0% found this document useful (0 votes)
404 views

Compilation of Handouts

Uploaded by

Leslie Alcantara
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
404 views

Compilation of Handouts

Uploaded by

Leslie Alcantara
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 105

TECHNOLOGICAL UNIVERSITY OF THE PHILIPPINES

Ayala Blvd., Ermita, Manila, 1000 Metro Manila


COLLEGE OF INDUSTRIAL TECHNOLOGY
FOOD AND APPAREL TECHNOLOGY DEPARTMENT

COMPUTER APPLICATION

ORAL PRESENTATION: HANDOUTS


(COMPILATION)

Submitted by:

BT-NFT 3C / 3D

Submitted to:

Prof. Vernan M. Isla

JULY 11, 2022

S.Y. 2021 – 2022


INFORMATION TECHNOLOGY, THE INTERNET, AND YOU

Cloud Computing

- Cloud computing is the delivery of different services through the Internet. These
resources include tools and applications like data storage, servers, databases,
networking, and software.
- Rather than keeping files on a proprietary hard drive or local storage device,
cloud-based storage makes it possible to save them to a remote database.
- Cloud computing is a popular option for people and businesses for a number of
reasons including cost savings, increased productivity, speed and efficiency,
performance, and security.

Understanding Cloud Computing

- Cloud computing is named as such because the information being accessed is


found remotely in the cloud or a virtual space.
- Companies that provide cloud services enable users to store files and
applications on remote servers and then access all the data via the Internet.
- Cloud Computing takes all the heavy lifting involved in crunching and
processing data away from the device you carry around or sit and work at. It
also moves all of that work to huge computer clusters far away in cyberspace.
- Cloud computing can be both public and private. Public cloud services
provide their services over the Internet for a fee. Private cloud services, on the
other hand, only provide services to a certain number of people
- There is also a hybrid option, which combines elements of both the public and
private services.

Types of Cloud Service

 Email
 Storage, backup, and data retrieval
 Creating and testing apps
 Analyzing data
 Audio and video streaming
 Delivering software on demand

Deployment Methods

 Public Clouds - Provide their services on servers and storage on the Internet.
These are operated by third party companies, who handle and control all the

2|Page
hardware, software, and the general infrastructure. Clients access services
through accounts that can be accessed by just about anyone.
 Private Clouds - Are reserved for specific clientele, usually one business or
organization. The firm's data service center may host the cloud computing
service. Many private cloud computing services are provided on a private
network
 Hybrid Clouds - are, as the name implies, a combination of both public and
private services. This type of model allows the user more flexibility and helps
optimize the user's infrastructure and security.

Types of Cloud Computing

1. Software-as-a-service (SaaS) - involves the licensure of a software


application to customers. Licenses are typically provided through a pay-as-
you-go model or on-demand. This type of system can be found in Microsoft
Office's 365
2. Infrastructure-as-a-service (IaaS) - involves a method for delivering
everything from operating systems to servers and storage through IP-based
connectivity as part of an on-demand service. Clients can avoid the need to
purchase software or servers, and instead procure these resources in an
outsourced, on-demand service. Popular examples of the IaaS system include
IBM Cloud and Microsoft Azure.
3. Platform-as-a-service (PaaS) - is considered the most complex of the three
layers of cloud-based computing. PaaS shares some similarities with SaaS,
the primary difference being that instead of delivering software online, it is
actually a platform for creating software that is delivered via the Internet.
This model includes platforms like Salesforce.com and Heroku.

Advantages of Cloud Computing

- Cloud-based software offers companies from all sectors a number of benefits,


including the ability to use software from any device either via a native app
or a browser.
- Cloud computing is far more than just accessing files on multiple devices.
- Cloud computing services also make it possible for users to back up their
music, files, and photos, ensuring those files are immediately available in the
event of a hard drive crash.
- The cloud structure allows individuals to save storage space on their desktops
or laptops.

3|Page
Disadvantages of Cloud Computing

- Security has always been a big concern with the cloud especially when it
comes to sensitive medical records and financial information.
- Servers maintained by cloud computing companies may fall victim to natural
disasters, internal bugs, and power outages, too.
- As with any technology, there is a learning curve for both employees and
managers.

The World Business

 Google Cloud
 Amazon Web Services (AWS)
 Microsoft Azure
 IBM Cloud
 Alibaba Cloud

Conversion of Scientific Data

- What does conversion mean in science? conversion: the


act of changing from one form, unit, or state to another.
ratio: the relationship between two or more quantities;
relative amounts of two or more values expressed as a
proportion.
- Data conversion is the process of translating data from one format to another.
While the concept itself may seem simple, data conversion is a critical step in
the process of data integration.
- Data conversion is the conversion of computer data from one format to
another. Throughout a computer environment, data is encoded in a variety of
ways. For example, computer hardware is built on the basis of certain
standards, which requires that data contains, for example, parity bit checks.

Example of conversion this are:

THE INTERNET, THE WEB AND ELECTRONIC COMMERCE


4|Page
Internet

- a system architecture that has revolutionized communications and methods of


commerce by allowing various computer networks around the world to
interconnect. Sometimes referred to as a “network of networks,”.
- The Internet provides a capability so powerful and general that it can be used for
almost any purpose that depends on information, and it is accessible by every
individual who connects to one of its constituent networks. It supports human
communication via social media, electronic mail (e-mail), “chat rooms,”
newsgroups, and audio and video transmission and allows people to work
collaboratively at many different locations. It supports access to digital
information by many applications, including the World Wide Web. 
- The Internet has revolutionized the computer and communications world like
nothing before. The invention of the telegraph, telephone, radio, and computer set
the stage for this unprecedented integration of capabilities. The Internet is at once
a world-wide broadcasting capability, a mechanism for information
dissemination, and a medium for collaboration and interaction between
individuals and their computers without regard for geographic location. The
Internet represents one of the most successful examples of the benefits of
sustained investment and commitment to research and development of
information infrastructure. Beginning with the early research in packet switching,
the government, industry and academia have been partners in evolving and
deploying this exciting new technology.

Origin of Internet

- The origins of the internet are rooted in the USA of the 1950s. The Cold War was
at its height and huge tensions existed between North America and the Soviet
Union. Both superpowers were in possession of deadly nuclear weapons, and
people lived in fear of long-range surprise attacks. The US realized it needed a
communications system that could not be affected by a Soviet nuclear attack.
- At this time, computers were large, expensive machines exclusively used by
military scientists and university staff.
- The Elliott-NRDC 401 was one of the first electronic
computers, developed by British electrical company
Elliott Brothers in 1952 
- President Dwight D. Eisenhower formed the Advanced
Research Projects Agency (ARPA) in 1958, bringing
together some of the best scientific minds in the
country. Their aim was to help American military technology stay ahead of its
enemies and prevent surprises, such as the launch of the satellite Sputnik 1,

5|Page
happening again. Among ARPA’s projects was a remit to test the feasibility of a
large-scale computer network.
- Lawrence Roberts was responsible for developing computer networks at ARPA,
working with scientist Leonard Kleinrock. Roberts was the first person to connect
two computers. When the first packet-switching network was developed in 1969,
Kleinrock successfully used it to send messages to another site, and the ARPA
Network—or ARPANET—was born.
- As ARPANET grew, a set of rules for handling data packets needed to be put in
place. In 1974, computer scientists Bob Kahn and Vint Cerf invented a new
method called transmission-control protocol, popularly known as TCP/IP, which
essentially allowed computers to speak the same language.
- After the introduction of TCP/IP, ARPANET quickly grew to become a global
interconnected network of networks, or ‘Internet’.
- The ARPANET was decommissioned in 1990.

How is the World Wide Web Different from the Internet?

- The terms ‘World Wide Web’ and ‘internet’ are often confused. The internet
is the networking infrastructure that connects devices together, while the
World Wide Web is a way of accessing information through the medium of
the internet.
- Tim Berners-Lee first proposed the idea of a ‘web of information’ in 1989. It
relied on ‘hyperlinks’ to connect documents together. Written in Hypertext
Markup Language (HTML), a hyperlink can point to any other HTML page
or file that sits on top of the internet.
- In 1990, Berners-Lee developed Hypertext Transfer Protocol (HTTP) and
designed the Universal Resource Identifier (URI) system. HTTP is the
language computers use to communicate HTML documents over the internet,
and the URI, also known as a URL, provides a unique address where the
pages can be easily found.
- Berners-Lee also created a piece of software that could present HTML
documents in an easy-to-read format. He called this ‘browser’ the
‘Worldwide Web’.

What is Packet Switching?

- Packet switching’ is a method of splitting and sending data. A computer file


is effectively broken up into thousands of small segments called ‘packets’,
each typically around 1500 bytes that was distributed across a network, and
then reordered back into a single file at their destination. The packet
switching method is very reliable and allows data to be sent securely, even

6|Page
over damaged networks; it also uses bandwidth very efficiently and doesn’t
need a single dedicated link, like a telephone call does.
- The world’s first packet-switching computer network was produced in 1969.
Computers at four American universities were connected using separate
minicomputers known as ‘Interface Message Processors’ or ‘IMPs’. The
IMPs acted as gateways for the packets and have since evolved into what we
now call ‘routers. Packet switching is the basis on which the internet still
works today.

What is TCP/IP?

- TCP/IP stands for Transmission Control Protocol/Internet Protocol. The term


is used to describe a set of protocols that govern how data moves through a
network.
- After the creation of ARPANET, more networks of computers began to join
the network, and the need arose for an agreed set of rules for handling data. In
1974 two American computer scientists, Bob Kahn and Vint Cerf, proposed a
new method that involved sending data packets in a digital envelope or
‘datagram’. The address on the datagram can be read by any computer, but
only the final host machine can open the envelope and read the message
inside.
- Kahn and Cerf called this method transmission-control protocol (TCP). TCP
allowed computers to speak the same language, and it helped the ARPANET
to grow into a global interconnected network of networks, an example of
‘internetworking’—internet for short.
- IP stands for Internet Protocol and, when combined with TCP, helps internet
traffic find its destination. Every device connected to the internet is given a
unique IP number. Known as an IP address, the number can be used to find
the location of any internet-connected device in the world.

What is DNS?

- DNS stands for Domain Name System. It is the internet’s equivalent of a


phone book, and converts hard-to-remember IP addresses into simple names.
- In the early 1980s, cheaper technology and the appearance of desktop
computers allowed the rapid development of local area networks (LANs). An
increase in the number of computers on the network made it difficult to keep
track of all the different IP addresses.
- This problem was solved by the introduction of the Domain Name System
(DNS) in 1983. DNS was invented by Paul Mockapetris and Jon Postel at the

7|Page
University of Southern California. It was one of the innovations that paved
the way for the World Wide Web.

Website

- A site or website is a central location of web pages that are related and accessed


by visiting the home page of the website using a browser. For example, the
Computer Hope website address URL (Uniform Resource Locator)
is https://www.computerhope.com. From our home page, you could get access to
any of the web pages (like this one) contained on our website.

The Introduction of Web Browsers

- Tim Berners-Lee was the first to create a piece of software that could present
HTML documents in an easy-to-read format. He called this ‘browser’ the
‘Worldwide Web’. However, this original application had limited use as it
could only be used on advanced NeXT machines. A simplified version that
could run on any computer was created by Nicola Pellow, a math’s student
who worked alongside Berners-Lee at CERN.

What Does Hypertext Markup Language (HTML) mean?

- Hypertext markup language (HTML) is the major markup language used to


display Web pages on the Internet. In other words, Web pages are composed
of HTML, which is used to display text, images or other resources through a
Web browser.
- All HTML is plain text, meaning it is not compiled and may be read by
humans. The file extension for an HTML file is .htm or .html.

What Does Hyperlink mean?

- A hyperlink is an element in an HTML document that links to either another


portion of the document or to another document altogether. On webpages,
hyperlinks are usually colored purple or blue and are sometimes underlined.
- A hyperlink can be thought of as an interface that links a source to a target.
Clicking the hyperlink at the source will navigate to the target. Hyperlinks
can assume any of the following appearances:
 Text
 Images
 URLs
 Controls (for example, a button)

8|Page
Examples of Web Browsers

 Mosaic - Mosaic was easy to download and install, worked on many different
computers and provided simple point-and-click access to the World Wide
Web. Mosaic was also the first browser to display images next to text, rather
than in a separate window.
 Netscape Navigator - A widely used internet browser that at the time was
faster and more sophisticated than any of the competition.
 Opera 1.0 - released April 1995. This was originally a research project for a
Norwegian telephone company.

Websites are hosted on servers, and require a web browser such as Chrome, Firefox, or
Internet Explorer to be visited (either on a computer or mobile device).

A website can be accessed directly by entering its URL address or by searching it on a


search engine such as Google or Bing.

Originally, websites were categorized by their top-level domains. Some examples


include:

 Government agency websites = .gov


 Educational institutions’ websites = .edu
 Nonprofit organizations’ websites = .org
 Commercial websites = .com
 Information sites = .info

Although these top-level domains extensions still exist, they say little about a website's
actual content. In modern days’ internet, the ".com" extension is by far the most popular
domain, together with many other country-specific extensions (.it, .de, .co.uk, .fr, etc.).

Search Tool
- Search allows you to search content created by tools within a worksite or course.
It achieves this by creating an index of all content that other tools make available
to the search tool. This index is updated automatically, so as content is added to
the worksite or course, it will be indexed.
- For example, if the worksite or course has an Email Archive, as emails are posted
to the list, the content of those emails will be indexed and become searchable in
the search tool. Or, if the site has documents uploaded to Resources, the
documents will become searchable.

9|Page
- Search indexes many different types of content, including messages, web pages in
HTML format, documents in DOC, PDF, or RTF format, spreadsheets in XLS
format, and Wiki pages.

Different Types of Search Tool

 Databases

- Encyclopedia Britannica gives the following general definition


of database: "any collection of data, or information, that is organized
for rapid search and retrieval by a computer. Databases are structured
to facilitate the storage, retrieval, modification, and deletion of data in
conjunction with various data-processing operations. A database
management system (DBMS) extracts information from the database
in response to queries. Database records and files must be organized
to allow retrieval of the information. Queries are the main way users
retrieve database information. The power of a DBMS comes from its
ability to define new relationships from the basic ones given by the
tables and to use them to get responses to queries. Typically, the user
provides a string of characters, and the computer searches the
database for a corresponding sequence and provides the source
materials in which those characters appear; a user can request, for
example, all records in which the contents of the field for a person’s
last name is the word Smith." Since the databases used for searching
academic publications most often contain bibliographic (i.e. title,
authors, abstract, keywords...) information they are often called
bibliographic databases.
- In databases that contain academic publications you will find quality
assured publications, mainly research articles, but also conference
publications, academic books and chapters from academic books and
sometimes quality checked web sites.

 Discovery Services (Tools)

- Since the number of electronically available library resources


have increased, libraries nowadays use so called discovery tools to
make it easier for users to discover and access these resources. The
discovery tools can search many e-resources simultaneously via a
query from a single search box. In most cases, discovery services only
allow access to resources that a library is authorized to use through
paid subscriptions, open access licenses, or the public domain
(Breeding, 2014).
10 | P a g e
 Library Catalogues

- A library catalogue contains information about the different books and


journals available at the library. In a "modern" library catalogue there
are often possibilities to make reservation for books and ask for books
to be transported between different libraries within a library network.
In a library catalogue you can search for titles, authors/editors, and
sometimes keywords and index of books but, usually,
you CAN'T search for articles in a library catalogue.

