mrs. cueni ic3 certification study guide. chapter 1 hardware and peripherals computer systems are...

126
IC3 Training Two Minute Drills Mrs. Cueni IC3 Certification Study Guide

Upload: betty-glenn

Post on 25-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

  • Slide 1
  • Mrs. Cueni IC3 Certification Study Guide
  • Slide 2
  • Chapter 1 Hardware and Peripherals Computer Systems are generally categorized in 4 primary groups Desktop Portable Handheld Embedded
  • Slide 3
  • Chapter 1 Hardware and Peripherals A Desktop computer or personal computer (PC) is the most frequently used computer system A desktop consists of 4 major component groups System unit Monitor Keyboard and mouse Peripheral devices
  • Slide 4
  • Chapter 1 Hardware and Peripherals The components inside the system unit are: Computer case Motherboard CPU Memory Cooling system Power supply Storage devices
  • Slide 5
  • Chapter 1 Hardware and Peripherals Portable computers lightweight, transportable PCs Notebook PC Laptop PC Tablet PC PDAs Personal Digital Assistants Subnotebook PCS Wearable computers
  • Slide 6
  • Chapter 1 Hardware and Peripherals Embedded computers is a self-contained system with its hardware and electron mechanical parts integrated into a single device Cars Sewing Machine Manufacturing equipment
  • Slide 7
  • Chapter 1 Hardware and Peripherals Standard input devices on a PC Keyboard and mouse Serve two purposes User to command and control the PC A Way to capture and enter data
  • Slide 8
  • Chapter 1 Hardware and Peripherals A mouse converts motion into electrical signals that track the pointer Two types of mice Optomechanical- ball and rollers move mechanically LED and sensors track motion Optical Other input devices Trackpads, trackballs and joysticks
  • Slide 9
  • Chapter 1 Hardware and Peripherals Output devices Monitor (displays) CRT uses electronic guns and phosphor LCD flat panel uses liquid crystal display Networking devices Audio systems Computer speakers external better sound than internal speakers
  • Slide 10
  • Chapter 1 Hardware and Peripherals Other input devices Digital cameras USB connection or CF cards Compact Flash memory Image scanners saves in in BMP, GIF, JPEG, PNG or TIFF File format Joysticks tracks movement from a center point Game controllers- better level of control
  • Slide 11
  • Chapter 1 Hardware and Peripherals Output devices printers Dot matrix multipart forms Inkjet- good quality print inexpensive Laser printers high-quality results
  • Slide 12
  • Chapter 1 Hardware and Peripherals Peripheral devices Internal connect to the PC through expansion cards PC card slot External peripherals connects through a devices cable to a jack or port of computers Device driver software than communicates with the hardware device and the OS (operating system)
  • Slide 13
  • Chapter 1- IC3 test Information from this chapter will be used throughout the test and it is assumed that you already know this The different computer types and applications Peripheral devices used for inputting data and outputting data The process used to install or connect a peripheral device to a computer
  • Slide 14
  • Chapter 2 Internal Hardware Everything a computer does is controlled by a microprocessor or CPU The CPU is a multifunctional integrated circuit that is made up of Control unit CU Arithmetic logic unit ALU Memory management unit MMU Registers
  • Slide 15
  • Chapter 2 Internal Hardware Bus system carries signals, addresses and data that needs to be transferred between the CPU, motherboard, I/O ports and expansion cards Types of bus structures Data bus Address bus Control bus
  • Slide 16
  • Chapter 2 Internal Hardware Processor kept at its designed operating temperature Too hot shuts down, performs poorly, gets damaged Heat sinks and fans help cool the processor
  • Slide 17
  • Chapter 2 Internal Hardware Processors are attached to a motherboard through two types of mounting sockets PGA-pin grid array have holes where the pins of the processor fit LGA-land grid arrays pins make contact with the pins of the processor
  • Slide 18
  • Chapter 2 Internal Hardware Chipset- allows PC to accept, display and move data Northbridge set controls and supports the main memory, cache memory and PCI bus controllers Southbridge set- peripheral devices and devices not essential to the PC
  • Slide 19
  • Chapter 2 Internal Hardware ROM Read Only Memory Non-volatile and retains its contents without a power source Stores PC startup instructions and the system BIOS Three types PROM, EPROM and EEPROM RAM- Random Access Memory Volatile and stores data as long as there is a power source RAM upgrades and replacement must match the PCs CPU and bus speed Most common type DRAM refreshed every 2 milliseconds
  • Slide 20
  • Chapter 2 Internal Hardware SDRAM is refreshed only when data is written to it SDRAM faster than DRAM SDRAM is commonly used for cache memory DRAM is common for system memory
  • Slide 21
