Download Chapter Lectures

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Piggybacking (Internet access) wikipedia , lookup

Computer security wikipedia , lookup

Malware wikipedia , lookup

Transcript
Chapter 1
We live in the information age. Through the use of different digital technologies, we now
can easily search, create, and distribute all kinds of information. Computer systems are
vital part of today’s world. Mankind has advanced through many ages from the Stone
Age to the Industrial Age. Today, we live in the Information Age, a period in history
when information is easy to access and affects many aspects of everyday life. The
primary factors driving us forward are the digital devices we use in business and our
everyday lives.
This digital revolution is an ongoing process of social, political, and economic change
brought about by digital technology, such as microchips, computers, and the Internet. It
has affected our daily lives in many ways, from the way we communicate to the way we
entertain and to the way we travel and commute. The digital revolution requires us to
modify and adjust our ways of looking at and dealing with some of the most basic
functions in our work and personal interactions.
Chapter 2
Computers are devices that process data, store data, and produce information. Digital
data is acquired, processed, stored, and transmitted using a variety of devices from large
computers to Smartphones. While digital content is stored using ones and zeros, it is
displayed in the format we would expect of that specific content.
Today, most of the digital data is stored using binary digits, commonly referred to as
bits. A bit is either a 1 or a 0. Computers use the binary number system (base 2) to
perform arithmetic operations.
Numeric data consists of numbers that can be used in arithmetic calculations. Character
data is composed of letters, numbers (not used in calculations), and special characters
(symbols). Character data is commonly referred to as text.
There are two fundamental types of components found in every computer—hardware
and software.
Software is a collection of computer programs (computer instructions) that perform a
specific task. There are two different types of software developed for different purposes,
including system software (operating systems and utilities), and application
software (software developed for certain applications such as entertainment, banking,
education, social networking, and so forth),
Computer hardware is the computer equipment that, along with software, performs the
input, processing, output, and storage functions. Hardware is generally anything you
can touch inside and outside the computer.
The most common computer hardware for data input is the keyboard and the mouse.
Other input devices include scanning equipment and touch screens.
Processing devices including circuit boards and chips (such as the central processing
unit and memory) are also computer hardware.
The most common output devices are printers and screens.
There are also storage devices, which include built-in storage: hard disks or solid state
drives, and removable devices such as DVDs, memory cards, and USBdrives.
Processor
The most important hardware component of every digital device is the microprocessor
(or simply the “processor”). The CPU (Central Processing Unit ) Consist of two
components:
 The ALU (arithmetic logic unit) performs arithmetic and logical operations.
 The control unit, which fetches, stores, and manages the executions of the
instructions.
Memory
There are two main types of computer memory: RAM (Random Access Memory) and
ROM (Read Only Memory).
RAM is a temporary holding area for data or instructions. RAM is volatile, meaning that
it can only hold data while it is electrically powered. RAM accesses the data/instructions
stored in it faster than the hard drive, making the execution of computer tasks more
rapid. The size of the RAM is important for certain activities such as computer games or
mathematical calculations where a large amount of data and instructions are processed.
ROM is more permanent and non-volatile. It contains hard-wired instructions for the
device. The instructions stored there do not change even if the device is not powered on.
The boot loader – instructions that tell a digital device how to start when powered on –
is an example of the instructions stored in the ROM
Storage
There are four main types of storage options: Magnetic, Optical, Solid State, and Cloud.
 The most common magnetic storage device is a hard disk drive. Data is stored
there using magnetic particles representing ones and zeros on the surface of a
disk. They come in various sizes depending on need. In the past, cassette tapes
and floppy disks were magnetic devices for data storage.

Storage devices using optical storage technologies including CD, DVD, and Bluray Disc (BD), represent data as microscopic light and dark spots on the disc
surface. These devices come in three categories; read-only, recordable, and
rewritable.

Read-only means the data is already on the disc and cannot be modified.

Recordable means you can record and store data on the disc, but once it is
recorded it cannot be changed. These discs are labeled asCD-R, DVD-R,
or BD-R (R for recordable).

Rewritable means the discs can be written, erased, and re-written again
many times. These discs are typically used for temporary storage or for
transferring data from one device to another.