Search Engines

- A search engine is a software program that helps people find the information they
are looking for online using keywords or phrases.
- Search engines are able to return results quickly—even with millions of websites
online—by scanning the Internet continuously and indexing every page they find.
- When a user enters a search term, the search engine looks at the website page
titles, contents and keywords it has indexed and uses algorithms (step-by-step
operations) to produce a list of sites—with the most relevant websites at the top of
the list.

How Do Search Engines Work?


- The work of a search engine can be broken down into three stages. Firstly,
there is the process of discovering the information. Secondly, there is the
organization of the information so that it can be effectively accessed and
presented when users search for something. Thirdly, the information must be
assessed to present search engine users with relevant answers to their queries.
- These three stages are usually called crawling, indexing, and ranking.

Crawling
- Search engines use pieces of software called web crawlers to locate publicly
available information from the internet, which is why this process is known
as crawling. Web crawlers can also sometimes be referred to as search engine
spiders. The process is complicated, but essentially the crawlers/spiders find
the webservers (also known as just servers for short) which host the websites
and then proceed to investigate them.

11 | P a g e
- A list of all the servers is created, and it is established how many websites are
hosted on each server. The number of pages each website has, as well as the
nature of the content, for example, text, images, audio, video, is also
ascertained. The crawlers also follow any links that the website has, whether
internal ones that point to pages within the site, or external ones that point to
other websites and use them to discover more pages.

Indexing

- Information found by the crawlers is organized, sorted, and stored so that it


can later be processed by the algorithms for presentation to the search engine
user. This is known as indexing. Not all the page information is stored by the
search engine, instead, it's just the essential information needed by the
algorithms to assess the relevance of the page for ranking purposes.

Ranking

- When a query is entered into a search engine, the index is scoured for
relevant information and then sorted into a hierarchical order by an algorithm.
This ordering of the search engine results pages (SERPS) is known as
ranking. Different search engines use different algorithms, and so give
different results. Over the years, algorithms have become more and more
complex as they attempt to present more relevant and accurate answers in
response to the queries of search engine users.

Pros

 Quick and straight forward


 You get a lot of results
 Excellent for finding popular materials and services

Cons

- There is a lot junk, including misleading and malicious material.


- Since there is a little or human involvement, the search is only as successful
as you make it; you will need good searching and evaluation skills to find
good sites.
- The page you really want might be buried in a list of thousands of results.

10 Examples of Search Engines

1. Google - Google is the biggest search engine in the world by far. It handles
over 5 billion searches each day and has a market share of over 90% at the
12 | P a g e
time of writing (August 2019). Developed originally by Larry Page and
Sergey Brin in 1997, Google has become so successful that it has become
synonymous with search engine services, even entering the dictionary as a
verb, with people using expressions such as: "I googled it" when they've
searched for something online.
2. Bing - The origins of Microsoft's Bing can be found in the technology
company's earlier search engines, MSN Search, Windows Live Search, and
Live Search. Bing was launched in 2009 with high hopes that it could usurp
its rival Google, but despite attracting many fans, things haven't quite worked
out that way. Even so, Bing is the third largest search engine worldwide after
Google and Baidu. It is available in 40 different languages.
3. Yahoo! - Yahoo! Search is another big player in the search engine world.
However, for much of its history it has supplied the user interface, but relied
on others to power the searchable index and web crawling. From 2001 to
2004, it was powered by Inktomi and then Google. From 2004, Yahoo!
Search was independent until a deal was struck with Microsoft in 2009
whereby Bing would power the index and crawling.
4. Ask.com - Originally known as Ask Jeeves, Ask.com is a little different from
Google and Bing, as it uses a question-and-answer format. For a number of
years, Ask.com was focused on becoming a direct rival to the big search
engines, but nowadays, answers are supplied from its vast archive and users
contributions, along with the help of an unnamed and outsourced third-party
search provider.
5. Baidu - Founded in the year 2000 by Robin Li and Eric Xu, Baidu is the most
popular search engine in China, and the fourth most visited website in the
world, according to Alexa rankings. Baidu has its origins in RankDex, a
search engine previously developed by Robin Li in 1996. As well as its
Chinese search engine, Baidu also offers a mapping service called Baidu
Maps and more than 55 other internet-related services.
6. AOL.com - AOL, now styled as Aol. and originally known as America
Online, was a big player in the early days of the internet revolution, providing
a dial-up service for millions of Americans in the late 1990's. Despite AOL's
decline as broadband gradually replaced dial-up, the AOL search engine is
still used by a significant minority of searchers. On June 23, 2015, AOL was
acquired by Verizon Communications.
7. DuckDuckGo - DuckDuckGo (DDG) has a number of features that
distinguish it from its main competitors. It has a strong focus on protecting
searchers' privacy, so rather than profiling users and presenting them with
personalized results, it provides the same search results for any given search
term. There's also an emphasis on providing quality rather than quantity when

13 | P a g e
it comes to search results. DDG's interface is very clean and not overladen
with adverts.
8. Wolfram Alpha - Wolfram Alpha markets itself as a computational
knowledge engine. Instead of answering the queries of searchers with a list of
links, it responds with mathematical and scientific answers for their
questions, using externally sourced "curated data". Wolfram Alpha was
launched in 2009 and has become a valuable tool for academics and
researchers.
9. Yandex - Launched in 1997, Yandex is Russia's largest search engine, and
the country's fourth most popular website. Outside of Russia, the search
engine also has a major presence in Ukraine, Belarus, Kazakhstan, and other
countries of the Commonwealth of Independent States. As well as search,
Yandex offers many other internet-related products and services, including
maps and navigation, music, eCommerce, mobile applications, and online
advertising.
10. Internet Archive - The Internet Archive provides free public access to a
wide range of digital materials. A nonprofit digital library based in San
Francisco, it's a great tool for tracing the history domains and seeing how
they have evolved over the years. Besides websites, you can also find
software applications and games, movies/videos, music, moving images, and
a huge collection of public-domain books. The Internet Archive also
campaigns for a free and open internet.

Electronic Commerce
- At its core, electronic commerce or e-commerce is simply the buying and selling
of goods and services using the internet, when shopping online. However, the
term is often used to describe all a seller’s efforts, when selling products directly
to consumers.
- Most people think of e-commerce as selling or purchasing a physical product
online. But e-commerce also includes the sale and purchase of non-physical
goods, such as services and digital products. It's when a business sells online.

What are E-Commerce Business Models?

- An e-commerce business can operate as the digital arm of a retail giant or a


physical store. It can also be a single person selling crafts out of their home
through online marketplaces. Of course, there's a whole range between those
extremes. E-commerce models vary widely and include many sale types.
Here are the different types of ecommerce businesses:
 Business-to-business (B2B)

14 | P a g e
 (B2B e-commerce refers to when a company purchases goods
or services online from another enterprise. Some examples
include a restaurant buying an ice machine or a law firm
purchasing accounting software. Business software like
customer relationship management (CRM) platforms and
payment processing companies are considered to be B2B, too.
B2B online sales tend to be more complicated than other
forms of e-commerce because they rely on large catalogs of
complex products to sell.
 Business-to-consumer (B2C)
 B2C online retail happens when a consumer purchases an item
over the internet for their own use. Although B2C e-commerce
seems more prominent, it’s only about half the size of the
worldwide B2B e-commerce market.
 Consumer-to-consumer (C2C)
 Consumer-to-consumer (C2C)
 C2C operates like a digital yard sale or an internet auction in
which individual people sell goods to each other. These might
be products they make, such as handcrafts or art, or
secondhand items they own and want to sell.
 Consumer-to-business (C2B)
 When a consumer creates value for a business, that's C2B
commerce. Creating value can take many forms. For instance,
C2B can be as simple as a customer leaving a positive review
for a business or a stock photography website purchasing
images from freelancers. In addition, businesses that sell
secondhand products sometimes purchase merchandise from
private citizens online.
 Business-to-government (B2G)
 These are sometimes called business-to-administration (B2A)
sales. They happen when a private firm exchanges goods or
services with a public agency. Usually, a business contracts
with a public organization to carry out a mandated service. For
instance, a custodial firm might bid online for a contract to
clean the county courthouse, or an IT firm might reply to a
proposal to manage a city's computer hardware.
 Consumer-to-government (C2G)
 Consumer-to-government (C2G)
 Ever paid a parking ticket online? Then you've experienced
C2G. This model also includes paying taxes online and

15 | P a g e
purchasing goods from a government agency's e-auction. Any
time you turn money over to a public agency using the
internet, you engage in C2G e-commerce.
 Direct to Consumer (D2C)
 Direct to consumer e-commerce is the newest model of
ecommerce, and trends within this category are continually
changing. D2C means that a brand is selling directly to their
end customer without going through a retailer, distributor, or
wholesaler. Subscriptions are a popular D2C item, and social
selling via platforms like Instagram, Pinterest, TikTok,
Facebook, Snap Chat, etc. are popular platforms for direct-to-
consumer sales.

Here Are Some Examples of Types Of E-Commerce:

● Retail: The sale of products directly to a consumer without an intermediary.


● Drop Shipping: The sale of products that are manufactured and shipped to
consumers via a third party.
● Digital Products: Downloadable items like templates, courses, e-books,
software, or media that must be purchased for use. Whether it’s the purchase
of software, tools, cloud-based products or digital assets, these represent a
large percentage of ecommerce transactions.
● Wholesale: Products sold in bulk. Wholesale products are usually sold to a
retailer, who then sells the products to consumers.
● Services: These are skills like coaching, writing, influencer marketing, etc.,
that are purchased and paid for online.
● Subscription: A popular D2C model, subscription services are the recurring
purchases of products or services on a regular basis.
● Crowdfunding: Crowdfunding allows sellers to raise startup capital in order
to bring their product to the market. Once enough consumers have purchased
the item, it’s then created and shipped.

Top E-Commerce Companies International

 ALIBABA
 AMAZON
 WALMART
 EBAY
 WAYFAIR

Top E Commerce Companies In The Philippines

16 | P a g e
 Lazada
 Monthly Traffic Estimate: 43.38M
 Shopee
 Monthly Traffic Estimate: 74.91M
 Metro deal
 Monthly Traffic Estimate: 770,000
 Carousell
 Monthly Traffic Estimate: 4.95M
 FACEOOK MARKETPLACE

Web Utilities

- Web Utilities are specialized utility program that make using the internet and the
web easier and safer. Some of these utilities are browser related program that
either become part of your browser or are executed from your browser. In
addition, the administrator can perform operations such as setting up account
tracks, registering scan destination, and importing/exporting various setting data.
Web Utilities is the device management utility embedded in this system. This
function allows you to remotely operate the Touch panel of this system or monitor
the status of this system using the computer’s browser via the network. In
[Machine Manager Setting], configure various functions of Web Utilities.

Use of Web utilities


- It adds some functionalities to the computer and there by focuses on the
infrastructure of the computer.
- Web utilities are specialized programs which makes the web secure.
- Web utilities make use of web browser from a client machine and monitor the
status of another machine in the network remotely.
- Allows you to remotely operate the Touch panel of this system or monitor the
status of this system using the computer's browser via the network

Example of web utilities

- Plug-ins is Programs that automatically load and operate as part of your


browser. Many web sites require plug-ins for users to fully experience web
page contents.

Some widely used plug-ins are:

 Shockwave
 QuickTime

17 | P a g e
Some widely used plug-ins are:
 Shockwave
 Quick Time

Helper Applications (add-ons)

- Independent programs that can be executed or launched from your browser.

Four types of helper applications are:

 Off-line browsers

- automatically connects you to selected web sites


- downloads HTML documents
- saves them to your hard disk
- documents can be read later without connecting to the Internet

Example: Flash Site

 Information pushers

- automatically gathers information on topics areas (channels)


- sends them to your hard disk
- information can be read later without being connected to the Internet

Examples: PointCast, Back web

 Off-line search utilities

- automatically submits your search request to several search engines


- receives the results, sorts them, eliminate duplicates

Examples: Meta crawler, Dog Pile

 Filters

- Programs that can allow parents or organizations to block out selected


sites.
- Can monitor usage and generate reports detailing time spent on
activities.

Examples: Cyber Patrol, Cybersitter Net Nanny

18 | P a g e
APPLICATION SOFTWARE

- Application software is a type of computer program that performs a specific


personal, educational, and business function. Each application is designed to
assist end-users in accomplishing a variety of tasks, which may be related to
productivity, creativity, or communication.

Examples of Application Software

 The Microsoft Suite- Office, Excel, Word, PowerPoint, Outlook, etc.


 Internet Browsers- Firefox, Chrome, Safari, Internet Explorer
 Music Software- Pandora, Apple Music, Spotify
 Communication Software- Slack, Skype, Zoom, Teams

Types of Business Application Software

- is a subset of the application software. These programs are built to facilitate


certain business functions and improve the accuracy, efficiency, and
effectiveness of operations by saving time and enhancing productivity.
 Enterprise Resource Planning - A type of business software used by
companies – usually via a bundle of integrated applications – to
solicit, review, store, manipulate, and analyze data derived from a
variety of business operations.
 Customer Relationship Management - CRM is used by companies
to solicit, review, store, and analyze customer data
 Database - An electronic arsenal of data that a user builds in order to
later access, review, and update particular pieces of information in a
rapid and coherent manner.
 Project Management Software - A type of business software
designed to plan and execute projects, and manage the resources
associated with those projects.

19 | P a g e
 Business Process Management - BPM is designed to facilitate rapid
development and automation of strategic processes and uses web-
based modeling, rule creation, and a simple interface to enable the
user to perform business functions more quickly.

Word Processing

- Word Processing refers to the act of using a computer to create, edit, save and
print documents. In order to perform word processing, specialized software
(known as a Word Processor) is needed

Spreadsheet

- A software application capable of organizing, storing, and analyzing data in


tabular form
- An application can provide a digital simulation of paper accounting worksheets

Mobile App

- A mobile app is a software application developed specifically for use on small,


wireless computing devices, such as smartphones and tablets, rather than desktop
or laptop computers.

App Store

- app store refers to an online shop where customers can purchase and download
various software applications. the apps sold through app stores are intended for
mobile device

Cloud Office Suite`


- Cloud office suites can help to reduce costs, improve collaborative “anytime,
anywhere” working, and ultimately offer an efficient path for your organization to
improve productivity levels. The term ‘cloud office’ refers to a suite of Software-
as-a-Service (SaaS) collaboration and communication tools that combine email,
file-sharing, instant messaging, conferencing, as well as document management,
search, and discovery. Popular examples of cloud office suites include
Microsoft’s Office 365 and Google’s G Suite.
- According to global market research analysts, Gartner, the process of migrating to
a cloud office involves consolidating and transferring a collection of workloads
from source systems to a cloud-based office platform. The content items that are
typically included in these workloads are:

20 | P a g e
 Emails
 Files
 Calendars
 Document types
 Related metadata
 Applications
 User permissions
 Compound structures
 Linked components

Elevated Collaboration Opportunities

- Cloud office suites present your users with a plethora of ways to work
collaboratively. By storing content in a centralized, cloud-based repository
such as SharePoint Online, documents and records can be edited, viewed, and
interacted with by multiple users. Apps such as Microsoft Teams give users
the power to work, communicate and collaborate in real-time, regardless of
location or device.

