SlideShare une entreprise Scribd logo
1  sur  34
1
Essential Computer Concepts
Module 1
Understanding Essential Computer Concepts
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use.
2
• Recognize you live and work in the digital world
• Distinguish types of computers
• Identify computer system components
• Compare types of memory
• Differentiate between input devices
• Explain output devices
Module Objectives (Slide 1 of 2)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use.
3
• Describe data communications
• Define types of networks
• Access security threats
• Understand system software
• Describe types of application software
Module Objectives (Slide 2 of 2)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use.
4
• The internet, computers, and mobile devices such as smartphones and
tablets provide us with a world of information, literally at our fingerprints
• Over the last 25 years, we can use the Internet to:
• Instantly communicate with friends and coworkers
• Store music and movies and access them anywhere
• Search and apply for jobs without leaving home
• Quickly access information
• Shop for anything from clothing to food to cars
• Manage finances, deposit checks, and pay at the cash register using a mobile
device
• Get directions, view maps, and find nearby restaurants
Recognize You Live and Work in the Digital World (Slide 1 of 4)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use.
5
• We can use the Web to get work done by:
• Searching for information
• Communicating with others through email or videoconferencing
• Telecommuting
• Cloud computing
Recognize You Live and Work in the Digital World (Slide 2 of 4)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use.
6
• How to be a good online citizen
•Your internet activities can have lasting repercussions on your work and
life
•For example, employers are known to keep an eye on social media
accounts of current or prospective employees
•Be aware of copyright laws when using an item on-line for reports or
presentations
Recognize You Live and Work in the Digital World (Slide 3 of 4)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use.
7
Recognize You Live and Work in the Digital World (Slide 4 of 4)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use.
7
• Couple using videoconferencing
to communicate
• Employee telecommuting
from home
8
• Types of personal computers:
• Desktop computers
• Laptop computers
• Tablets
• Smartphones
• Mainframe computers and supercomputers
Distinguish Types of Computers (Slide 1 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use.
9
• Touchscreens
• Microsoft Windows 10 was also developed to work with touchscreen monitors,
tablets, and smartphones
• Many tasks are, in fact, easier to accomplish with a touchscreen device because they
are designed for use with gestures instead of a mouse
Distinguish Types of Computers (Slide 2 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
10
Distinguish Types of Computers (Slide 3 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
• Desktop • Laptop, smartphone, and tablet
• Supercomputer
11
• A computer system includes computer hardware and software
• Hardware refers to the physical computers
• Software refers to the intangible components of a computer system,
particularly the programs, or data routines, that the computer uses to
perform a specific task
Identify Computer System Components (Slide 1 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
12
• An Overview of computer system components
• Architecture
• Data
• Processing
• Motherboard or CPU
• Cards or removable circuit boards
• Input and input devices
• Output and output devices
• Peripheral devices
Identify Computer System Components (Slide 2 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
13
• Motherboard
Identify Computer System Components (Slide 3 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
• Flow of information through a computer system
14
• Memory is one of the most important components of personal
computer hardware as it stores instructions and data
• Types of memory include:
•Random access memory (RAM) which holds info while the computer is on
•Cache memory is high-speed memory
•Virtual memory
•Read-only memory is a chip that stores the BIOS (Basic Input-Output
System)
•CMOS memory is a chip that stores the date, time and system parameters
Compare Types of Memory (Slide 1 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
15
• Upgrading Ram is one of the easiest ways to make your computer run
faster
• The more RAM a computer has, the more instructions and data can
be stored there
• You can often add more RAM by installing additional memory cards
on the motherboard
Compare Types of Memory (Slide 2 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
16
•Relationships between types of computer memory
Compare Types of Memory (Slide 3 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
17
•Since RAM retains data only while the power is on, your computer
must have a more permanent storage option
•Types of storage media include
•Magnetic storage devices such as a hard drive
•Optical storage devices use laser technology to store data and include a
CD, CD-ROM and DVD
•Flash Memory
•Solid-state drive (SSD) is intended as a replacement for a traditional hard
disk drive
•Solid-state hybrid drive (SSHD) combines the speed of an SSD with
benefits of a traditional hard disk drive
Summarize Types of Media (Slide 1 of 2)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
18
Summarize Types of Media (Slide 2 of 2)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
• Storage devices and RAM
19
Differentiate Between Input Devices (Slide 1 of 2)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
• To accomplish a task, a computer first needs to receive the data and
commands you input
• In a typical system, you provide this information using an input device
such as a keyboard or a mouse but wireless devices can also perform
this function
• There are many types of input devices
• Keyboard
