By Mr. Abdalla A. Shaame 1. Uses of Computer PC at Home Common uses for the computer within the home  Computer games  Working from Home  Banking from.

Slides:



Advertisements
Similar presentations
Computer Skills Preparatory Year Presented by: L.Obead Alhadreti.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What is Cloud Accounting? Cloud Server AccountantClient A SOLUTION FOR YOUR BACK-OFFICE Using today’s technology, we can run your accounting and bookkeeping.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Everything your business needs to know but probably doesn’t.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
24/7/365 Remote Computer Support. Program Overview.
Significant Social & Ethical Issues. Significant Issues Year 2000 Y2K Problem Viruses Reliance on Software.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Living in a Digital World Discovering Computers 2011.
Installing software on personal computer
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Data Security GCSE ICT.
Video Following is a video of what can happen if you don’t update your security settings! security.
General Purpose Packages
Viruses.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Computer Viruses. – A computer virus is an application program designed and written to destroy other programs. – It has the ability to:  Link itself.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Grid-based Sensor Network Service on Future Internet By Mohammad Mehedi Hassan Student ID:
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Eng.Abed Al Ghani H. Abu Jabal Introduction to computers.
A virus is a piece of software tht is designed to copy itself onto other programs causing them to function differently. In the 80’s, when the viruses.
Types of Electronic Infection
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Grid-based Future Internet with Wireless sensor network By Mohammad Mehedi Hassan Student ID:
The Social Impact of Information and Communication Technology
The Social Impact of Information and Communication Technology on Business Lecture 9 1.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Introduction to Student Name Student Class.
Data Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
 LAN ◦ A LAN (Local Area Network) is a system whereby individual PCs are connected together within a company or organization.  WAN ◦ A WAN (Wide Area.
Computer in Everyday Life
How do I know if I need to switch supplier?. What information do I need to know before I can compare energy prices? My usage (kWh) and costs (£) for energy.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
NetTech Solutions Protecting the Computer Lesson 10.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
Anika Massey.  There are three main types of business:  Traditional  Online  Transportation.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Chapter Two Introduction to Information Technology Prepared by: Eman Amer.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Society & Computers PowerPoint
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
CHAPTER 18 TECHNOLOGY ADVANCEMENTS IN THE WORKPLACE.
A DVANTAGES AND D ISADVANTAGES OF CAG. A DVANTAGES AND D ISADVANTAGES OF CAD As with all new things there are good points and bad points. The introduction.
SOFTWARE. Software… Instructions that are stored electronically that tell the computer what to do.
Computer Security Sample security policy Dr Alexei Vernitski.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Application Software Chapter 6.
Advantages and Disadvantages of CAG
System And Application Software
Part 3.
Types of Software.
24/7/365 Remote Computer Support
Presentation transcript:

By Mr. Abdalla A. Shaame 1

Uses of Computer PC at Home Common uses for the computer within the home  Computer games  Working from Home  Banking from Home  Connecting to the Web 2

Application of Computer Computers in Education CBT (Computer Based Training) Computer Based Training (CBT) offers a low cost solution to training needs where you need to train a large amount of people on a single subject. These programs are normally supplied on CD-ROM and combine text, graphics and sound. 3

Application of Computer Office Applications Automated Production Systems Many car factories are almost completely automated and the cars are assembled by computer-controlled robots. This automation is becoming increasingly common throughout industry. Design Systems Many products are designed using CAD (Computer Aided Design) programs to produce exact specifications and detailed drawings on the computer before producing models of new products. 4

Application of Computer Stock Control Stock control is ideal for automation and in many companies it is now completely computerized. The stock control system keeps track of the number of items in stock and can automatically order replacement items when required. Accounts / Payroll In most large organizations the accounts are maintained by a computerized system. Due to the repetitive nature of accounts a computer system is ideally suited to this task and accuracy is guaranteed. 5

Application of Computer Computers in Daily Life  Accounts  Games  Educational  On-line banking  Smart ID cards  Supermarkets  Working from home (Tele-working)  Internet 6

Value of Backup The most important thing that you store on your computer is information. Often the contents of a hard disk can represent years of work. If the hard disk stops working one day you could lose all those years of work. For this reason it is VITAL that you take regular backups of the information that is stored on the computer. 7

Value of Backup Organize your computer for more efficient backups Complete vs. incremental backups Use 'off-site' storage Use a UPS (Un-interruptible Power Supply) 8

Computer viruses What are computer viruses? Viruses are small programs that hide themselves on your disks (both flush disk and your hard disk). Unless you use virus detection software Different viruses are activated in different ways. 9

Computer viruses How do viruses infect PCs? Viruses hide on a disk and when you access the disk (either a flush disk or another hard disk over a network) the virus program will start and infect your computer. The worst thing about a computer virus is that they can spread from one computer to another, either via use of infected flush disk, or over a computer network, including the Internet. 10

Computer viruses How to prevent virus damage There are a number of third party antivirus products available, most of them you have to pay for them. The main thing about your virus checker is that I should be kept up to date. Many companies supply updated disks on a regular basis or allow you to receive updates through an electronic, on-line bulletin board. 11

Discussion How often should you run antivirus software to scan your PC system for viruses? 12

Next lesson Application Software 13