Smarter Enterprise Search

- Both popular cloud office suites offer intelligent search solutions, such as
Microsoft Delve and Google Cloud Search. Both these solutions provide
higher quality search and data discovery capabilities compared to on-premises
deployments.

Increased or Unlimited Storage

- Most cloud office suites provide the attractive benefit of increased storage
space per user. In fact, Office 365 provides each user with a very generous
1TB of storage space via OneDrive for Business (easily increased to 5TB),
while Google G Suite provides 30GB per user as standard.

Unified Meeting Solutions

- Messaging applications such as Microsoft Teams and Google Hangouts make


it easy to initiate and maintain persistent conversations and real-time
meetings, which can easily be integrated with relevant content tools to provide
a substantially richer meeting experience.

Better Mobile App Support


21 | P a g e
- Users are increasingly demanding access to productivity tools on both tablets
and smartphones; allowing them to continue work while away from the office.
Modern cloud office suites answer this challenge with optimized mobile apps
designed to deliver continuous working experiences.

Popular examples of cloud office suites include Microsoft’s Office 365 and Google’s G
Suite:

 Microsoft Office 365 - is a suite of cloud-based productivity and collaboration


applications that integrates all Microsoft’s existing online applications (Word,
Excel, PowerPoint, OneNote, Outlook, Publisher, Sway, and Access) into a cloud
service, adding Skype for Business and Microsoft Teams as the main
communication and collaboration applications.
 G Suite - is a collection of business, productivity, collaboration, and education
software developed and powered by Google. The primary G Suite tools include
Gmail, Drive, Docs, Sheets, Slides, Forms, Calendar, Google+, Sites, Hangouts,
and Keep.

Application Software

- Application software or app or short is a type of computer program that performs


a specific personal, educational, and business function. Each application is
designed to assist end-users in accomplishing a variety of tasks, which may be
related to productivity, creativity, or communication.

What Does Office Suite Mean?

- An office suite is a collection of applications bundled together, intended to be


used by knowledge workers in an organization. It is used to simplify tasks
and processes of office workers and increase their productivity
- Collection of software created by the same vendor and designed to be used
for routine tasks within an organization. Typically, an office suite includes
applications such as word processing, spreadsheets, presentation, email, note
taking, database, collaboration and other related types of software. In most
cases, each application in the office suite can be installed separately and all
applications within the suite support interoperability between each other. also
known as ‘Office Software Suite’ or ‘Productivity Suite
- Among a few possible uses of office software is its ability to draft a letter,
make a presentation, write a report or create a budget.

Basic Applications Include:


• Word processing software
22 | P a g e
• Spreadsheet building software
• Presentation creating software

Other Applications Include:


• Database manager
• Email client
• Publishing platform
• Project management software
• Collaboration software

Word Processing Software

- ‘Word processing’ is the act of typing, editing and printing textual/graphical


information using a word processor. In the olden days, this was done
mechanically using a typewriter. Typewriters are now slowly becoming
extinct, and almost everyone does word processing electronically through
their computers.
- The biggest advantage of this shift is the quick and easy creation of error-free
documents thanks to the rewrite option, conspicuous by its absence in
mechanical word processors.

Spreadsheet Software

- A ‘spreadsheet’, technically, is a table of values arranged in rows and


columns with each value having a possibility of having a predefined
relationship with other values. Spreadsheet applications (usually referred to
simply as spreadsheets) are computer programs that simulate physical
spreadsheets by capturing, displaying, and manipulating data arranged in
rows and columns. In a spreadsheet application, each value resides in a cell,
which is at the intersection of the corresponding column and row.

Presentation Software

- Presentation software allows you to create presentations. They help to create


sequences of words and pictures that act as visual aid, help tell a story,
support a speech etc. during a public presentation. The software’s ease of use
is its biggest advantage – one of the main reasons why most blackboards are
being replaced by projector screens these days.

Database Management Systems

23 | P a g e
- Databases are a powerful and convenient way to organize information. Using
tables, they offer an organized mechanism for storing, managing and
retrieving information. Spreadsheet users will already be accustomed to
storing data in tabular form, and will find it easy to make the switch to
databases.

Email Client

- An email client is a computer application capable of accessing and managing


your emails. The application runs on your desktop and enables you to send,
receive and organize your email. It’s called a client because this email system
is based on client-server architecture. The clients send the mail to a central
server, which re-routes the mail to its intended destination.

Publishing Platform

- Printing of documents and images require them to first be ‘published’. Before


computers became commonplace, the publishing process required huge
printing presses that copied and duplicated pages. The text and graphics
would have to be printed out separately, placed on a single sheet, taped in
place, copied and then printed. Documents such as newsletters, brochures,
books, web pages, greeting cards, business cards, letterheads and signage are
all created using desktop publishing software.

Project Management Software

- Unlike individual planners, project management software is meant for


organizations to manage large-scale projects from start to finish, while
allowing employees at different levels to contribute their input in the process.
Project management as a concept began in the world of Engineering and
Construction.
- Google Docs - an online office suite - Inevitably, these techniques and
software were intertwined to automate the whole management process. All
project management software caters to the primary functions of project
management – planning, scheduling, resource allocation, communication and
documentation.

Collaboration Software

- Collaboration, about a couple of decades ago, would have meant sitting


together around a table, and pooling in all your resources to brainstorm over an
idea. Today, however the definition has taken a drastic turn. Collaboration

24 | P a g e
today relies mainly on technology, not on proximity. Workers today are always
on the run, and with time being a scarce resource, productivity cannot be
compromised for issues such as travel.

Some of the most popular productivity suites are listed below:

 Microsoft Office 2013 or Office 365 (Windows)


 Kingsoft Office (Windows, Android, Linux)
 Open Office (Previously Openoffice.org) (Mac, Windows, Linux – Open
Source)
 Libre Office (Mac, Windows, Linux – Open Source)
 Google Docs (Cloud)
 Zoho (Cloud)
 Think Free (Cloud, Android)
 Neo Office (Mac OSX)

The 6 Best Office Suites for Your Documents, Spreadsheets, and Presentations:

 Microsoft Office 365 - Tools Included: Word processor, spreadsheets,


presentations, notes, database builder (on PCs), email, file sync.
 Google G Suite - Tools Included: Word processor, spreadsheet, presentations,
notes, email, file sync.
 Zoho Workplace - Tools Included: Word processor, spreadsheets,
presentations, email, team chat, file sync, websites.
 Apple iWork - Tools Included: Word processor, spreadsheet, presentations
(notes, mail, and calendar apps also included with iOS and macOS).
 Quip - Tools Included: Word processor, spreadsheets, team chat.
 LibreOffice - Tools Included: Word processor, spreadsheets, presentations,
database builder, drawing tool.

Block Letter Format

- A block letter format is a minimalist letter type that utilizes simple outlines to
delineate a message. Block letter format’s text is aligned to the left with single
spacing between the lines and double spacing to separate the paragraphs instead
of the usual indentations.
- Block letter formats, especially the traditional block, have specific punctuation
guidelines in the letter’s salutation part. Different block formats stem from the
original block format with varied specifications

Why Use a Block Letter Format?

25 | P a g e
- A block letter format is a reserve for official letters. Its minimalist and clear
view outline salient information on the first skim. Many human resource
managers and other formal letter recipients spend a maximum of an average of
2 minutes on a letter.

How to Write a Block Letter

1. Creating the Outline - The initial step to writing a block-structured letter is


formatting the margin. Make 1-inch margins on a blank A4 paper or a
Microsoft Word document. The margins streamline the document’s alignment.
2. Formatting Addresses and Date - Begin with the sender’s address on the left
part of the letter; however, center the letterhead if your letter includes a
letterhead. Remember to use 12pt New Times Roman. Follow the sender’s
address with the relevant contact number and fax number. Skip two spaces
using the return or enter button on your computer, then write the date. You can
use the different date formats but ideally use month, date, and year style. Add
another double space, then write the recipient address.
3. Salutation - After writing the addresses, what follows is the salutation clause.
It is good practice to know who you are writing to include the correct title, for
example, engineer, doctor, or attorney, rather than the vague Mr./Mrs. Skip a
line or a single space and start the salutation with “Dear” followed by the title
and name of the recipient, i.e., “Dear Eng. Rey:”
4. Formatting the Body - Skip a line after the salutation and begin the body of
the letter. A letter body contains the intention of your letter and any relevant
information you wish to convey. Paragraphs are not intended but separated by
double spaces. Write your letter succinctly to communicate your message with
good visual effect.
5. Finalizing Your Letter - After finishing the body of the letter, skip a single
space and insert a closing phrase. “Sincerely” is usually a good closing phrase
followed by a comma. Closing phrases take many forms, such as “sincerely
yours” “best regards.” After a closing phrase, skip three lines and include your
name and title. Sign in the space above your name.

Full Block Format

- The full block letter format or the traditional block is the most common block
letter format.
- Full block letters have the entire text aligned to the left and have closed
punctuation requirements.

26 | P a g e
- A colon or comma is usually common after the salutation clause. However, you
will not require ending punctuation in open punctuation full block letters after the
salutation. All enclosures and dates are also left-aligned.
- Content is aligned to the left margin of the page.
- In appearance, it is quite simple. It means that the reader would find it easy to
read.
- A typist would also find it easier.
- There is a single line space in the paragraphs.

Example:

27 | P a g e
Semi-Block Format

- Semi block or indented style is similar to a full block style, albeit informal.
- The beginning of every paragraph is indented five-character spaces and
paragraphs separated by double space.
- The text is left-justified, while the date and signoff are similar.
- The beginning of the paragraph is indented at five-character spaces. The rest of
the paragraph is not indented.
- Sign off and date have a similar alignment.

Example:

28 | P a g e
Modified Block Format

- In a modified block, the entire text is aligned to the left except for the date,
signoff, and sender’s address aligned to the right.
- However, the date and sign are roughly set at the center but offset towards the
right of the letter.
- The paragraphs are not intended, and the spacing is similar to a full block
structure spacing.
- The address of the sender is roughly set at the center of the sheet.
- Date and sign off also have a similar alignment

Example:

29 | P a g e
System Software

- System Software is a set of programs that control and manage the operations of
computer hardware. It also helps application programs to execute correctly.
- System Software are designed to control the operation and extend the processing
functionalities of a computer system. System software makes the operation of a
computer more fast, effective, and secure.

Types Of System Software

 Operating systems
 Programming language translators
 Communication Software
 Utility programs

30 | P a g e
Features Of System Software

 System Software is closer to the system


 Generally written in a low-level language
 The system software is difficult to design and understand
 Fast in speed
 Less interactive
 Smaller in size
 Hard to manipulate

Application Software

- Application Software is a program that does real work for the user.
- It is mostly created to perform a specific task for a user
- Application Software acts as a mediator between the end-user and System
Software. It is also known as an application package.
- This type of software is written using a high-level language like C, Java, VB. Net,
etc. It is a user-specific and is designed to meet the requirements of the user.
- You can also install multiple Application Software on a single System Software.
- You can store this kind of software on CDs, DVDs, flash derive, or keychain
storage devices.
- Applications are a class of software that are primarily designed to be used by
people.
- This includes areas such as knowledge tools, information access, decision
support, business services, ecommerce, entertainment, media and games.

Example:

 Word-processing
 Spreadsheet
 Database, etc.

Types Application Software

 Word-processing software - It makes use of a computer for creating,


modifying, viewing, storing, retrieving, and printing documents.
 Spreadsheet software - Spreadsheet software is a numeric data-analysis tool
that allows you to create a computerized ledger.
 Database software - A database software is a collection of related data that is
stored and retrieved according to user demand.

31 | P a g e
 Graphics software - It allows computer systems for creating, editing, drawings,
graphs, etc.
 Education software - Education software allows a computer to be used as a
learning and teaching tool.
 Entertainment software - This type of app allows a computer to be used as an
entertainment tool.

Features Of Application Software

- Perform more specialized tasks like word processing, spreadsheets, email,


photo editing, etc.
- It needs more storage space as it is bigger in size
- Easy to design and more interactive for the user
- Generally written in a high-level language

What Is The 4 Types Of Software?


- System software is a type of computer program that is designed to run a
computer's hardware and application programs. If we think of the computer
system as a layered model, the system software is the interface between the
hardware and user applications. The operating system is the best-known example
of system software.
System Software
- System software is software designed to provide a platform for other software.
Examples of system software include operating systems like macOS,
GNU/Linux, Android and Microsoft Windows, computational science software,
game engines, search engines, industrial automation, and software as a service
application. Wikipedia
Computer Programmers
- Computer programmers use programming software to write code.
Programming software and programming tools enable developers to develop,
write, test and debug other software programs. Examples of programming
software include assemblers, compilers, debuggers and interpreters
- Software programming is the act of writing computer code that enables
computer software to function. The computer technology field often has
overlapping terminology that can be confusing to discern.
Application Software

32 | P a g e
- Application software is a type of computer program that performs a specific
personal, educational, and business function. Each application is designed to
assist end-users in accomplishing a variety of tasks, which may be related to
productivity, creativity, or communication.
- An application program is a computer program designed to carry out a specific
task other than one relating to the operation of the computer itself, typically to
be used by end-users. Word processors, media players, and accounting software
are examples. The collective noun refers to all applications collectively.
Driver Software
- In the most fundamental sense, a driver is a software component that lets the
operating system and a device communicate with each other. For example,
suppose an application needs to read some data from a device.
- Many parts of a computer need drivers, and common examples are:
 Computer printers.
 Graphic cards.
 Modems.
 Network cards.
 Sound cards. 

What Is Operating System?


- an operating system is the most important software that runs on a computer. It
manages the computer's memory and processes, as well as all of its software and
hardware. It also allows you to communicate with the computer without knowing
how to speak the computer's language. Without an operating system, a computer
is useless. 
Types Of Operating Systems:

 Batch Operating System


 Multitasking/Time Sharing OS
 Multiprocessing OS
 Real Time OS
 Distributed OS
 Network OS
 Mobile OS

Batch Operating System


- Some computer processes are very lengthy and time-consuming. To speed the
same process, a job with a similar type of needs is batched together and run as
a group.
33 | P a g e
- The user of a batch operating system never directly interacts with the
computer. In this type of OS, every user prepares his or her job on an offline
device like a punch card and submit it to the computer operator.
Multi-Tasking/Time-Sharing Operating Systems
- Time-sharing operating system enables people located at a different
terminal(shell) to use a single computer system at the same time. The
processor time (CPU) which is shared among multiple users is termed as time
sharing.
Real time OS
- A real time operating system time interval to process and respond to inputs is
very small. Examples: Military Software Systems, Space Software Systems
are the Real time OS example.
Distributed Operating System
- Distributed systems use many processors located in different machines to
provide very fast computation to its users.
Network Operating System
- Network Operating System runs on a server. It provides the capability to
serve to manage data, user, groups, security, application, and other
networking functions.
Mobile OS
- Mobile operating systems are those OS which is especially that are designed
to power smartphones, tablets, and wearables devices.
- Some most famous mobile operating systems are Android and iOS, but others
include BlackBerry, Web, and watchOS.

