other search engines rather than individual websites.
Spider
Search
Obtaining Better Search Results
Boolean Operators
Search for a phrase
Search within a website
Search with a wild card
Evaluating Websites
Authority Bias Relevance Audience Links
Digital Activism
Raise awareness about specific issues. #IceBucketChallenge #BringBackOurGirls Question if effective or fosters a false sense of involvement.
Geolocation
GPS chip that can calculate exact position Targets consumers by their location Used by 3rd party advertising networks Can be a violation of privacy rights No specific laws yet
Using the Web Effectively
Accessing and moving around the web
Searching the web effectively
Using the web ethically
Tools used to Navigate the Web
Hyperlinks Breadcrumb trail Bookmarks History Tagging
Visual Indications of Secure Website
https://
Closed padlock and green-colored address bar
Consider the validity of the site.
TRUSTe and Better Business Bureau
Safe on-line Shopping
Investigate unknown sites with bbb.org or bizrate.com
Check return policy, save copy of order, make sure you receive a confirmation number.
Make sure company has phone number and address.
Pay with credit, rather than debit card.
Use common sense.
Credit Cards
U.S. federal consumer credit card protection laws protect credit card purchases, not debit card purchases.
Click and Brick business
Business with both a traditional and on-line store.
Barnes and Nobles
Social Commerce
A subset of e-commerce that uses social networks to assist in marketing and purchasing products.
“Liking” a company.
Ordering a latte and paying w/Starbucks app.
Avoid Shopping on Public Computers
May have spyware installed that can track and log keystrokes.
Also avoid wireless transactions in public hotspots.
HTTP
Hyper Text Transfer Protocol
Start most URLs
Enables files to be transferred from a web server so you can see them on your browser.
FTP
File Transfer Protocol
Used to upload and download files from one computer to another.
TLD
Top Level Domain
Indicates the kind of organization the host is.
The three-letter suffix
.com - originally commercial, but now all
.biz - Businesses
.edu - Degree granting institutions
.gov - Local, state, and federal
.info - Information service providers
.mil - U.S. military
.net - originally for networking, but now all
.org - organizations such as not-for-profits
Blogs
One of the most popular ways of sharing content on web.
Web log
A journal posted on the web.
Usually written by a single author, arranged as a list, and are public, and can be created by anyone.
Setting up a Blog
Blogger.com
Sign up and create a blog name.
Accessible with a google account.
New blog, create a name, pick a design template, create URL.
Posting Content to a Blog
Click on new post icon next to heading.
Type title for entry in post title box, then content.
Click Link to create a URL for your post.
Insert Image to add a photo.
Click preview to preview blog.
Reader Comments on Blogs
Feedback helps shape future entries and direct you to other blogs you may find interesting.
Mobile Blogging
Install blogger app on smart phone.
Add, edit content, send links or location.
Set up a Blogger Profile
Don’t provide personal information and let others know your personal interests.
Click the icon near your name and click blogger profile link, add photo, link to home page, save profile button.
Searching for Blogs
Many directories
Blogs.botw.org
blogsearchengine.com
blogcatalog.com
Differentiate between Keyword and Metasearch Engines
Google vs. dogpile/info.com
Keyword Search Engines
Google or Bing
Not sorted, returns a list of websites.
Metasearch Engines
Dogpile or info.com
Search engine that searches other search engines.
Combine and compare results from multiple search engines to make search the web more efficient.
Eliminates duplicates and searches for relevancy for more complete listing in less time.
Different Search Engines
ChaCha - Human search engine Technorati - Blog search engine Monster - Job search engine Blinkx - multimedia metasearch engine TheSearchEngineList - Comprehensive list of search engines.
Alternative Search Engines
ChaCha - Human search engine
Technorati - Blog search engine
Monster - Job search engine
Blinkx - multimedia metasearch engine (YouTube)
TheSearchEngineList - Comprehensive list of search engines.
Effective Searches
Ensure terms are not too broad.
Use a minus sign to exclude some results.
Find synonyms ~
Specific file types: Info:, Define:, Numrange “..”
Quotes for exact search terms
Google has modifiers under search box (video, Images)
Google, click settings, Advanced Search for search form
LearnTheNet.com
Networking Sites
Media Sharing Business Networking and Collaboration Information Sharing e-Commerce and Payment Social Travel Health and Fitness Wiki
Media Sharing Sites
Instagram YouTube Pinterest Flickr Periscope Vine Bandcamp Spotify
Business Networking and Collaboration
LinkedIn
Slack
Kickstarter
StartupNation
Information Sharing
Delicious SlideShare StumbleUpon Reddit Digg
ASCII Code
Developed as the standard for computers from different manufacturers to exchange data.
Character to binary.
1963
Advanced Research Projects Agency (ARPA)
1958 Established for the US Department of Defense.
Created ARPANET, the beginnings of the internet.
First Internet Message
1969 by UCLA sent first internet message to Stanford University. Beginning of network communication.
Ray Tomlinson
1972 wrote program to send e-mail over ARPANET
Develops “User@host” e-mail convention.
1978 there were 111 Internet domains on ARPANET.
Vincent Cerf and Robert Kahn
1973 developed a set of communication rules - the TCP/IP protocol that allows different types of computers to communicate.
Tim Berners-Lee
Developed and made public HTTP protocol and WWW.
Developed the first web browser.
WWW
1991 A subset of the Internet that is connected via hypertext (text containing hyperlinks to other documents and media.
1997 1million internet domains on ARPANET
Client Server Network
- User enters www.amazon.com in browser (client.)
- Request sent to servicer via data pathways.
- Data flows along backbone and on to smaller pathways until it reaches server for Amazon.
- Server returns requested data using fastest pathway (which may be different than arrival path.)
- Web browser interprets the data and displays it on your monitor.
IP Address
Identifies your computer.
