Week 1 - Computer Appreciation CMDI (3) - Merged
Week 1 - Computer Appreciation CMDI (3) - Merged
Computer Appreciation
Module Description
Computer Appreciation
Module Learning Objectives
• Demonstrate understanding of the fundamental hardware
components that make up a computer’s hardware and the
role of each of these components
• Demonstrate understanding of the difference between an
operating system and an application program, and what
each is used for in a computer
• Explain the fundamental concepts of computer hardware
and software
• Acquire the foundation level knowledge required to
understand computer and its operations.
Information Processing System
• DATA is a collection of independent and unorganized
facts.
INFORMATION
DATA
Functions of an Information Processing System
• A letter
• A number
• A special character or symbol, or
• A space
BASIC PC HARDWARE
• HARDWARE is the tangible part of a computer
system.
Basic hardware of a PC system
• Central Processing Unit (CPU)
• Memory Unit
• Input Devices
• Output Devices
• RANDOM ACCESS
MEMORY (RAM) is used to
store the programs and data
that you will run. Exists only
when there is power.
3. Input Devices
• Serial Mouse
• USB/Cordless Mouse
Other Pointing Devices
• Trackball
• Track point
• Touch pad
• Touch Screen
• Joystick – input device for
computer games
• Monitor
• Audio Speakers
• Printer
Types of Monitor
Laser
printer Inkjet printer
5. Secondary Storage Devices
• Compact Disk
• CD-R – write once, 650MB
• CD-RW – rewritable, 700MB
Optical Drives
• Components are:
• Microprocessor
• (Optional) Coprocessors
• Memory
• Basic Input/Output System (BIOS)
• Expansion Slot
• Interconnecting circuitry
Software
Good Luck!
Week 4
Computer and Network
Security
Module Description
Module Learning Objectives
• 1945
• 1986
• 1998
• 2001
• 2006
• 2010
• Confidentiality
The information must just be accessible to the authorized
people.
Confidentiality is the principle of protecting information from
disclosure to unauthorized entities.
Access control, and cryptographic encryption of data over a
network or on a storage device are common techniques for
achieving confidentiality.
• Availability
Assurance that the systems responsible for delivering,
storing and processing information are accessible when
needed, by those who need them.
• Reliability
Computers should work without having unexpected
problems
• Authentication
Guarantee that only authorized persons can access to
the resources
Computer security concepts
Passive Attack
attempts to learn or make use of information from the
system but does not affect system resources.
• Computer crime
Any illegal act involving a computer generally is
referred to as a computer crime.
• Cracker
A cracker is someone with extensive computer knowledge
who accesses a computer or network illegally , someone
whose purpose is to destroy data, steal information, or
other malicious action
• Cyber terrorist
A cyber terrorist is someone who uses the Internet or
network to destroy or damage computers for political
reasons.
• Rootkit
A rootkit is a program that hides in a computer
and allows someone from a remote location to take
full control of the computer.
Types of Security
• Network Security
• System and software security
• Physical Security
• Network security
Network security refers to any activities designed to protect
your network. Specifically, these activities protect the
usability, reliability, integrity, and safety of your network and
data.