Solid state storage devices store data in erasable, rewritable circuitry. They
provide fast access to data because they include no moving parts like magnetic or
optical devices do. Once the data is stored in a solid state device, it is non-volatile.
Solid state storage devices include solid state drive (SSD, which can be used as a
substitute for a hard disk drive), memory cards, andUSB flash drives (jump
drives, thumb drives, or data sticks).

In contrast to the above discussed “local” storage devices, remote storage is the
type of device that can be accessed from a network. Remote storage may be
available on a home, school, or work network. When a remote storage is available
as an Internet service, it is called “cloud storage.” Apple iCloud, Microsoft
OneDrive, Google Drive, and Dropbox are examples of cloud storage. While most
cloud services offer a generous amount of free storage space, they do have
security and privacy risks as well as service outages and discontinuation of
services concerns. Security and privacy risks can occur due to inherent
weaknesses in the networks and the cloud storage sites. In the case that a cloud
storage site has an outage, the data stored in the cloud will become inaccessible
and can disrupt the activities of businesses and individuals. When a cloud storage
provider closes its business, it is called “discontinuation of service.” This can
happen with little or no notice. Because of this, you should be very careful of what
you store in the cloud.
Chapter 3
The Internet, like many other innovations, had its beginnings with the
government. ARPANET (Advanced Research Projects Agency Network) was
created to allow scientists to share information in 1969. It was command-line
primitive, but by the 1990s user-friendly tools became available and today there
are over two billion users on it. People can access Internet through ISPs (Internet
Service Providers) for a fee.
Protocols and Domain Names
When transmitting data, nodes must follow certain rules to be able to connect to
each other. These sets of rules are called “communications protocols,” and the
process of connecting is called “handshaking.”
Everyone on Internet has Internet address. These addresses are controlled by IP
(Internet Protocol). Since remembering all of the numeric names for all of the
nodes is problematic for humans, domain names were created such as
Hindscc.edu. Domain names are translated into Internet addresses by DNS
(Domain Name System). DNS servers contain a list of all domain names and their
corresponding IP addresses. A domain name, like a file name, consists of two
parts, a name and an extension. The most common extensions are .com, .edu,
and .org. The name and extension are separated by a period.
Internet Connections
In today’s world, most people like to have their own Internet connection (usually
at their home). There are a number of ways individual locations can be connected
to Internet.








Cable Internet Service Provider (ISP) uses the same Cable TVinfrastructure to
bring Internet connections to its subscribers. The cable modem converts signals
from your computer to signals that can travel over the cable infrastructure.
Another very common service is through the telephone company. There are four
types of service offered: dial–up, ISDN, DSL, andFTTH.
Dial-up is the oldest and slowest offering. It uses sound waves and needs a
modem to convert digital signals to audio signals and back to digital signals at the
receiving location. Dial-up uses circuit switching to connect the source and
destination locations.
DSL (Digital Subscriber Line) is a much more common and faster service. It still
uses phone lines, but it uses digital signals.
ISDN (Integrated Services Digital Network) divides a telephone line into two
channels: one for voice, one for data. It requires specific equipment.
Fiber to the Home (FTTH) uses fiber-optic cables rather than coaxial cables to
bring the connection to the terminal location.
Another means of connecting to Internet is via Satellite Internet Service. Signals
are sent or received using an individual dish antenna through a satellite. This can
be an independent setup, or it can be coupled withTV.
Mobile Broadband Service uses smartphones and radio signals to transmit voice
and data. This service has gone through generations of technology; the most
recent are 3G and 4G. 3G (third generation) became available in 2001, while 4G
(fourth generation) became available in 2011.
The World Wide Web (WWW) or as it is commonly known, the Web, is a
technology that uses the Internet with a protocol called HTTP (Hyper Text
Transfer Protocol) to communicate using hyperlinks (also called hypertext).
The Web is made up of Web sites that contain related information and are made
up of one or many Web pages. The pages of a Web site are linked by hyperlinks
that are underlined or colored words, but they can be photos or buttons or other
graphic items as well. Every Web page has a unique identifier called a URL
(Uniform Resource Locator). URLs can become quite long.
HTTP works with www to transfer and display Web pages on a local browser.
Communication between your browser and Web servers occurs. When a URL is
entered, the browser attempts to establish an HTTP session and retrieve data
from the Web server through commands called HTTP methods (such as GET,
POST, and HEAD), and displays the content on the screen. The “404 Not Found”
message is generated when the requested resource does not exist.
Social Media







