Ict Notes
Ict Notes
WHAT IS ICT?.....................................................................................................................................2
ICT Tools..............................................................................................................................................2
USAGE OF ICT IN DAILY LIFE........................................................................................................2
THE IMPACT OF ICT ON SOCIETY.................................................................................................4
INTRODUCTION TO COMPUTERS.................................................................................................5
QUALITIES OF A COMPUTER......................................................................................................5
Advantages of using computers.........................................................................................................5
Disadvantages of computers..............................................................................................................6
Classification of computers.................................................................................................................6
2. Computer Generations...............................................................................................................6
_Toc424009468COMPUTER SYSTEM............................................................................................12
Its made up of the following..............................................................................................................12
Hardware components........................................................................................................................12
Hardware Devices: Secondary storage devices..............................................................................23
Relationship between Hardware and Software...................................................................................37
Software..............................................................................................................................................37
Computer personel..............................................................................................................................39
Advantages of Computer Networking.............................................................................53
Internet, Intranet and Extranet............................................................................................................58
INTRODUCTION COMPUTER THREATS.....................................................................................63
ICT ETHICS......................................................................................................................................65
SOCIAL RESPONSIBILITIES..........................................................................................................74
COMPUTER SECURITY..................................................................................................................77
PRIVACY IN COMPUTER USAGE.................................................................................................78
WHAT IS PRIVACY?........................................................................................................................78
Essential Life Skills............................................................................................................................80
Basics of Conflict Management.........................................................................................................82
Page 1 of 97
East Africa Institute Of Certified Studies 2015
WHAT IS ICT?
ICT is the technology required for information processing, in particular, the use of electronic
computers, communication devices and software applications to convert, store, protect, process,
transmit and retrieve information from anywhere, anytime.
INFORMATION
Information refers to the knowledge obtained from reading, investigation,study or research.
The tools to transmit information are the telephone, television and radio.
We need information to make decisions and to predict the future. For example, scientists can detect
the formation of a tsunami using the latest technology and warn the public to avoid disasters in the
affected areas.
Information is knowledge and helps us to fulfill our daily tasks. For example, forecasting the stock
exchange market.
COMMUNICATION
Communication is an act of transmitting messages. It is a process whereby information is
exchanged between individuals using symbols, signs or verbal interactions. Previously, people
communicated through sign or symbols, performing drama and poetry. With the advent of
technology, these older forms of communication are less utilised as compared to the use of the
Internet, e-mail or video conferencing
Communication is important in order to gain knowledge. With knowledge, we are more confident in
expressing our thoughts and ideas.
TECHNOLOGY
Technology is the use of scientific knowledge, experience and resources to create processes and
products that fulfill human needs. Technology is vital in communication
ICT Tools
ICT tools are components associated with ICT. They are either hardware or software items used to
process information. They include;
Computers and Related Equipment Communication Equipment
Software programs .
Every year, a lots of ICT tools are manufactured by various companies in the world.
For example, Input output devices, application software etc.
Bar code readers Used in super markets & shops to read bar codes which contain
information about that particular product.
Bar code printers Used to print information about a particular product in Barcode format
Page 2 of 97
East Africa Institute Of Certified Studies 2015
Today, most schools and higher educational institutions have computers in the classroom for teacher
and students. In education, teachers, students, researchers and school administrators benefits from
the usage of ICT.
Teachers Teachers use computers to research for teaching materials, participate in online
forums and online conferences as well as to aid their teaching.
Students Students use the computers as a reference tool. They use computers to browse the
Internet to look for information
Researchers use computers tocollect and process data
School administrators use computers for administrative purposes to make sure that the entire
operation runs smoothly.
2. Business
The computer's characteristic as high speed of calculation, diligence,accuracy, reliability, or
versatility has made it an integerated part in all business organisations. Computer used in business
organisation for:
Payroll Calculations Financial forcasting
maturity date
4. Marketing
In Marketing uses of computer are following:
Advertising: With computers, advertising professionals create art and graphics, write and revise
copy, and print and disseminate ads with the goal of selling more products.
At Home Shopping: At home shopping has been made possible through use of computerized
catalogues that provide access to product information and permit direct entry of orders to be filled
by the customers.
5. Health Care
Computers have become important part in all Medical Systems. The computers are being used in
hospitals to keep the record of patients and medicines. It is also used in scanning and diagnosing
different diseases. ECG, EEG, Ultrasounds and CT Scans etc. are also done by computerised
machines. Some of major fields of health care in which computer are used:
Page 3 of 97
East Africa Institute Of Certified Studies 2015
Diagnostic System: Computers are used to collect data and identify cause of illness.
Lab-diagnostic System:All tests can be done and reports are prepared by computer.
Patient Monitoring System:These are used to check patient's signs for abnormality such as in
Cardiac Arrest, ECG etc.
Pharma Information System:Computer checks Drug-Labels, Expiry dates, harmful drug side
effects etc.
Nowadays, computers are also used in performing surgery.
Engineering Design
Computers are widely used in Engineering purposes. One of major areas is CAD(Computer aided
design).CAD provides creation,edition, and modification of image. Some fields are:
Structural Engineering:Requires stress and strain analysis required for design of Ships,
Buildings, Budgets, Airplanes etc.
Industrial Engineering:Computers deals with design, implementation and improvement of
Integrated systems of people, materials and equipments.
Architectural Engineering:Computers help in planning towns, designing buildings,
determining a range of buildings on a site using both 2D and 3D drawings
6. Communication
Communication means to convey a message, an idea, a picture or speech that is received and
understood clearly and correctly by the person for whom it is meant.Some main areas in this
category are:
E-mail FTP
Chatting Telnet
Usenet Video-conferencing
Page 4 of 97
East Africa Institute Of Certified Studies 2015
GIGO is a short form for Garbage In Garbage Out. It refers to the quality of output produced
according to the input. Normally bad input produces bad output.
4. EFFECTIVE SHARING OF INFORMATION
With the advancement of ICT, information can be shared by people all around the world. People can
share and exchange opinions, news and information through discussion groups, mailing list and
forums on the Internet. This enable knowledge sharing which will contribute to the development of
knowledge based society.
5. PAPERLESS ENVIRONMENT
ICT technology has created the term paperless environment. This term means information can be
stored and retrieved through the digital medium instead of paper. Online communication via emails,
online chat and instant messaging also helps in creating the paperless environment.
6. BORDERLESS COMMUNICATION
Internet offers fast information retrieval, interactivity, accessibility and versatility. It has become a
borderless sources for services and information. Through the Internet, information and
communication can be borderless.
7. SOCIAL PROBLEMS
There are some negative effects of ICT. It has created social problems in the society. Nowadays,
people tend to choose online communication rather than having real time conversations. People tend
to become more individualistic and introvert.
8. Another negative effect of ICT is :
fraud
identity theft
Pornography
Hacking
This will result a moral decedent and generate threads to the society.
9. HEALTH PROBLEMS
A computer may harm users if they use it for long hours frequently. Computer users are also
exposed to bad posture, eyestrain, physical and mental stress. In order to solve the health problems,
an ergonomic environment can be introduced. For example, an ergonomic chair can reduces back
strain and a screen filter is used to minimize eye strain.
INTRODUCTION TO COMPUTERS
A computer is an electronic device or set of devices that work under the control of stored program
accepting data from outside itself and processing it to produce information.
COMPUTER TERMINOLOGIES.
(i) Its automatic i.e. can work with minimum human intervention once supplied with data
and instructions.
(ii) Its data processor processes raw facts and figures to produce information.
(iii) Its a storage device store information for later reference.
(iv) Its electrical Requires some form of power to drive it.
Advantages of using computers.
Classification of computers
1. According to size
A number of different dimensions can be used to classify computers into different types.
Traditionally, the size and the capabilities of computers are used as the main criterion and
the computers are classified into the following types.
PC The personal computer (PC) is small in size and is designed for general use by a
single person.
Server A computer that has been optimized to provide services to other computers
over a network. Servers usually have powerful processors, lots of memory and large
Page 6 of 97
East Africa Institute Of Certified Studies 2015
hard drives.
M
ainframe Mainframes are huge computers, which could fill an entire room or
even a whole floor. Over the years, the size of computers has diminished while the
power has increased; the term mainframe has fallen out of use. You will still
hear the term used, particularly in large companies to describe the huge machines
processing millions of transactions every day.
Supercomputer This type of computer is usually very expensive. Although some
supercomputers are single computer systems, most comprised multiple high
performance computers working parallel as a single system. The best-known
supercomputers are built by Cray Supercomputers.
2. Computer Generations
a. First Generation
The period of first generation was 1946-1959. First generation of computer started with using
vacuum tubes as the basic components for memory and circuitry for CPU(Central Processing Unit).
These tubes like electric bulbs produced a lot of heat and were prone to frequent fusing of the
installations, therefore, were very expensive and could be afforded only by very large organisations.