• Pointing device, such a mouse, scroll wheel or trackball
• Touchscreen, which accepts commands from fingers
• Microphone
• Scanner
20
Differentiate Between Input Devices (Slide 2 of 2)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
• Personal computer pointing devices: mouse, trackball, and touchpad
21
• An output device is any hardware peripheral that communicates the results
of data processing
• Output devices may connect to computers with cables or wirelessly
• Output devices include:
• Monitor
• Printer
• Speakers
Explain Output Devices
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
22
• Data communications is the transmission of data from one computer to
another or to a peripheral device
• One computer sends the data over some type of channel such as telephone,
coaxial cable or wirelessly
• A device driver or driver handles the transmission protocols, which establishes
the rules for data transfer
• A driver is a computer program that can establish communication because it
understands the characteristics of your computer and of the device
Describe Data Communications (Slide 1 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
23
• Computers communicate in multiple ways such as through a:
• USB (Universal Serial Bus)
• Ethernet port
• Modem
Describe Data Communications (Slide 2 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
24
Describe Data Communications (Slide 3 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
• Computer Expansion Ports
25
• A network connects one computer to other computers and peripheral
devices, enabling you to share data and resources with others
• To connect with a network via Ethernet, a computer must have a
network interface card, which creates a communications channel
between the computer and the network
• Many desktops PC’s and laptops come with a NIC built-in, and an
Ethernet cable is used to make the connection to a router or modem
• A router is a device that controls traffic between network components
• Network software is also essential, establishing the communication
protocols that will be observed on the network
Define Types of Networks (Slide 1 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
26
• There are a variety of network types
• Peer-to-peer network
• Local area network (LAN)
• Wide area network (WAN)
• Wireless local area network (WLAN)
• Personal area network (PAN)
• Infrared technology use infrared light waves to “beam” data from one
device to another
Define Types of Networks (Slide 2 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
27
Define Types of Networks (Slide 3 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
• Typical network configuration
28
• Security refer to the steps a computer user takes to prevent
unauthorized use of or damage to a computer
• Malware is a broad term that describes any program designed to cause
harm or transmit information without permission of the computer
owner
• In order to protect computers against a virus, users should use antivirus
software
• Spyware is software that secretly gathers information from your
computer and then sends this data to a company or person that created
it
• A firewall is like a locked door on your computer or network and
prevents other computers on the internet from accessing it
Assess Security Threats (Slide 1 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
29
• Criminals are relentlessly searching for new and aggressive ways of
accessing computer users’ personal information and passwords
• A spoofed site is a fake website set up to look like a legitimate website
• Phishing refers to the practice of sending email to customers or potential
customers of a legitimate website encouraging them to click a link in the
email
• Pharming occurs when a criminal breaks into a DNS server and redirects any
attempts to access a particular website to the spoofed site
Assess Security Threats (Slide 2 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
30
• Windows Defender scan in progress
Assess Security Threats (Slide 3 of 3)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
31
• System software allocates system resources, manages storage space,
maintains security, and detects equipment failure
• Components of system software:
• The operating system manages the system resources, which includes
controlling basic data input and output
• Utility software helps analyze, optimize, configure, and maintain a computer
• Protecting information with passwords
• To prevent anyone from guessing your passwords, always create and use
strong passwords
• A strong password consists of at least eight characters of upper and
lowercase letters and numbers
Understand System Software (Slide 1 of 2)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
32
• Relationships between system software and other system components
Understand System Software (Slide 2 of 2)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
33
• Application software enables you to perform specific tasks such as
writing letters, creating presentations, analyzing statistics, creating
graphics, enhancing photos, and much more
• Typical application software includes the following:
•Document production software, which allows you to write and format text
documents
•Spreadsheet software, of which Microsoft Excel is an example
•Database management software lets you collect and manage data
•Presentation software allows you to create a visual slide show as with
Microsoft PowerPoint
•Multimedia authoring software allows you to record and manipulate image
files
•Information and task management software
•Website creation and management software
Describe Types of Application Software (Slide 1 of 2)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
34
• Automatic spell checking in Microsoft Word
Describe Types of Application Software (Slide 2 of 2)
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with
a certain product or service or otherwise on a password-protected website for classroom use
• Editing a worksheet in Microsoft Excel