A set of 4 numbers separated by periods.
e-Commerce and Payment
Venmo
Paypal
SquareCash
Groupon
Social Travel
Uber
Airbnb
TripAdvisor
Wase
Health and Fitness
MapMyFitness
Fitocracy
MyFitnessPal
Happier
Wiki
Project collaboration and file sharing.
Screen sharing, project management
Social Media Sharing
Blogs Podcasts Webcasts (realtime) e-mail (most common) Instant Messaging Texting VoIP
Podcast Directories and Aggregators
iTunes (itunes.com)
Podfeed (podfeed.net)
Stitcher (stitcher.com)
YouTube (youtube.com)
Web Based email vs. e-mail Client
Accessible from any computer with internet.
Software installed on your computer.
Instant Messaging
Real time exchange.
Used by multiple persons simultaneously,
Video/audio chats available.
Text Messaging
Uses short messaging service (SMS) to send asynchronous messages between multiple mobile devices.
Can include images or video.
VoIP
Voice communication via Internet
Free or low cost calls
Some reliability issues.
OnLine Shopping Precautions
Use a firewall and antivirus Don't shop on public wifi (spyware) Check for visual indicators (https, padlock, green) Third party verification (BBB) Use credit, not debit card. Create a strong password. Deals too good to be true usually are. Read the fine print.
Common Browser Features
Privacy browsing
Tabbed browsing
Address bar/search box
Pin tabs of favorite sites
Google Specialized Search
Custom Search Finance Trends Shopping Scholar
Boolean Operators in Searchers
Use AND, NOT, OR between keywords in a search
Cloud Storage
OneDrive
Dropbox and GoogleDrive alternatives
No more flash drives needed
Share File or Folder
Letter K
01001011
What factors should you consider processor speed?
Processor speed is a measure of how many tasks the main chip can perform in 1 second.
Other factors such as the number of cores, cache memory, and FSB, how fast data is exchanged between the CPU and RAM.
Machine Cycle (hertz Hz)
Machine cycles per second.
The process of the CPU getting the data or information from RAM and decoding the instructions into something the computer can understand.
The CPU executes and stores the results back into system memory.
What size hard drive do I need?
Consider storage needs as well as any external forms of storage you may use.
Today’s internal drives have capacities of 8Tb or more.
External Hard Drives
Internal hard drives that have been made portable by enclosing them in a protective case and making them small and lightweight.
Used to backup internal hard drive.
Flash/Jump/USB/Thumb Drives
Significant storage capacity, up to 256 Gb.
Cloud Storage
Keeps your files on the Internet.
Requires that you install software on device.
Dropbox, OneDrive, iCloud, Google Drive.
Flash Memory
Your computer will need a slot into which you can insert the flash memory card.
Also memory card readers that plug into a USB port.
Digital cameras, smartphones, video cameras, and printers.
Use Solid State Flash memory, and have capacities that exceed DVD’s.
Ports
Places which peripheral devices attach to the computer to exchange data.
Adding Ports to your System
Expansion cards (clip into expansion slot on motherboard.) Expansion hub.
Expansion Hub
A device that connects to one port to provide additional new ports.
Thunderbolt Port
Newest input/output technology.
Uses fiber optic technology and can achieve extremely fast transfer speeds.
Apple the first to integrate.
USB (Universal serial bus) Ports
Most common to connect input/output devices to the computer.
USB 3.1 up to 10 Gbps and charges devices faster.
Ethernet Ports
Connect to a DSL or cable modem, or network.
Transfer speeds up to 10,000 Mbps.
HDMI Port
High definition multimedia interface.
High definition video and uncompressed digital audio in one cable.
All monitors, DVD payers, TVs and game consoles have at least one.
Types of Ports
USB
Ethernet
HDMI
Thunderbolt
Which browser feature enables you to secure a tab permanently?
Pinned tabs
What is a Specialty Search Engine?
Searches only sites deemed appropriate to an interest or industry.
Two Basic Types of Software
Application software
System software
Software
A set of instructions that tells the computer what to do.
Application Software
Is used to do tasks at home, school, and work.
System Software
Helps run the computer and coordinate instructions between application software and the computer’s hardware devices.
Ways to Distribute Software
Local installation
Software as a service (SaaS)
Subscription
Ways to Purchase Software
DVD from brick and mortar store Download from internet Student discounts Freeware Beta Versions
Installing Software
System requirements
Create a restore point
Full installation vs. custo installation
Recovering from a computer crash using a recovery drive
Uninstalling Software
Removes the software from your hard drive.
Upgrading Software
Upgrades and updates are not required if you have a subscription to the software or are using software as a service.
You don’t need to rush to get every upgrade
Many software is backward compatible.
Backwards Compatibility
Vendors make new versions backward compatible, meaning that the new versions can recognize and open files created with older versions.
Software Licenses
End User License Agreement (EULA) Ultimate owner of the software; Whether copies can be made; Number of installations allowed; Warranties.
Two Categories of Software
Productivity and Business Software
Multimedia and Educational Software
Productivity and Business Software
Installed-Proprietary
Microsoft Office
Apple iWork
Productivity and Business Software
Installed-Open Source
LibreOffice
Productivity and Business Software
Web-Based
Microsoft Office Online
Google Docs
Zoho
ThinkFree
Microsoft Office
Word Excel PowerPoint Access OneNote Outlook
Apple iWork
Pages
Numbers
Keynote
LibreOffice
Writer
Calc
Impress
Base
Microsoft Office Online
Word Excel PowerPoint OneNote Outlook
Google Docs
Docs
Sheets
Slides
Gmail
Zoho
Writer Sheet, Books Show Creator Notebook
ThinkFree
Write
Calc
Show
Note
Word Processing Software
Create and edit documents for: Research papers; Class notes; Resumes. Microsoft Word (most popular) or Zoho Writer
Spreadsheet Software
Performs calculations and numerical analyses. Text; Values and dates; Formulas; Functions. Microsoft Excel; Apache OpenOffice Calc
Presentation Software Tips
Use images;
Be careful with color;
Use bullets for key points, limit 4-6 per slide;
Consider font size and style;
Keep animation and background audio to a minimum.
