Technology For Success Mod 1
Technology For Success Mod 1
Creative responses
Explain the impact of the “Internet of Things” and Virtual Reality (VR) - The use of computers to
embedded computers simulate a real or imagined environment that
appears as a three-dimensional (3-D) space.
Discover uses for artificial intelligence
Augmented Reality (AR) - A type of VR that
Explore the impact of virtual reality
uses an image of an actual place or things that
adds digital information to it.
Next generation – replaced vacuum tubes with Use technology in daily life
transistors
Use technology to enhance productivity and
1960s – integrated circuits learning
1970s and 1980s – the personal computer (pc) Apply green computing concepts to daily life
gained popularity
Small and have limited hardware but enhance the Use Technology to Enhance Productivity
capabilities of everyday devices
Robotics
Artificial Intelligence (AI) Robotic arms and cameras can assist surgeons
The technological use of logic and prior experience Enterprise computing—each department of a
to simulate human intelligence large company uses technology specific to its
function
Capabilities
Explore how you might prepare for a career in
technology
Technology to Assist Users with Disabilities
Laws
IT consulting
Green Computing Concepts
Software and apps
Green Computing
Technology equipment
Reducing electricity and environmental waste
generated from technology IT departments
-Telecommuting
List the ways that professionals might use -Use of smartphones, the Internet, the cloud
technology in the workplace
Intelligent workplace
Explain the ways that teachers might use
Some companies use a BYOD (bring your own
technology in K-12 education
device) policy
Explain how various transportation services
Online collaborative productivity software
utilize technology to their advantage
-Proofread everything
Technology in Healthcare
-Professional social networks
Physicians use computers to monitor patients’
vital signs and research symptoms and Certifications
diagnoses
-Demonstrates knowledge in a particular area
Mobile health (mHealth) (software, hardware, operating systems, etc.)
3-D printers
Technology in Manufacturing
Computer-aided manufacturing
(CAM)—streamlines production and and allows
for shipping products more quickly
-Server address
-Pathname
-File name
Web server
-IP address
-Domain name
Address bar
Cache
The Web
Internet
Webpage
Website
Explain the pros and cons of web apps Identify Secure and Insecure Websites
Lock icon
Categories
Use E-Commerce
Pros
The Major Components of a Webpage
Variety
Five Major Areas
Convenience
Header
Budget
Navigation bar
Cons
Body
Security Use search tools and strategies
Indirect experience
Pricing can vary based upon the level of service -Navigate many sources of information, including the
provided, negotiated terms, and other factors Internet, online libraries, and popular media sites.
A team of people often review and make a -Select the right tool for finding the information you
purchasing decision need.
-Coupons
Use Search Tools and Strategies
Use a word stem to help broaden results Use Specialty Search Engines
Refine Web Searches Let one search information sources that general
search engines do not always access
Learning from the Search Engine Results Page
(SERP)
Subject filters
Time filters
Citing Sources
Each type of information source uses a different Technology for Success: Computer Concepts
citation style Module 3
Failure to cite sources, even if some of the words are Computer Hardware
changed or paraphrased, is plagiarism
Machine cycle
Storage Devices
Computer Memory
Storage Solutions
Input and Output Devices
Hard Drives
Optical media
Cloud Storage
All-in-one Computer
Experiment with Input Devices
Monitor and system unit are housed together
Input Devices
Take up less space and easier to transport
Keyboard
Typically more difficult to service or upgrade
Pointing device
More expensive than desktops
Mouse
Mobile Device
Touchpad
Portable or handheld computing device
Trackball
Tablet
Touchscreen/multitouch screens
Less powerful
Pen Input
Not upgradeable
Stylus
Digital Pen
Hardware to Consider When Purchasing a
Computer Microphone
Cameras/webcam
Scanner
Game controller Plug-and-play
Gamepad
Earbuds
Measure the Performance of Computer Hardware
Headsets
Computer Performance
Projectors
Processor clock speed
Voice synthesizer
Bus width/word size
Printers
Benchmark
Ink-jet
Laser
Troubleshooting Hardware Problems
Multifunction device (MFD)
Common Hardware Problems
Mobile
Device does not turn on
Plotter
Battery issues
3-D
Computer issues a series of beeps when turned
on
How to Install Computer Hardware Operating system does not run
Installation Monitor does not display
Ideal location Keyboard/mouse does not work
Check for all necessary components Wet keyboard no longer works
Free from damage Speakers do not work
Connect all components and accessories, then Hard drive makes noise
connect power
Fan issues
Turn on computer, follow on-screen steps
Device is too hot
Peripherals
Cannot read from optical disc
Liquid damage Display issues
Slow performance
Screen damage
Touchscreen unresponsive
Regular Maintenance
Surge suppressor
Restoring a Device
Backup files
Module 4
Platform
Managing programs
Managing memory
Coordinating tasks Mobile Operating Systems
Configuring devices
Monitoring performance
Utilities File
File format
Folder
Library
Volatile memory
Steps in the Boot Process Selecting items to appear in the Notification area
Change language/dialect
Title bar at the top displays the name of the Shortcut menu
app, file, or folder shown in the window
Dialog box
Buttons
-Option/radio buttons
Maximize
-Check boxes
Minimize
-List boxes
Close
Run More than One Operating System
Restore Down
Virtual machine
Vertical and horizontal scroll bars
Requires an app that is specifically designed to
Multiple windows can be open at once and set up and manage virtual machines
appear side-by-side or stacked
Installation files for the operating system to run
The active window is the one currently on the virtual machine are also required
being used
Runs on a partition
Windows can be resized and dragged to
Manage User Accounts
new locations
User accounts identify the resources a user can
Program window
access when working with the computer
Folder window
Protect your computer against unauthorized
access
Resources
Save Files to Folders and Filing Systems To open a saved file, navigate to the file’s
location using the file manager or the Open
Name the file
dialog box from within a program or app.