34 | P a g e
SYSTEM UNIT

- A system unit is the part of a computer that houses the primary devices that
perform operations and produce results for complex calculations. It includes the
motherboard, CPU, RAM and other components, as well as the case in which
these devices are housed. This unit performs the majority of the functions that a
computer is required to do.
- The term "system unit" is frequently used to distinguish between the computer's
internal components and its external hardware, including the keyboard, mouse,
and display. In layman's terms, a system unit is also referred to as a chassis or a
tower.
- The system unit covers the system devices, which can range from a
microprocessor to a capacitor or system clock and perform calculations as
requested by the input device. Each system device serves a specific purpose. The
system unit is made up of electronic components that work together to perform
calculations and transfer the results to the appropriate input and output devices.

Types of System Units

1. Desktop System Units - It contains electronic components and selected


secondary storage. Input and output devices, such as mouse, keyboard and
monitor, are located outside the system unit.
2. Media Center System Units - Media center system units use powerful desktop
system hardware with specialized graphic card for interfacing with televisions
and others.
3. Notebook System Units - This type of system unit are portable and much
smaller. These system units contain the electronic components, selected
secondary storage devices, and input devices (keyboard and pointing devices).
Located outside the system units, the monitor is attached by hinges. Notebook
system units called laptops.
4. Netbook System Units - These are similar to notebook system units. They are
smaller less powerful and less expensive. Netbook are designed to support on-
the-go Web browsing and email access.
5. Tablet PC System Units - Tablet PCs are highly portable devices that support
the use of a stylus or pen to input. There are 2 basic types, one is effectively a
notebook computer.
6. Handheld Computer System Units - These systems contain an entire computer
system, including the electronic components, secondary storage and input and out
the most widely use handheld computers.

35 | P a g e
System Boards

- The motherboard is also known as logic board, baseboard, system board,


mainboard, main circuit board, planar board, and mobo in a short way. It is a
nonconductive plastic sheet that has the necessary circuit and place holders like
sockets/slots to connect components and provide logistics for all the components
to work in a coordinated manner.
- The motherboard is the main internal hardware component of the system unit.
This board is called the "motherboard" because it has all the connectors that
connect to the other hardware components of the computer system. This means
that all input and output (I/O) devices have their connectors on the motherboard.

Some Interfaces & Components of A Typical Motherboard

 CPU socket
 Memory slots
 Power connector
 Chipset

Six Different Types of Motherboards

1. AT Motherboard - These motherboards have bigger physical dimensions of


hundreds of millimeters and hence they are not the right fit for the mini
desktop category of computers. Bigger physical size also inhibits installing
new drivers. Sockets and six-pin plugs are used as power connectors in these
motherboards. 
2. ATX Motherboard - ATX denotes advanced technology extended, it was
developed by Intel during the 1990s and it was an improved version over an
earlier version of AT motherboard. It is smaller in size when compared to AT
and it provides interchangeability of the connected components. There is a
marked improvement in the connector aspects.
3. LPX Motherboard - This board had two improvements over earlier versions.
The first one is Input and Output ports were taken to backside and the second
one was the introduction of Riser card to facilitate more slots and easier
connection. Some of these features were deployed in the AT motherboard. 
4. BTX Motherboard - BTX denotes Balanced Technology Extended, intended
to manage demands of new technologies in terms of more power
requirements hence generation of more heat. Intel stopped further
development of BTX boards during the mid-2000s to concentrate on low
power CPU.
36 | P a g e
5. Pico BTX Motherboard - These boards are smaller in size and hence the
word Pico. Two expansion slots are supported in spite of being sharing the
top half of BTX. Half-height or riser cards are its unique features and it
supports the demands of digital applications.
6. Mini ITX Motherboard - Mainly used in small form factor (SFF) computer
due to its lower power consumption and faster cooling ability. This
motherboard is the most preferred in the home theater domain due to its lower
level of fan noise that will improve the quality of the theatre system.

Sockets and Bus

CPU Socket

- Socket is a place on the motherboard plate of the computer where the


processor is inserted.
- It acts as a connector to connect and provide mechanical and electrical
connections between the central processing unit (CPU) to the motherboard

4 Types of CPU Socket

1. LGA Sockets - The LGA (Land Grid Array) is a socket whose assembly is in
packaging for integrated circuits. In these types of sockets, the needles are
located in the CPU socket, and there are metallic points of contact in the lower
area of the processor. The LGA can be electrically connected to a
motherboard through a connector or by soldering the board directly.
2. PGA Sockets - The PGA (Pin Grid Array) is an integrated circuit packaging
identified by being rectangular or square, whose pins are aligned in a regular
matrix. Here, the pins may not cover the entire surface but leave gaps between
them, with the standard spacing of 2.54mm.
3. ZIF Sockets - ZIF (Zero Insertion Force): This is an evolution of the PGA,
where the pins are carried by the microprocessor and inserted into the socket
connectors. This mechanism is defined by not exerting any pressure (Zero
Insertion Force) when installing or removing the processor from the socket.
4. BGA Sockets
- Not as famous as other types of sockets, the BGA (Ball Grid Array)
socket is not technically a socket because its main characteristic is that
the microprocessors are permanently mounted in this socket.
- In this case, instead of pins, some copper balls are soldered directly to
the motherboard. Eliminate any possibility of upgrading or replacing
the microprocessor.

Types of Computer Buses

37 | P a g e
- A bus is a common pathway through which information flows from one
computer component to another. This pathway is used for communication
purposes and it is established between two or more computer components.
We are going to check different computer bus architectures that are found in
computers.

Functions of Buses in Computer

 Data Sharing - All types of buses found in a computer transfer data between
the computer peripherals connected to it. The buses transfer or send data
either in the serial or parallel method of data transfer. This allows for the
exchange of 1, 2, 4 or even 8 bytes of data at a time. (A byte is a group of 8
bits). Buses are classified depending on how many bits they can move at the
same time, which means that we have 8-bit, 16-bit, 32-bit or even 64-bit
buses.
 Addressing - A bus has address lines, which match those of the processor.
This allows data to be sent to or from specific memory locations.
 Power - A bus supplies power to various peripherals connected to it.
 Timing - The bus provides a system clock signal to synchronize the
peripherals attached to it with the rest of the system.

Bus Terminologies

- Computers have two major types of buses:


1. System Bus - This is the bus that connects the CPU to the main
memory on the motherboard. The system bus is also called the front-
side bus, memory bus, local bus, or host bus.
2. A Number Of I/O Buses - (I/O is an acronym for input/output),
connecting various peripheral devices to the CPU. These devices
connect to the system bus via a ‘bridge’ implemented in the
processors' chipset. Other names for the I/O bus include “expansion
bus", "external bus” or “host bus”.
Expansion Cards and Slots
Expansion Cards
- The expansion cards are the different types of cards or adapters which are
used in computer to improve the performance and compatibility of any
system. This means that they are used to expand the working performance of
the system. These cards can be available in modular form so that we can
attach or remove them from the slots or they are integrated on the
motherboard and are fixed.
38 | P a g e
4 Basic Types of Expansion Cards

1. Network Card - Network card is used to connect our computer system to the
computer networks over the Internet OR it is used for communication
between our system and the other computer networks. Network card is also
known as the Network adapter or Network interface card (NIC). NIC card has
the pins at the bottom so that it can be fixed in the expansion slot on the
motherboard. Similarly, it has Rj-45 port at the back of the card which is used
to connect to the LAN network.
2. Video Card - Network card is used to connect our computer system to the
computer networks over the Internet OR it is used for communication
between our system and the other computer networks. Network card is also
known as the Network adapter or Network interface card (NIC). NIC card has
the pins at the bottom so that it can be fixed in the expansion slot on the
motherboard. Similarly, it has Rj-45 port at the back of the card which is used
to connect to the LAN network.
3. Modem - Network card is used to connect our computer system to the
computer networks over the Internet OR it is used for communication
between our system and the other computer networks. Network card is also
known as the Network adapter or Network interface card (NIC). NIC card has
the pins at the bottom so that it can be fixed in the expansion slot on the
motherboard. Similarly, it has Rj-45 port at the back of the card which is used
to connect to the LAN network.
4. Audio Card - Network card is used to connect our computer system to the
computer networks over the Internet OR it is used for communication
between our system and the other computer networks. Network card is also
known as the Network adapter or Network interface card (NIC). NIC card has
the pins at the bottom so that it can be fixed in the expansion slot on the
motherboard. Similarly, it has Rj-45 port at the back of the card which is used
to connect to the LAN network.

Expansion Slots

- Network card is used to connect our computer system to the computer


networks over the Internet OR it is used for communication between our
system and the other computer networks. Network card is also known as the
Network adapter or Network interface card (NIC). NIC card has the pins at
the bottom so that it can be fixed in the expansion slot on the motherboard.
39 | P a g e
Similarly, it has Rj-45 port at the back of the card which is used to connect to
the LAN network.

How Many Expansion Slots Does My Computer Have?

- Network card is used to connect our computer system to the computer


networks over the Internet OR it is used for communication between our
system and the other computer networks. Network card is also known as the
Network adapter or Network interface card (NIC). NIC card has the pins at
the bottom so that it can be fixed in the expansion slot on the motherboard.
Similarly, it has Rj-45 port at the back of the card which is used to connect to
the LAN network.

Why Do Computers Have Expansion Slots?

- Network card is used to connect our computer system to the computer


networks over the Internet OR it is used for communication between our
system and the other computer networks. Network card is also known as the
Network adapter or Network interface card (NIC). NIC card has the pins at
the bottom so that it can be fixed in the expansion slot on the motherboard.
Similarly, it has Rj-45 port at the back of the card which is used to connect to
the LAN network.

Standard And Specialized Ports of Computer

- A port is a physical docking point using which an external device can be


connected to the computer. It can also be programmatic docking point through
which information flows from a program to the computer or over the Internet.

Characteristics of Ports

- External devices are connected to a computer using cables and ports.


- Ports are slots on the motherboard into which a cable of external device is
plugged in.
- Examples of external devices attached via ports are the mouse, keyboard,
monitor, microphone, speakers, etc.

Serial Port

- Used for external modems and older computer mouse


- Two versions: 9 pins, 25 pin model

40 | P a g e
- Data travels at 115 kilobits per second

Parallel Port

- Used for scanners and printers


- Also called printer port
- 25 pin model
- IEEE 1284-compliant Centronics port

PS/2 Port

- Used for old computer keyboard and mouse


- Also called mouse port
- Most of the old computers provide two PS/2 port, each for the mouse and
keyboard
- IEEE 1284-compliant Centronics port

Universal Serial Bus (or USB) Port

- It can connect all kinds of external USB devices such as external hard disk,
printer, scanner, mouse, keyboard, etc.
- It was introduced in 1997.
- Most of the computers provide two USB ports as minimum.
- Data travels at 12 megabits per seconds.
- USB compliant devices can get power from a USB port.

VGA Port

- Connects monitor to a computer's video card.


- It has 15 holes.
- Similar to the serial port connector. However, serial port connector has pins,
VGA port has holes.

Power Connector

- Three-pronged plug.
- Connects to the computer's power cable that plugs into a power bar or wall
socket.

Firewire Port

- Transfers large amount of data at very fast speed.


- Connects camcorders and video equipment to the computer.

41 | P a g e
- Data travels at 400 to 800 megabits per seconds.
- Invented by Apple.
- It has three variants: 4-Pin FireWire 400 connector, 6-Pin FireWire 400
connector, and 9-Pin FireWire 800 connector.

Modem Port

- Connects a PC's modem to the telephone network.


- Ethernet Port
- Connects to a network and high-speed Internet
- Connects the network cable to a computer.
- This port resides on an Ethernet Card.
- Data travels at 10 megabits to 1000 megabits per seconds depending upon the
network bandwidth.

Game Port

- Connect a joystick to a PC
- Now replaced by USB
- Digital Video Interface, DVI port
- Connects Flat panel LCD monitor to the computer's high-end video graphic
cards.
- Very popular among video card manufacturers.

Sockets

- Sockets connect the microphone and speakers to the sound card of the
computer.

42 | P a g e
INPUT AND OUTPUT
Pointing Devices
- The pointing devices are used to point or select anything on the screen using
devices such as a mouse. These pointing devices are also called “Input devices “

Scanning Devices
- Scanners read data or information from source and which can be a written
document, inventory card, price tag, photograph or picture. A scanning device
reads data or information and converts it into a form that the computer can
process.

Types Of Scanning Devices


- A flatbed scanner is an optical scanner
which makes use of a flat surface for
scanning documents. The scanner is
capable of capturing all elements on the
document and does not require movement
of the document. A scanner that provides
43 | P a g e
a flat, glass surface to hold a sheet of paper, book or other object for
scanning. The scan head is moved under the glass. Flatbed scanners often
come with sheet feeders for scanning multiple sheets of paper rather than one
at a time.
- A sheetfed scanner (also referred to as an
automatic document scanner or ADF
scanner) is a digital imaging system
specifically designed for scanning loose
sheets of paper, widely used by businesses to
scan office documents and less frequently
used by archives and libraries to scan books
that have been disbound.
- The drum scanner was the first image
scanner designed for use with a computer.
'At the time of its creation in 1957 by the
US National Bureau of Standards, the first
scan had a resolution of 176 pixels for the
long dimension. Drum scanners provide the
ultimate in scanning quality and resolution
and are widely used for commercial graphics production as well as
applications that turn photos into posters and wall-sized images.
- A type of optical scanner designed
especially for scanning photographs. Photo
scanners are smaller than general-purpose
scanners but offer high resolution. A typical
photo scanner is a sheet-fed scanner that
can scan 3×5-inch or 4×6-inch photographs
at 300 dpi or higher resolution. An image
scanner is a digital device used to scan
images, pictures, printed text and objects and
then convert them to digital images. Image scanners are used in a variety of
domestic and industrial applications like design, reverse engineering,
orthotics, gaming and testing.
- A film scanner is a device made for
scanning photographic film directly into a
computer without the use of any
intermediate printmaking. A film scanner is
a device made for scanning photographic
film directly into a computer without the
use of any intermediate printmaking.

44 | P a g e
- A portable scanner can be helpful when
you are looking to digitally upload small
photos or documents. Traditional
scanning devices can usually handle a
number of sizes, some of which may be
larger than you need. Portable scanners
are usually designed with more standard
sizes in mind.
Pointing Devices
- An input device used to control a pointer on the screen is called a pointing
device. A pointer is a small symbol that appears on the screen in a graphical
user interface.

Types of Pointing Devices:

 Mouse - Is a small, lightweight input device. The mouse


is moved on a flat surface to control the movement of
the cursor on a screen.
Different Types of a Mouse:
Mechanical Mouse

45 | P a g e
Optical Mouse

Wireless Mouse

 Trackball - A trackball can also be used as an


alternative to a mouse. This device also has buttons
similar to those on a mouse.
 Touchpad/ Trackpad
- A touchpad is a small, plain surface over which the
user moves his finger. The user controls the
movement of the cursor on the screen by moving his
fingers on the touchpad. It is also known as a trackpad
 Pointing Stick - A pointing stick is a pressure-
sensitive device. It is similar to a pencil eraser and

46 | P a g e
exits between keys on the keyboard. When the user pushes the pointing stick,
the pointer on the screen also moves.
 Graphics Tablet - A graphics tablet consists of a flat
pad on which the user draws with a special pen called a
stylus. The image is created on the screen as the user
draws on the pad. A designer can produce very accurate
drawings using a graphics tablet.
 Touchscreen - The touchscreen is a video display
screen that receives input from the touch of a finger.
The screen is covered with a plastic layer. There are
undetectable beams of infrared light at the back of the
screen.
 Light Pen - A light pen is a hand-held pen-like device. It
is a light-sensitive stylus. The light pen is connected by a
wire to the computer. It has a device at the tip that emits
light. The pen sends information to the computer when a
user touches the pen on certain areas of a specially
designed screen.
 Joystick - A joystick consists of a base and a stick. The
stick can be moved in several directions to shift an
object anywhere on the computer screen. A joystick
can perform a similar function to a mouse or trackball.
 Stylus - The stylus is similar to a ballpoint pen. It uses
pressure to write text and draw lines. It was also called a
pen. A stylus is used in graphical applications.