Social media has spread across the globe. It facilitates self-presentation,
information sharing and communicating, and relationship building among
networked individuals via text, pictures, video, and audio. While it transforms the
ways we connect, interact, and share, it also raises some legal and ethical
concerns.
Most people think social networking is a relatively new phenomenon, but actually
it has been around for decades. It is a means of virtual interaction where people
share information, pictures, and other media regarding their lives and opinions
on different issues.
Network media are a collection of tools that are used to share information and
can be categorized into the following four main groups.
The first is social networking, which requires an online presence and is typically
used to communicate with family and friends. Facebook and Twitter are excellent
examples of social networking.
The second group is geosocial networking, and it is used to find locations, events,
and people. Yelp is an example of geosocial networking.
The third group is content communities, and it is used for sharing media such as
videos, pictures, and topical information. YouTube and Instagram are examples
of content communities.
The fourth group is online communications, and it is used for sending messages
to one or many people. Snapchat and Skype are examples of online
communication
Chapter 4
Application Software
This type of software is developed for various purposes, from education to
entertainment, graphic design, banking, travel arrangements, and social
interaction. These various applications can be accessed via smartphones, web
browsers, tablets, desktops, or laptops.
Web applications (apps) are software that is accessed with a web browser. These
applications are not installed on the user’s computer, but instead the code for
web apps is downloaded along with Web pages and is executed by the browser.
Gmail, Google Docs, and blackboard learning management systems are typical
examples of Web apps. When using Web apps, usually your data is stored on the
app’s Web site, and you can access your data from any location using any device
that has web access.

Productivity software helps get your work done. Office Suite packages are
software of this type. An office suite is a collection of programs that make your
daily work more efficient. The programs are also called modules, which include
word processing, spreadsheets, presentations, databases, calendars, and contact
manager modules. MSOffice, Google Docs, Apache OpenOffice, and Apple iWork
are examples of office suite packages.
Word Processor- This allows the user to type a letter, memo, or other document
using the computer’s keyboard.
This software also allows the user to manipulate the text—edit, search, and
replace, format, spell-check, and insert multimedia—giving it much greater
power and flexibility than a mechanical device.

Spreadsheet- Spreadsheets are two-dimensional tables that allow you to create,
store, and access data using rows and columns.
They had their beginning in accounting, but people quickly discovered many
other uses such as budgeting, computing grades, tracking investments, and
estimating project costs.
Spreadsheets are very powerful when manipulating data, creating what-if
analysis, and using formulas.

Presentation Software - Presentation software combine text, photos, clip art,
graphics, animations, and multimedia into a series of electronic slides to be
shown on a screen or projector.
These are commonly used for class lectures, business communications, product
demonstrations, and so forth.
A typical presentation slide will contain bullet points and graphics with themes
and templates to provide a formal or professional appearance.