Database Software
Store and organize data in: Fields-a data category Records-related fields Tables-related records Oracle, MySQL, Access
Note Taking Software
Research, brainstorming, and collaboration. Organize notes into tabbed sections.
Access from other office applications.
OneNote
Evernote
Personal Information Manager Software
Manage e-mail, contacts, calendars, tasks.
Outlook is most widely used PIM.
Web-based PIMs-Google, Yahoo!-similar to Outlook
Other Options-Toodledo-coordinates well with Outlook, OmniFocus for Mac.
Productivity Software Features
A wizard walks through the steps necessary to complete a task.
A template is a predesigned form.
A macro is a small program that groups a series of commands.
Personal Financial Software
Manage daily finances;
Electronic checkbook registers;
Automatic bill payment tools
Intuit Turbo Tax and HandR Block at Home for tax preparation.
Software for Large and Specialized Businesses
Vertical market software is designed for a specific industry.
Computer-aided design (CAD) creates automated designs, technical drawings, and 3D model visualizations.
SketchUp Make for home/landscape planning.
Small Business Software
Accounting software to track accounts receivable and payable, inventory, payroll, and billing.
Desktop Publishing software (DTP)
Web Authoring software
Desktop Publishing Software
Newsletters, catalogs, annual reports or other large complicated publications.
Multimedia Software
Required to produce computer games, animations, and movies.
Photo and image editing;
Digital audio and video-editing.
Drawing Software
Two dimensional, line based drawings. Technical diagrams. Animations Adobe Illustrator Home and landscape with Broderbund.
Digital Audio Software
Digital audio files Downloaded music files, audiobooks, or podcasts. Compressed: MP3 (most common), ACC, WMA Uncompressed: WAV, AIFF Digital audio workstation software. Audio-Editing software.
App Creation Software
Create characters to extend a game: EverQuest, Oblivion, Unreal Tournament
Create your own games: Unity, Adobe Flash, RPG Maker VX, GameMaker
Educational and Reference Software
Test Preparation; Simulation; Instructional; Trip Planning; Home Design/Improvement; Course Management; Brain Training; Genealogy; Typing, languages, cooking.
Freeware
Copyrighted software that certain program developers distribute for free.
Filehippo.com and majorgeeks.com
Open Source Software
Free software that is available with few licensing and copyright restrictions.
Offer little or no formal support except by community of users.
Community of users keep it current.
Beta Versions
Free of charge.
Still under development, but developers hope users will report errors or bugs.
Installing Beta, Open Source and Freeware
Always set a restore point before downloading any kind of software.
Only use programs designed to work with your operating system.
Wait until last version is released.
Stick with reliable developers.
Make sure virus protection is up to date.
Software for Students
Students may be able to buy regular software at discount prices from a campus computer store or bookstore, on-line or mail-order.
Some software developers offer discounts to students.
How do I know if the software I buy will work on my computer?
Every software has a set of minimum requirements for the operating system, processor, primary memory (RAM) and hard drive, video card, and peripherals.
Do you have to do anything special if you’re downloading software from the internet?
For the most part software is downloaded in a zipped format and automatically, without special interaction.
Installing Software
Must be installed on hard drive.
May differ between DVD or from the web.
Both usually offer installation wizards.
Full or Custom Installation
Full copies all program files to computer while Custom you decide what features to install.
Installing Downloaded Software
Locate the setup.exe file, and take recommended actions to complete the installation.
Uninstalling Software
Go to the Programs and Features in the Control Panel and choose the application you want to delete.
Uninstalling Software in Windows 8-10
Right click the program tile on the Start Screen and then select Uninstall.
Uninstalling Software using the Programs and Features Icon in the Control Panel
Choose Uninstall, Change or Repair.
Uninstall will run the proper cleanup routine to clear all files and restore settings that have been changed.
Productivity Software Suites
Includes word processing, spreadsheet, presentation, database, and PIM programs.
For Microsoft (proprietary) software its cheaper to buy the suite than individually.
Include installed as well as web-based.
What sort of software would I use to create a website?
Squarespace and Adobe Dreamweaver are two programs that both professionals and casual web page designers use to create web pages.
MSOffice also lets users convert to a web-compatible format.
Also web-page authoring software
Web Page Authoring Software
Allows the novice to design interesting and interactive web pages without knowing any HTML code.
Often include wizards, templates, and reference materials.
Squarespace and Adobe Dreamweaver.
What software do I need for designing a newsletter?
Many word processing programs have features that are hallmarks of desktop publishing.
For professional projects use QuarkXPress and Adobe InDesign.
Desktop Publishing Software
Tools you can use to format and arrange text and graphics.
Also import files from other sources, manipulate graphics, and publish files to web.
QuarkXPress and Adobe InDesign.
Adobe Photoshop Elements
A good basic program for casual users.
Correct red eye, improve color balance, touch up, and add creative effects.
Full-Featured Image Editing Software
Adobe Photoshop and Corel PaintShop Pro.
Layering images and masking images.
Create enhanced digital images used commercially in logos, advertisements, and on book and CD covers.
Digital Video Editing Software
Edit and manipulate digital video.
Most moderately priced software have enough features for the casual user.
Microsoft Movie Maker is free.
Adobe Premiere Pro is premium software.
Adobe Illustrator
Tools to create professional quality creative and technical illustrations.
Pencils, pens, and paintbrushes.
Drag geometric images and use paint bucket, eye-dropper, and spray can tools.
Computer Aided Design Software
3D modeling engineers use to create automated designs, technical drawings, and model visualizations.
Can be rotated.
CAD Projects
Medical engineering-solid models of human anatomy for medical implants.
Simulation Software
Educational software that allow you to experience or control the software as if it were an actual event, such as flying a plane.