Contenu connexe

Tendances

Access 2016 module 2 ppt presentation
Access 2016 module 2 ppt presentationAccess 2016 module 2 ppt presentation
Access 2016 module 2 ppt presentationdgdotson
 
Excel module 3 ppt presentation
Excel module 3 ppt presentationExcel module 3 ppt presentation
Excel module 3 ppt presentationdgdotson
 
Windows 10 module 2 ppt presentation
Windows 10 module 2 ppt presentationWindows 10 module 2 ppt presentation
Windows 10 module 2 ppt presentationdgdotson
 
Power point 2016 module 1 ppt presentation
Power point 2016 module 1 ppt presentationPower point 2016 module 1 ppt presentation
Power point 2016 module 1 ppt presentationdgdotson
 
Excel module 2 ppt presentation
Excel module 2 ppt presentationExcel module 2 ppt presentation
Excel module 2 ppt presentationdgdotson
 
Windows 10 module 1 ppt presentation
Windows 10 module 1 ppt presentationWindows 10 module 1 ppt presentation
Windows 10 module 1 ppt presentationdgdotson
 
Word 2016 module 1 ppt presentation
Word 2016 module 1 ppt presentationWord 2016 module 1 ppt presentation
Word 2016 module 1 ppt presentationdgdotson
 

Tendances (7)

Access 2016 module 2 ppt presentation
Access 2016 module 2 ppt presentationAccess 2016 module 2 ppt presentation
Access 2016 module 2 ppt presentation
 
Excel module 3 ppt presentation
Excel module 3 ppt presentationExcel module 3 ppt presentation
Excel module 3 ppt presentation
 
Windows 10 module 2 ppt presentation
Windows 10 module 2 ppt presentationWindows 10 module 2 ppt presentation
Windows 10 module 2 ppt presentation
 
Power point 2016 module 1 ppt presentation
Power point 2016 module 1 ppt presentationPower point 2016 module 1 ppt presentation
Power point 2016 module 1 ppt presentation
 
Excel module 2 ppt presentation
Excel module 2 ppt presentationExcel module 2 ppt presentation
Excel module 2 ppt presentation
 
Windows 10 module 1 ppt presentation
Windows 10 module 1 ppt presentationWindows 10 module 1 ppt presentation
Windows 10 module 1 ppt presentation
 
Word 2016 module 1 ppt presentation
Word 2016 module 1 ppt presentationWord 2016 module 1 ppt presentation
Word 2016 module 1 ppt presentation
 

En vedette

Linking Into Sales linkedin certificate
Linking Into Sales linkedin certificateLinking Into Sales linkedin certificate
Linking Into Sales linkedin certificateMartin Brossman
 
How to use pivot table
How to use pivot tableHow to use pivot table
How to use pivot tableArlene Jovita
 
AutoCorrect - Excel 2013 Tutorial
AutoCorrect - Excel 2013 TutorialAutoCorrect - Excel 2013 Tutorial
AutoCorrect - Excel 2013 TutorialSpreadsheetTrainer
 