In this generation mainly batch processing operating system were used. In this generation Punched
cards, Paper tape, Magnetic tape Input & Output device were used. There were Machine code and
electric wired board languages used
Page 7 of 97
East Africa Institute Of Certified Studies 2015
The main features of Second Generation are:
Use of transistors Still very costly
A.C needed
d. Fourth Generation
The period of Fourth Generation was 1971-1980. The fourth generation of computers is marked by
the use of Very Large Scale Integrated (VLSI) circuits.VLSI circuits having about 5000 transistors
and other circuit elements and their associated circuits on a single chip made it possible to have
microcomputers of fourth generation. Fourth Generation computers became more powerful,
compact, reliable, and affordable. As a result, it gave rise to personal computer (PC) revolution. In
Page 8 of 97
East Africa Institute Of Certified Studies 2015
this generation Time sharing, Real time, Networks, Distributed Operating System were used. All the
Higher level languages like C and C++, DBASE etc. were used in this generation
The main features of Fourth Generation are: Concept of internet was introduced
VLSI technology used
Great developments in the fields of
Very cheap networks
No A.C. needed
5. Fifth Generation
The period of Fifth Generation is 1980-till date. In the fifth generation, the VLSI technology
became ULSI (Ultra Large Scale Integration) technology, resulting in the production of
microprocessor chips having ten million electronic components. This generation is based on parallel
processing hardware and AI (Artificial Intelligence) software. AI is an emerging branch in computer
science, which interprets means and method of making computers think like human beings. All the
Higher level languages like C and C++, Java, .Net etc. are used in this generation.
AI includes: Advancement in Superconductor
Robotics technology
3.
4.
Page 9 of 97
East Africa Institute Of Certified Studies 2015
5.
6. In terms of purpose, computers are classified into special purpose or general
purpose.
7.
8. Special purpose computer is designed for only one purpose. A computer which
guides space shuttles, and which cannot be used for any other purpose is an example
of special purpose computer.
9.
10. General-purpose computer, on the other hand, can be used for many purposes. For
example, the same general-purpose computer may be used to handle payroll, do
balance sheet, and produce graphics for the design of buildings, solve complex
mathematical equations, or play games. It is possible to provide a long list under this
heading. Here is a least of varied examples are given below
11.
Home Computer This is a low-cost microcomputer of limited capability designed
for domestic use with programs that typically are used for such things as computer
game or controlling family finance.
Word Processor -- This is a special purpose computer used in the production of
office documents, letters, contracts, etc.
Personal Computer (PC) These are microcomputers designed for independent use
by individual at work or in home mainly for business purposes. Some PCs are
portable. Many can be connected to minicomputers and mainframe computers so that
the PC user can also gain access to the facilities offered by the larger machine.
Desktop Computer -- These are microcomputers designed to be placed on top the
desk for independent use by individual at work or in home mainly for business
purposes. It therefore implies that Home computers and Personal Computers are
example of Desktop Computers.
Workstation Computers -- These are another type of microcomputers which are also
examples of desktop computers. Although larger and more powerful PCs are
sometime called workstations in order to denote the presence of advanced features
not provided by all PCs. These include in-built capabilities for their interconnection
and operation in conjunction with other computers.
Lap-top Computers -- These are another type of microcomputers which are smaller
in size compared to desktop computers and as a result they can be placed on the lap
of an individual to do any job. Although smaller and sometime very powerful
features not provided by all PCs. These include in-built capabilities for their
interconnection, mobile computing, with an in-built backup battery that allows one to
work without direct power connection and also operation in conjunction with other
computers.
Notebook Computers -- These are another type of microcomputers which are
smaller in size compared to desktop computers and the laptop computers as a result
they can placed on the lap of an individual, carried around easily to do any job.
Although smaller and sometime confused for Laptop computers, they can as well be
very powerful in their operations and usages. These include in-built capabilities for
their interconnection, mobile computing, with an in-built backup battery that allows
one to work without direct power connection and also operation in conjunction with
other computers.
Page 10 of 97
East Africa Institute Of Certified Studies 2015
Palmtop Computers -- These are another type of microcomputers which are smaller
in size compared to the Laptop computers and the Notebook computer. They are
hand held computers and which can be easily carried around to do some jobs.
Although smaller and sometime confused for a calculator, they are actually
computers, they can as well be very powerful in their operations and usages. These
include in-built capabilities for their interconnection, mobile computing, with an in-
built backup battery that allows one to work without direct power connection and
also operation in conjunction with other computers.
Embedded Computers These are computers that are embedded within some other
devices or system but is not accessed directly. Examples of such system can be find
in watches, video recorder, petrol pumps, cameras, lift elevators, cars and a host of
other industrial and domestic devices.
12.
13.
14. Classification of computer according to technology
(i) Hardware
24.
25.
a. Input devices
b. Output devices
c. Cpu
d. Storage devices
e. Bus sytem
f. Computer ports
26.
27.
(ii) Software
System software
Application software
28.
(iii) Orgware/Operator
29.
48. All inputs and outputs are transmitted through main memory
49. Control Unit
50. This unit controls the operations of all parts of computer.It does not carry out any
actual data processing operations. Functions of this unit are
51. It is responsible for controlling the transfer of data and instructions among other
units of a computer.
52. It manages and coordinates all the units of the computer.
53. It obtains the instructions from the memory, interprets them and directs the
operation of the computer.
54. It communicates with Input/Output devices for transfer of data or results from
storage.
Page 13 of 97
East Africa Institute Of Certified Studies 2015
70. Light pen 74. Reader(OCR
Microphone )
71. Track
Ball 75. Magnetic 77. Bar Code
Ink Card Reader
72. Scanner Reader(MIC
R) 78. Optical
73. Graphic Mark Reader
Tablet 76. Optical
Character
79.
80. Keyboard
81. Most common and very popular input device is keyboard. The keyboard helps in
inputting the data to the computer.The layout of the keyboard is like that of
traditional typewriter, although there are some additional keys provided for
performing some additional functions. Keyboard are of two sizes 84 keys or 101/102
keys, but now 104 keys or 108 keys keyboard is also available for Windows and
Internet.
82. The keys 83. Ke 84. Description
are ys
following
Sr. No.
85. 1 86. Ty 87. These keys include the letter
pin keys (A-Z) and digits keys
g (0-9) which are generally
Ke give same layout as that of
ys typewriters.
88. 2 89. Nu 90. It is used to enter numeric
me data or cursor movement.
ric Generally, it consists of a set
Ke of 17 keys that are laid out in
yp the same configuration used
ad by most adding machine and
calculators.
91. 3 92. Fu 93. The twelve functions keys
nct are present on the keyboard.
ion These are arranged in a row
Ke along the top of the
ys keyboard.Each function key
has unique meaning and is
used for some specific
purpose.
94. 4 95. Co 96. These keys provides cursor
ntr and screen control. It
ol includes four directional
ke arrow key.Control keys also
ys include Home, End,Insert,
Delete, Page Up, Page
Page 14 of 97
East Africa Institute Of Certified Studies 2015
Down, Control(Ctrl),
Alternate(Alt), Escape(Esc).
97. 5 98. Sp 99. Keyboard also contains some
eci special purpose keys such as
al Enter, Shift, Caps Lock,
Pu Num Lock, Space bar, Tab,
rp and Print Screen.
os
e
Ke
ys
100.
101.
102. Mouse
103. Mouse is most popular Pointing device. It is a very famous cursor-control
device. It is a small palm size box with a round ball at its base which senses the
movement of mouse and sends corresponding signals to CPU on pressing the
buttons. Generally it has two buttons called left and right button and scroll bar is
present at the mid. Mouse can be used to control the position of cursor on screen, but
it cannot be used to enter text into the computer.
104. ADVANTAGES
105. Easy to use
Page 15 of 97
East Africa Institute Of Certified Studies 2015
source which are then converted into the digital form that can be stored on the
disc.These images can be edited before they are printed.
116. Digitizer
117. Digitizer is an input device which converts analog information into a digital
form. Digitizer can convert a signal from the television camera into a series of
numbers that could be stored in a computer. They can be used by the computer to
create a picture of whatever the camera had been pointed at. Digitizer is also known
as Tablet or Graphics Tablet because it converts graphics and pictorial data into
binary inputs. A graphic tablet as digitizer is used for doing fine works of drawing
and images manipulation applications.
118. Microphone
119. Microphone is an input device to input sound that is then stored in digital
form. The microphone is used for various applications like adding sound to a
multimedia presentation or for mixing music.
120. Magnetic Ink Card Reader(MICR)
121. MICR input device is generally used in banks because of a large number of
cheques to be processed every day. The bank's code number and cheque number are
printed on the cheques with a special type of ink that contains particles of magnetic
material that are machine readable. This reading process is called Magnetic Ink
Character Recognition(MICR). The main advantages of MICR is that it is fast and
less error prone.
122. Bar Code Readers
123. Bar Code Reader is a device used for reading bar coded data (data in form of
light and dark lines). Bar coded data is generally used in labelling goods, numbering
the books etc. It may be a hand held scanner or may be embedded in a stationary
scanner. Bar Code Reader scans a bar code image, converts it into an alphanumeric
value which is then fed to the computer to which bar code reader is connected
124.
3. Output Devices
125. Following are few of the important output devices which are used in
Computer Systems
126. Monitors
128. Printer
129.