  • Chapter 2 Internal Hardware Memory modules come in three types SIMMs singleinline memory modules Memory chips on one side of the circuit card DIMMS double-inline memory module current memory standard Memory chips on both sides of the circuit card SODIMMS smaller DIMMS for notebook
  • Slide 22
  • Chapter 2 Internal Hardware Front Side bus FSB specific path that connects the CPU and the RAM, the device controllers and the expansion bus
  • Slide 23
  • Chapter 2 Internal Hardware Cache memory fast memory used for frequently requested data and instructions Cache is located between RAM and the CPU Reduces access time Two types L1 - internal cache L2 external cache
  • Slide 24
  • Chapter 2 Internal Hardware Storage Media Hard disk drive secondary storage media Platters where data is stored on a HDD Two types of material for platters aluminum alloys and glass Most hard drives have two platters Accessed by a read-write head Hard drive platters are coated with a thin film medium
  • Slide 25
  • Chapter 2 Internal Hardware Each side of the platter has one read-write hear The read write heads moves in unison connected by the same actuator mechanism The read-write head uses magnetic flux to record data
  • Slide 26
  • Chapter 2 Internal Hardware Factors that Affect Computer Performance How well the CPU, memory and bus are aligned A wider data bus can speed up data transfer High end motherboards and chipsets will allow you to separate the data and the address buses Install a motherboard, chipset, caching, RAM and processor that use synchronous clocking Read manufacturers recommendations for the best memory size make sure speeds of the CPU, cache, FSB and RAM match
  • Slide 27
  • Chapter 2 Internal Hardware Run defragment software on your hard disk to better arrange the stored data for faster retrieval Install a virus scanner that looks for viruses, spyware, adware and malware Monitor the Windows task managers CPU and RAM utilization graphics Poor computer performance sometimes is based on a bad configuration of the operating system
  • Slide 28
  • Chapter 2 IC3 test 1-2 questions of test over this chapter understand the following: The purpose and use of the components that make up the CPU How primary memory is used in the storage of data and in the execution of program instructions The different types of storage media **The components, features, configuration settings that can impact the performance of a computer
  • Slide 29
  • Chapter 3 Power & Environmental Secure the area where the PC sits locked room Physically restrict the movement of the PC lockdown Key locks to prevent keyboard or mouse usage Cable locks to secure to a desk or table BIOS locks lowest level of security password needed Windows XP and Vista press Windows logo key and the L (lock) key you need to enter the password to get back in
  • Slide 30
  • Chapter 3 Power & Environmental Environment Smoke, fire, heat, water, foam and tiny particles of burnt material can damage computers Dust and debris- cause the cooling fan to bring the dust into the computer components Dry environments - Static electricity Humidity moisture in the air can damage parts
  • Slide 31
  • Chapter 3 Power & Environmental Public Power System High-voltage periods over- voltage, spikes or surges can burn/fry PC components Low-voltage periods under-voltage, brownouts Six types of electrical events EMI electromagnetic interference equipment in house RFI radio frequency interference fluctuations in power Power surges lightning storms Power spikes sudden high over-voltage event Power sags temporary dip in the voltage Brownouts when demand exceeds supply Blackouts total loss of power
  • Slide 32
  • Chapter 3 Power & Environmental Devices that help Surge suppressor suppress power surges Should include an MOV metal-oxide varistor which redirects the current to the ground Line conditioner controls surges and spikes and eliminate electric noise UPS Uninterruptible power supply protects against brownouts and blackouts
  • Slide 33
  • Chapter 3 IC3 test Physical risks to a computer Theft or malicious damage Environmental issues Electrical power risks
  • Slide 34
  • Chapter 4 Maintaining & Troubleshooting Most common hardware issues Electrical power source I/O switch Device connections Device configuration Device drivers
  • Slide 35
  • Chapter 4 Maintaining & Troubleshooting Cleanliness is the best prevention for hardware issues Hardware issues caused by poor maintenance Poor system case cooling and ventilation Slow hard disk performance Power supply degradation Keyboard and mouse issues
  • Slide 36
  • Chapter 4 Maintaining & Troubleshooting Preventative maintenance by users include cleaning, checking and scanning activities such as: Virus scanning Cleaning PC exterior Disk drive scanning Checking power protection devices
  • Slide 37
  • Chapter 4 Maintaining & Troubleshooting Leave the following to an expert: Internal components of a monitor Power supply Microprocessor Memory Electrical connections in the system case
  • Slide 38
  • Chapter 4 Maintaining & Troubleshooting Professional computer technician Cleaning the inside of the case Checking cables and expansion cards Checking or replacing power supply Installation or major upgrades to computer components Upgrading the BIOS