MS Excel Pivot Table Reports & Charts
MS Excel Pivot Table Reports & ChartsMS Excel Pivot Table Reports & Charts
MS Excel Pivot Table Reports & Chartsdnbakhan
 
Entering Data - Excel 2013 Tutorial
Entering Data - Excel 2013 TutorialEntering Data - Excel 2013 Tutorial
Entering Data - Excel 2013 TutorialSpreadsheetTrainer
 
Alphorm.com Formation Excel 2016 Expert I - partie 1
Alphorm.com Formation Excel 2016 Expert I - partie 1Alphorm.com Formation Excel 2016 Expert I - partie 1
Alphorm.com Formation Excel 2016 Expert I - partie 1Alphorm
 
Ms office (basic) 2016 session 01
Ms office (basic) 2016 session 01Ms office (basic) 2016 session 01
Ms office (basic) 2016 session 01Muhammad Umer Aleem
 

En vedette (7)

Linking Into Sales linkedin certificate
Linking Into Sales linkedin certificateLinking Into Sales linkedin certificate
Linking Into Sales linkedin certificate
 
How to use pivot table
How to use pivot tableHow to use pivot table
How to use pivot table
 
AutoCorrect - Excel 2013 Tutorial
AutoCorrect - Excel 2013 TutorialAutoCorrect - Excel 2013 Tutorial
AutoCorrect - Excel 2013 Tutorial
 
MS Excel Pivot Table Reports & Charts
MS Excel Pivot Table Reports & ChartsMS Excel Pivot Table Reports & Charts
MS Excel Pivot Table Reports & Charts
 
Entering Data - Excel 2013 Tutorial
Entering Data - Excel 2013 TutorialEntering Data - Excel 2013 Tutorial
Entering Data - Excel 2013 Tutorial
 
Alphorm.com Formation Excel 2016 Expert I - partie 1
Alphorm.com Formation Excel 2016 Expert I - partie 1Alphorm.com Formation Excel 2016 Expert I - partie 1
Alphorm.com Formation Excel 2016 Expert I - partie 1
 
Ms office (basic) 2016 session 01
Ms office (basic) 2016 session 01Ms office (basic) 2016 session 01
Ms office (basic) 2016 session 01
 

Similaire à Ecc 2016 module 1 ppt presentation

Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security Dr. Ahmed Al Zaidy
 
Windows 10 Module 2.pdf
Windows 10 Module 2.pdfWindows 10 Module 2.pdf
Windows 10 Module 2.pdfssuser536c36
 
9781337117562_ppt_ch01.pptxChapter 1An Overview of Compute.docx
9781337117562_ppt_ch01.pptxChapter 1An Overview of Compute.docx9781337117562_ppt_ch01.pptxChapter 1An Overview of Compute.docx
9781337117562_ppt_ch01.pptxChapter 1An Overview of Compute.docxsleeperharwell
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application SecurityDr. Ahmed Al Zaidy
 
Windows 10 Module 1.pdf
Windows 10 Module 1.pdfWindows 10 Module 1.pdf
Windows 10 Module 1.pdfssuser536c36
 
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and TechnologyChapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and TechnologyDr. Ahmed Al Zaidy
 
1WebDesign6EChapter1TheEnvironmentandtheTools.docx
1WebDesign6EChapter1TheEnvironmentandtheTools.docx1WebDesign6EChapter1TheEnvironmentandtheTools.docx
1WebDesign6EChapter1TheEnvironmentandtheTools.docxlorainedeserre
 
Intro to Web Design 6e Chapter 1
Intro to Web Design 6e Chapter 1Intro to Web Design 6e Chapter 1
Intro to Web Design 6e Chapter 1Steve Guinan
 
Chapter 14 Business Continuity
Chapter 14 Business ContinuityChapter 14 Business Continuity
Chapter 14 Business ContinuityDr. Ahmed Al Zaidy
 
Chapter12017
Chapter12017Chapter12017
Chapter12017husmos
 
Information and communication technology Textbook answers
Information and communication technology Textbook answersInformation and communication technology Textbook answers
Information and communication technology Textbook answersabdurrahman mafhoom
 