Image Capture Devices

- Image Capture Devices These devices are used to capture the images from outer
environment. Following are the important image capture devise:
1. Digital Camera
2. Digital Video Camera
3. Camcorder
4. Webcam
5. Scanner

Digital Camera

47 | P a g e
- A digital camera is an important image capturing device. It has a grid of light
sensors that captures image of outer environment.
- The sensors generate analogue signals representing the image and send these
signals to the embedded/built-in processor of camera. This processor digitizes
the analogue signals and displays them on the LCD screen of camera.
- A digital image is made up of pixels. A pixel is a small rectangular sized
picture element. A digital image with a greater number of pixels has good
resolution/image quality. The camera processes and stores the images in non-
volatile memory or it may save images on removable digital storage.

Different Types of Digital Camera:

1. Compact Digital Cameras


 Compact cameras are the most widely used and the simplest cameras
to be ever seen. They are used for ordinary purposes and are thus
called “point and shoot cameras”.
 They are very small in size and are hence portable. Since they are
cheaper than the other cameras, they also contain fewer features, thus
lessening the picture quality. These cameras are further classified
according to their size. The smaller cameras are generally called as
ultra-compact cameras. The others are called compact cameras.
2. Bridge Cameras
 Bridge cameras are most often mistaken for single-lens reflex cameras
(SLR). Though they have the same characteristics their features are
different.
 Though they resemble SLR in many ways, they operate much slower
than the latter. They are very big in size and so the fixed lenses are
given very high zooming capability and also fast apertures.
3. Digital Single Lens Reflex Cameras (DSLR)
 This is one of the most high-end cameras obtainable for a decent
price. They use the single-lens reflex method just like an ordinary
camera with a digital image sensor. The SLR method consists of a
mirror which reflects the light passing through the lens with the help
of a separate optical viewfinder.
4. Electronic Viewfinder (EVF)
 This is just a combination of very large sensors and also
interchangeable lenses. The preview is made using an EVF. There is
no complication in mechanism like a DSLR.
5. Digital Rangefinders
 This is a special film camera equipped with a rangefinder. With this
type of a camera distant photography is possible. Though other
48 | P a g e
cameras can be used to take distant photos, they do not use the
rangefinder technique.
6. Line-Scan Cameras
 This type of cameras is used for capturing high image resolutions at a
very high speed. To make this mechanism possible, a single pixel of
image sensors is used instead of a matrix system. A stream of pictures
of constantly moving materials can be taken with this camera.

Digital Video Camera

- A digital video camera captures the sequence of digital images at the rate of
usually 30 images per second. This sequence of digital images is stored as a
video file. The file may also include audio as well.
- A digital video camera (DVCAM) is a device that captures motion picture
information from live environments, encoding it into data that can be decoded
or transcoded into electronic visual media. A typical digital camera consists
of a lens, image sensor, storage media and a number of other features that can
also be found on other cameras (such as scalable aperture, filters and flash).

Different Types of Video Camera:

1. DLSR Video Camera


 DSLR stands for Digital Single Lens Reflex Camera. Inside the body
of the camera, there is a mirror that reflects the light coming from the
lens. Also, when you hit the shutter, the image gets flipped up and the
light coming out from the lens shot by an image sensor, and this is
how a photograph is made. Also, for video, the image sensor starts
recording it instead of clicking a shot.
 DSLR Video cameras are one of the most common types of video
cameras available out there. The best part of them is that they can
click amazing pictures along with great videos. And there are almost
every YouTuber is using DSLR’s to shoot their videos.
2. Mirrorless Video Camera
 Mirrorless Video Camera is a bit different from the DSLR cameras.
However, they are quite similar in many ways. They look like the
same. However, as the name of the camera suggests, mirrorless.
Hence, there is no mirror in the camera that we get to see in a DSLR.
In a mirrorless camera, the image sensor is exposed to the light always
and offers you a digital preview of your image on the LCS screen.
3. Point And Shoot Video Cameras

49 | P a g e
 Point-and-Shoot Video Cameras are one of the most common types of
cameras that we all have seen. They are small in size and does not
offer us many functionalities. Like you cannot change lenses. Also,
they do come with autofocus and a built-in flash component.
4. Sports And Action Video Cameras
 Action cameras are far better compared to any other cameras out
there. The thing about them is that they come with quite a lot of
accessories. As a result, you can attach an action camera to your
helmet, bike, or anywhere. They are small in size and made out of
durable materials.
 They come with a single lens that is capable of shooting in high
definition from a wide-angle perspective. Also, some of the cameras
are capable of shooting in 4K. This kind of camera is mostly used by
travelers or at the sports events when you need to capture shots from a
bike, car, or anything.
5. Professional-Grade Camera
 In the end, there are the Professional-Grade Cameras. As you can see
in the name, they are made for professional users. Professional-grade
cameras are powerful enough to produce high-quality video, and it is
mostly used by the filmmakers. As the need to shoot high-quality
videos.
 They are also very reliable and comes with a robust body, which
makes them long-lasting. Even these cameras are pretty expensive
compared to any other cameras. Even they are highly customizable
and come with no plastic parts.

Camcorder

- it is a portable digital video camera that has facility of recording. It captures


image sequence and stores them as a video file.
- A camcorder is a combination of a television camera, a video recorder, and a
synchronization pulse generator, allowing you to record video and sound on a
miniature cassette, digital versatile disc (DVD), or memory card, and
subsequently transfer the signals to a full-size DVD or other medium.

Different Types of Camcorders:


50 | P a g e
1. VHS - The VHS format is the oldest type of camcorder. This type of video
camcorder is fast becoming outdated, because you can only play back the
video on a VHS VCR system. VHS camcorders are not nearly as clear as
digital video camcorders that offer clear video with 540 lines of resolution,
VHS video cameras only offer 240 lines of resolution.
2. MiniDV - MiniDV, short for mini–Digital Video off the clearest and most
vivid colors out of all the types of camcorders on the market, and they're
small in size only 4 inches in width and height. Mini dv camcorders can fit in
the palm of your hand, making them very easy to handle and transport. And if
you like editing your video footage you can connect dv camcorders to your
computer system.
3. Digital8 - Digital8 camcorders offer the best of both worlds, Hi8 and DV.
You can use 8mm and hi8 video tapes combined with the best image quality
found in digital camcorder formats. Digital8 camcorders are larger and
heavier than Mini DV camcorders, but they are also cheaper in price. The
Digital8 system offers 540 lines of crystal-clear resolution.
4. DVD Camcorders - The newest form of digital video cameras are DVD
camcorders. These camcorders are small in size, just like Digital8 and Mini
DV camcorders. The big difference compared to other camcorder systems is
that DVD camcorders use recordable DVD discs such as DVD-R or DVD-
RW. The big benefit to DVD video cameras is that they can be played on
your home DVD player, and of course the quality is the best you can find.

Input Devices Image Capture Devices, Sound Capture Devices

 Webcam - Webcam is used in video calling or video conferencing. It


captures images and sent them to computer where computer transmits them
over Internet so that other party can see. Webcam is not used for recording
video but it is used for broadcasting video. It can also be used for remote
monitoring of a place or a building.

Advantages of Webcam

- Work
- Personal relationships
- Education and Training
- Versatility

 Scanner
 A scanner creates a digital photograph of a paper document. Scanner
has a single row of hundreds of light sensors. It throws light on the

51 | P a g e
document and each sensor generate an analogue signal depending
upon the intensity of light it receives.
 The scanners we usually use are 2 D scanners. A 3 D scanner is a
device that analyzes a real-world object or environment to collect data
on its shape and possibly its appearance. The collected data can then
be used to construct digital three-dimensional models.

Advantage Of Scanner

- Quality and Retail


- Reliability
- Environmental benefits
- Easy to use

Sound and Music Capture Devices

Two Main Devices:

- Microphone - Is a very common sound capturing device. It receives sound


from outer environment and coverts it into analogue signals. The microphone
is connected with the soundcard of computer.  Microphone is usually used to
make voice calls over Internet which is known as Vo. IP.  Microphone can
also be used with speech recognition software that will receive the voice
signals coming from microphone and will convert them into the text which is
really helpful for those with physical disabilities.
Advantage Of Microphone

- It is faster to read in text than to type it in using a keyboard type


- It can improve both safety and security when used in the voice
activation system
- Sound can be manipulated in real time rather than a recording done at
the earlier stage

- Midi (Musical Instrument Digital Interface) - It is a musical keyboard which is


connected to the computer through a special MIDI interface. When a key is struck
on the musical keyboard then keyboard sends signals representing particular pitch
and volume related to that key. 

Advantage Of Midi

- The advantages of MIDI are the file sizes are smaller than the others
everything of the sound file can be edited and change also effects can be
52 | P a g e
added to an instrument, when editing the sound file and making changes
there is no background noise during making the changes.

Output Devices

- An output device is any hardware device used to send data from a computer to
another device or user. Usually, most output peripherals are meant for human use,
so they receive the processed data from the computer and transform it in the form
of audio, video, or physical reproductions.

Example of Output Device:

- monitors and projectors (video)


- headphones and speakers (audio)
- Printers and plotters (physical reproduction in the form of text or graphics).

● Monitors - it is also known as VDU (Visual Display Unit). It consists of several


components such as screens, circuitry, power supplies, screen adjustment buttons
and more, which are assembled into a casing. The monitor provides output from a
computer on a screen so that users can interact with a view data digitally.
● Projectors- is a display output device because it receives images from a computer
and transfer those computer images to a wall surface or projection screen.
Specifically, the computer first sends the signal to the video card which then
transmits the signal to the projector to project the images on the surface.
● Speakers- are one of the most common output devices used to achieve audio
output. Computer speakers usually receive signals from the sound card and then
convert them to audio. These speakers use internal amplifiers that vibrate at
different frequencies to increase/decrease the volume or amplitude of the sound as
per the choice of the user.
● Headphones- also known as earphones are output devices that allow us to listen
to audio from a computer. These devices are mainly used to listen to audio
privately or without disturbing others around. Headphone comes with variety of
sizes and designs and connect with supported devices via both wired and
wirelessly.
● Sound Card- also known as an expansion cost, it is a type of output device that is
usually installed on a motherboard in the output of sound signals and enable
devices such as speakers and headphones to function.
● Video Card- is also an expansion card and installed on the slots in the
motherboard. The primary function of a video card is to process images and
videos so that their visuals are displayed on the screen. It is also known as a video
adapter.

53 | P a g e
54 | P a g e
Job Applicant Letter

- A job application letter (also known as a cover letter) is a letter you send with
your resume to provide information on your skills and experience.  This letter is
your chance to “sell” yourself to an employer, explaining why you are an ideal
candidate for a position.
- When you write your job application letter, it’s essential to pay close attention
to formatting. There’s a right way to format a cover letter; deviate from the
standard guidelines and hiring managers may drop you from consideration. In
fact, anything that makes your job application letter appear less than professional
can prevent hiring managers from taking you seriously as a candidate. Make sure
your cover letter is formatted properly and is free from errors before you send.
- The purpose of a job-application or résumé cover letter is to improve your
chances of being called for an interview, by convincing the reader that you would
be the best person for the job. If your letter is poorly written, the reader will not
likely take the time to look at your résumé. So, your job-application letter is a
crucial chance at making a good first impression.

What Makes a Good Letter?

 Selectivity. Choose only your best points—two or three that will be of the
most interest to the reader—to present in well-developed paragraphs. Focus
on skills you can bring to the company and how your accomplishments may
have benefited a previous employer.
 A job-application letter should:
- Be single spaced, leaving one space between paragraphs.
- Be about one full page in length (longer if you are more experienced).
- Have carefully chosen words—pack a lot into a small space, making
each word count to show that you are the most qualified candidate for
the position.

Things to Remember Before You Write Job Application Letter

- Each cover letter takes preparation. Here are some things to keep in mind
while you prepare:
 Think about yourself and your experiences.
 Then think about how you would like to relate these
experiences to the organization you're writing to. Which of
your talents, skills, personality traits and accomplishments
should this particular organization know about? Brainstorm a
list for yourself.
55 | P a g e
 How did you hear about this opportunity?
 If it was through a personal contact, write down the name. If
through an advertisement, write down where and when you
saw it and list the specific points the ad wants you to include.
 What do you know about the organization you're writing to?
 Consider what attracted you to it in the first place. Maybe it's
personal (a friend worked there), or maybe you are impressed
with what the organization does or admire their unique work
philosophy. Do some research about the company online or
through trade magazines, etc.
 To whom are you writing?
 It's always best to write to an actual person (with a title) if you
can. If you're responding to an ad that does not include a
specific contact, try to look up the name of someone related to
the role. Be sure to spell both name and title perfectly. If you
cannot find a specific person to write to, try "Dear Hiring
Manager" or "Dear Human Resources." 

Tips for Writing Job Application Letter

1. Do Not Copy Your Resume. A cover letter is a sales pitch. The purpose of
this letter is to convince the hiring manager that you’re a strong candidate and
to highlight your relevant experience and abilities. Your application letter
should show how exactly your background makes you a good fit for a
particular position. In contrast, your resume is a general record of your
experience, education, and accomplishments.
2. Tailor Each Application Letter To The Job. As mentioned above,
emphasize in your letter why you are an ideal candidate for the specific job.
This requires that you personalize each letter to fit the company and
position. Match your qualifications to the job posting by highlighting the
skills, experience, and requirements listed in the description.
3. Be Professional. Application letters have a fairly rigid format—as hiring
managers read your letter, they will expect to see certain information
included in set areas. You have freedom within the structure to be personable,
but it is important to stick to a certain level of formality. Pay particular
attention to the professionalism of your salutation. You wouldn't, for
instance, want to refer to the letter's recipient by their first name unless
specifically requested.
4. Carefully Proofread. Employers are likely to overlook an application with a
lot of errors. Therefore, read through your cover letter, and even consider
asking a friend or career counselor to read the letter. Proofread for grammar
56 | P a g e
and spelling errors. Be particularly mindful to spell the letter recipient's name
correctly, as well as the company name.
5. Follow Business Letter Format. Use business letter format when writing
your letter. If you’re sending a typed hard-copy letter, be sure to lead with a
paragraph containing your address, followed by the date, followed by the
address of the recipient. If you’re sending an email, you can omit the address
and date sections.
6. Decide Whether to Send a Hard Copy or Email. The main difference
in formatting an email application letter is that you need to include a subject
line that clearly lays out your purpose for writing, e.g. “Graphic Designer—
Joe Smith.” And, instead of placing your contact information at the top of the
letter, as you would in a hard copy, you'll include it below your signature.