  • Slide 39
  • Chapter 4 Maintaining & Troubleshooting General troubleshooting - 5 step process Identify the symptoms of the problem Replicate the problem Evaluate all possible causes fro the problem Diagnose each of the possible causes and isolate the likely cause Apply a correction, configuration, repair or replacement to solve the problem
  • Slide 40
  • Chapter 4 Maintaining & Troubleshooting Keep a maintenance log of past problems it can be valuable when troubleshooting issues Questions to ask When did this first happen? Is this the first time this happened? What activity was being performed? Can the problem be recreated? Did you add hardware or software to the PC right before the problem? Is there a weather or environmental issue present?
  • Slide 41
  • Chapter 4 Maintaining & Troubleshooting Good staring point for unidentified problems: power sources/supply Also, include the PCs environment when diagnosing issues
  • Slide 42
  • Chapter 4 Maintaining & Troubleshooting Processor issues due to: Issue with cooling of processor Power supply Compatibility issue with the motherboard and chipset Symptoms of processor failure The PC wont boot The PC boots, but OS doesnt start PC crashes during startup PC suddenly has parity errors integrity of the data PC locks up after a few minutes of operation
  • Slide 43
  • Chapter 4 Maintaining & Troubleshooting Hard Disk problems caused by: Hard disk drive Hard disk controller SCSI host adapter Cabling Power supply
  • Slide 44
  • Chapter 4 Maintaining & Troubleshooting RAM problems caused by: After new memory is installed Electrical problems on the motherboard Configuration of RAM Compatibility of RAM Improper installation of RAM
  • Slide 45
  • Chapter 4 Maintaining & Troubleshooting Video performance issues: Power or data connection issues Video configuration Monitor compatibility Device driver issues
  • Slide 46
  • Chapter 4 Maintaining & Troubleshooting Power supply issues Use a multimeter to check for proper voltage on each power connector
  • Slide 47
  • Chapter 4 Maintaining & Troubleshooting To diagnose audio or sound issues Verify that there are no system resource conflicts Speakers are plugged into the jacks Speaker wire is not crimped or broken Proper device drivers are installed
  • Slide 48
  • Chapter 4 Maintaining & Troubleshooting Keep in mind computer technicians do not have the same abilities Guidelines when selecting a technician: Certifications IC3, Comp TIA A+ References Warranties do they offer warranties on their work? Years of experience more experience might be more efficient
  • Slide 49
  • Chapter 4 IC3 test At least two questions on computer hardware and software problems and troubleshooting
  • Slide 50
  • Chapter 5 Computer Software Software is divided into three groups System software Utility software Application software
  • Slide 51
  • Chapter 5 Computer Software System software creates and manages the foundation structure on which other software operates Utility or special purpose software performs tasks that help the operating system Applications is task oriented software and assists a user to perform a work or recreational task
  • Slide 52
  • Chapter 5 Computer Software CPU uses a fetch-decode-execute cycle to obtain instructions from memory Fetch requests instructions to be provided from CPU, RAM, cache, storage or a register device Decode- certain opcodes have certain functions so there is no overlap 04 Add E6 - output to port Executes performs the opcode through the CPU
  • Slide 53
  • Chapter 5 Computer Software 4 primary actions opcodes perform Control operations Data processing Input/output Data transfer
  • Slide 54
  • Chapter 5 Computer Software A buffer is memory used to hold data in transit especially when the sending device has a faster transfer rate than the receiving device
  • Slide 55
  • Chapter 5 Computer Software PC architecture has system resources that are assigned to specific devices to facilitate requests for service Interrupts CPU checks this after each instruction is executed making sure the request for service has been made I/O addresses CPU assigns an address to that instruction hexadecimal number DMA channels allows devices to read or write directly to and from memory without intervention from the CPU Direct memory access
  • Slide 56
  • Chapter 5 Computer Software PC system resources are viewed through the Windows Device manager A device driver is the interface between the hardware device and the operating system and application software
  • Slide 57
  • Chapter 5 Computer Software A software license grants a user to install and use software according to the rules in the EULA End User License Agreement Three types of software licenses Free licenses Open source licenses Proprietary licenses
  • Slide 58
  • Chapter 5 Computer Software Software upgrade replaces an installed version of a software package with a completely new version Software update applies a patch and corrections to an installed version of a software package.