130. Monitors
131. Monitor commonly called as Visual Display Unit (VDU) is the main output
device of a computer. It forms images from tiny dots, called pixels, that are arranged
in a rectangular form. The sharpness of the image depends upon the no. of the pixels.
There are two kinds of viewing screen used for monitors.
132. Cathode-Ray Tube (CRT)
Page 16 of 97
East Africa Institute Of Certified Studies 2015
136. In the CRT display is made up of small picture elements called pixels for
short.The smaller the pixels, the better the image clarity, or resolution.It takes more
than one illuminated pixel to form whole character, such as the letter e in the word
help. A finite number of character can be displayed on a screen at once.The screen
can be divided into a series of character boxes - fixed location on the screen where a
standard character can be placed. The most screens are capable of displaying 80
characters of data horizontally and 25 lines vertically. There are some disadvantage
of CRT
137. Large in Size
182. Noisy
Page 20 of 97
East Africa Institute Of Certified Studies 2015
250. It consumes less access time as compared to main memory.
251. It stores the program that can be executed within a short period of time.
282. Faster
285. Expensive
286.
287. High power consumption
288. Dynamic RAM (DRAM)
289. DRAM, unlike SRAM, must be continually refreshed in order for it to
maintain the data. This is done by placing the memory on a refresh circuit that
rewrites the data several hundred times per second. DRAM is used for most system
memory because it is cheap and small. All DRAMs are made up of memory cells.
These cells are composed of one capacitor and one transistor. Characteristic of the
Dynamic RAM
290. It has short data lifetime
Page 22 of 97
East Africa Institute Of Certified Studies 2015
293. Used as RAM
307. The EEPROM is programmed and erased electrically. It can be erased and
reprogrammed about ten thousand times. Both erasing and programming take about
4 to 10 ms (milli second). In EEPROM, any location can be selectively erased and
programmed. EEPROMs can be erased one byte at a time, rather than erasing the
entire chip. Hence, the process of re-programming is flexible but slow.
308. Advantages of ROM
309. Non-volatile in nature
320. This section will be looking at the various forms of secondary storage device
(media). For each device you should be familiar with the following details:
seek time - Average time taken from requesting data to starting to read the requested data
Write type - Whether it is read only, write only or readable and writable
321.
Page 24 of 97
East Africa Institute Of Certified Studies 2015
322.
323. sequential access requires all memory locations before the one sought to be
read, before reaching it. Random access memory allows you to jump directly to the
memory location you are seeking
324. Pay special attention to devices with an orange background, you need to be
able to describe exactly how they work!
325. Contents
1 Magnetic media
2 Optical media
o 2.1 CD-ROM
3 Solid-state memory
327. Magnetic media stores data by assigning a magnetic charge to metal. This
metal is then processed by a read head, which converts the charges into ones and
zeros. Historically, magnetic media has been very popular for storing programs, data,
and making backups. It looks set to continue in this role for some time. However,
solid state technology to starting to be used more and more, storing programs and
data on new devices such as mobile phones and cameras.
Page 25 of 97
East Africa Institute Of Certified Studies 2015
338. Hard disk
340. Hard disks are usually found inside computers to store programs and data.
They are increasingly cheap and more and more companies are using them to back
things up. Hard disks can vary in physical size with some disks getting as small as
your thumb. The capacity of a commercial disk is currently up to about 2 terabytes
allowing users to read and write to them. They are constructed from several key
components:
Platter - Metallic disks where One or both sides of the platter are magnetized, allowing data
to be stored. The platter spins thousands of times a second around the spindle. There may be
several platters, with data stored across them
Head - The head reads magnetic data from the platter. For a drive with several platters there
may two heads per platter allowing data to be read from top and bottom of each
Actuator Arm - used to move the read heads in and out of the disk, so that data can be read
and written to particular locations and you can access data in a Random fashion, you don't
need to read your way through the entire disk to fetch a particular bit of information, you
can jump right there. Seek time is very low.
Power connector - provides electricity to spin the platters, move the read head and run the
electronics
IDE connector - allows for data transfer from and to the platters
Jumper block - used to get the disk working in specific ways such as RAID
341.
Page 26 of 97
East Africa Institute Of Certified Studies 2015
342. For the exam you must be able to explain how a hard disk works:
4. Once the data sector that is required has spun around and under the read head, data is read
343.
344.
345. Description of a hard disk platter
3. the actuator arm moves the write head to the track that will be written to
Page 27 of 97
East Africa Institute Of Certified Studies 2015
4. Once the data sector that is required has spun around and under the write head, data is
written to the platter
347. Pros
352.
Cons
354.
356.
357.
358. DDS tape drive. Above, from left right: DDS-4 tape (20 GB), 112m Data8
tape (2.5 GB), QIC DC-6250 tape (250 MB), and a 3.5" floppy disk (1.44 MB)
359. Increasingly obsolete, the tape has been a medium to deliver software and
back up data since the early days of computing. Nowadays they are used mostly for
corporate backing up and archiving of data. Tapes are sequential data stores, meaning
that if you had information stored at the end of the tape you would have to wind your
way through the entirety of the tape before you could read it. There is no random
access like with a hard disk! Tapes can be several terabytes in size and reading and
writing can be very fast as long as you read or write continuous sections of the tape
at once.
360. Pros
361. Fast
Page 28 of 97
East Africa Institute Of Certified Studies 2015
362. High capacity
363. Cheap per megabyte
364.
Cons
366.
368. Optical media works by creating a disc with a pitted metallic surface. There
are several different types of disk out there ranging from 650 MB to 128 GB, with
the pits and lands getting closer together for higher volume disks. The principle
behind how each of them works is the same.
369.
370.
371. pitted surface visible on the surface of a CD. Massively zoomed in!
372. Optical media
376.
373. 375.
374. Type Imag
Device Size
e
377.
650
CD-ROM Read Only
378.
CD-R Write once then Read only 100p
x
CD-RW re-Writable
379. 380.
DVD-ROM Read Only 4.7 -
Page 29 of 97
East Africa Institute Of Certified Studies 2015
DVD-RW re-Writable
DVD-RAM re-Writable
382.
25 - 383.
Blu-ray (BD) 381. Re-Writable and Read Only
versions available, using a Blue laser,
disc
that is able to recognise smaller pits
and lands. Allowing for the pits and
HD DVD lands to be more closely packed
384. CD-ROM
385.
386.
387. close up of the surface of a CD being read
1. A single track runs in a spiral pattern from the centre of the disc to the outside, this track is
made of pits and lands to represent the ones and zeroes.
2. A laser is shone on the metallic surface and the reflection is captured in a photodiode sensor,
the lands reflect differently to the pits, meaning it can tell the difference between a 1 and a 0
388. Pros
389. Cheap
390. Cons
394.
Page 30 of 97
East Africa Institute Of Certified Studies 2015
395. Solid-state memory
407.
Internals of a typical USB flash drive
408.
409. USB Standard-A plug
410.
411. USB mass storage controller device
412.
413. Test points
414.
415. Flash memory chip
420.
421. Write-protect switch (Optional)
422.
423. Space for second flash memory chip
424. USB Flash drives are solid state, that means that there are no moving parts.
This is very useful for seek times as we don't have to wait for mechanical movement,
meaning seek time is very low and it allows for fast Random Access Memory. Flash
drives can be set to read only mode, but they will always allow for reading and
writing. The size of flash drives is not as great as a Hard Disk and they are generally
much more expensive per megabyte
2. USB driver loads, providing the computer with code on how to read and write from the USB
3. The USB is read, giving information on the file and folder structure (File Allocation Table)
to the Computer
4. [Reading] The user chooses to open a file, the Computer sends the address wanted to the
USB port
6. [Writing] The computer sends data to the USB port where it is place into empty space on the
drive
7. [Writing] The computer then requests a new version of the file and folder structure
425. Pros
428.
Cons
431.
Page 32 of 97
East Africa Institute Of Certified Studies 2015
432. Memory cards
433. Work in much the same way as a Flash drive and can often be converted into
Flash Drives. They have different connectors and are generally smaller than USB
Flash drives allowing for them to be used in cameras, mobile phones and game
consoles.
434.
435.
436. comparison of different memory cards
437.
438.
439.
5. Ports
440. What is a Port?
441. A computer port is a physical docking point using which an extenal device
can be connected to the computer.
442. A computer port can also be programmatic docking point through which
information flows from a program to computer or over the internet.
443.
444. Characteristics
445. External devices are connected to a computer using cables and ports.
446. Ports are slots on the motherboard into which a cable of external device is
plugged in.
447. Examples of external devices attached via ports are mouse, keyboard,
monitor, microphone , speakers etc.
Page 33 of 97
East Africa Institute Of Certified Studies 2015
448.
449.
450.
451. Following are few important types of ports
452. Serial Port
453. Used for external modems and older computer mouse.
466. Most of the old computers provide two PS/2 port, each for mouse and
keyboard.
Page 34 of 97
East Africa Institute Of Certified Studies 2015
467.
468. Also known as IEEE 1284-compliant Centronics port.
469. Universal Serial Bus (or USB) Port
470. Can connect all kind of external USB devices such as external hard disk,
printer, scanner, mouse, keyboard etc.