Database software - help users enter, find, organize, update, and report data
stored in a database.
Data is stored as a series of records, which are composed of fields that hold data.
A record holds data for a single entity—a person, place, thing, or event. A field
holds one item of data relevant to a record such as name, age, address, date, title,
price, or vendor name.
Software Licenses:
When you purchase or download software, you do not own it like you own other
purchased products such as books or TV. You probably cannot make copies of the
software and distribute or sell it online like you may do to other goods that you own. In
fact, when using software, you are licensed by the Software Company or owner to use it.
The degree to which you can do things with the software depends on the license
agreement of the software, which is often referred to as EULAs (End-User License
Agreements). The reason software is licensed has to do with copyrights.
From a legal perspective, there are two categories of software: public domain and
proprietary.
Public Domain Software
Public domain software is software that is no longer protected by a copyright or the
rightful owner has placed it in the public domain, making it available without
restriction.
It is typically free without any restrictions.
Proprietary Software
Proprietary software has restrictions on its use delineated by the license agreement,
copyright, or patent.
Some proprietary software is distributed commercially, while some is free.
Based on licensing rights, proprietary software is distributed as commercial software,
freeware, demoware, or open source software.
Depending on the license, proprietary software can be used on a single or multiple user
basis. Some licenses even specify the length of the licensed use, which could be 1 year, 3
years, and so forth.
Chapter 5
Software is the instructions that direct the computer to perform various tasks.
An operating system is the heart of digital devices. It gives devices a personality and
allows them to perform and interact with you and each other. Microsoft Windows and
Apple OS X are operating systems found on most personal computers. Android
and iOS are operating systems found on mobile devices. Both desktop operation systems
and mobile operating systems are designed to accommodate one user at a time. UNIX
and Microsoft Windows Server are operating systems run on server computers. Server
operating systems are designed for distributed networks accessed by multiple users at a
time.
An operating system interacts with application software, device drivers, and computer
hardware to perform tasks assigned by device users. It manages a set of limited system
resources such as processors, memory, storage resources, and input/output devices to
ensure that all of the user requests are performed in an orderly manner.
File Management
Files in a digital device are used to store documents, photos, videos, music, and so forth.
File management utilities are provided by operating systems to manipulate these files,
their names, file types, creations, deletions, duplications, and locations in your storage
devices. Windows File Explorer is the file management tool provided by MS Windows,
and Finder is the tool provided by Mac OS.
Computer file can reside on your computer locally, or it can be stored in the cloud. Each
file must have a filename. This filename consists of a name part and, for MS Windows
and Mac OS, an extension (e.g., custrel.docx is a file containing customer relations
information). The extension part of the filename tells the operating system, application
software, and the type of file. The file name and extension are separated by a period. The
naming of a file must adhere to specific rules of the operating system where it is located.
These rules specify the length limit and the symbols and words that can or cannot be
used in the filenames.
Every storage device has a directory containing a list of files. The top-level main
directory is usually called the root directory. Beneath it are sub-directories and in file
management tools; these sub-directories are depicted as folders. Each folder can hold
related items such as photos taken for some event, or data for the same application
program. Folders can be created within other folders, making them nested folders. A
computer file’s location within the folders is defined by a file path, which consists of a
drive letter and a colon (for personal computers), folder name(s), and the file name and
extension. Each item is separated by back-slashes except the file name and extension,
which are separated by a period.
Each operating system has software for file management called file management
utilities. Application software can open, modify, and save data files as well.
Chapter 7
Networks are the communication links between digital devices. There are different types
of networks including LAN (local area network), WAN (wide area network), and PAN
(personal area network), which transmit data over different wired or wireless channels
through various network equipment such as routers, switches, and access points.
Networks link things together, and in this course we will be focusing on communications
networks. Networks are critical to both business and personal activities where data and
information is shared. When networks are looked at by size, there are three categories.
The most recent is PAN (Personal Area Network). This is a small range, wireless
network. The most common use is to synchronize an individual’s devices. Good
examples are Bluetooth-enabled devices and NFC-enabled connections.
The second category is LAN (Local Area Network). A typical location for a LAN is in a
building where computers will communicate with each other. A building may also
contain multiple LANs. In a LAN, computers are connected via wire or wireless. A good
example of a wireless LAN is the Wi-Fi Network at home.
LANs or individuals are connected to distant locations via the third
category, WANs (Wide Area Networks). The most well-known WAN is the Internet.
The medium connecting computer and networks is called a communication channel.
There are two types: wired and wireless.
Wired channels come in different mediums: copper, coaxial, and fiber-optic.