  • Slide 59
  • Chapter 5 IC3 test Three primary types of software: System software Applications software Utility software Give examples of software under each category How hardware interacts with system software, how application software interacts with system software How and when utility software is used
  • Slide 60
  • Chapter 6 Application Software
  • Slide 61
  • Chapter 17 Data communications Basics Digital Signals transmits on two primary frequencies Analog signals use multiple frequencies and amplitudes to represent data. Requires a frequency spectrum to transmit sound and data
  • Slide 62
  • Chapter 17 Data communications Basics Modern networks are digital networks Modem translates between digital and analog signals Modulates digital signals into analog signals for transmission Demodulates received analog signals to digital format
  • Slide 63
  • Chapter 17 Data communications Basics Protocol set of rules that govern devices to transmit data Most common protocols for LANs and WANs are the TCP/IP suite Protocols are most influenced by the OSI model First Seven steps Ensures networks can communicate with others
  • Slide 64
  • Chapter 17 Data communications Basics Protocols are modelled from the OSI model Open System Interconnect (OSI) Reference Model 7 layers each layer identifies an operation that must occur in a network data communication Physical Data Link Network Transport Session Presentation Application
  • Slide 65
  • Chapter 17 Data communications Basics As data is transferred in is divided into packets called Protocol Data Units (PDU) Data transmitted over wires and through air use radio frequency (RF) signaling that can be intercepted. Needs to be encrypted Network security provided by TCP/IP
  • Slide 66
  • Chapter 17 Data communications Basics Standard wiring used in networks is called TP cable (twisted pair) UTP unshielded twisted pair doesnt include shielding STP- Shielded twisted pair have foil or metallic shielding
  • Slide 67
  • Chapter 17 Data communications Basics Cable categories for Twisted Pair (TP) CAT 5 CAT 5e CAT 6 Varies in number of wire pairs. Twists per inch, bandwidth, usage, maximum segment length
  • Slide 68
  • Chapter 17 Data communications Basics Coaxial cable Single core wire encased in a layer of insulation, wrapped in wire mesh and enclosed in plastic Used when a more robust cable is needed for damp, exposed or short vertical installations
  • Slide 69
  • Chapter 17 Data communications Basics Fiber Optic Higher bandwidth than TP or coaxial Can be single mode or multimode Single-mode carries a single signal over long distances Multimode carries multiple signals over shorter distances
  • Slide 70
  • Chapter 17 Data communications Basics TP Twisted pair use the RJ-45 connector on the end Coaxial cable terminated with a BNC connector named after Bayonet Neill-Concelman connector Can use an F connector for cable TV Fiber Optics connectors are SC, ST, LC and MT
  • Slide 71
  • Chapter 17 Data communications Basics Securing a network Authentication verifies users by username and password Authorization determines actions and accesses the user has been granted
  • Slide 72
  • Chapter 17 Data communications Basics Use a strong password to avoid unauthorized access Sufficient length Variety of characters Easy to remember
  • Slide 73
  • Chapter 17 Data communications Basics Network threats try to occupy the network router or server The most common types if network home threats are DoS Denial of Service and IP spoofing page 482
  • Slide 74
  • Chapter 17 Data communications Basics A firewall performs packet filtering and denies access to internal networks from external sources
  • Slide 75
  • Chapter 17 Data communications Basics Wireless security systems are MAC Media Access Control address filtering WPA Wi-Fi Protected Access WEP Wired Equivalent Privacy
  • Slide 76
  • Chapter 18 Network Basics A network is an arrangement the interconnects two or more computers for the purpose of sharing resources. A network varies in size and scope. It can be small enough for a company or large enough for a whole company The biggest network in the Internet
  • Slide 77
  • Chapter 18 Network Basics Network topology is the pattern of how the computers are arranged Five basic topologies Peer-to-peer Bus Star Ring Mesh
  • Slide 78