Parts of a Job-Application Letter

1. Inside Address - Include the name, title, organization, and mailing address.
Spell the name correctly to avoid offending the recipient—phone the
company if you do not know to whom to address the letter
2. Salutation - Begin your letter with “Dear” followed by the reader's title and
last name, ending with a colon, not a comma.
3. Four Paragraphs Minimum - Your letter should have at least an
introductory paragraph, an education paragraph, an employment paragraph,
and a concluding paragraph.
 Introductory Paragraph
 This paragraph captures your reader's attention and creates the
tone of your letter. You want to establish the tone of quiet self-
confidence, not self-effacement. Avoid all negative statements.
For example, do not say, "I do not have a strong background in
computers, but I am willing to learn." Your reader will walk
away remembering your weaknesses instead of your strengths.
Functions of the Introductory Paragraph:
 Identifies your source of information. For a solicited application,
name your source of information: ad, website, current employee's
name and title. If your application is unsolicited, simply ask if a
position is available.
 Identifies the position you are interested in. Make it clear which
position you are applying for; in case the organization has
advertised many job openings.
 States that you wish to be considered for the position.
Forecasts the rest of the letter. Choose a few phrases in the opening
paragraph that let your reader know what to expect in the body of
57 | P a g e
the letter. For example, “retail experience” or “computer
experience” prepares your reader for a discussion of these
qualifications later in your letter
 The Education Paragraph
 If your education paragraph is stronger than your employment
paragraph, as most students’ will be, place it before your
employment paragraph. In your paragraph, consider what
aspect of your education best fits the job requirements. A good
strategy is to discuss skills and knowledge gained from
advanced coursework in your major.
 You can also discuss the range and diversity of your courses to
show your versatility, if the job you are applying for stresses
this. Your business or communication skills that you acquired
in college, as well as extracurricular activities, are often
valuable to mention in your education paragraph. Employees
with leadership experience and skills are of value to many
companies. Be sure to mention your college major in the
education paragraph, if you have not already done so in your
introductory paragraph. Here is an example of an education
paragraph that develops one unified idea, rather than a series
of unrelated facts:

\\
Your own education paragraph should strive for a unified idea, as this one does.

 The Employment Paragraph


 Begin with a topic sentence and develop a single idea. The
idea might be that you have a broad background or that a
particular job has given you special skills that will help you in
the job for which you are applying. This is an example of an
effective employment paragraph:

58 | P a g e
 The Concluding Paragraph
 The purpose of the concluding paragraph is to encourage the
reader to invite you for an interview. In the earlier paragraphs,
you provided information to convince the reader to give you a
second look. Your last paragraph should make it easy for the
person to contact you.
 The following elements are in a good concluding paragraph: a
reference to your résumé, a polite but confident request for an
interview, and your phone number and e-mail address. Use the
phrase “at your convenience” when requesting an interview
and state the time of day you can be reached. Below is an
effective example of a concluding paragraph:

4. Complimentary Close - These are some standard phrases: Sincerely,


sincerely yours, Yours sincerely, Yours very truly, and very truly yours.
5. Signature - Type your full name on the fourth line below the complimentary
close. Sign in ink above your typed name.
6. Enclosure Line - The enclosure notation refers to the résumé0

59 | P a g e
Job Application Letter Template

60 | P a g e
61 | P a g e
The DON’TS when Writing Job Application Letter

- A poor cover letter:


 Is poorly written with weak sentence structure and bad grammar.
 Has misspelled words or typographical errors.
 Contains sexist, condescending, or discriminatory language.
 Fails to address the reader personally or focus on his or her needs.
- If you want to have a chance at all of being invited for an interview, avoid the
above common mistakes found in job- application cover letters.

Here are some examples of BAD COVER LETTERS:


Dear Mr. Jones:
With great pleasure, I am enclosing my résumé for your consideration. My work history for
the past two years reflected my father’s illness. All available money went toward his care. I
am sure my background would show what an asset I would be for dealing with all types of
people.

- This letter plays on the sympathy of the reader. Instead of making excuses for
one’s weaknesses and asking for pity, the cover letter should focus on one’s
Gentlemen:
I would like to apply for the position of . I recently earned a bachelor’s degree in
marketing, and I worked the past two summers at College Town Bookstore as a sales clerk.
Enclosed is a copy of my résumé, and I will gladly send my references upon request. I
request, though, that you do not contact College Town Bookstore.
strengths.

- If you are concerned about having a previous employer contacted, do not write it
in your cover letter. It raises questions in the reader’s mind about your past work
relationships, taking the focus off your cover letter’s purpose. During an
interview, you will have the opportunity to address your concerns.

Dear Ms. Johnson:


I am very interested in applying for a management trainee position. I graduated from Texas
A&M University with a degree in marketing. I have presented many speeches and have written
many papers in my classes, showing my strong communications skills. I consider myself a
hard worker and a real “people person.” I would be a tremendous asset wherever I work.

- The focus should be on the company’s needs—not on the perceived arrogance of


the writer.

62 | P a g e
To Whom It May Concern:
It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of
foolishness, it was the spring of hope, the winter of despair, we had everything before us
............................................................................................” In his quote, Charles Dickens
could be describing the business world of today. All of us will be faced with decisions to be
made that will affect our futures. Sometimes we will need help with the choices we will need
to make when opportunities for personal growth occur. I believe your management trainee
position is the very challenge and opportunity that will help my career grow, and I would

- This cover letter sounds more like a graduation speech. Being overly dramatic
is not appropriate for a job-application cover letter; strive for a more
professional, neutral tone.
Dear Mr. Adams:
I wish to be considered for your management trainee position. I have no working experience in
a company like Carlton Data Management or in the advertised position, but I acquired
excellent organizational skills from my college courses. I think that my enthusiasm will more
than make up for my lack of work experience. Please consider my enclosed résumé.

- It is best not to lead with your weaknesses. Rather, concentrate on what you can
offer the company.

Dear Sirs:
I am applying for the management trainee position that I saw advertised in the newspaper.
I feel I am qualified for the position.

With four years of college behind me, I am seeking a new challenge in a position where I can
use my people-oriented skills.

Here is my résumé and a list of contacts who will give you information about my background,
skills, and my tireless energy. I am an action-oriented people person and a team player, excited
about the potential for growth and ever-increasing responsibility. I would love to share ideas
with you.

I look forward to meeting you as you search for the best possible candidate for this important
position in your company.

63 | P a g e
- This letter is shallow and slightly jumbled. Strive for better organization and stay
focused on the company’s needs

Curriculum Vitae Preparation

- It is a marketing tool and may be one of the most important documents you write
in your professional life. It is the sum and substance of your work history and
education and indicates a particular career direction. It should demonstrate
credibility and be interesting.
- Because your CV is like a personal advertisement, it should convince a potential
employer that you are an outstanding candidate for the job and that you will
contribute to the organization. Your CV has to sell you in short order. While you
may have all the requirements for a particular position, your CV is a failure if the
employer does not instantly come to the conclusion that you "have what it takes."
The first hurdle your CV has to pass - whether it ends up in the "consider file" or
the "reject file" - may take less than thirty seconds.
- To prepare a successful CV, you need to know how to review, summarize, and
present your experiences and achievements on one page. Unless you have
considerable experience, you don't need two pages. Outline your achievements
briefly and concisely. Your CV is your ticket to an interview where you can sell
yourself!

What Your Curriculum Vitae Should Include?

1. Personal Data
 The only required information is your name, address, phone number,
and e-mail address. Be sure to provide both permanent and current
address, and the telephone numbers.
2. Career Objective
 An objective tells potential employers the sort of work you are hoping
to do. A concise statement indicating your career goals is
recommended if you have specific career desires. Otherwise, include
your objective in your cover letter to a specific employer or for a
specific job.
3. Summary of Skills/Professional Expertise
 A concise statement highlighting your strongest skills and areas of
professional expertise can be an advantage to you, especially if you
have a mix of experiences in your career history.
4. Education

64 | P a g e
 One rule of thumb is that unless you are more than five years out of
school, your education section should precede your experience
section. List the names of the institutions you attended with the most
recent listed first. List the degree received plus your major area of
study. Include special programs from your university, such as junior
year abroad, a six-month internship, etc. Indicate either the degree
name or the degree initials.
 Indicate the area of specialization or major after the degree title.
Include the thesis topic in italics if it relates to your professional
goals. Mention academic honors including a brief explanation of
honors or awards that are not self-explanatory, particularly for
international students. It is not necessary to include your grade point
average unless requested by an employer.
5. Work Experience
 Internships and volunteer experience can be considered in this section
if they relate to your professional goals, or you can create a section
called “Additional or Related Experience," or "Community Service."
In a CV, work and education may be listed in chronological order
however many employers prefer the reverse chronological order (put
your last job first and work backward to your first). It should include
title of position, name of organization, location of work (town, state),
dates of employment, describe your work responsibilities with
emphasis on specific skills and achievements. When describing work
experience, summarize your accomplishments rather than listing job
tasks.
 Students and recent grads often fail to make an effective presentation
of their experience because they use to narrow a definition of work
experience. First of all, relevant "work" experience is in no way
limited to paid employment. Also consider including nonpaid work,
volunteer work, part-time and temporary positions, internships,
unstructured work, self-employment, odd jobs, and miscellaneous
informal services you may have provided to your academic
department or a favored professor.
6. Publications
 List those publications that relate directly to your career goal.
Employers most interested in publications will be teaching hospitals,
research organizations, consulting, and international organizations. It
is usually recommended to create a separate list and indicate on your
resume that publications are available upon request.
7. Computer Skills
 It is advisable to provide information about your computer skills.
65 | P a g e
8. Languages
 If you are fluent or conversant in several languages, list the languages
you speak and/or write as follows: "Fluent in French, proficient in
Japanese, knowledgeable in Spanish." Think carefully about your
level of proficiency. Do not overrate your skills as you may be asked
to demonstrate your language ability during an interview.
9. Interests
 One or two lines about your outside interests, hobbies, or travels can
sometimes add interesting information to the interview and may spark
conversation. You may add key or special skills or competencies,
leadership experience in volunteer organizations Generally, avoid
information about your marital status, children, or age in this section
(unless you feel it is relevant to the work you will be expected to do).
10. References
 References You can write "References Available upon Request" if
you have space. Employers will ask directly for references, so prepare
a list with names, titles, addresses, and telephone/fax numbers. Ask
people if they are willing to serve as references before you give their
names to a potential employer. Give careful consideration to your
choice of references, as some will be more appropriate to an employer
than others.

Curriculum Vitae Writing Tips

 Content
- Run a spell check on your computer before anyone sees your resume.
- Get a friend (an English major would do nicely) to do a grammar
review.
- Ask another friend to proofread. The more people who see your
resume, the more likely that misspelled words and awkward phrases
will be seen (and corrected).
- The use of power verbs denote that you took action. Examples include
words like "accomplished," "achieved," and "managed." When
reviewers see these action words, they realize that you are a person
that takes initiative: you are a self-starter.
- The use of power words helps measure the result of the actions you
took. Examples of power words are "positive," "results," and
"significant."

66 | P a g e
- Emphasize your recent work experience. In today's changing world,
reviewers don't care what you were doing fifteen-twenty years ago.
- Try to highlight your strengths, and minimize your weaknesses.
 Design - These tips will make your resume easier to read and/or scan into an
employer's data base.
- Use white or off-white paper.
- Use 8-1/2- x 11-inch paper.
- Print on one side of the paper.
- Use a friendly font (Arial, Times or Courier) size of 10 to 14 points
- Use nondecorative typefaces.
- Choose one typeface and stick to it.
- Avoid italics, script, and underlined words
- Do not use horizontal or vertical lines, graphics, or shading.
- Do not fold or staple your resume.
- If you must mail your resume, put it in a large envelope
- There is no consensus as to what length your resume should be. The
length depends on the depth and scope of your individual experiences.
Try to keep it to either one full page or two full pages. Leaving it at
1½ pages isn't as professional as one or two full pages.
- Keep paragraphs brief: no more than five to six lines. If you have a
long paragraph on your resume, break it up into several shorter ones.
Eliminate every unnecessary word.
 Putting your resume/CV on-line
- Once you are satisfied with your resume/CV you should consider
putting it in one of the CSO’s electronic resume books. Employers are
very interested in viewing resumes/CVs on line when hiring. This will
also give a larger number of employers the opportunity to view your
resume/CV easily and often.

67 | P a g e
Example of Curriculum Vitae

68 | P a g e
How to Create Brochure Using Microsoft Publisher

- A brochure can be an effective way to present information about your business,


product, or service to prospective clients. You can produce your own 3- or 4-
panel brochures in Microsoft Publisher, using either its selection of built-in
templates or, with practice, you can make one from scratch, and you can
customize it with such features as reply forms and an address section.
● Choose A Brochure Design. - Select "Brochures" from Available
Templates, then select a design from the display of brochure templates.
You can click on any design to see a larger version of it in the upper right
of the Brochure Options task pane at the right of the screen.

● Choose A Panel Amount. - Decide whether you want to make a 3- or 4-


panel brochure. Select "3-panel" or "4-panel" from the Page size section of
the Options section of the task pane. Before deciding on whether to make
a 3-panel or 4-panel brochure, you may want to fold a sheet of paper of the
size you want to print your brochure on in thirds or quarters to help you
decide which design you want to make. (A misprinted document is a good
choice for this.)
● Include Any Necessary Forms. - If you're using your brochure to solicit
information or orders from your customers, include a form in your
brochure to collect that information. The Forms dropdown list offers
several options:
1. None. Choose this option if your brochure is designed solely to
present your business without collecting any information from
your customer in return.
2. Order Form. Choose this option if your brochure is a sales
brochure from which customers can order the products described
in it.
3. Response Form. Choose this option if your brochure is intended
to present your current products or services and solicit information
from your customers about new products, changes to products, or
improvements to services they'd like to see.
4. Sign-Up Form. Choose this option if your brochure is a sales
brochure selling a service for customers to register for.
5. Form designs are not available if you choose to make your
brochure from a blank template.

70 | P a g e
● Choose A Design Scheme. - You can add custom colors and fonts to your
brochure. Each template comes with a default color and font scheme, but
if you wish to use a different color or font scheme, you can do so by
selecting the appropriate new scheme. Choose a new color scheme from
one of the named color schemes in the Color Scheme dropdown and a new
font from the Font Scheme dropdown.

71 | P a g e
● Insert Your Company Information. Select your company information
set from the Business Information dropdown or select "Create new" to
create a new information set. This information will be inserted into your
brochure.

● Create The Brochure. - Click the "Create" button at the bottom of the
task pane to create your brochure. You may want to print out the brochure
at this point to see if the design is what you want. You can also create a
PDF of it at this point to email to others for their input on the design.

72 | P a g e
● Replace Any Placeholder Text with Your Own Text. - Click on the text
you want to replace and type your new text in the text field. Select "Text
Fit" in the Text group of the Text Box Tools Format ribbon and then select
"Do Not Autofit" (Publisher 2010). You can then manually select a new
text size. Repeat this step for any other text you wish to replace, on both
sides of the brochure.

● Replace Any Placeholder Pictures with Your Own Pictures. Right-


click the picture you want to replace, then select "Change Picture"
from the popup menu. Choose where the new picture will come from.
Repeat this step for any other pictures you wish to replace, on either
side of the brochure.

73 | P a g e
● Save The Brochure. Choose "Save" or "Save As" from the File menu
(2003 or 2007) or from the left menu of the File tab (2010). Give your
brochure a descriptive name.