471. Introduced in 1997.
472. Most of the computers provide two USB port as minimum.
473. Data travels at 12 megabits per seconds
474. USB compliant devices can get power from a USB port
475.
476. VGA Port
477. Connects monitor to a computer's video card.
482. Connects to the computer's power cable that plugs into a power bar or wall
socket.
483.
484. Firewire Port
485. Transfer large amounts of data at very fast speed.
489. Three variants: 4-Pin FireWire 400 connector, 6-Pin FireWire 400
connector and 9-Pin FireWire 800 connector
490. Ethernet Port
491. Connects to a network and high speed Internet
494. Data travels at 10 megabits to 1000 megabits per seconds depending upon
the network bandwidth.
495.
496. Game Port
497. Connect a PC to a joystick
512. Data bus is the most common type of bus. It is used to transfer data between
different components of computer. The number of lines in data bus affects the speed
of data transfer between different components. The data bus consists of 8, 16, 32, or
64 lines. A 64-line data bus can transfer 64 bits of data at one time.
Page 36 of 97
East Africa Institute Of Certified Studies 2015
515. The address bus (sometimes called the memory bus) transports memory
addresses which the processor wants to access in order to read or write data. It is a
unidirectional bus
516. Many components are connected to one another through buses. Each
component is assigned a unique ID. This ID is called the address of that component.
It a component wants to communicate with another component, it uses address bus to
specify the address of that component. The address bus is a unidirectional bus. It
can carry information only in one direction. It carries address of memory
location from microprocessor to the main memory.
519. Control bus is used to transmit different commands or control signals from
one component to another component. Suppose CPU wants to read data from main
memory. It will use control is also used to transmit control signals like ASKS
(Acknowledgement signals). A control signal contains the following:
520. 1 Timing information: It specifies the time for which a device can use data
and address bus.
522. Suppose that CPU gives a command to the main memory to write data. The
memory sends acknowledgement signal to CPU after writing the data successfully.
CPU receives the signal and then moves to perform some other action.
547. Hardware without set of programs to operate upon cannot be utilized and
is useless.
548. To get a particular job done on the computer, relevant software should be
loaded into the hardware
552. A software acts as an interface between the user and the hardware.
Page 38 of 97
East Africa Institute Of Certified Studies 2015
555. Software
556. Software is a set of programs, which is designed to perform a well defined
function. A program is a sequence of instructions written to solve a particular
problem. There are two types of software
557. System Software
589. Conclusion
590. A computer operator is an individual who is responsible for using computers,
fixing computer problems and monitoring computer usage by others in his/her
department. The true extent of the job role of a computer operator will be determined
by the exact position he/she holds, the company which the individual works for and
the amount of responsibility the individual is given. Overall, the job role of a
computer operator is one which is varied and fulfilling. Should one have a good
knowledge with regard to computers and be well rounded in such knowledge,
embarking on a career as a computer operator may be a wise move on their part.
594. Computer programmers write, test, and maintain the programs that computers
follow when performing specific functions. While job titles and descriptions vary by
company, the main task of computer programmers is problem solving and
Page 40 of 97
East Africa Institute Of Certified Studies 2015
development of systems solutions using the appropriate methodologies and
techniques.
595. Programmers often work on projects as a team, each team member assigned
according to strength and ability. A programmer uses programming languages, such
as C++, PHP, or Java to communicate with computer to perform a set of instructions.
By typing code in 2nd and 3rd level programming languages (which are languages
become more like words as the generation goes up and more like machine code as
the generation goes down , eg assembler) helps computer programmers easier to
code with. Once finished coding they compile the program into machine language so
the computer can follow the set of instructions.
Network Designer
Page 41 of 97
East Africa Institute Of Certified Studies 2015
Systems Analyst
Solutions Architect
Systems Architect
603. Duties The role of system analysts and designers is critical in contemporary
system development. The systems analyst is a key partner with project managers and
system developers.
604. Systems analysts define software requirements and specifications and guide
program design and development. A systems analyst may supervise a software
development or maintenance team of analyst / programmers and programmers.
605. Depending on the level of responsibility and the particular job role involved,
duties may also include:
3. Undertaking analysis of current software products and determining approaches which will
improve their user interface, performance and integrity
4. Leading team members and third parties in client organisations in the integration of
technological methodologies and components of projects
5. Ensuring and being accountable for the technical integrity of the design in accordance with
the clients requirements
6. Ensuring that programs meet marketing/user requirements by testing and monitoring initial
field use and problems
8. Improving the interface between systems users, the operating system and applications
software
9. Conducting user requirements analysis to match customer needs to company products and
services
Page 42 of 97
East Africa Institute Of Certified Studies 2015
10. Assisting the sales force with pre-sales activity such as proposal preparation, systems
demonstrations and presentations, particularly in relation to larger and more important
clients.
606. Career Path Systems analysts and designers typically have a technical
background, often in software development and programming. A senior systems
engineer usually has substantial formal training and at least 7-10 years systems
engineering experience. A systems analyst will typically have at least 5 years
experience in software development and programming with at least 2 or more years
in systems analysis. A principal solutions architect would typically have at least 10
years experience in a technical field such as systems integration or systems
development, with at least 5 years experience in an ICT contracting environment.
608. The systems analyst/ designer is usually a more senior position in enterprises.
Professional qualifications will vary but a good understanding of ICT with technical
expertise is essential. Formal qualifications for systems analyst would typically
include studies of computing systems alongside studies typically found in a Bachelor
Degree of Engineering / Science / ICT.
616. Systems designers (IT) create detailed design documentation for the
development and integration of computer systems to meet the needs ofbusinesses.
Page 43 of 97
East Africa Institute Of Certified Studies 2015
617. Systems designers (IT) may perform the followingtasks:
draw up detailed design documentation including chartsand diagrams that indicate the
various components involved
talk with other team members (analysts and programmers) to ensure functionality according
to systems specifications, and develop solutions as problemsor issues arise
618. Specialisations:
634.
638. In summary
Page 45 of 97
East Africa Institute Of Certified Studies 2015
1. undertake daily administration, including monitoring system performance, ensuring
successful backups, and developing/implementing disaster recovery plans
2. manage data to give users the ability to access, relate and report information in different
ways
3. develop standards to guide the use and acquisition of software and to protect valuable
information
4. modify existing databases or instruct programmers and analysts on the required changes
1. enjoy keeping up with the complexities of database technologies, and have a knowledge of
relational database technology (eg, Oracle, Sybase, DB2, MS Access) and operating systems
5. enjoy working within a team and taking a hands-on approach, but can also work
autonomously
7. enjoy troubleshooting determining the causes of operating errors and deciding what to do
about it
8. are critical thinkers and can use logic and reason to identify the strengths and weaknesses of
alternative solutions, conclusions or approaches to problems
9. are active listeners and can give full attention to what people are saying and take the time to
understand the points being made
Page 46 of 97
East Africa Institute Of Certified Studies 2015
644. Average salary according to the Victorian Governments Youth Central is
$71,596 based on around three years relevant IT experience. Job prospects are good,
and employment has remained steady over the last five years.
649. Larger organisations may offer structured career paths with increasing
management and technical responsibilities, but many database administrators move
on to other areas such as systems development, project management, network
management or database architecture. Those with good management skills combined
with their technical expertise may move into more strategic roles.
653. In summary
install, configure and maintain PCs, networking equipment and network operating systems
Page 47 of 97
East Africa Institute Of Certified Studies 2015
plan and implement maintenance and upgrades for system software and hardware
maintain peripheral devices connected to the printer such as printers and scanners
have good oral and written communication skills and are active listeners
658.
663. A network consists of two or more computers that are linked in order to
share resources (such as printers and CDs), exchange files, or allow electronic
communications.
664. The computers on a network may be linked through cables, telephone lines,
radio waves, satellites, or infrared light beams
Page 48 of 97
East Africa Institute Of Certified Studies 2015
Facilitate communication via email, video conferencing, instant messaging, etc.
Enable multiple users to share a single hardware device like a printer or scanner
668. topology : The geometric arrangement of devices on the network. For example,
devices can be arranged in a ring or in a straight line.
669. protocols : The rules and encoding specifications for sending data. The protocols
also determine whether the network uses a peer-to-peer or client/server architecture.
670. media : Devices can be connected by twisted-pair wire, coaxial cables, or fiber
optic cables. Some networks do without connecting media altogether, communicating
instead via radio waves.
671. Different Types of Networks
Page 49 of 97
East Africa Institute Of Certified Studies 2015
673. A LAN is a network that is used for communicating among computer devices,
usually within small geographical area e.g. an office building or home. i.e. within
the same building or up to a radius 10m 5km.
LANs enable the sharing of resources such as files or hardware devices that may be needed by
multiple users
Is limited in size, typically spanning a few hundred meters,and no more than a mile
Is fast, with speeds from 10 Mbps to 10 Gbps
Requires little wiring, typically a single cable connecting to each device
Has lower cost compared to MANs or WANs
LANs can be either wired or wireless. Twisted pair, coax or fibre optic cable can be used in
wired LANs.
Every LAN uses a protocol a set of rules that governs how packets are configured and
transmitted.