Copper lines are called "twisted pair" and have been used as the primary mediums for
well over a hundred years. Specialized versions of copper are Ethernet and Network
cables. DSL (Digital Subscriber Lines) connections use copper as well.
Coaxial cable is primarily used for cable television, but can carry digital transmissions as
well.
Fiber-optic cable is typically used for high-capacity trunk lines. There is a saying in the
network community: "copper to the desktop and fiber in the backbone."
LANs would use copper and the trunk line (backbone) would use fiber. The biggest
drawback to wired channels is limited mobility, but they are a much more secure
medium than a wireless channel.
Chapter 9
Protecting the information assets of an individual, an organization, or the government
from security threats has become extremely important. Digital security is important to
individuals, large corporations, and every entity in-between. Digital security involves
protection against unauthorized activity, whether it is done by hackers directly, or
indirectly using malware or viruses.
One of the most effective ways to implement digital security is through encryption.
Encryption is a means of masking data in a message or data file. This method has been
around for centuries. In this process, the sender of a message or the creator of a data file
encrypts the data, making it unreadable to unauthorized readers who do not have the
correct cryptographic key.
Another approach to securing data and access is through authentication. Most
commonly, authentication involves the use of passwords and PINs (Personal
Identification Numbers), though biometric solutions, such as fingerprints and retina
scans, are also used.
Most people are familiar with passwords, as they are required for many activities. To
build a strong password, use at least eight characters, along with a letter, number, or
special character in uppercase. Such passwords are very difficult to hack. Web sites
often have strength meters, which is software that tells you the strength of your newly
created password.
Many activities or Web sites that require passwords use a software called Password
Manager, which keeps track of user IDs and passwords. It can generate a password for
you when you forget yours. The password manager asks for proof that you are you, and
then sends you a new password it has created, which you can use for access.
Generated by Web servers, the cookies reside on the requesting computer and contain
any information collected by the host site about you or your activity. Persistent cookies
are kept after the session is over, while session cookies only exist while the Web
connection is active. Cookies can be set by the domain that hosts the Webpage (firstparty cookies), or by a site other than the one you connected to (third-party cookies).
Malware is the shortened name for Malicious Software, referring to any computer
program designed to surreptitiously enter a digital device. Viruses, worms, and Trojans
are the most common forms of malware. Some malware can be extremely dangerous.
They can delete your data or steal your password or other personal information. Other
malware allows hackers to access your computer and send messages to others with
malware included.
In the context of cyber security, social engineering (SE) is a deceptive practice that
exploits human psychology by inducing victims to interact with a digital device in a way
that is not in their best interest. SE attackers usually try to gain financially or create a
service disruption. Their most well-known trick is to offer a large sum of money to the
victim, but demand an advance fee to start the process of obtaining that money.
Spam consists of unsolicited messages, which can account for approximately 70% of all
e-mails. Spam messages are sent through mass e-mails. Everyone gets spam of some
kind or the other. There are filtering techniques to block spam messages, but spammers
can and have developed techniques to bypass these barriers.
Phishing is a scam message that appears to come from a legitimate source. Through
phishing, a hacker tries to obtain private information.
You can check the e-mail address from which a message has originated to determine
whether it is part of a phishing scam. You can also check with the source directly to
determine whether the message is legitimate.
Pharming is a way to redirect the user to fraudulent Web sites that distribute malware,
collect personal data, and perpetrate other scams. Google and others check URLs and
flag sites that should be avoided by users. This is to enable what is known as safe
browsing. Avoid rogue malware such as fake virus alerts—not generated by your
antivirus software—which try to put malware into your digital device.
A PUP (potentially unwanted program) is a variation of pharming. It is also known as
PUA (potentially unwanted application). This malware tries to get the user to download
harmful programs, especially during software installation. To prevent this, you must
read all the information appearing on the screens during installation of software, and
make sure you know what is being downloaded.
Protection against security threats
Pharming is a way to redirect the user to fraudulent Web sites that distribute malware,
collect personal data, and perpetrate other scams. Google and others check URLs and
flag sites that should be avoided by users. This is to enable what is known as safe
browsing. Avoid rogue malware such as fake virus alerts—not generated by your
antivirus software—which try to put malware into your digital device.
Firewalls are another type of security software that are used to block unauthorized
access to digital devices. Firewalls consist of a set of rules and directions where certain
data is blocked and other data is allowed to pass through to the digital device.
A major problem in the software industry is pirated software. This is software that is
illegally copied, distributed, or modified. Using pirated software is a violation of the law,
and it can lead to a loss of revenue for the software companies creating the software.
Furthermore, illegal software is a major source of viruses and malware.