74 | P a g e
SECOND STORAGE

Primary Storage  

- Primary storage is commonly referred to as simply “primary memory” which is


volatile in nature such as the RAM which is a memory and tends to lose data as
soon as the computer reboots or loses power. It holds data or information that can
be directly accessed by the central processing unit 
- RAM is stored in integrated circuits for immediate access with minimum or no
delay. It’s a high-speed data storage medium which is directly connected to the
processing unit via the memory bus, allowing active programs to interact with the
processor. 
- Version of ROM that can be programmed once after it has been created; and
Cache memory which is also a that is directly integrated with the CPU chip to
provide high-speed data access for future requests. It’s more of a volatile memory
of the computer that is placed between the CPU and the main memory. 

Read-Only Memory (Rom) 

Programmable Read-Only Memory 

75 | P a g e
Cache Memory 

What Is Secondary Storage? 

- Secondary storage is yet another ideal storage solution in the computer’s


memory hierarchy that is used to store data or information on the long-term
basis, more like permanently. Unlike primary storage, they are non-volatile
memory or commonly referred to as external memory that are not directly
accessed by the central processing unit. 
- Secondary storage includes optical media such as CDs and DVDs which are
capable of storing any substantial amount of data; magnetic tapes which are
methods of data storage used across corporate environments. However,
secondary storage devices are quite slower than their primary counterparts,
which make them relatively cheaper but equally efficient. 

Hard Drives 

76 | P a g e
Optical Media  

Magnetic Tape  

Disk Caching 

- A preset amount of memory is used in a fixed allocation; usually a 10–15 percent


memory allocation is set aside. The operating system usually manages this
workspace using a LRU (least recently used) algorithm. For a dynamic allocation,
the operating system determines the disk cache allocation as it is running. 

What Is Significance of Disk Cache? 

 Disk cache memory is a type of cache memory that is used to store and access
data from a host hard drive more quickly. By using this technology, the hard
disk, memory, and computing components can process input and output data
more quickly. 

Raid - is a technology used to increase the performance and reliability of data storage
by combining multiple smaller disks into a single, more capable, device. 

77 | P a g e
 Raid Benefits - RAID arrays grant numerous advantages, and they vary depending
on the chosen RAID configuration.  

In general, RAID helps with: 


 Increasing fault tolerance, or ability to function after one or several disk
failures. 
 Boosting read and write (I/O) speeds. 
 Enlarging storage capacity to hold all your data. 
 Improving data security. 
 Ensuring data reliability. 
 Keeping the system running in case one of the disks fails to allow time for
a replacement, thus  
 ensuring no downtime. 
 Warning users of potential crashes using the Parity Check function. 

Optical Storage

- Optical storage, electronic storage medium that uses low-power laser beams to
record and retrieve digital (binary) data. In optical-storage technology, a laser
beam encodes digital data onto an optical, or laser, disk in the form of tiny pits
arranged in a spiral track on the disk’s surface.  

What Is Optical Storage Used For? 

 They are useful lightweight media for transporting data and programs. Data is
written onto the disc by a laser and is read from the disc by another laser. 
The discs are cheap, but they are vulnerable to scratches. They cannot store
much data as a hard drive.

CD-ROM

 Abbreviation of compact disc read-only memory, type of computer memory


in the form of a compact disc that is read by optical means. A CD-ROM drive
uses a low-power laser beam to read digitized (binary) data that has been
encoded in the form of tiny pits on an optical disk. 

DVD-ROM

 A read-only DVD disc used to permanently store data files. DVD-ROM discs
are widely used to distribute large software applications that exceed the
capacity of a CD-ROM disc. DVD-ROM discs are read in DVD-ROM and

78 | P a g e
DVD-RAM drives in computers, but typically not in DVD drives connected
to TVs and home theater systems. 

BLUE RAY

 is an optical disc format like CD and DVD. Blu-ray discs can hold more
information than other optical media, because of the blue lasers that the disc
drives use. A single Blu-ray disc can hold up to 25GB of data. 

HD DVD

 Due to the structure of the single-lens optical head, both red and blue laser
diodes can be used in smaller, more compact HD DVD players. However, HD
DVD discs can’t be played on standard DVD players. 

DVD-RAM

 is a DVD optical disk storage technology on which data can be continually


read, erased and written? It provides exceptional data integrity, data retention
and damage protection and can be used for basic data storage, archiving data
and data backup. 

CD-R&DVD-R

 are optical disc storage formats. Choosing the best one to use is a case-by-
case decision. DVD-R discs have much more storage space, but CD-R discs
work with more devices. CD-Rs are an older medium, but they still get the
job done, although USB flash drives have replaced the role of CD-R and
DVD-R discs in many cases. 

When Was Digital Storage Created?  

 The first hard disk drive was the IBM Model 350 Disk File that came with the
IBM 305 RAMAC computer in 1956. It had 50 24-inch discs with a total
storage capacity of 5 million characters (just under 5 MB). Above: IBM
Model 350, the first-ever hard disk drive.  

Why Is Digital Storage Important? 

 Data storage is a key component of a successful business. You need to store
all the files you’re currently processing in accounts payable, expense
reporting, and other departments somewhere you won’t lose them 

79 | P a g e
What Is Digital Storage Capacity? 

 Storage capacity refers to how much disk space one or more storage devices
provides. It measures how much data a computer system may contain. For an
example, a computer with a 500GB hard drive has a storage capacity of 500
gigabytes. A network server with four 1TB drives, has a storage capacity of 4
terabytes. 

80 | P a g e
COMMUNICATIONS AND NETWORKS

Revolution and Communication Channel

- Cell phones and other wireless technologies are allowing us to stay connected in
today’s world like never before. Increased connectivity potentially means
increased productivity especially in the business world.
Numerous applications depend on communication systems

- Email, Instant messaging (IM), internet telephone, and electronic commerce


connectivity uses computer networks to link people and resources
- Going wireless has been the most dramatic change
- sending and receiving devices
- Communication channel

Data transmission specifications

- Communication Channels
- Channels carry data from one computer to another
- Two categories of communication channels:
● Physical Connection
 Telephone lines (Twisted pair Cables)
 Coaxial cable
 Fiber-optic cable
● Wireless Connection
 1 Infrared
 2 Broadcast radio
 Wi-Fi (wireless
 Fidelity)802.11
 3 Microwave
 Stations
 Bluetooth
 4 Satellite
 GPS
Connection Device Signals
● Types Of Signals
1. Analog signal
2. Digital signal

81 | P a g e
Connection Device Types and Transfer Speeds
● Types Of Modems:
1. External
2. Internal
3. Wireless
4. PC Card
Connection Service

Protocols

Networks

82 | P a g e
Computer Networks

etwork Types

Network Architecture

83 | P a g e
Star Network

Bus Network

Rin

g Network

84 | P a g e
Hierarchical Network

Principal Network

Strategy

Organizational Internets

Careers In IT

85 | P a g e
Connection Devices

- Connected devices are physical objects that can connect with each other and other
systems via the internet. They span everything from traditional computing
hardware, such as a laptop or desktop, to common mobile devices, such as a
smartphone or tablet, to an increasingly wide range of physical devices and
objects.
- This growing list of objects includes household appliances, heating and cooling
systems, vehicles, health and fitness monitors, environmental sensors, and more.
These devices, which are commonly embedded with technology such as
processing chips, software, and sensors, collect data and share it with other
devices and systems. Connected devices are typically monitored and controlled
remotely. They connect with the internet and each other via various wired and
wireless networks and protocols, such as Wi-Fi, NFC, 3G and 4G networks.

The Connection Devices Are Divided into Five Different Categories:

1. Passive Hubs - A passive hub is just a connector. It connects the wires


coming from different branches. In a star-topology Ethernet LAN, a passive
hub is just a point where the signals coming from different stations collide;
the hub is the collision point. This type of a hub is part of the media; its
location in the Internet model is below the physical layer.
2. Repeaters - A repeater is a device that operates only in the physical layer.
Signals that carry information within a network can travel a fixed distance
before attenuation endangers the integrity of the data. A repeater receives a
signal and, before it becomes too weak or corrupted, regenerates the original
bit pattern. The repeater then sends the refreshed signal. A repeater can
extend the physical length of a LAN.
3. Active Hubs - An active hub is actually a multipart repeater. It is normally
used to create connections between stations in a physical star topology.
However, hubs can also be used to create multiple levels of hierarchy. The
hierarchical use of hubs removes the length limitation of 10Base-T (100 m).
4. Bridges - A bridge operates in both the physical and the data link layer. As a
physical layer device, it regenerates the signal it receives. As a data link layer
device, the bridge can check the physical (MAC) addresses (source and
destination) contained in the frame
5. Routers- A router is a three-layer device that routes packets based on their
logical addresses (host-to-host addressing). A router normally connects LANs
and WANs on the Internet and has a routing table that is used for making

86 | P a g e
decisions about the route. The routing tables are normally dynamic and are
updated using routing protocols.

There Are Four Types Of Network Services:

● User Management - User management is a range of services, from the creation


of user names and passwords to the allocation of rights, privileges, and access.
For example, when a new staff member joins a department, the network
administrator must create a new account for this person to access the network
services. Access to applications, files, services, and tools this person will require
to complete his or her job must be provided by the system administrator. This is
known as user management and authentication.
● Email - Email is a widely used productivity tool that requires connection to the
Internet. In addition, many organizations have a policy surrounding the email
software that can be used, the maximum storage capacity, and the file sizes that
can be transmitted. Most organizations provide staff with a company-specific
email address, which requires the creation and maintenance of an email server.
● Printing - Shared printing is one of the primary network services required in any
organization. Instead of individual printers at each desk, all the users can submit
printing jobs to a central unit. This unit is often a multi-function printer, scanner,
and photocopier. In order to provide this type of network service, many firms
implement special printer management software to control the flow of documents
and protect confidential documents.
● System Administration - From a system administration perspective, the ability to
control all the workstations from a central location is the best network service.
The administrator is responsible for deploying new software applications,
updating the operating systems, and maintaining the same versions of software
programs on all the workstations. Many firms lock the workstations, so only the
system administrator can add new software or run new programs. This increases
the overall quality of the network and reduces staff time spent on computer
maintenance.

What is Network Architecture?

- Network architecture refers to a network’s structural and logical layout. It


describes how the network devices are connected and the rules that govern data
transfer between them. Planning the network architecture is vital because it either
enhances or hinders the performance of the entire system. Choosing the wrong
transmission media or equipment for a particular expected server load, for
instance, can cause slowdowns on the network.

87 | P a g e
Types of Networking Architecture

● Peer-To-Peer
 In a peer-to-peer model, all devices in a network have equal
responsibilities and privileges with each other. This means tasks are
allocated equally throughout the network. Files in one computer can
be shared with every other computer, essentially making every node a
network storage drive. Resources like a printer connected to one
device are also visible to every other device on the network.
 A peer-to-peer architecture is suitable for small networks, such as a
branch office. Your home network, by the way, often uses a peer-to-
peer model.
● Client/Server Architectures
 In a client/server architecture, all devices in the network, called
“clients,” are connected to a central hub, called a “server.” The server
handles the bulk of the network operations – data storage, processing
of client requests, cybersecurity, and access control.
 Most large networks, such as WANs, often use the client/server
model. The web server you’re accessing this article on, for instance, is
a perfect example. In this case, your computer or smartphone is the
client device. Client/server is also the preferred enterprise network
architecture.

Network Architecture Design

- The design of any digital network architecture involves optimizing its


building blocks. These include
 Hardware
 These are the equipment that forms the components of a
network, such as user devices (laptops, computers, mobile
phones), routers, servers, and gateways. So, in a way, the goal
of any network architecture is to find the most efficient way
to get data from one hardware point to another.
 Transmission Media
 Transmission media refers to the physical connections
between the hardware devices on a network. Different media

88 | P a g e
have various properties that determine how fast data travels
from one point to another.
 They come in two forms: wired and wireless. Wired media
involve physical cables for connection. Examples include
coaxial and fiber optic. Wireless media, on the other hand,
relies on microwave or radio signals. The most popular
examples are Wi-Fi and cellular.
 Protocols
 Protocols are the rules and models that govern how data
transfers between devices in a network. It’s also the common
language that allows different machines in a network to
communicate with each other. Without protocols, your iPhone
couldn’t access a web page stored on a Linux server.
 There are many network protocols, depending on the nature of
the data. Examples include the Transmission Control Protocol
/ Internet Protocol (TCP/IP) used by networks to connect to
the Internet, the Ethernet protocol for connecting one
computer to another, and the File Transfer Protocol for
sending and receiving files to and from a server.
 Topology
 How the network is wired together is just as important as its
parts. Optimizing this is the goal of network topology.
 Topology is the structure of the network. This is important
because factors like distance between network devices will
affect how fast data can reach its destination, impacting
performance. There are various network topologies, each with
strengths and weaknesses.

What is Network Security

- Network Security protects your network and data from breaches, intrusions and
other threats. This is a vast and overarching term that describes hardware and
software solutions as well as processes or rules and configurations relating to
network use, accessibility, and overall threat protection.
- Network Security involves access control, virus and antivirus software,
application security, network analytics, types of network-related security
(endpoint, web, wireless), firewalls, VPN encryption and more

Benefits of Network Security

89 | P a g e
- Network Security is vital in protecting client data and information, keeping
shared data secure and ensuring reliable access and network performance as
well as protection from cyber threats. A well-designed network security
solution reduces overhead expenses and safeguards organizations from costly
losses that occur from a data breach or other security incident. Ensuring
legitimate access to systems, applications and data enables business
operations and delivery of services and products to customers.
Types of Network Security Protections

● Firewall - Firewalls control incoming and outgoing traffic on networks, with


predetermined security rules. Firewalls keep out unfriendly traffic and is a
necessary part of daily computing. Network Security relies heavily on
Firewalls, and especially Next Generation Firewalls, which focus on blocking
malware and application-layer attacks.
● Network Segmentation - Network segmentation defines boundaries between
network segments where assets within the group have a common function,
risk or role within an organization. For instance, the perimeter gateway
segments a company network from the Internet. Potential threats outside the
network are prevented, ensuring that an organization’s sensitive data remains
inside. Organizations can go further by defining additional internal boundaries
within their network, which can provide improved security and access control
boundaries within their network, which can provide improved security and
access control.
● Hyperscale Network Security - Hyperscale is the ability of an architecture
to scale appropriately, as increased demand is added to the system. This
solution includes rapid deployment and scaling up or down to meet changes
in network security demands. By tightly integrating networking and compute
resources in a software-defined system, it is possible to fully utilize all
hardware resources available in a clustering solution.
● Cloud Network Security - Applications and workloads are no longer
exclusively hosted on-premises in a local data center. Protecting the modern
data center requires greater flexibility and innovation to keep pace with the
migration of application workloads to the cloud. Software-defined
Networking (SDN) and Software-defined Wide Area Network (SD-WAN)
solutions enable network security solutions in private, public, hybrid and
cloud-hosted Firewall-as-a-Service (FWaaS) deployments.