  • Chapter 18 Network Basics Peer-to-peer Most primitive As you connect computers in a daisy chain fashion Practical limit of 10-15 Bus Designed around a primary network cable Computers connect to the main network cable Use hub switch or tap
  • Slide 79
  • Chapter 18 Network Basics Star Connects computers or nodes to a signal source Each computers has a dedicated bandwidth Ring The network backbone is arranged in a loop Devices connect to the ring through MSAUs Multiple- station access units (smart hubs)
  • Slide 80
  • Chapter 18 Network Basics Mesh Connects each node to all other nodes The benefit is that the nodes can communicate with each other even when direct connectivity is lost
  • Slide 81
  • Chapter 18 Network Basics Two types of networks LAN Local Area Network Must have at least two computers Exists for the purpose of sharing resources LANs can host Intranets or Extranets WAN Wide area Network Allows communication between other networks Larger geographical area
  • Slide 82
  • Chapter 18 Network Basics Other types of networks PAN Personal Area Network Home use Can use cables, Radio Frequency, Infra-red 30 feet or less CAN Campus Area network Business schools College campuses MAN Metropolitan Area network Downtown core of a city for business, government, schools, libraries
  • Slide 83
  • Chapter 18 Network Basics Network devices include: Repeaters used to boost a signal Hubs allows sharing of bandwidth between devices Smart hubs Switches think of a switch board operator Signals directed to correct device Bridges connects two networks Can be with dissimilar types (Token Ring and Ethernet) Routers- primary connection point Determines the best path for data packets
  • Slide 84
  • Chapter 18 Network Basics Majority of local networks are client/server types Benefit is that shared resources are centralized Files / Programs Printers/Scanners Benefits of Networked computers Enhanced communication/collaboration Cost and error reduction Simplified system maintenance
  • Slide 85
  • Chapter 18 Network Basics Risks to Networks includes: Weak passwords Viruses Weak or non existent security measures Catastrophic loss External and internal threats
  • Slide 86
  • Chapter 19 E-Mail systems Email message made up of two components Message header Source and destination address Subject and Data CC,BCC Message ID Reply to Message Body Text, graphics, video Sent either ASCII or HTML format
  • Slide 87
  • Chapter 19 E-Mail systems Email address three parts Local-part mailbox or user name @ address separator Domain identity the Internet address of the server [email protected]
  • Slide 88
  • Chapter 19 E-Mail systems Security risks Email attachments Attach a file paper clip Include an item Attach an electronic business or address card Dont open from unknown sources Generally they are safe
  • Slide 89
  • Chapter 19 E-Mail systems Signature block Can be manually or automatically placed in the email body Incoming emails are placed in an Inbox until the client connects or downloads them
  • Slide 90
  • Chapter 19 E-Mail systems Two protocols are used POP3 Post Office Protocol version 3 After each message is downloaded, it is deleted from the mail server Downloads message (desktop computers) IMAP Internet Message Access Protocol Message resides on the mail server mailbox (mobile devices) User sees header information
  • Slide 91
  • Chapter 19 E-Mail systems Address book stores email addresses and other contact information Email security involves Protect against unsolicited messages Securing outgoing mail
  • Slide 92
  • Chapter 19 E-Mail systems A spam filter and antivirus software provides defense against unsolicited and potentially harmful email messages Two methods can be applied to secure outgoing mail Digital signatures Security device Sender is who they claim to be registered or certified mail Encryption- Transfers readable text to encodes or unreadable text Private keyssending end Public key that matches on receiving end
  • Slide 93
  • Chapter 20 Communication over a Network Major types of electronic communications Blogs Social Networking Computer-based teleconferencing E-Mail Internet telephony Vontage, Skype alternative to public phone system Video and images Text and Instant messaging
  • Slide 94
  • Chapter 20 Communication over a Network Electronic collaboration- two or more people discussing, developing, creating or reviewing a common entity College example High school projects Google docs
  • Slide 95