Course Management Software
Blackboard.
Provide traditional classroom tools such as calendars, and grade books over the internet.
Windows Calculator
Converts between decimal, binary, and hexadecimal.
How each system represents values:
Decimal
0 1 2 3 4 5 6 7 8 9
Hexadecimal
0 1 2 3 4 5 6 7 8 9 A B C D E F
Binary
0 1
Binary Digits Converted to Hex
A 16 digit binary pattern converts to a 4 digit hexadecimal value.
1110-0011-1000-1011 = E38B
Hex Codes
www.psyclops.com/tools/rgb
Binary to Hex Conversion
0 0000 8 1000 1 0001 9 1001 2 0010 A 1010 3 0011 B 1011 4 0100 C 1100 5 0101 D 1101 6 0110 E 1110 7 0111 F 1111
HTML Proramming Colors
FFFFFF White
000000 Black
Red/green/blue: 153, 51, 255
Hex Code: 9933FF
Programming for End Users
Macros
Macro
Small program that groups series of commands so they run as a single command.
Used to automate routine tasks or complex series of commands that must be run frequently.
MSOffice includes Visual Basic (VBA) to provide functionality for recording macros (procedures.)
Advantages of Macros
Simplify complex tasks.
Reusable.
Can be edited and changed.
Creating a Macro in Word
Add the Developer tab to the ribbon.
Record a macro in Word to insert a table.
Run the macro.
No blank spaces.
Insert Developer Tab in Word
File tab, Word Options, Customize Ribbon, Commands, Click Developer Box
The easiest way to automate a task in Word is to:
Perform the task while recording a macro.
Software as a Service
When a vendor hosts software on a website and you don’t need to install the software on your device.
Copyleft
The practice of offering people the right to freely distribute copies and modified versions of open source software with the stipulation that the same rights be preserved in derivative works down the line.[1] Copyleft software licenses are considered protective or reciprocal, as contrasted with permissive free software licenses.
App Inventor
Software package that can be used to create mobile applications.
Benefits of Simulation Programs
Help prevent costly errors.
Allow users to experience or control the software as if it were an actual event.
Allow users to experience potentially dangerous situations without risk.
Bloatware
Pre-installed software that is best to delete if not used.
Moodle
Course management software.
How many binary digits are represented by one hexadecimal digit?
4
Each digit in a hexadecimal number represents how many bits?
4
The decimal number 12 is represented in hexadecimal as:
C
Expressed in base systems the RGB range is:
00000000-11111111 Binary
00-FF Hexadecimal
0-255 Decimal
Operating System Consists of what 2 primary types of programs:
Operating system
Utility programs
Operating System Functions
- Manages computer’s memory and storage.
- Consistent means for application software to work with CPU.
- Manage, schedule and coordinate tasks. An orchestra’s conductor.
Other:
Provide a user interface.
Manages computer hardware and peripherals.
Manages the processor.
Includes utility programs.
Ability to multitask.
User Interface
How the user interact with the computer.
Includes desktop, icons, and menus.
OS Function
Utility Program
A small program that performs many of the general housekeeping tasks such as system maintenance and file compression.
OS Function
Multitasking
Provide the ability to perform more than one process at a time.
OS Function.
Common Operating Systems, Developers
Windows, Microsoft macOS, Apple iOS, Apple Android, Google Linux, Open Source
Operating Systems, Devices
Windows, laptop, tablet, desktop, all in one, smartphone. macOS, laptop, desktop, all in one. iOS, tablet, iphone, iPod touch. Android, smart phone, tablet Linux, laptop, desktop, tablet
Top 3 Operating Systems
Windows
macOS
Linux
Top 3 Mobile Operating Systems
Android
iOS
Window
Top Web-Based OS
Google Chrome OS
Main functionality provided through browser and virtually no filed copied to computer
OS for Machinery, Networks, Business
Real-Time OS (RTOS)
Multiuser Operating System
Real-Time OS (RTOS)
Machine that performs repetitive series of specific tasks in precise time.
Cars, medical scanning equipment, robotic camera.
Require minimal user interaction.
Multi-User Operating System
Network OS
Allows multiple users access to the computer at the same time.
Unix.
Unix
A multiuser, multitasking OS that is used as a network OS.
What the OS does
Enables user to interact with the computer.
Types of Interfaces
Command driven interface.
Menu-driven interface.
Graphical user interface (GUI).
Command Driven Interface
Enter commands to communicate with the computer system.
Menu-Driven Interface
Choose commands from menus displayed on screen.
Eliminated need to know all commands.
Graphical User Interface (GUI)
Current OS use UGI.
Display graphics and use the point and click technology of the mouse and cursor.
Spooler
A program that helps coordinate all print jobs currently being sent to the printer.
Preemptive Multitasking
The OS processes the task assigned a higher priority before those assigned a lower priority.
Interrupt Handler
A special numerical code that prioritizes requests.
Every device has its own type.
Hardware Coordination
Event created by all activity in each device.
Device interrupt establishes priority.
Event placed in interrupt table in computer’s RAM.
The OS performs preemptive multitasking.
Hardware Coordination Flow
- CPU playing a movie.
- CPU receives an interrupt request from the printer.
- Memo about movie stored in stack (RAM).
- CPU executes printing.
- Memo about movie retrieved from stack.
- CPU resumes playing movie.
Paging
The process of swapping.
Thrashing
Excessive paging.
Swap File
Data and instructions that haven’t been used recently are moved to a temporary storage area on hard drive.
When more RAM needed than is available.
Virtual Memory
Borrowed space from hard drive.
Increasing RAM can avoid using virtual memory.
Device Driver
A special program on each connected device that facilitates communication between that device and the OS.
Manage peripherals and hardware.
Hardware and Peripheral Device Mgmt.
Device Driver (Seagate GoFlex Desk USB) Plug and Play
Plug and Play (PnP)
A hardware and software standard.