Technical aspects
Network topology describes the layout of interconnections between devices and network
segments. At the Data Link Layer and Physical Layer, a wide variety of LAN topologies have
been used, including ring, bus, mesh and star, but the most common LAN topology in use today
is switched Ethernet.
Nodes in a LAN are linked together with a certain topology. These topologies include:
674. Bus
675. Ring
676. Star
677. LANs are capable of very high transmission rates (100s Mb/s to G b/s).
Page 50 of 97
East Africa Institute Of Certified Studies 2015
690. A metropolitan area network (MAN) is a large computer network that
usually spans a city or a
691. large campus. formed whenever clients are connected within a medium
seized area i.e. entire city within a radius of 10km
692. A MAN is optimized for a larger geographical area than a LAN, ranging
from several blocks of
693. buildings to entire cities.
694. A MAN might be owned and operated by a single organization, but it
usually will be used
695. by many individuals and organizations.
696. A MAN often acts as a high speed network to allow sharing of regional
resources.
697. A MAN typically covers an area of between 5 and 50 km diameter.
698. Examples of MAN: Telephone company network that provides a high speed
DSL to
699. customers and cable TV network
3 Wide Area Network (WAN)
700. WAN covers a large geographic area such as country, continent or even
whole of the world.
701. A WAN is two or more LANs connected together. The LANs can be many
miles apart.
702. To cover great distances, WANs may transmit data over leased high-speed
phone lines or
703. wireless links such as satellites.
704. Multiple LANs can be connected together using devices such as bridges,
routers, or gateways, which enable them to share data.
705. The world's most popular WAN is the Internet
706.
4 Personal Area Network (PAN)
707. A PAN is a network that is used for communicating among computers and
computer devices (including telephones) in close proximity of around a few meters
within a room
708. It can be used for communicating between the devices themselves, or for
connecting to a larger network such as the internet.
709. PANs can be wired or wireless
710. A personal area network (PAN) is a computer network used for
communication among computer devices, including telephones and personal digital
assistants, in proximity to an
711. individual's body.
712. The devices may or may not belong to the person in question. The reach of
a PAN is typically a few meters.
713. Advantages
Page 51 of 97
East Africa Institute Of Certified Studies 2015
Do multiple LAN and MAN connections with each other so very complex
network andthe global organization to stand out and management regulations
714. disadvantages
Low bandwidth, easy to lose connection, usually only suitable for online applications such
as e - mail, ftp, web ....
For Back-up and Support Networked computers can be used to take back-up of
critical data. In situations where there is a requirement of always-on computer, another
computer on the network can take over in case of failure of one computer.
Page 52 of 97
East Africa Institute Of Certified Studies 2015
720. The hardware components of a LAN consist of:
Cabling and connectors, for example, coaxial cable and BNC connector, Unshielded Twisted
Pair (UTP) and RJ-45 connector
Hub, concentrator, and more complicated network devices such as Bridge, LAN Switch and
Router
722. The software components of a LAN can be grouped into two categories:
NIC Drivers
Network Operating System for servers, for example, Novell Netware 4.1 or Microsoft
Windows NT
Network Operating System for clients (PCs/workstations), for example, Novell Netware
4.1 client or Microsoft Windows 95
Forwarding/routing & control software, for examples, transparent bridging, spanning tree
and IP routing software
726. A Network Interface Card, or NIC, is a circuit board inserted into each
network station (PC/workstation or server) to allow communication with other
stations. Depending on the stations, the bus of a NIC could be ISA, PCI, EISA,
MCA, S-busand so on.
Page 53 of 97
East Africa Institute Of Certified Studies 2015
727. What is a Hub?
728. A Hub is a central device used on star network topology that repeats or
amplifies signals, allowing the network to be lengthened or expanded with additional
stations. For example, an Ethernet hub normally has 8 or 12 or 16 RJ-45 ports, each
port can be connected to a PC or workstation or server. Also, the hubs BNC port can
be connected to a coaxial cable to lengthen the network.
730. A Bridge is a device used to connect two or more LANs. It operates at the
Media Access Control Layer (layer 2), checking and forwarding data packets
between different LANs.
734. A Router is a device that operates at the network layer (layer 3), routing data
between similar or dissimilar networks. A router is more powerful than a bridge or
LAN Switch because the router checks the network protocols and addresses (for
example, IP or IPX).
736. Network Management are functions that manage and control networks. It
consists of five major functions:
1 Fault Management
2 Accounting Management
3 Configuration Management
4 Performance Management
5 Security Management
Page 54 of 97
East Africa Institute Of Certified Studies 2015
738. SNMP, or Simple Network Management Protocol, is a standard protocol
adopted for the network management of Internet and TCP/IP based networks.
740. RMON are the functions that monitor the network performance, errors and
other summary information. RMON functions can be implemented in a network
device (HUB, LAN switch) or a station (PC, Server).
746. A RMON software probe is a RMON-like software that runs on PCS. The
software can do the function of monitoring the network traffics, errors and other
statistics. It can also store the records for later analysis.
748. In order to create an Ethernet network, certain components are necessary for
the computers within the network to communicate with each other. The required
components to create an Ethernet network are:
Ethernet hub
Page 55 of 97
East Africa Institute Of Certified Studies 2015
Thin Ethernet (Thinnest) coaxial cable (usually provided)
750. A Network Interface Card (NIC) is an add-on adapter card that is installed to
the PCI or ISA slot on the PCs motherboard. The NIC sorts data on the computer
into bundles and transmits them to another computer while allowing the user to
access the data within the bundle simultaneously. The most common NIC used today
is the 10Base-T Ethernet card that is connected to an Ethernet hub.
751. Hub
752. All Ethernet 10Base-T networks are connected with an Ethernet hub. The hub
manages the traffic that passes between computers on a network and is connected to
all computers that are part of the network.
755. Most network interface cards today have PnP (Plug and Play) capability. The
following procedures assume that your NIC is PnP-compatible and that your PCs
operating system is Windows 95. Once the NIC is installed and you have powered
on your computer, Windows 95 will automatically detect the new modem and
assist you with its configuration. If this is not the case, refer to the documentation
that came with your NIC for proper configuration procedures such as setting IRQ
settings.
756.
767. The ability to exchange data and communicate efficiently is the main purpose
of networking computers. But we have to consider beyond these points to evaluate
the feasibility of networking for our own advantages.
A computer network can be identified as a group of computers that are interconnected for sharing
data between them or their users. There is a wide variety of networks and their advantages and
disadvantages mainly depend on the type of network.
771. This is one of the major advantages of networking computers. People can
find and share information and data because of networking. This is beneficial for
large organizations to maintain their data in an organized manner and facilitate
access for desired people.
775. Users can share software within the network easily. Networkable versions of
software are available at considerable savings compared to individually licensed
version of the same software. Therefore large companies can reduce the cost of
buying software by networking their computers.
776. 5. Security
777. Sensitive files and programs on a network can be password protected. Then
those files can only be accessed by the authorized users. This is another important
Page 57 of 97
East Africa Institute Of Certified Studies 2015
advantage of networking when there are concerns about security issues. Also each
and every user has their own set of privileges to prevent them accessing restricted
files and programs.
778. 6. Speed
779. Sharing and transferring files within networks is very rapid, depending on the
type of network. This will save time while maintaining the integrity of files.
786. Security threats are always problems with large networks. There are hackers
who are trying to steal valuable data of large companies for their own benefit. So it is
necessary to take utmost care to facilitate the required security measures.
788. In a network there are users who consume a lot more bandwidth than others.
Because of this some other people may experience difficulties.
Page 58 of 97
East Africa Institute Of Certified Studies 2015
Money. A linear bus network may be the least expensive way to install a network; you do
not have to purchase concentrators.
Length of cable needed. The linear bus network uses shorter lengths of cable.
Future growth. With a star topology, expanding a network is easily done by adding another
concentrator.
Cable type. The most common cable in schools is unshielded twisted pair, which is most
often used with star topologies.
1 Bus Topology: All the devices/nodes are connected sequentially to the same backbone or
transmission line. This is a simple, low-cost topology, but its single point of failure presents
a risk.
795.
796.
Page 59 of 97
East Africa Institute Of Certified Studies 2015
2 Star Topology: All the nodes in the network are connected to a central device like a hub or
switch via cables. Failure of individual nodes or cables does not necessarily create downtime
in the network but the failure of a central device can. This topology is the most preferred and
popular model.
797.
More expensive than linear bus topologies because of the cost of the hubs, etc.
800.
801.
802.
3 Ring Topology: All network devices are connected sequentially to a backbone as in bus
topology except that the backbone ends at the starting node, forming a ring. Ring topology
shares many of bus topology's disadvantages so its use is limited to networks that demand
high throughput.
803. Advantages
Page 60 of 97
East Africa Institute Of Certified Studies 2015
804. See also: Ring Protection
Very orderly network where every device has access to the token and the opportunity to
transmit
Does not require a central node to manage the connectivity between the computers
Due to the point to point line configuration of devices with a device on either side (each
device is connected to its immediate neighbor), it is quite easy to install and reconfigure
since adding or removing a device requires moving just two connections.