Intro to Web Design 6e Chapter 6
Intro to Web Design 6e Chapter 6Intro to Web Design 6e Chapter 6
Intro to Web Design 6e Chapter 6Steve Guinan
 
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementChapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementDr. Ahmed Al Zaidy
 
Word 2016 module 1 ppt presentation
Word 2016 module 1 ppt presentationWord 2016 module 1 ppt presentation
Word 2016 module 1 ppt presentationdgdotson
 
Word Module 1 Lesson
Word Module 1 LessonWord Module 1 Lesson
Word Module 1 LessonGulledgeE
 
Computing withBusiness Applications 1 Programming Log
Computing withBusiness Applications 1 Programming LogComputing withBusiness Applications 1 Programming Log
Computing withBusiness Applications 1 Programming LogLynellBull52
 

Similaire à Ecc 2016 module 1 ppt presentation (20)

Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security
 
Python Fundamentals
Python FundamentalsPython Fundamentals
Python Fundamentals
 
Windows 10 Module 2.pdf
Windows 10 Module 2.pdfWindows 10 Module 2.pdf
Windows 10 Module 2.pdf
 
9781337117562_ppt_ch01.pptxChapter 1An Overview of Compute.docx
9781337117562_ppt_ch01.pptxChapter 1An Overview of Compute.docx9781337117562_ppt_ch01.pptxChapter 1An Overview of Compute.docx
9781337117562_ppt_ch01.pptxChapter 1An Overview of Compute.docx
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Windows 10 Module 1.pdf
Windows 10 Module 1.pdfWindows 10 Module 1.pdf
Windows 10 Module 1.pdf
 
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and TechnologyChapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and Technology
 
1WebDesign6EChapter1TheEnvironmentandtheTools.docx
1WebDesign6EChapter1TheEnvironmentandtheTools.docx1WebDesign6EChapter1TheEnvironmentandtheTools.docx
1WebDesign6EChapter1TheEnvironmentandtheTools.docx
 
Intro to Web Design 6e Chapter 1
Intro to Web Design 6e Chapter 1Intro to Web Design 6e Chapter 1
Intro to Web Design 6e Chapter 1
 
Chapter 14 Business Continuity
Chapter 14 Business ContinuityChapter 14 Business Continuity
Chapter 14 Business Continuity
 
Chapter12017
Chapter12017Chapter12017
Chapter12017
 
Information and communication technology Textbook answers
Information and communication technology Textbook answersInformation and communication technology Textbook answers
Information and communication technology Textbook answers
 
Chapter 03.ppt
Chapter 03.pptChapter 03.ppt
Chapter 03.ppt
 
Intro to Web Design 6e Chapter 6
Intro to Web Design 6e Chapter 6Intro to Web Design 6e Chapter 6
Intro to Web Design 6e Chapter 6
 
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementChapter 11 Authentication and Account Management
Chapter 11 Authentication and Account Management
 
Word 2016 module 1 ppt presentation
Word 2016 module 1 ppt presentationWord 2016 module 1 ppt presentation
Word 2016 module 1 ppt presentation
 
Word Module 1 Lesson
Word Module 1 LessonWord Module 1 Lesson
Word Module 1 Lesson
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
 
Computing withBusiness Applications 1 Programming Log
Computing withBusiness Applications 1 Programming LogComputing withBusiness Applications 1 Programming Log
Computing withBusiness Applications 1 Programming Log
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Ecc 2016 module 1 ppt presentation