Save to the computer, flash drive, or cloud Double-click it or select it and click the Open
button.
If creating or editing a file, it should be saved
frequently
Files you work on using a web app save Manage Folder Names and Folder Placement
changes as you make them
You can create a new folder in a file manager
Use the Save As or Save a Copy dialog box to such as File Explorer or Finder
save a file with a new name or in a new
To create a folder, click the New folder button in
location
your file manager. The folder name by default is
“New folder.” To rename the folder something
meaningful, select the folder and click it again to
Determine File Properties make it editable, then type the name and enter.
Every file has properties, such as name, type, Within file manager, you can move, copy, and
location, and size delete folders the same as a file
Dates: when the file was created, modified, last
accessed
Organize Files Using File Management Tools
The operating system assigns some properties
to files, such as type or format, and updates File Management
other properties, such as date, size, and
Windows 10: File Explorer
location
macOS: the Finder
File Placement
Types of Apps
App Features
Productivity apps: allow one to create An app store is used to find and download apps
documents for business and personal use
Can take advantage of specific features of the Use Common Features of Productivity Apps
devices on which they are installed
Understand the features of common
Many require an Internet connection to productivity suites
provide full functionality. Some can run offline
Use word processing software for basic word
and will store information on your device until
processing functions
they can synchronize with the cloud.
Use spreadsheet software to manage basic
Web Apps
workbooks
Accessed by visiting a website in a browser
Use presentation software to create and share
A mobile app is a web app that runs on a basic presentations
mobile device
Use database software to manage basic
Mobile web apps often have a responsive databases
design
Use graphics software
Many developers prefer web apps since they
run on all devices
The Features of Common Productivity Suites
Some apps are available both as native and
web apps Productivity Suite
Spreadsheet Software
Personal and Professional Uses
Spreadsheets
Copy text and graphics from one document (or Built-in and custom functions
spreadsheet or database) to another
Argument: information necessary for a formula Format text
or function to calculate an answer
Set a slide’s dimensions, aspect ratio, and
Absolute reference orientation
Each slide has a specific layout based on Share by copying the HTML embed code
its content, and each layout has predefined provided by the presentation app’s share option
placeholders for these items and pasting it into a blogpost or webpage
Select a presentation design Try not to stand behind a podium or in one place
Use technology to enhance your presentation The software displays commands and work
areas appropriate to the view for your task
Involve the audience
Big Data: data collections so large that it is
Do a dry-run beforehand
difficult to process using relational database
applications
Add, update, and delete data A query extracts data based on specified criteria,
or conditions, for one or more fields
Filter, sort and retrieve data from the
database A report is a user-designed layout of database
content
Create forms and reports
A form is a screen used to enter data into a
Database applications database
Track contacts, schedules, possessions, or A form is made up of controls
collections
Represents a query in SQL (Structured Query Ensure data integrity and minimize data entry
Language) errors by controlling how data is entered,
formatted, and stored
Because many users may need to access a
database at the same time and they can be Prevent users from inadvertently changing or
quite large, enterprise databases generally run deleting important data
on a server
Control version issues
Data can be exported into other programs,
Manage database backup plans regularly
such as a spreadsheet program, where you can
create charts to visualize data that results from Establish security to protect data from hacker
a query attacks
Key Features
Types of Apps
Data mining
E-waste
Risk Sustainable Electronics Management (SEM)
promotes the reduction of e-waste
The possibility something might occur that
results in an injury or a loss
Attackers
Script kitties
Hactivists
Cyberterrorists
Online banking
E-commerce shopping
Address spoofing
Social Engineering
Hold devices with both hands Shred paperwork that contains personal
information before discarding
Do not use the device on escalators or
near train doors Do not carry a Social Security number in a wallet
or write it on a check
Do not use white or red headphone cords
Do not provide personal information either over
Do not give chase if a device is stolen
the phone or through an email message
Enable device security features
Keep personal information in a secure location in
a home or apartment
Can protect against hardware malfunctions, For paper documents that must be retained, use
user error, software corruption, natural a scanner to create a PDF of the document and
disasters, and cyberattacks add a strong password that must be entered
before it can be read
Options: online or to external hard drive
Be cautious with a website or app request to
collect data
Viewing or stealing computer data A longer password is always more secure than a
shorter password, regardless of complexity
Injecting malware
Most security experts recommend that a
Downloading harmful content secure password should be a minimum of 15-20
Precautions characters in length
Do not use birthdays, family member Thieves can make excessive charges in the
names, pet names, addresses, or any personal victim’s name
information
The victim is charged for the purchases and
Use a password manager suffers a damaged credit history that can lead to
being denied loans for school, cars, and homes
Authenticating with Biometrics