Point to point line configuration makes it easy to identify and isolate faults.
805. Disadvantages
One malfunctioning workstation can create problems for the entire network. This can be
solved by using a dual ring or a switch that closes off the break.
Moving, adding and changing the devices can affect the network
More difficult to configure than a Star: node adjunction = Ring shutdown and
reconfiguration
806.
4 Tree Topology: A tree topology combines characteristics of linear bus and star topologies. It
consists of groups of star-configured workstations connected to a linear bus backbone cable
(See fig. 3). Tree topologies allow for the expansion of an existing network, and enable
schools to configure a network to meet their needs.
Page 61 of 97
East Africa Institute Of Certified Studies 2015
Point-to-point wiring for individual segments.
809. .An example of this network could be cable TV technology. Other examples
are in dynamic tree based wireless networks for military, mining and otherwise
mobile applications.[
810.
811.
5 Mesh Topology: The topology in each node is directly connected to some or all the other
nodes present in the network. This redundancy makes the network highly fault tolerant but
the escalated costs may limit this topology to highly critical networks.
Page 62 of 97
East Africa Institute Of Certified Studies 2015
812.
813.
814.
815.
816.
Page 63 of 97
East Africa Institute Of Certified Studies 2015
820. Device that enables computers to communicate through phone lines.
Computer
Software
E-Commerce
File Sharing
Information browsing
Page 64 of 97
East Africa Institute Of Certified Studies 2015
Disadvantages of Internet
Theft of personal information such as name, address, credit card number etc.
Virus threats nothing but a program which disrupts the normal functioning of your
system.
Spamming refers to receiving unwanted e-mails in bulk, which provide no purpose and
needlessly obstruct the entire system.
Pornography This is perhaps the biggest threat related to childrens healthy mental life.
A very serious issue concerning the Internet.
Though, internet can also create havoc, destruction and its misuse can be very fatal,
INTRANET is a private network connection or a website that connects computers only within an
organization or a company that does not connect directly to the internet. Giving privacy to data to
avoid hacking by unauthorized people.
Intranet Security
Two levels of Security required:
Internal
External
Through Firewall.
Applications of Intranet
Chat Systems:
Software that enables two or more users at networked PCs to carry on online, real-time
text conversations.
Data Conferencing:
Data conferencing is a method where a groupware package connects two or more PCs
over the Internet or intranets so a team can share, mark up, and review a whiteboard of
drawings, documents, and other material displayed on their screens.
Desktop Videoconferencing:
The use of end user computer workstations to conduct two-way interactive
videoconferences.
Discussion Forums:
Provide an online network discussion platform to encourage and manage online text
discussions over a period of time among members of special interest groups or project
teams.
Electronic Mail:
Sending and receiving text messages between networked PCs over telecommunications
networks. E-mail can also include data files, software, and multimedia messages and
documents as attachments.
Workforce productivity: Intranets can help users to locate and view information faster
and use applications relevant to their roles and responsibilities. With the help of
browser interface, users can access data held in any database the organization wants to
make available, anytime and - subject to security provisions - from anywhere within the
company workstations, increasing employees' ability to perform their jobs faster, more
accurately, and with confidence that they have the right information.
Disadvantages
Management problem:
A company may not have person to update their Intranet on a routine basis
Security problem
Unauthorized acescs
Abuse of access
Denial of service
Productivity problem
Less back-end integration -With Intranets, firms have to set up and maintain separate
applications such as E-mail and Web servers, instead of using one unified system as with
groupware
Extranet
EXTRANET is an extension of an organizations intranet that can be accessed by users outside the
organization, usually partners, vendors, and suppliers with a username and password to access
the intranet.
Examples
Dealers/distributors have access to product files such as :-
i. product specification,
ii. pictures,
iii. images, etc.
to answer the queries of the customer.
Components of extranets ..
Some basic infrastructure components such as the internet Including :-
TCP/IP protocols,
E-mail,
Web-browsers,
External business partners &
Tele-commuting employees place order, check status & send E-mail.
Benefits of Extranet
Improved quality.
lower travel costs.
lower administrative & other overhead costs.
reduction in paperwork.
delivery of accurate information on time.
improved customer service.
better communication.
overall improvement in business
effectiveness.
Disadvantages
The suppliers & customer who dont
have technical knowledge feel problem.
Faceless contact.
Information can be misused by other competitors.
Fraud may be possible.
Technical Employees are required.
The computer is a great tool to store important information. In certaincases, the information is
very vital that losing it will harm the computersystem.
Computer threats can come from many ways either from human or naturaldisasters. For example,
when someone is stealing your account informationfrom a trusted bank, this threat is considered
as a human threat. However,when your computer is soaked in heavy rain, then that is a natural
disaster
threat.
MALICIOUS CODE
Malicious code is also known as a rogue program. It is a threat to computing assets by causing
undesired effects in the programmers part. The effect is caused by an agent, with the intention to
cause damage.
The agent for malicious code is the writer of the code, or any person who causes its distribution.
There are various kinds of malicious code. They include virus, Trojan horse, logic door, trapdoor
and backdoor, worm and many others
a) VIRUS
a program that can pass on the malicious code to other programs by modifying them attaches
itself to the program, usually files with .doc, .xls and .exe extensions destroys or co-exists with
the program can overtake the entire computing system and spread to other systems
b) TROJAN HORSE
a program which can perform useful and unexpected action must be installed by users or
intruders before it can affect the systems assets an example of a Trojan horse is the login script
that requests for users login ID and password
the information is then used for malicious purposes
c) LOGIC BOMB
logic bomb is a malicious code that goes off when a specific condition occurs.
an example of a logic bomb is the time bomb it goes off and causes threats at a specified time
or date
e) TRAPDOOR OR BACKDOOR
a feature in a program that allows someone to access the program with special privileges
f) WORM
a program that copies and spreads itself through a network
HACKER
Hacking is a source of threat to security in computer.
It is defined as unauthorised access to the computer system by a hacker.
Hackers are persons who learn about the computer system in detail. They write program referred
to as hacks. Hackers may use a modem or cable to hack the targeted computers.
NATURAL AND ENVIRONMENTAL THREATS
Computers are also threatened by natural or environmental disaster. Be it at home, stores, offices
and also automobiles.Examples of natural and environmental disasters:
Flood
Fire
Earthquakes, storms and tornados
Excessive Heat
Inadequate Power Supply
SECURITY MEASURES
Today, people rely on computers to create, store and manage critical information. It is important
that the computer and the data they store are accessible and available when needed. It is also
important that users take measures to protect their computers and data from lost, damage and
misused.
Security measures mean the precautionary measures taken toward possible danger or damage.
There are 6 type of security measures.
1) DATA BACKUP
Data Backup is a program of file duplication. Backups of data applications are necessary so that
they can be recovered in case of an emergency.
2) CRYPTOGRAPHY
Cryptography is a process of hiding information by altering the actual information into different
representation, for example, an APA can be written as I ?
Almost all cryptosystems depend on a key such as a password like the numbers or a phrase that
can be used to encrypt or decrypt a message.
4) ANTI-SPYWARE
Spyware is a program placed on a computer withoutthe users knowledge. It secretly collects
informationabout the user.
The spyware program communicates information to the outside source.
An anti-spyware application program sometime called tracking software or a spybot is used to
remove spyware.
Among of the popular anti-spyware programs are:
Spybot Search and Destroy
Ad-aware
Spyware Blaster
5) FIREWALL
Firewall is a piece of hardware or software which functions in a networked environment to
prevent somecommunications forbidden by the security policy.
Firewall implement a security policy. It might permit limited access from in or outside the
network
perimeters or from certain user or for certain activities
6) HUMAN ASPECTS OF SECURITY MEASURES
Human aspects refer to the user and also the intruderof a computer system.
It is one of the hardest aspects to give protection to.
The most common problem is the lack of achieving a good information security procedure
ICT ETHICS
Ethics is a set of moral principles that govern the behavior of a group or individual.
computer ethics is set of moral principles that regulate the use of computers
Code of Ethics Is a guideline in ICT that help determine whether a specific computer
action is ethical or unethical
Intellectual Is works created by inventors, authors and artists
Property
Privacy Refers to the right of individuals and companies to deny or restrict the
collection and use of information about them
Computer Is any illegal acts involving computers
Crime
Cyber Law Is any laws relating to protect the Internet and other online communication
technologies
Some common issues of computer ethics include intellectual property rights such as copyrighted
electronic content, privacy concerns, and how computers affect society
For example, while it is easy to duplicate copyrighted electronic or digital content, computer
ethics would suggest that it is wrong to do so without the author's approval.
And while it may be possible to access someone's personal information on a computer system,
computer ethics would advise that such an action is unethical
ETHICS LAW
Computers users are free to follow or ignore Computers users must follow the regulations
the code of ethics and law
Universal, can be applied anywhere, all over Depend on country and state where the
the world crime is committed
To produced ethical computers users To prevent misuse of computers
Not following ethics are called immoral Not obeying laws are called crime
INTELLECTUAL
You have certainly heard the word property before: it is generally used to mean a possession, or
more specifically, something to which the owner has legal rights.