  • 1. 1 Essential Computer Concepts Module 1 Understanding Essential Computer Concepts © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 2. 2 • Recognize you live and work in the digital world • Distinguish types of computers • Identify computer system components • Compare types of memory • Differentiate between input devices • Explain output devices Module Objectives (Slide 1 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 3. 3 • Describe data communications • Define types of networks • Access security threats • Understand system software • Describe types of application software Module Objectives (Slide 2 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 4. 4 • The internet, computers, and mobile devices such as smartphones and tablets provide us with a world of information, literally at our fingerprints • Over the last 25 years, we can use the Internet to: • Instantly communicate with friends and coworkers • Store music and movies and access them anywhere • Search and apply for jobs without leaving home • Quickly access information • Shop for anything from clothing to food to cars • Manage finances, deposit checks, and pay at the cash register using a mobile device • Get directions, view maps, and find nearby restaurants Recognize You Live and Work in the Digital World (Slide 1 of 4) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 5. 5 • We can use the Web to get work done by: • Searching for information • Communicating with others through email or videoconferencing • Telecommuting • Cloud computing Recognize You Live and Work in the Digital World (Slide 2 of 4) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 6. 6 • How to be a good online citizen •Your internet activities can have lasting repercussions on your work and life •For example, employers are known to keep an eye on social media accounts of current or prospective employees •Be aware of copyright laws when using an item on-line for reports or presentations Recognize You Live and Work in the Digital World (Slide 3 of 4) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 7. 7 Recognize You Live and Work in the Digital World (Slide 4 of 4) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 7 • Couple using videoconferencing to communicate • Employee telecommuting from home
  • 8. 8 • Types of personal computers: • Desktop computers • Laptop computers • Tablets • Smartphones • Mainframe computers and supercomputers Distinguish Types of Computers (Slide 1 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 9. 9 • Touchscreens • Microsoft Windows 10 was also developed to work with touchscreen monitors, tablets, and smartphones • Many tasks are, in fact, easier to accomplish with a touchscreen device because they are designed for use with gestures instead of a mouse Distinguish Types of Computers (Slide 2 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 10. 10 Distinguish Types of Computers (Slide 3 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • Desktop • Laptop, smartphone, and tablet • Supercomputer
  • 11. 11 • A computer system includes computer hardware and software • Hardware refers to the physical computers • Software refers to the intangible components of a computer system, particularly the programs, or data routines, that the computer uses to perform a specific task Identify Computer System Components (Slide 1 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 12. 12 • An Overview of computer system components • Architecture • Data • Processing • Motherboard or CPU • Cards or removable circuit boards • Input and input devices • Output and output devices • Peripheral devices Identify Computer System Components (Slide 2 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 13. 13 • Motherboard Identify Computer System Components (Slide 3 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • Flow of information through a computer system
  • 14. 14 • Memory is one of the most important components of personal computer hardware as it stores instructions and data • Types of memory include: •Random access memory (RAM) which holds info while the computer is on •Cache memory is high-speed memory •Virtual memory •Read-only memory is a chip that stores the BIOS (Basic Input-Output System) •CMOS memory is a chip that stores the date, time and system parameters Compare Types of Memory (Slide 1 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 15. 15 • Upgrading Ram is one of the easiest ways to make your computer run faster • The more RAM a computer has, the more instructions and data can be stored there • You can often add more RAM by installing additional memory cards on the motherboard Compare Types of Memory (Slide 2 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 16. 16 •Relationships between types of computer memory Compare Types of Memory (Slide 3 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 17. 17 •Since RAM retains data only while the power is on, your computer must have a more permanent storage option •Types of storage media include •Magnetic storage devices such as a hard drive •Optical storage devices use laser technology to store data and include a CD, CD-ROM and DVD •Flash Memory •Solid-state drive (SSD) is intended as a replacement for a traditional hard disk drive •Solid-state hybrid drive (SSHD) combines the speed of an SSD with benefits of a traditional hard disk drive Summarize Types of Media (Slide 1 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 18. 18 Summarize Types of Media (Slide 2 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • Storage devices and RAM
  • 19. 19 Differentiate Between Input Devices (Slide 1 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • To accomplish a task, a computer first needs to receive the data and commands you input • In a typical system, you provide this information using an input device such as a keyboard or a mouse but wireless devices can also perform this function • There are many types of input devices • Keyboard • Pointing device, such a mouse, scroll wheel or trackball • Touchscreen, which accepts commands from fingers • Microphone • Scanner