  • Chapter 20 Communication over a Network Advantages of electronic collaboration Elimination of travel Avoids interruptions in other duties Availability of input rom team members Disadvantages Conflicts due to personal philosophies, cultural differences, unfamiliarity with software Online Technical support becomes important
  • Slide 96
  • Chapter 20 Communication over a Network In s synchronous collaborative session Each participant gets a password for access to the session Users are assigned usernames to identify them to other participants Blackboard example
  • Slide 97
  • Chapter 20 Communication over a Network Advantages of electronic communications Enhanced participation Flexibility Speed of exchange Disadvantages Diversity of audience Performance Voice
  • Slide 98
  • Chapter 20 Communication over a Network Netiquette guidelines and best practices that should be followed in electronic communications Chain letters jokes etc to mutiple recipients Copyright-know and understand copyright Flames-angry mesages Identity subject line, signature block Message length Ownership be sure you know who owns the email Security always assume messages are not secure
  • Slide 99
  • Chapter 20 Communication over a Network Timely response Addresses make sure you are on the To: line Spelling and grammar E-mail attachments E-mail privacy-dont share addresses without permission E-mail graphics animated, innapropraite, sound files
  • Slide 100
  • Chapter 20 Communication over a Network Acceptable Use Policy AUP defines what authorized users on a network can and can not do Signed in school At work Can get fired Top reasons for people getting fired
  • Slide 101
  • Chapter 21 The Internet and the Web The Internet is the largest WAN in the world It is a physical structure Consists of sub-networks Web subnetworks E-mail subnetworks Voice communication sub-networks
  • Slide 102
  • Chapter 21 The Internet and the Web Internet terms IP address Internet Protocol 32 bit, 128 bit Each nodes has an IP address Router directs network traffic TCP/IP Transmission Control Protocol/Internet Protocol rules and guidelines to transmit and receive messages (for structure, not people) World Wide Web information Web-vehicle to navigate the WWW Uses links
  • Slide 103
  • Chapter 21 The Internet and the Web Hyperlink contains URL of page, the name of the host or server and domain identity Web Browser-software to see the file and interpret the HTML or scripting code used Window to the Internet Internet Explorer Firefox Opera Safari Chrome
  • Slide 104
  • Chapter 21 The Internet and the Web IANA and ICANN agencies that assigns and monitors the IP addresses, domain names, content and media types 9 types Content Media Audio MPEG, MP3, WMA, RA, WAV Human-readable-CSS, HTML and XML Image-GIF, JPEG,PNG, TIF, SVS, ICO Message - HTTP Multipart MIME Multipurpose Internet Mail Extensions Multipurpose-ZIP HTML, XHTML Non-standard PHP, Adobe Flash Vendor specific- Word, Open office, Excel Video-MPEG1, MP4, QuickTime Windows Media Player WMV
  • Slide 105
  • Chapter 21 The Internet and the Web Website can contain many webpage types Active Server, HTML Each has a purpose Blog, ecommerce, forum site, portal site
  • Slide 106
  • Chapter 21 The Internet and the Web Website layout and contents Consistency is the key Design features Banner, sidebar, body An contain forms, frames, hyperlinks, horizontal bars and tables
  • Slide 107
  • Chapter 21 The Internet and the Web Security settings of a Web Browser Customized for home, school or business Can prevent unwanted pages, popups or drop down windows and browser script attacks
  • Slide 108
  • Chapter 21 The Internet and the Web Web Browsers Navigation bar is important Built in search features History of sites visited List of favorite sites Bookmarks
  • Slide 109
  • Chapter 21 The Internet and the Web Most common Web Browser errors are misspellings of URLs Browser version compatibility Garbled text- improper font substitution Page Not Found errors 400 error codes problem caused by resource request 500 error codes problem with the host server Plug-ins or Add-ins Pop-up pages Slow or interrupted page loading Spoofing or phishing
  • Slide 110
  • Chapter 22 Working with Content on the Internet Content on the Web is created using HTML Hypertext Markup Language Defines characteristics of text, graphics and links 3 parts- page itself, header, body Page is made up of tables, lists and forms Scripting languages VBScript, JavaScript Can access data from other objects on the page