You might have also encountered the phrase intellectual property. This term has become more
commonplace during the past few years, especially in the context of computer ethics. But what
exactly does it refer to?
Intellectual property refers to creations of the intellect (hence, the name): inventions, literary and
artistic works, symbols, names, images, and designs used in commerce are a part of it.
Intellectual property is usually divided into two branches, namely industrial property which
broadly speaking protects inventions and copyright, which protects literary and artistic works.
Copyright, which includes literary and artistic works such as novels, poems and plays,
films, musical works, artistic works such as drawings, paintings, photographs, sculptures,
and architectural designs.
Copy rights
Copyright is a legal concept, enacted by most governments, giving the creator of an original
work exclusive rights to it, usually for a limited time
Copyright came about with the invention of the printing press and with wider public literacy. As
a legal concept, its origins in Britain were from a reaction to printers' monopolies at the
beginning of the 18th century. Charles II of England was concerned by the
unregulated copying of books and passed the Licensing of the Press Act 1662 by Act of
Parliament.
In summary, copyright laws protect intellectual property which includes literary and artistic
works such as novels, poems and plays, films, musical works, artistic works such as drawings,
paintings, photographs and sculptures, and architectural designs.
But unlike protection of inventions, copyright law protects only the form of expressions of
ideas, not the ideas themselves.
Remember that a created work is considered protected as soon as it exists, and a public register
of copyright protected work is not necessary
But what of works made available to the public on the Internet? Are they at all protected
by copyright? Once again, yes! For works made available over a communications
network (such as the Internet), the copyright protects original authorship.
But, according to the Copyright Law, it does not protect ideas, procedures, systems, or
methods of operation. This means that once such an online work has been made public,
nothing in the copyright laws prevents others from developing another work based on
similar principles, or ideas
NETIQUTTES
Netiquette are about the the various risks related to using the Internet.
It is about proper ways in which to use a network and to determine whether information is
reliable, while emphasizing four important points given in next slides.
Keep these other people in mind when you say something on a network.
Just as you would in the real world, be aware of risks, fraud and false information which
exists on the Internet. Use common sense when deciding whether information is valid.
Don't trust or spread further any information about which you are in doubt. Always try to
obtain reliable information.
Protect your personal information to keep someone from using it in an unethical way.
(For example, when you enter a prize contest, your name, address, and phone number
may be given to a dealer of personal information.)
Authentication
AVOID SPAMMING
Spamming is sending unsolicited bulk and/or commercial messages over the Internet.
Spamming is morally bad if it is intended to destroy and done by infringing on the right
of privacy of others.
It could be good if the message sent benefits the recipients, like giving out warnings or
useful information to others
The existence of the information society is based on give and take. Making a contribution is an
essential part of being a good network user. For example, if you make a request and find the
information you receive helpful, write a summary and report what you learned , publish it on the
Net or give links to others.
SOFTWARE PRIVACY
Software piracy is morally bad when someone reproduces a copy of the software and
sells it for profit, produces exactly the same or similar version without giving proper
credit to the original author, or simply produces it and distributes it to others.
It is not immoral to copy the software if someone who has a licensed copy of the software
and simply makes a backup copy of the original. One back-up copy of the commercial
software can be made, but the back-up copy cannot be used except when the original
package fails or is destroyed.
However, it could be used like a vaccine poison to kill another poison to cure or
prevent a potentially destructive system from wreaking havoc in the network. The way
some worms and viruses work could be used to gather information that could help protect
the majority of computer users.
PLAGIARISM
Plagiarism is copying someone else's work and then passing it off as one's own. It is
morally bad because it is an act of stealing.
Copying programs written by other programmers and claiming it as your own could be an
act of plagiarism. It involves lying, cheating, theft, and dishonesty.
FILE PRIVACY
Any computer document produced either by an individual in his private home or in his office
should remain private. No one has should open any document unless authorized by the individual
who created the file himself.
User identification
Examples:
pin number
password
Possessed object
Is a any item that you must carry to gain access to computer of computer facility
Examples:
ATM card
credit card
smart card
Biometric device
Is a device that translates personal characteristics into digital code that is compared
with the digital code stored in the database
Examples:
fingerprint reader
iris scanner
PORNOGRAPHY SLANDER
is any form media or material (like books, video is a false spoken statement
or photos) that show erotic behavior and about someone, intended to
intended to cause sexual excitement damage his or her reputation
the effects of pornography on society are: the effects of slander on
i) Can lead to criminal acts such as exploitation society are:
of women i) Can develop society that
ii) Can lead to sexual addiction disregards on honesty and
iii) Can develop lower moral values towards truth
other people ii) Can lead to bad habits of
iv) Can erode good religious, cultural, behaviors spreading rumors and untruth
and beliefs iii) Can cause people to have
nagative attitudes toward
another person
An ethical hacker is usually employed by an organization who trusts him or her to attempt to
penetrate networks and/or computer systems, using the same methods as a hacker, for the
purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e.,
gaining access to computer systems without prior authorization from the owner) is a crime in
most countries, but penetration testing done by request of the owner of the victim system or
network is not.
A Certified Ethical Hacker has obtained a certification in how to look for the weaknesses and
vulnerabilities in target systems and uses the same knowledge and tools as a hacker.
ii) To give protection against the misuse of computers and computer criminal
activities
iii) Hacking into your school's database to change your examination results
i) Computer fraud - is the crime of obtaining money by deceiving (to trick) people
through the use of computers such as email hoaxes, program fraud, investment schemes
and claim of expertise on certain fields
iv) Computer attack is defined as any activities taken to disrupt the equipments of
computers systems, change processing controls and corrupt stored data
NB: As technology advances, computers continue to have a greater impact on society. Therefore,
computer ethics promotes the discussion of how much influence computers should have in areas
such as artificial intelligence and human communication. As the world of computers evolves,
computer ethics continues to create ethical standards that address new issues raised by new
technologies.
With the advancement of ICT, it is easy for anyone to retrieve your information from
the Internet. You may not realise that when you fill a form on the Internet, your
information may be exposed and stolen.
Intellectual property refers to any product of human intellect that is unique and has
value in the market place. This covers ideas, inventions, unique name, computer
program codes and many more.
ETHICAL COMPUTER CODE OF CONDUCTS
Examples of ethical computer code of conducts include:
SOCIAL RESPONSIBILITIES
Social responsibility is an ethical framework which suggests that an entity, be it an organization
or individual, has an obligation to act for the benefit of society at large. Social responsibility is a
duty every individual has to perform so as to maintain a balance between the economy and the
ecosystems
Include:
Valuing diversity
To many people, responsibilities to consumers may be seen as no more than a natural outcome
of good business. There are, however, broader social responsibilities including providing good
value for money; the safety and durability of products or services; standard of after-sales
service; prompt and courteous attention to queries and complaints; long-term satisfaction, for
example serviceability, adequate supply of products or services, and spare and replacement
parts; fair standards of advertising and trading; full and unambiguous information to potential
customers. Increasing concern for social responsibilities to consumers can be seen by the
activities of such bodies as the Consumers Association, and the number of television and radio
programmed devoted to this subject.
To having the action of social responsibility of an organization would lead to their suppliers,
and business associates more confidence to the organization. The examples of social
responsibility might include: fair standards of trading, honoring terns and conditions of
purchase or sale, and settlement dates, for example payment of accounts, assistance to smaller
organization; engagement only in fair competition; respect for copyright and patents. By doing
that, the other organizations would view the company as less risky. This is in the stockholdrs
best interest. It will improve the price of stock in the long run because the stock market will
views the company as less risky and open to public attack. So, it would reduce the cost of the
production of the company. Therefore award it a high price-earnings ratio.
Organizations have a responsibility not to misuse the scarce factors of production upon which
the wealth of the country depends. Organizations have a responsibility to society, to respect
environmental considerations and take care of amenities. For example, the effects and
potential dangers of pollution, noise, disposal of waste; the siting and appearance of new
buildings; transportation policies, such as the routing of heavy vehicles through narrow village
roads; and avoidance of excessive packaging and more use of biodegradable materials. All of
that must be think off since the decision making of the organizations to have their process of
production. For example, is the protest against aerosol sprays containing chlorofluorocarbons.
These have been blamed for damaging the ozone layer, which protects the earth from harmful
ultraviolet rays from sun. Organizations should, of course, respect and obey the law which is
set up of government even where they regard it as not in their best interests. But what is
debatable is the extent to which organizations should co-operate voluntarily with actions
requested by the government. Some examples are: restraint from trading with certain overseas
countries, and the acceptance of controls over imports or exports; actions designed to combat
inflation.
The measurement of social investment deals with the degree to which the organization is
investing both money and human resources to solve community social problems. Here, the
organization could be involved in assisting community organizations dedicated to education,
charities, and the arts.
CSR is part of Imtechs core business . Imtech focuses its corporate activities on value creation
in the longer term in the three dimensions people, planet and profit, and enters into a dialogue on
this with its stakeholders.
Imtech uses its strong position for the benefit of a sustainable society. The world is looking at
organisations like Imtech for solutions to the problems of today and tomorrow. Every day,
Imtech proves its claim of Technology that improves society. Time and time again with literally
hundreds of green projects and numerous appealing internal CSR initiatives.