Facilitates the installation of new hardware in PCs by including in the OS the drivers the devices will need in order to run.
Software Application Coordination
Application programming interfaces (API).
Application Programming Interface (API)
Blocks of code in each program the CPU recognizes.
Used for the similar procedures in each program.
Microsoft Direct X
Microsoft Direct X
A group of multimedia APIs built into the Windows OS.
Improves graphics and sounds.
Boot Process (4 steps)
- CPU activates BIOS
- Power-On Self-Test (POST)
- Load OS from hard drive to RAM
- Checking registry for configurations and customizations.
BIOS
Located in ROM.
Activated by CPU Basic input/output system
Responsible for loading the OS into RAM.
Manages the exchange of data between the OS and the input/output devices.
First task of BIOS is to activate POST.
Goes through preconfigured list of devices then loads OS into RAM from hard drive.
Step 1 of boot process.
Power-On Self-Test
Ensures that essential peripheral devices are attached and operational.
Step 2 of boot process.
1. Tests the video card and video memory.
2. Identifies the BIOS.
3. Tests that the memory chips are working.
4. BIOS compares POST results with CMOS.
Loading the OS
System files are loaded into RAM.
Loads Kernel.
Step 3 of boot process.
Kernel
Supervisor program.
The essential component of the OS that manages the processor and all other components.
Memory Resident.
Loaded into RAM in step 3 of boot process.
Checking Configurations/Customizations
OS checks registry for configurations used by the OS and applications.
Non resident copies to RAM as needed.
Step 4 of boot process.
Registry
Contains configurations used by the OS and applications.
Display settings for monitor.
The Main Features of the Windows Interface
Desktop Taskbar Start Menu Pinning Virtual Desktops
How Does OS Keep Computer Organized
Hierarchical organizational/directory structure. Root Directory (c://) Drives Libraries (music) Folders Subfolders Files
Utility Programs
Tools Used to Enhance Productivity, Back up Files, and Provide Accessibility.
Small applications that perform special functions.
Desktop
Primary working area.
Shows task bar at the bottom.
Windows interface.
Start Menu
Provides access to all applications and apps installed on your device.
Windows interface.
Virtual Desktops
Allow you to organize groups of windows into different displays.
Windows interface.
Linux
Most interfaces are based on Windows and mOS paradigms.
Ubuntu.
Using icons to launch programs and apps running in a window environment.
Naming Conventions (Files)
Up to 255 characters.
Each OS has their own naming conventions.
Name followed by type extension (.doc)
No 2 files stored on the same device or folder can share both the same file name and extension.
File Explorer
Main tool for finding, viewing, and managing the contents of the computer.
Divided into left and right sections.
Large Icons
Good way to display contents of files and folders.
Preview pane shows first page of document.
Good way to view files and folders, especially images.
File Management Actions
Open Copy Cut Rename Delete Recycle Bin
File Compression
Compacts a large file making it easier/faster to e-mail, upload to web, or save to disc.
Windows has built in compression.
Free/share ware such as WinZip and Stuffit.
How are Files Compressed?
Redundancies in a file are removed.
Right click on folder/file, Send to, Compressed (zipped) folder.
File Explorer, click Share tab, Zip.
Utilities included in OS
The basic utilities designed to manage and tune the computer hardware.
Firewall and file compression utilities.
Standalone Utilities
Offer more features or an easier user interface for backup, security, diagnostic, or recovery functions.
Antivirus and Security programs.
Windows Administrative Utilities
System perfomance utilities.
File and system backup utilities.
Accessibility utilities.
System Performance Utilities
Windows Administrative Utilities.
Disk Cleanup
Task Manager
Disk Degragmenter
File/System Backup Utilities
Windows Administrative Utilities.
File History
System Restore
Accessibility Utilities.
Ease of Access Center.
Windows Administrative Utilities.
Disk Cleanup
Removes unnecessary files from hard drive.
References on FAT to files that no longer exist or have been moved (sys confusion.)
Windows Administrative/System Performance utility.
Task Manager
Check on non-responsive program or use to exit the program.
Process tab shows if program isn’t responding.
Windows Administrative/System Performance utility.
Disk Defragmenter
Rearranges fragmented data so that related file pieces are unified. Helps speed up performance.
Windows Administrative/System Performance utility.
System Restore
Allows you to roll your system settings back to a specific date when everything was working properly.
Windows Administrative/File,System Backup Utilities.
When uninstall doesn’t work.
Ease of Access Center
Centralized location for assistive technology and tools to adjust accessibility settings.
A questionnaire asks about routine tasks and provides a personalized settings recommendation.
Ease of Access Tools
Magnifier (separate magnified window) Narrator Speech Recognition On-Screen Keyboard High Contrast color schemes
If PC isn’t Booting Properly
Check to see if there have been recently installed hardware or software.
Uninstall new hard/software using Uninstall program in Control Panel, then try to reboot again. If system boots, then reinstall.
Last Known Good Configuration
Windows Advanced Options menu.
Used by Windows if it detects a problem in the boot process.
Created each time you boot successfully.
Registration information saved during last shut down.
Windows 10 Boot Errors
Reset PC attempts to diagnose and fix errors in system files causing the computer to behave improperly.
Start menu/Setting/Update and Securities/Recovery.
CMOS
Stores hardware configuration.
Involved in boot process.
Results of POST compared to CMOS.
A special kind of memory that is never erased and uses virtually no power.
Windows 10 Basics
Designed to run on multiple devices: desktops, laptops, tablets, and phones.
Use a mouse
Use a touch screen
Use keystrokes
Start Menu Left Section
Provides access to all installed programs, including Most Used, Suggested, File Explorer, Settings, and Power buttons.
Start Menu Right Section
Block tiles that launch applications, installed software, and files/folders.
Can be grouped together and resized.
You will find tiles representing your most used applications.
To Position an Active Window
Press the Windows key and a directional key on keyboard.
