Module 2 Short Managing files continued.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

GCSE ICT Networks & Security..
4.03 IT PowerPoint Objective 4.03—Understand Information Technology activities and careers.
Types of Computers & Computer Hardware Computer Technology.
Input Devices. What is input? Input refers to the process of entering data, programs, commands and user responses into memory Programs are sets of instructions.
Computer Systems.
4.03 IT PowerPoint Objective 4.03—Understand Information Technology activities and careers.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
ICT at Work Global Communication.
Standard Grade Computing COMMERCIAL DATA PROCESSING CHAPTER 13.
Local & Wide Area Networks
Introduction to computers. What is a personal computer? Capacity: Large hard disks combined with a large working memory (RAM) Speed: Fast. Normally measured.
What is Information Technology?
LESSON 2 Input and Output Devices
Welcome to Computer Solutions I!
Programming and Application Packages
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Computer Components Checklist There are many parts that work together to make a computer work.
2.00 Understand Computer Fundamentals. Unit Objective: 2.02.
2.00 Understand Computer Fundamentals. Unit Objective: 2.02.
Course ILT Basics of information technology Unit objectives Define “information technology” (IT), distinguish between hardware and software, and identify.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Eng.Abed Al Ghani H. Abu Jabal Introduction to computers.
Module 0 resources Presented by: Oscar Abagali Nkrumah Duncan Williams Gerard Ataogye Anthony Sarpong On 14/03/2013.
Information Technology. Information technology Information technology can be defined as a collection of computer, hardware, software, database, networking.
Networks.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
Module 0 resources Presented by: Osacr Abagali Nkrumah Duncan Williams Gerard Ataogye Anthony Sarpong On 14/03/2013.
Transferring data.  Most commercial computer users need to allow their employees to share data.  It also needs more than one employee to access the.
Computer Hardware Software, Memory & Storage Internet & EthicsPowerPoint
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Chapter Two Introduction to Information Technology Prepared by: Eman Amer.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
KEYBOARDING 1 Computer Basics. Definitions Computer  An electronic, digital, programmable machine that has four functions  accepts input  processes.
Module 2 Short Including preparation for ECDL testing.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Technical Implementation: Security Risks
Network and hardware revision
4.1 Computers And Human Beings
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Administrative Practices Outcome 1
GCSE ICT – REVISION QUESTIONS
Information Technology
UNIT 19 Data Security 2.
Computer Hardware-Meeting the machine
Definition, DIS/Advantages & Services
The computer work station
Topic 6: Issues Press F5 to view!
Business Technology Applications
Types of Computers & Computer Hardware
Business Computer Technology
ICDL چیست ؟ گواهینامه کار با کامپیوتر در حوزه اروپا و خارج از اروپا گواهینامه بین المللی ICDL نامیده می شود. این گواهینامه یک استاندارد جهانی برای.
Computer Ethics.
Understand Information Technology activities and careers.
BCT 2.00 Analyze Technology Issues
Security of People, Property and Information
4.03 IT PowerPoint Objective 4.03—Understand Information Technology activities and careers.
Part 3.
How ICT is used Businesses, Organisations and Individuals use Information Technology in many ways.
HOW DO I KEEP MY COMPUTER SAFE?
Unit 4 IT Security Kerris Davies.
4.03 IT PowerPoint Objective 4.03—Understand Information Technology activities and careers.
Presentation transcript:

Module 2 Short Managing files continued. Including preparation for ECDL testing

Extra revision slides on Module 2 Email is quick and easy and means you don’t have 2 write documents again as you can keep printing the same documents. E commerce is the process of doing business over the internet being able 2 view up to date info cheaper becauce cutting out middle man service 24 hrs a day materials delivered direct Disadvantage: data insecure sometimes, no personal touch, website might be misleading Ergonomics health and safety Security and anti virus software Copyright and data protection Types of software

Computers at work Manufacturing eg controlling robots and machines Banking online and atms Travel agency and airlines Governments for motor tax Medical eg life support systems Shops eg bar coding and stock controls

Uses of computers Computers in the home for paying via motor tax.ie Shopping, paying bills, chat rooms, remote access= teleworking Computers in education; vice principals may use it for timetabling keeping records e.g. excel.

Ergonomics . Ergonomics is the study of when and how we use computer equipment and furniture. Safety precautions no food or drink in the computer room disconnect in stormy weather, protect computers from a power surges. We use an uninterupted power supply and turn off monitors

security . Information securiy Use lock or motion detectors to stop things being stolen Hacking is an example of unauthorised entry into confidential info To make info more secure you must have a good password policy no the data protection act 1988 and keep backup copys Keep ab tutor software on your computer so u can monitor exactly what each employee or student has been doing on the computer Viruses are instructions that attach to files reproduce and spread to other files eg the I love you virus infected 72 million computers in 3 hours costing millions to people Install anti virus software

copy rights . Copyright works the same way as both books and music you must register your brand licencing as end user license. Data protection act says that info must be gotten fairly from people and people have the right 2 see their info stored.

Other software Commercial software Shareware is software that is freely available for a period of time until after a while you have 2 pay 4 it Free ware no payment is due public domain software

More about computers and revision Control alt + 4 gives € Revision that Mouse, trackball, touch pad, light pen, scanners, joysticks, microphones and digital cameras can be inputs

Internet Set up revision Modem= connects the computer to the telephone lines.Often a card plugged into the back of the computer.Uses digital signals. Internet server provider= eir PSTN=public switched telephone network ISDN= was designed for transmitting digital rather than analogue signals Optic fibre cable fastest

Tips on managing files The speed of the CPU is usually measured in MH or GHz Ram cannot store data when the computer is switched off. Receiving software updates from the internet will involve a client server relationship Back up data is best stored in another building

Open source software is free software Personal protection of individual data is an nb part of data legislation Data subject has the right to access their own personal data Data controllers must collect data only for legitimate purposes.

Conclusion About Output and Input Networks Other software types Data and security Ergonomics Tips Irish Data protection act