  • Slide 111
  • Chapter 22 Working with Content on the Internet Web search engine creates a database of Web content operates in three steps Web crawling a spider returns content from search Indexing content returned is then indexed or ordered Searching search engine, searches its content for matches
  • Slide 112
  • Chapter 22 Working with Content on the Internet Selection Based Search engine use the mouse to highlight any term and the search is conducted outside the web page Meta-Search Engine meta-crawler DogPile and Vivisimo sends search criteria to other search engines and compiles the results
  • Slide 113
  • Chapter 22 Working with Content on the Internet 4 considerations to verify the quality and validity of information Identify the source and the level of the expertise on the topic Check the objectivity-bias un Control Check the timeliness Verify the validity of the information
  • Slide 114
  • Chapter 22 Working with Content on the Internet Everything on the Web is copyrighted The creator, originator, poet, composer, author owns the copyright the instant the information is posted Trademark is a word, phrase or image that has been registered with the US Patent and Trademark Office Retina Display
  • Slide 115
  • Chapter 22 Working with Content on the Internet Plagiarism is using or closely imitating the words or thought of another person and representing them as your own pg 599 FTP File Transfer Protocol transfer files from one computer to another over the Internet
  • Slide 116
  • Chapter 23- Computers at Home, Work and School Computer Technology has evolved over 5 generations Mechanical device generation 300 years 1600-1900 1 st 1930-1950 ENIAC, UNIVAC 2 nd smaller and faster components COBOL, Fortran 3 rd Early 602-70s (1st generation as we know it today) 4 th generation mid 70s present personal computers
  • Slide 117
  • Chapter 23- Computers at Home, Work and School Computer technology benefits every industry Banking Forecasting Tracking Manufacturing Law enforcement Transportation Medical
  • Slide 118
  • Chapter 23- Computers at Home, Work and School Technology has changed the way people work Telecommute Use VPNs virtual private networks
  • Slide 119
  • Chapter 23- Computers at Home, Work and School Computer in school Interactive learning Record-keeping Research and analysis Commuter at Home Home theater systems Environmental control systems Security systems
  • Slide 120
  • Chapter 23- Computers at Home, Work and School Physically disabled people benefit through adaptive technologies to help with Speech text messaging on phones Hearing speech recognition software Vision-talking watches, talking computers Mobility computer keyboards, joysticks, hand foot switches Sip and puff control devices
  • Slide 121
  • Chapter 24- The Risks and Disadvantages of Computers in Society Risks and threats with the use of a computers if not properly addressed, could become major issues Users should Safeguard against software threats Protect their privacy Avoid e-commerce hazards Use computers ethically Dispose of equipment responsibly
  • Slide 122
  • Chapter 24- The Risks and Disadvantages of Computers in Society To avoid injuries to your neck, shoulders, wrists arms hands and eyes follow guidelines Read from page 619-621 OSHA guidelines for safe computing How to sit and work on a computer Workspace furniture
  • Slide 123
  • Chapter 24- The Risks and Disadvantages of Computers in Society Viruses, Malware, worms and Trojan Horses can invade your computer Install and update antivirus software Run regularly Install a software firewall Protect sensitive information on your computer Encryption passwords
  • Slide 124
  • Chapter 24- The Risks and Disadvantages of Computers in Society Protect your privacy Restrict personal information shared Email address Social networking
  • Slide 125
  • Chapter 24- The Risks and Disadvantages of Computers in Society When using the Internet and Web, observe: copyright rules trademark laws user agreements AUPs software licenses Data ownership Permitted access
  • Slide 126
  • Chapter 24- The Risks and Disadvantages of Computers in Society Computers and peripherals contain a significant amount of lead, mercury, cadmium and other toxic materials Follow EPA regulations when disposing of these items Recycling centers