  • 20. 20 Differentiate Between Input Devices (Slide 2 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • Personal computer pointing devices: mouse, trackball, and touchpad
  • 21. 21 • An output device is any hardware peripheral that communicates the results of data processing • Output devices may connect to computers with cables or wirelessly • Output devices include: • Monitor • Printer • Speakers Explain Output Devices © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 22. 22 • Data communications is the transmission of data from one computer to another or to a peripheral device • One computer sends the data over some type of channel such as telephone, coaxial cable or wirelessly • A device driver or driver handles the transmission protocols, which establishes the rules for data transfer • A driver is a computer program that can establish communication because it understands the characteristics of your computer and of the device Describe Data Communications (Slide 1 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 23. 23 • Computers communicate in multiple ways such as through a: • USB (Universal Serial Bus) • Ethernet port • Modem Describe Data Communications (Slide 2 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 24. 24 Describe Data Communications (Slide 3 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • Computer Expansion Ports
  • 25. 25 • A network connects one computer to other computers and peripheral devices, enabling you to share data and resources with others • To connect with a network via Ethernet, a computer must have a network interface card, which creates a communications channel between the computer and the network • Many desktops PC’s and laptops come with a NIC built-in, and an Ethernet cable is used to make the connection to a router or modem • A router is a device that controls traffic between network components • Network software is also essential, establishing the communication protocols that will be observed on the network Define Types of Networks (Slide 1 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 26. 26 • There are a variety of network types • Peer-to-peer network • Local area network (LAN) • Wide area network (WAN) • Wireless local area network (WLAN) • Personal area network (PAN) • Infrared technology use infrared light waves to “beam” data from one device to another Define Types of Networks (Slide 2 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 27. 27 Define Types of Networks (Slide 3 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • Typical network configuration
  • 28. 28 • Security refer to the steps a computer user takes to prevent unauthorized use of or damage to a computer • Malware is a broad term that describes any program designed to cause harm or transmit information without permission of the computer owner • In order to protect computers against a virus, users should use antivirus software • Spyware is software that secretly gathers information from your computer and then sends this data to a company or person that created it • A firewall is like a locked door on your computer or network and prevents other computers on the internet from accessing it Assess Security Threats (Slide 1 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 29. 29 • Criminals are relentlessly searching for new and aggressive ways of accessing computer users’ personal information and passwords • A spoofed site is a fake website set up to look like a legitimate website • Phishing refers to the practice of sending email to customers or potential customers of a legitimate website encouraging them to click a link in the email • Pharming occurs when a criminal breaks into a DNS server and redirects any attempts to access a particular website to the spoofed site Assess Security Threats (Slide 2 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 30. 30 • Windows Defender scan in progress Assess Security Threats (Slide 3 of 3) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 31. 31 • System software allocates system resources, manages storage space, maintains security, and detects equipment failure • Components of system software: • The operating system manages the system resources, which includes controlling basic data input and output • Utility software helps analyze, optimize, configure, and maintain a computer • Protecting information with passwords • To prevent anyone from guessing your passwords, always create and use strong passwords • A strong password consists of at least eight characters of upper and lowercase letters and numbers Understand System Software (Slide 1 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 32. 32 • Relationships between system software and other system components Understand System Software (Slide 2 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 33. 33 • Application software enables you to perform specific tasks such as writing letters, creating presentations, analyzing statistics, creating graphics, enhancing photos, and much more • Typical application software includes the following: •Document production software, which allows you to write and format text documents •Spreadsheet software, of which Microsoft Excel is an example •Database management software lets you collect and manage data •Presentation software allows you to create a visual slide show as with Microsoft PowerPoint •Multimedia authoring software allows you to record and manipulate image files •Information and task management software •Website creation and management software Describe Types of Application Software (Slide 1 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use
  • 34. 34 • Automatic spell checking in Microsoft Word Describe Types of Application Software (Slide 2 of 2) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use • Editing a worksheet in Microsoft Excel