File Explorer Left Section
Navigation pane showing contents.
Quick Access - Commonly accessed files.
OneDrive - files stored in the cloud.
This PC - locally stored files.
File Explorer Right Section
Displays contents of a selection from left section.
Details View
Most interactive view.
Files and folders are displayed in list form with additional file information in columns.
Sort by name, date modified, type, size.
Recycle Bin
Files deleted from hard drive, which can be restored until permanently deleted.
All files deleted from other drives are permanently deleted.
File Extensions
Identifies what kind of file it is and what kind of application should use to read the file.
Adding File Extensions
Windows adds the file extension for you.
Mac and Linux don’t need file extensions because the extension information is stored within the file itself.
Add extensions if you’ll send to Windows users.
What Does Disk Cleanup Clean
Recycle Bin files
Temporary Internet files
Temporary files created by Windows to store data while a program is running, but couldn’t delete if it had a problem exiting a program.
Calculates amount of space freed.
Accessing Task Manager
Right click on empty space on task bar.
Start menu, Windows System, Task Manager
Ctrl + Alt + Del
Task Scheduler
Utility program.
Allows you to schedule and manage tasks to run automatically at predetermined times.
How File Compression Works
Look for repeated patterns of letters and replaces with a shorter placeholder.
Repeated patterns and placeholder cataloged and stored in the ‘dictionary.’
Can reduce text files up to 50%.
“The rain in Spain falls mainly on the plain.”
Patterns: “ain”, “the”
Unzipping Files
Usually use the same program used to zip it.
Restored to original state.
System Restore Point
Created every time you start your computer or install an application or driver.
A snapshot.
Restore Point Wizard resets system.
Doesn’t affect personal data files.
Task Manager Tabs (7)
Processes * Performance * Users * App History Startup Details Services Understanding if you should upgrade your memory, your processor, or buy a new system.
Action Center
Windows 10 shows major events and periodically checks the system for corrupt files or errors and displays in the Action Center.
Quick access to security settings.
Click on Notifications icon in the System Tray of the Taskbar.
Icon becomes opaque when there’s a new notification.
Functions of Task Manager
Monitor CPU and Ram to gauge computer’s efficiency.
Quit programs not responding.
Processes Tab of Task Manager
Lists apps and processes currently in use, status, impact on system.
Status shows “Not Responding”
Background process pieces belonging to OS.
CPU Usage on Processes Tab of Task Manager
Display percentage of the CPU’s time each program is using.
Find out which programs are putting the biggest load on PC.
Memory Usage on Processes Tab of Task Manager
Keep track of which programs are putting the biggest demands on memory.
Displays programs’ current memory usage.
Performance Tab of Task Manager
Displays summary information for CPU, memory, disk, and wifi usage.
Level of 80% may indicate an upgrade is needed.
Services Tab of Task Manager
Lists all services currently in use (many OS).
Provides status of current services.
Can start or stop service for any service program by right clicking.
Weblinks
http: //www.informationweek.com - customizing and evaluating system performance.
http: //www.geek.com - All things computer related.
Rotational Latency
A tiny delay after the read/write head is positioned over the correct track, while the head waits for the right sector to pass underneath.
Writing Data
Everything written in binary code.
Read/write heads record each bit of information with lightning speed as the platter rotates underneath.
One ring on disk written to at a time.
Disk must be formatted first.
Solid State Drives Pros
Greater reliability due to no moving parts.
High data transfer rates.
Energy efficient.
Becoming standard storage.
Hard Drives
Mechanical parts enclosed in a sealed case.
Should always remain sealed.
Traditional storage means.
Nonvolatile Storage
Hard Disk drives Solid state drives Solid state hybrid drives -Data is remembered when power is off. -Necessary if you want to save and access files and programs.
Solid State Drives Cons
Less storage capacity than hard disk drives.
Expensive.
Hard Drive Interior
Magnetically coated platter
DC Spindle Motor
Read/Write Head, Arm Actuator
Platter
Platters sit on top of the DC spindle motor.
Platters spin at a precise, constant speed of thousands of revolutions per minute (rpm.)
Read/Write Head, Arm Actuator
Actuators move the arm from the center to the outer edge of each platter at amazing speeds.
Formatting a Disk
Formatting marks the disk into tracks, rings, sectors, and wedges.
System for locating each bit of data.
Reading Data
Controller sends signal to the drive.
Drive looks at starting track and sector.
Moves arm to track and waits for the sector to spin under the read/write head.
As each block of data is located, the HD sends it along the BUS lines to the computer and seeks the next block of data.
Each block indicates whether to continue on or if it is the end of the data.
HD continues to spin awaiting next request.
How a Disk Gets Fragmented
As old files are deleted, storage becomes distributed over the disk.
Pieces of each file are spread out all over the disk.
Speed impaired because it takes more time to search for and locate all a file’s parts.
Access Time
The amount of time it takes for a computer to request and retrieve data.
Stand Alone Utility Programs
Disk Cleanup - McAfee Total Protection
Degrag/Optimize - Norton Utilities, iDefrag
Task Manager/Resource Monitor-Process explorer
File History/Recovery-Acronis True Image, Norton Online Backup
System Restore - FarSone RestoreIT, Acronis True Image
Distros
Different versions of Linux.
Error Checking
Checks for lost files and fragments and physical errors on the hard drive.
Threats to your Digital Assets
Identity theft and hackers.
Computer viruses.
Online annoyances and social engineering.
Cybercrime
Any criminal action perpetrated primarily through the use of a computer.
Top 4 relate to fraud.
Others involve computer intrusions, child porn, and blackmail.
Cybercriminals
Individuals who use computers, networks, and the Internet to perpetrate crime.
Four Categories of Cybercrimes
FBI related scams.
Identity theft.
Non-auction/Non-delivery of merchandise.
Advance fee fraud.
Identity Theft/Hacking
A thief steals personal information and poses as you.