Frontrunner in sustainability
Imtech aims to be a frontrunner in sustainability. Imtech CEO Ren van der Bruggen: Society is
becoming greener at an increasingly high pace. Technology leads the way in this development.
The trend towards green technical infrastructure started in the energy and buildings sector.
This was followed by green data centres and now, this trend manifests itself in the markets for
marine technology, in the industrial sector and in the market for traffic technology. Imtech is a
leading player in all of these markets. As a technical service provider with an ability to deliver
green total solutions through the combination of electrical engineering, IT and mechanical
engineering, we provide our clients with all possible options that enable sustainable growth.
The governance of the CSR policy has been arranged at the highest level in the organisation and
is the responsibility of the Board of Management. The Board directs an international steering
committee made up of responsible managers from each division. The members of the steering
committee are authorised to jointly determine the CSR policy, and to implement the activities
that derive from this policy in the various business units. Imtech NV implements the ISO26000
guidelines. CSR principles are an integral component of the companys HR policy and business
principles.
COMPUTER SECURITY
We need to protect our computer from any intruders such as hackers, crackers and script kiddie.
We do not want strangers to read our e-mail, use our computer to
attack other systems, send forged e-mail from our computer, or examine personal information
stored on our computer such as financial statements.
a) hardware security
a) HARDWARE SECURITY
Hardware security refers to security measures used to protect the hardware specifically the
computer and its related documents.
The examples of security measures used to protect the hardware include PC-locks, keyboard-
locks, smart cards and biometric devices.
b) SOFTWARE AND DATA SECURITY Software and data security refers to the security
measures used to protect the software and the loss of data files.
Examples of security measures used to protect the software are activation code and serial
number.
loss of data files is the disaster recovery plan method. The idea of this plan is to store data,
program and other important documents in a safe place that will not be affected by any major
destruction.
c) NETWORK SECURITY
The transfer of data through network has become a common practice and the need to implement
network security has become significant.
Network security refers to security measures used to protect the network system. One example of
network security measures is firewall. With firewall, network resources can be protected from
the outsiders.
WHAT IS PRIVACY?
Every time you click on an advertisement or register a software product online, your
information is entered into a database. Computer technology can also threaten
privacy through spam. Do you know what spam is? Spam is unsolicited e-mail
messages, advertisements or newsgroup postings sent to many recipients at once.
It is done through:
Cookies
Electronic
profile
Spyware
Cookies
Electronic profile
electronic profile is the combining of data in a database that can be sold to the Internet by
the company to the interested parties.
this database is in a form such as magazine subscription or product warranty cards that
had been filled by online subscribers.
the information in electronic profile includes
Spyware
refers to a program that collects user information without the users knowledge.
can enter computers, sneaking in like a virus. is a result of installing new
programs.
communicates information it collects to some outside source while we are online.
We need privacy for anonymity. For example, the Internet creates an elaborate trail of data
detailing a person surfing on the Web because all information is stored inside cookies. We do not
want our trail to be detected.
We also need privacy for confidentiality. For example, online information generated in the course
of a business transaction is routinely used for
a variety of other purposes without the individuals knowledge or consent.
We do not want our private lives and habits exposed to third parties.
Critical Thinking :
Creative Thinking:
It is an ability that helps us look beyond our direct experience and address issues in a perspective
which is different from the obvious or the norm. It adds novelty and flexibility to the situation of
our daily life.
Decision Making
The process of making assessment of an issue by considering all possible options and the effects
different decision might have on them.
Problem solving
Having made decisions about each of the options, choosing the one which is the best suited,
following it through the process again till positive outcome of the problem achieved.
Interpersonal Relationships
It is a skill that helps us to understand our relations with others and relate in a positive manner
with them. It helps us to maintain relationship with friends and family member and also be able
to end relationship constructively.
Effective Communication:
It is an ability, which involves recognizing emotions in others, and ourselves, being aware of
how emotions influence behaviors and being able to respond to emotions appropriately.
Self awareness:
Includes our recognition of ourselves, our character, strengths and weaknesses, desires and
dislikes. It is a pre-requisite for effective communication, interpersonal relationship and
developing empathy.
Empathy:
Is an ability to imagine what life is like for another person even in a situation that we may not be
familiar with. It helps us to understand and accept others and their behavior that may be very
different from ourselves.
Conflict is when two or more values, perspectives and opinions are contradictory in nature and
haven't been aligned or agreed about yet, including:
1. Within yourself when you're not living according to your values;
2. When your values and perspectives are threatened; or
3. Discomfort from fear of the unknown or from lack of fulfillment.
Conflict is inevitable and often good, for example, good teams always go through a "form, storm,
norm and perform" period. Getting the most out of diversity means often-contradictory values,
perspectives and opinions.
Mediation:
The goal is to identify multiple possible select one that is acceptable to all
involved parties and in the interest of project objectives.
Arbitration:
This strategy requires the project manager to provide a safe and productive
opportunity for the conflicted parties After careful attention and fully
listening to each party, the project manager should formulate, define, and
provide a solution to the parties. This strategy is based on the forcing
approach to conflict described earlier. Arbitroften be effectivelycombined
with mediation by forcing an initial conflict solution and then allowing the
parties to negotiate to a more mutually acceptable alternative
Control:
Based on the smoothing approach described earlier, this strategy to bring tension and emotions
down to a level at which productive discussion and negotiation canoccur. Humour is often an
effective tool, as well as the use of temporary breaks or time parties.
Acceptance:
The decision can be made that the conflict consequences are negligible
relative to project objectives and, therefore, require no action. This strategy
carries significant risk of later escalation and should be combined with
specific plans for monitoring the situation to ensure that the conflict remains
at an acceptable level
Elimination:
Finally, the elimination strategy is reserved for those conflicts that have
become so dysfunctional that the project can no longer tolerate any impacts
from them. elimination involves the removal of the conflicted parties from
involvement with the project.
Types of Managerial Actions that Cause Workplace Conflicts
1. Poor communications
a. Employees experience continuing surprises, they aren't informed of new
decisions, programs, etc.
b. Employees don't understand reasons for decisions, they aren't involved in
decision-making.
c. As a result, employees trust the "rumor mill" more than management.
1. Regularly review job descriptions. Get your employee's input to them. Write down and date
job descriptions. Ensure:
a. Job roles don't conflict.
b. No tasks "fall in a crack".
5. Develop procedures for routine tasks and include the employees' input.
a. Have employees write procedures when possible and appropriate.
b. Get employees' review of the procedures.
c. Distribute the procedures.
d. Train employees about the procedures.
6. Regularly hold management meetings, for example, every month, to communicate new
initiatives and status of current programs.
There is no one best way to deal with conflict. It depends on the current situation. Here are the
major ways that people use to deal with conflict.
1. Avoid it. Pretend it is not there or ignore it.
a. Use it when it simply is not worth the effort to argue. Usually this approach tends
to worsen the conflict over time.
2. Accommodate it. Give in to others, sometimes to the extent that you compromise yourself.
a. Use this approach very sparingly and infrequently, for example, in situations
when you know that you will have another more useful approach in the very
near future. Usually this approach tends to worsen the conflict over time, and
causes conflicts within yourself.
3. Competing. Work to get your way, rather than clarifying and addressing the issue. Competitors
love accommodators.
a. Use when you have a very strong conviction about your position.
2. Get perspective by discussing the issue with your friend or by putting it down in writing.
Consider:
a. How important is this issue?
b. Does the issue seem worse because you're tired, angry at something else, etc.?
c. What's your role in this issue?
4. Then do something.
a. Wait at least a day before you do anything about the conflict. This gives you
a cooling off period.
b. Then take an action.
c. Have in your own mind, a date when you will act again if you see no clear
improvement.
1. Know what you don't like about yourself, early on in your career. We often don't like in others
what we don't want to see in ourselves.
a. Write down 5 traits that really bug you when see them in others.
b. Be aware that these traits are your "hot buttons".
2. Manage yourself. If you and/or the other person are getting heated up, then manage yourself to
stay calm by
a. Speaking to the person as if the other person is not heated up - this can be very
effective!
b. Avoid use of the word "you" - this avoids blaming.
c. Nod your head to assure them you heard them.
d. Maintain eye contact with them.
3. Move the discussion to a private area, if possible.
5. Verify that you're accurately hearing each other. When they are done speaking:}
a. Ask the other person to let you rephrase (uninterrupted) what you are hearing from
them to ensure you are hearing them.
b. To understand them more, ask open-ended questions. Avoid "why" questions -
those questions often make people feel defensive.
6. Repeat the above step, this time for them to verify that they are hearing you. When you present
your position
a. Use "I", not "you".
b. Talk in terms of the present as much as possible.
c. Mention your feelings.
8. Work the issue, not the person. When they are convinced that you understand them:
a. Ask "What can we do fix the problem?" They will likely begin to complain again.
Then ask the same question. Focus on actions they can do, too.
9. If possible, identify at least one action that can be done by one or both of you.
a. Ask the other person if they will support the action.
b. If they will not, then ask for a "cooling off period".