Most financially damaging cybercrime for individuals.
Hacker is anyone who unlawfully breaks into a computer system.
Types of Identity Theft Crime
Counterfeiting credit and debit cards. Requesting changes of address. Open new credit cards. Obtaining medical services. Buying a home.
Types of Hackers
White-hat (ethical)
Black-hat
Grey-hat
White-Hat Hackers
Break into systems for non malicious reasons.
Test system security vulnerabilities or to expose undisclosed weaknesses.
Black-Hat Hackers
Break into systems to destroy information or for illegal gain.
Grey-Hat Hackers
Break into systems to flaunt their expertise or to attempt to sell their services in repairing security breaches.
Packet Analyzer/Sniffer
Program deployed by hackers that looks at each packet as it travels on the Internet.
Keylogger
Program that captures all keystrokes made on a computer.
Hacking Tools
Packet Analyzers Keyloggers Trojan Horses Backdoor Programs/rootkits Zombies Exploit kits Logical ports
Trojan Horse
A program that appears to be something useful but does something malicious in the background without your knowledge.
Backdoor Programs/Rootkits
Programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge.
Access and delete files, send e-mail, run programs, making computer a zombie.
Zombies
Computers under the control of a hacker.
Often used to launch denial-of-service attacks on other computers.
Types of Hacking Attacks
Denial-of-Service
DDoS
Botnet
Denial-of-Service (DoS)
Hacker flooding system with requests from a Zombie, causing it to shut down. Legitimate users thereafter cannot access.
Distributed Denial of Service (DDoS)
Multiple zombies perpetrate attack simultaneously.
Botnet
Large group of software running on zombie computers.
Exploit Kits
Software programs that run on servers, and are searching for vulnerabilities.
Logical Ports
Virtual, not physical, communication paths.
Firewalls screen data coming in to these ports. Like windows. Organize request for information from other networks or computers.
Virus Basics
Program that attaches to a computer program to spread to other computers.
Main purpose is to replicate itself and copy its code into as many other host files as possible.
Secondary objectives can be destructive.
Smartphones, tablets, and other devices can be infected with viruses.
Types of Viruses
Boot sector viruses Logic bombs/Time bombs Worms Script and macro viruses Email viruses Encryption viruses
Boot sector viruses
Executes when a computer boots up.
Found on infected media, replicate to the master boot record, such as booting with an infected flash drive in USB. Can erase your entire hard drive.
Logic bombs/Time bombs
Execute when certain conditions or dates are reached, such as opening a file or opening a program a certain number of times. Time bombs triggered by passage of time or on a certain date.
Worms
Virus-like and spread on their own with no host file or human interaction needed. Spread through network connections. Much more active in spreading themselves.
Script and macro viruses
Series of commands with malicious intent.
Triggered if you enable macros in infected document when it triggers and infects other documents on your computer.
Email viruses
Spread as attachments to an e-mail, often using address books.
Encryption viruses
Holds files hostage by encrypting them, and ask for ransom to unlock them. Program searches for common data files such as Word or Excel.
Virus Classification by methods of avoiding Detection
Polymorphic
Multipartite
Stealth
Polymorphic Virus Class
Change their code or periodically rewrites themselves to avoid detection.
Most infect a particular file type.
Multipartite Virus Class
Designed to infect multiple file types to fool the antivirus software that is looking for it.
Script and macro viruses
Series of commands executed without your knowledge with malicious intent.
Triggered if you enable macros in infected document when it triggers and infects other documents on your computer.
Online Annoyances-Malware
Adware Spyware Spam (junk email) Social Engineering Phishing Pharming Scareware
Adware
A type of malware that displays unsponsored advertisements.
Spyware
A type of malware that is a piggy-back program.
Transmits information about you.
Using tracking cookies.
Keystroke loggers.
Spam
Unwanted or junk e-mail. Minimize by: Creating a free e-mail address Spam filters Third party programs Reclassify emails misidentified as spam.
Cookies
Small text files stored on your hard drive when you visit a website and are to help companies determine traffic on their website and evaluate the effectiveness of their marketing.
Don’t search hard drive, but may invade privacy.
No security threat.
Social Engineering
Any technique using social skills to generate human interaction with the purpose of enticing individuals to reveal sensitive information.
Pretexting involves creating a scenario that sounds legitimate.
Scareware.
Phishing
Lures internet users to reveal personal information.
Pharming
Malicious code is planted on your computer.
Avoiding Schemes
Never reply to any email asking for personal information.
Don’t click email links.
Check with the company asking for information.
Never give personal information on insecure sites.
Use phishing filters.
Use internet security software that’s frequently updated.
Scareware
A type of malware that downloads onto your computer and tries to convince you that your computer is infected.
Then directs you to a site to purchase fake removal or antivirus tools.
Social engineering technique.
Restricting Access to Digital Assets
Firewalls
- Packet Filtering
- Logical Port Blocking
Firewall
Hardware or software designed to protect computers from hackers.
Included in OS of Mac and PC.
Norton Internet Security, McAfee Internet Security, and ZoneAlarm Internet Security suites include firewall software. Router.
Packet Filtering
A firewall configured to filter out packets sent to specific logical ports.
Logical Port Blocking
A firewall configured to refuse requests from the Internet asking for access to specific ports.
Logical Ports
21 - FTP control (file transfer protocol)
23 - Telnet (unencrypted text communication)
25 - SMTP (simple mail transfer protocol)
53 - DNS (domain name system)
80 - HTTP (hypertext transfer protocol)
443 - HTTPS (HTTP with transport layer security encryption.)
Antivirus Software
Specifically designed to detect viruses and protect your computer and files from harm. Should auto-schedule to run weekly. Scans when files when they’re opened or executed. Detects either a virus signature or a suspicious activity like a macro or script launching. It stops the execution of the file and notifies you.
Popular Antivirus Software
Symantec Kapersky AVG McAfee Bitdefender
Virus Signature
Portion of the virus code that’s unique to a particular computer virus.
Quarantining
Placing a virus in a secure area so it won’t spread to other files.
Inoculation
Records key attributes about your computer files and keep stats in a secure place.
Authentication
Passwords
Biometrics
Passwords
Difficult to guess. Strong Password generator. Password Meter to evaluate passwords. Windows, macOS and others have built-in password protection for files as well as desktop. Password Management tools available.
Biometrics
Reads a unique personal characteristic (fingerprint or iris) and converts it to a digital code.
Voice authentication.
Facial recognition.
Provide a high level of security.
Privacy Tools
In private
Private browsing
Incognito
Portable Privacy Devices
IronKey Personal flash drives.
Inoculation
Records key attributes about your computer files and keep stats in a secure place and checking to see if they change over time.
Protecting your Personal Information
Identity thieves crave: SSN Full DOB Phone Number Street Address
Other Sensitive Information
Full legal name Email address Zip code Gender School or workplace
Backups
Copies of files used to replace the originals if they’re lost or damaged.
Files to Backup
Data Files
Program Files
Types of Backups
Full
Incremental
Image
Backup Locations
Cloud
External Hard Drive
Network Attached Storage Device and Home Server
Cloud Backup
Files stored at secure, remote location
Accessible anywhere through a browser.
Most free storage sites don’t provide enough space for image backups.
External Hard Drive
Inexpensive, one-time cost.
Fast backups with USB 3.0
Could be destroyed or stolen with computer.
Difficult to back up multiple devices.
Network Attached Storage (NAS)
Backing up multiple devices easier.
More expensive.
Could be destroyed or stolen with computer.
Power Surges
An electrical current is supplied in excess of normal voltage.
Old or faulty wiring.
Downed power lines.
Lightning strikes.
Malfunctions at electric company substations.
Surge Protector
Replace every 2-3 years.
Use with all devices that have solid-state components.
Main Security Concerns with Mobil Devices
Keeping them from being stolen.
Keeping data secure in case they’re stolen.
Finding a device if its stolen.
How do you test a firewall?
Go to sites such as grc.com and run the ShieldsUp or LeakTest.
ShieldsUp status column will show Closed or Stealth.
Virus Attachment
A computer program that attaches itself to another computer program called the host program.
Virus Symptoms
Existing program icons or files suddenly disappear.
Viruses often delete specific file types or programs.
Changes appear in browser; it may take you to an unusual home page or sprouted new toolbars.
Data files become corrupted.
Programs don’t work properly.
System slows down or is slow to boot up.
How to get a Virus
- Booting up with an infected flash drive.
- Opening an infected email attachment.
- Enabling macros in Word or Excel.
Viruses you can get from Internet
Hidden in program files you download.
Scripts can be hidden in websites.
Scripts
Small programs executed when you enter a site.
Avoiding Viruses
Update antivirus software and OS regularly for latest security patches.
Windows Defender
And others, downloads a list of updates for virus signature files every time you go online.
Defensive Computing
Making sure you have the correct computer setup and computing habits.
Protection against your own mishaps.
Backups
Undelete
Security Updates
System Restore
Protection Suite Features
E-mail scams
Parental controls
File shredding
Security Updates
Pates published for Windows and Edge and Office.
Windows update automatically downloads updates and installs them.
Backing Up Data
Copy personal data files to:
External hard drive
Clout backup service (Dropbox, Google Drive, MSOne Drive)
System and Security, File History, lets you designate a hard drive to back up to. Also saves different versions of files. Link to Use system Image to create backup of system.
Windows Defender
Downloads a list of updates for virus signature files every time you go online.
Included in Windows and defends against pop-ups, malware, and hacking agents. Part of Windows updates. Disabled when other programs activated.
Popup Blocker
Internet Options
Type website for which you want to allow popups.
Enabled by default.
Popup Blocker
Internet Options
Type website for which you want to allow popups.
Enabled by default.
Malware (Viruses, Adware, Spyware)
Data mining Aggressive advertising Tracking surfing habits. Keystroke loggers. Trojan horses. Backdoor programs and zombies.
Malware (Viruses, Adware, Spyware)
Data mining Aggressive advertising Tracking surfing habits. Keystroke loggers. Trojan horses. Backdoor programs and zombies.
Network Address Translation
The firewall sees the request from the computer with the internal IP. It then makes the same request to the Internet using its own public address, and returns the response from the Internet resource to the computer inside the private network. From the perspective of the resource on the Internet, it is sending information to the address of the firewall. From the perspective of the workstation, it appears that communication is directly with the site on the Internet.
Virtual Private Network
Makes it just as secure to send information across a public network as it is on a secure private network.
Virtual Private Network
Makes it just as secure to send information across a public network as it is on a secure private network.
When you are surfing anonymously
The sites you visit are not stored in browser history;
You are using a browser that has privacy tools;
Temporary files created are immediately deleted.
Full Backup
Create a copy of all you application and data files.
Image Backup
All system files are backed up.
Complete snapshot of everything that makes your computer run.
Incremental Backup
Partial backup; files changed or created since the last backup.
When you are surfing anonymously
The sites you visit are not stored in browser history;
You are using a browser that has privacy tools;
Temporary files created are immediately deleted.
Dvorak Keyboard
Alternative keyboard layout that puts the most commonly used letters on Home Keys - keys in the middle of the keyboard.
Capacitive System
Basic touch screens detect touches and translate them into meaningful commands.
Multitouch User Interface
Introduced by Apple.
Pinching the screen.
Coordinate based grid to arrange the capacitors.
Input Devices for Images
Digital cameras Camcorders Mobile Device cameras Flatbed scanners Webcam
Types of Microphones
Omnidirectional-conference calls
Unidirectional-1 voice; podcasts
Clip-on (Lavalier)-presentations
Close talk-headset-phone, speech recog.