90 | P a g e
PRIVACY, SECURITY, AND ETHICS

Privacy Issues

Three Major Issues Concerning Online Privacy

- Online users are incredibly vulnerable to security threats, and there is a long
list of issues associated with their safety. Here we are discussing only the
major issues concerning online privacy.
1. Spying and Snooping - When you are online, you are spied by a
number of trackers for various purposes. Trackers keep a record of
your search history and track all your online activities through various
means. This provides them a clear picture of who you are and your
interests, which is a breach of online privacy policy and makes you a
public property. Most of the time, this tracking is for advertisement
purposes only and it allows advertisers to show ads according to your
taste and interests. But sometimes this information is used by
cybercriminals to carry out unauthorized and illegal activities risking
your online existence.
2. Information Mishandling - There are various sites on the internet
that need your personal information to get access to their services.
These sites often store cookies and save your personal information and
later use it for various purposes. Most of the time this information is
not encrypted and can be accessed by anyone. This mishandling of
personal information may lead to serious consequences. The modern
trend of e-banking and e-business portals have multiplied the risks
associated with online privacy. By sharing your bank details and

91 | P a g e
crucial files on the internet, you are paving ways for burglars and
making yourself vulnerable to cybercriminals.
3. Location Tracking - Most of the internet users proudly upload their
social media posts highlighting their current location along with
tagging friends and family members. It's fun and exciting to share your
life events with friends and family, but this data does not remain
restricted to your expected audience only. This same data is stored on
the social media site you are using and stays there forever, often
without you knowing (though you may have given consent through a
terms and services agreement). Along with social media apps, Google
Maps and other apps also ask for your location and by turning on your
location you are providing first-hand information to the world about
where exactly you are and what your next move is, which is certainly
risky and insecure.

Possible Ways to Protect Against Online Privacy Threats

1. Use a VPN
 There are various ways of protecting your online privacy, but the most
successful and certain way is through VPN. It is a tool that provides
an encrypted tunnel for all your online activities, which means it
encodes all the information transferred between you and your host site
and leaves no chances of snooping and spying. It also provides you an
anonymous IP and disguises your actual identity, hiding your
geographical location and making your online existence more safe and
secure.
 There are various VPN available including free and paid ones. Some
VPN work on a small scale and have access to a few countries only
while others are international ones with access to most parts of the
world.
2. Conduct Safe Browsing

92 | P a g e
 Hackers can easily track your activities and get into your system
through your browser. It’s highly recommended to keep your browser
updated to the latest version. Avoid using spammy websites that asks
for user details. You can also block ads on your browser and take
extra time to actually read privacy policies before giving your
consent.
3. Keep Your System Up-to-Date
 Keep your system up to date to ensure that you don’t miss out any
feature and security fixes. If you find it a hassle to manually apply
updates, you can always use tools to automate your software updates.
Regularly scan your system or it’s better to keep auto scan on in your
system.
4. Use Anti-Virus
 A strong anti-virus program will keep your device free from all types
of malwares, such as spyware, viruses, Trojans, etc. You can also use
a good anti-virus that will keep you updated if it found something
wrong in your system. Using anti-virus is essential as it helps you to
get real time updates.

Privacy Laws

- The potential for breaches of online privacy has grown significantly over the
years. There is no single law regulating online privacy. Instead, a patchwork of
federal and state laws applies. Some key federal laws affecting online privacy
include:
The Federal Trade Commission Act (FTC) [1914]– regulates unfair or deceptive
commercial practices. The FTC is the primary federal regulator in the privacy
area and brings enforcement actions against companies. This includes failing to
comply with posted privacy policies and failing to adequately protect personal
information.

93 | P a g e
● Electronic Communications Privacy Act (ECPA) [1986] - protects
certain wire, oral, and electronic communications from unauthorized
interception, access, use, and disclosure.
● Computer Fraud & Abuse Act (CFAA) [1986] – makes unlawful
certain computer-related activities involving the unauthorized access of a
computer to obtain certain information, defraud or obtain anything of
value, transmit harmful items, or traffic in computer passwords. The law
has been in amended six times.
● Children’s Online Privacy Protection Act (COPPA) [1998] – requires
certain website and online service providers to obtain verifiable parental
consent before collecting, using, or disclosing personal information from
minors under the age of 13. It also requires websites to post an online
privacy policy, collect only the personal information necessary, and create
and maintain reasonable security measures.
● Controlling the Assault of Non-Solicited Pornography and Marketing
Act (CAN-SPAM Act) [2003] – governs sending unsolicited commercial
email and prohibits misleading header information and deceptive subject
lines. It also requires senders to disclose certain information, include a
valid opt-out mechanism, and it creates civil and criminal penalties for
violations.
● Financial Services Modernization Act (GLBA) [1999] – regulates the
collection, use, and disclosure of personal information collected or held
by financial institutions and requires customer notices and a written
information security program.
● Fair and Accurate Credit Transactions Act (FACTA) [2003] – requires
financial institutions and creditors to maintain written identity theft
prevention programs.

Philippine Data Privacy

94 | P a g e
- Republic Act No. 10173, otherwise known as the Data Privacy Act is a law
that seeks to protect all forms of information, be it private, personal, or
sensitive. It is meant to cover both natural and juridical persons involved in
the processing of personal information.

95 | P a g e
What Is Cybercrime?

- Cybercrime is a crime that involves a computer and a network. The computer may
have been used in the commission of a crime, or it may be the target. Cybercrime
may harm someone's security and financial health.
- Cybercrime refers to any illegal activity carried out using computers or the
internet. Cybercriminals ranging from rogue individuals to organized crime
groups to state-sponsored factions use techniques like phishing, social
engineering, and all kinds of malware as part of their cyber-attacks.

Why Computer Crimes Are Vulnerable?

- Because of:
● Anonymity
● Weakness in operating system
● Lack of awareness

Types Of Cybercrime:

● Hacking – A commonly used hacking definition is the act of compromising


digital devices and networks through unauthorized access to an account or
computer system
● Denial Of Service Attack – A denial-of-service (DoS) attack occurs when
legitimate users are unable to access information systems, devices, or other
network resources due to the actions of a malicious cyber threat actor.
● Virus Dissemination – Virus dissemination is a process of a Malicious
software that attaches to other software that destroys the system of the victim.
They disrupt the computer operation and affect the data store by modifying or
deleting it
● Software Piracy – Software piracy is the illegal copying, distributing,
sharing, selling or use of software, whether intentional or not.

96 | P a g e
● PORNOGRAPHY – Cyber Pornography means the publishing, distributing
or designing pornography by using cyberspace
● Credit Card Fraud - Credit card fraud is a form of identity theft that
involves an unauthorized taking of another's credit card information for the
purpose of charging purchases to the account or removing funds from it.
● Phishing - Phishing is a type of social engineering attack often used to steal
user data, including login credentials and credit card numbers. It occurs when
an attacker, masquerading as a trusted entity, dupes a victim into opening an
email, instant message, or text message.
● Cyber Stalking - Cyberstalking involves using electronic means, including
the Internet, to stalk or harass a person or group of people. Cyberstalking can
include many things including threats, solicitation for sex, false accusations,
defamation, slander, libel, identity theft, and vandalism.
● Threatening - A cyber or cybersecurity threat is a malicious act that seeks to
damage data, steal data, or disrupt digital life in general. Cyber threats
include computer viruses, data breaches, Denial of Service (DoS) attacks, and
other attack vectors.
● Salami Attack - An attack on a computer network which involves the
intruder siphoning off small amounts of money from a file and placing them
in another file that he or she can access; for example, a file that holds their
bank account details.

Safety Action for Cybercrime

- These are the Top seven cyber safety actions


● Install OS/Software Updates
● Run Antivirus Software
● Prevent Identity Theft
● Turn On Personal Firewalls
● Avoid Spyware/Adware
● Protect Passwords

97 | P a g e
● Back Up Important Files

What Is Cyber Security?

- Computer security, Cyber Security, or information technology security is the


protection of computer systems and networks from information disclosure, theft
of, or damage to their hardware, software, or electronic data, as well as from the
disruption or misdirection of the services they provide. Cyber Security’s goal is to
Protect our information and information systems
- Cyber security is the practice of protecting critical systems and sensitive
information from digital attacks. Cyber security is important because government,
military, corporate, financial, and medical organizations collect, process,
- and store unprecedented amounts of data on computers and other devices. That’s
why it is important to protect every small and big data or information.

Two Types of Cyber Security

- There are two types of Security. these two are used to protect against
unauthorized access to data centers and other computerized systems.
1. Physical Security – The protection of personnel, hardware, software
and data from physical actions and events (eg: protection from fire,
flood, and any natural disasters)
2. Cyber Security – Cyber or Computer Security is the protection of
computing system, including hardware, software from cyber-attack.
This system includes in:
● PC
● Laptops
● Smartphones
● Mobile
● Devices
● Printers
98 | P a g e
Cyber Security Threats

- These threats able to operate in security failures and damages to the assets of
a user.
- With a global population as of 2019 of 7.5 billion 42% people facing cyber
crimes
Examples:
● Hacking
● Social Engineering
● Phishing
● Trojan Horses
● Spamming
● Virus
● Malware

How To Strengthen the Cyber Security?

1. Use Software Firewalls (Avast, FortiGate, Sophos Firewall)


2. Back-Up Data
3. Use Strong Password (SuMMer@TiMe143)
4. Ensure Smart Phone Security
5. Practice Safe Clicking – don’t accept strange emails, links, websites, calls, &
messages.
6. Make sure antivirus software is always up to date
7. Don’t put Personal & Sensitive information online (Address, Account
Numbers)

The Benefits of Cyber Security

● Protect personal and Sensitive Information of the user


99 | P a g e
● Decrease the threat of current and future vulnerability
● Comprehensive digital protection to the user
● Prevent adware
● Denise spyware
● Secure from the viruses
● Creates job opportunities

What Is Computer Ethics?

- Computer ethics is a field of applied ethics that addresses ethical issues in the use,
design and management of information technology and in the formulation of
ethical policies for its regulation in society.
- Computer ethics essentially protect individuals online from predation: they
prevent the breach of privacy, identify theft, interference with work, and unlawful
use of proprietary software, among other events. Computer ethics govern the
behavior of users online and date back to 1992.

The 10 Commandments of Computer Ethics

1. Thou shalt not use a computer to harm other people.


2. Thou shalt not interfere with other people’s computer work.
3. Thou shalt not snoop around in other people’s files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people’s computer resources without authorization.
8. Thou shalt not appropriate other people’s intellectual output
9. Thou shalt think about the social consequences of the program you write.
10. Thou shalt use a computer in ways that show consideration and respect.

Importance Of Computer Ethics

100 | P a g e
- To Protect Personal & Commercial Information such as login & password
info, credit card and account information and government and commercial
databases. It also controls unwanted internet mail and ads (Spam).
- To Make ICT Available and Accessible to all People, including the Disabled
and the Deprived. Accessibility needs to be kept in mind during curriculum
design (in educational contexts), in order to maximize the capabilities of the
technology
- To suppress dishonest business practices and to protect and encourage fair
competition
- To promote moral and social values in society
- To control plagiarism, student identity fraud, and the use of copyrighted
material, etc.

PowerPoint

- a software package designed to create electronic presentations consisting of a


series of separate pages or slides,
- Sometimes abbreviated as PP or PPT, PowerPoint is a presentation program
developed by Microsoft that creates a slide show of important information, charts,
and images for a presentation. It is most often used for business and school
presentations.
- January 1987: The name PowerPoint was established
- The team had to find a new name quickly and thought about "Slide Maker" and
"Overhead Maker". According to Gaskins, one night he came up with "Power
point" randomly under the shower.

101 | P a g e
Excel Worksheet

- A worksheet (also known as a spreadsheet) consists of cells in which you can


enter and calculate data. The cells are organized into columns and rows. A
worksheet is always stored in a workbook. A workbook can contain many
worksheets. Think of it as a book. In Microsoft Excel, a workbook is a collection
of one or more spreadsheets, also called worksheets, in a single file. Below is an
example of a spreadsheet called "Sheet1" in an Excel workbook file called
"Book1." Our example also has the "Sheet2" and "Sheet3" sheet tabs, which are
also part of the same workbook.

102 | P a g e
References:
https://www.investopedia.com/terms/c/cloud-computing.asp
https://www.scienceandmediamuseum.org.uk/objects-and-stories/short-history-internet
https://www.techopedia.com/definition/5411/website#:~:text=A%20website%20is%20a
%20collection,constitute%20the%20World%20Wide%20Web.
https://www.slideshare.net/priyasoni91/the-internet-10511600
https://www.britannica.com/technology/Internet
https://www.computerhope.com/jargon/w/website.htm
https://www.scienceandmediamuseum.org.uk/objects-and-stories/short-history-internet
https://www.techopedia.com/definition/5411/website#:~:text=A%20website%20is%20a
%20collection,constitute%20the%20World%20Wide%20Web.
https://www.techopedia.com/definition/5175/hyperlink
https://weblearn.ox.ac.uk/portal/help/TOCDisplay/content.hlp?
docId=whatisthesearchtool
https://libguides.lub.lu.se/c.php?g=656004&p=4610765
https://www.bdc.ca/en/articles-tools/entrepreneur-toolkit/templates-business-guides/
glossary/search-engine
https://turbofuture.com/internet/What-is-a-Search-Engine-Definition-and-Examples
https://www.investopedia.com/terms/c/cloud-computing.asp
http://w.sunybroome.edu/basic-computer-skills/functions/word_processing/
1word_processing.html? fbclid=IwAR299u6WMjKPvzodklosx01J72rAGysMa-
1Z7lwPQ71BfrkXpyqt8- LfdS4#:~:text=Word%20Processing%20refers%20to
%20the,applications%20are%20also%20widely%20used
https://www.techopedia.com/definition/9510/spreadsheet-software?
fbclid=IwAR13MvCZLZcBKoiPUa022g1yCrJZOwAJraN3_7hTODCG0Zd1VYk3KVA
Rai8
https://www.techopedia.com/definition/27519/app-store?fbclid=IwAR222-dX-
5LqdgY8oKdRoWQnFoylO5JYkjts9XPkX-ayOO832nKTvLL-hRs
https://www.quickbase.com/articles/application-software-basics?
fbclid=IwAR0lmC7mfLvYyAZg9N7m5ktvtzsLfJiPDyKYKIIvAjgdAwSGIPO5i1TNXB
s#:~:text=Application%20software%20is%20a%20type,productivity%2C%20creativity
%2C%20or%20communication
https://www.proventeq.com/blog/cloud-office-and-its-business-benefits

103 | P a g e
https://www.techopedia.com/definition/10206/office-suite#:~:text=An%20office
%20suite%20is%20a,suite%20or%20office%20productivity%20software.
https://zapier.com/blog/microsoft-office-vs-g-suite/
https://www.digit.in/technology-guides/fasttrack-to-office-suites/an-introduction-to-
office-suites.html/
https://www.guru99.com/operating-system-tutorial.html
https://www.emerald.com/insight/content/doi/10.1108/eb045169/full/html?
skipTracking=true#:~:text=Types%20of%20scanning%20devices%20which,scanners
%20and%20hand%2Dheld%20scanners.&text=Flatbed%20scanners%20operate%20in
%20a,down%2C%20on%20a%20glass%20platen.
https://www.moglix.com/articles/scanners-definition-types-advantages-and-price
https://www.scanjunction.com/what-are-the-different-types-of-scanners-and-their-uses/
https://slidetodoc.com/input-devices-image-capture-devices-sound-capture-devices/
https://www.circuitstoday.com/different-types-of-digital-cameras
https://unsignedbyte.com/different-types-of-video-cameras/
https://www.sciencedirect.com/topics/engineering/camcorder
https://www.streetdirectory.com/travel_guide/120163/technology/
the_types_of_camcorders.html
https://www.techopedia.com/definition/3538/output-device#:~:text=An%20output
%20device%20is%20any,%2C%20video%2C%20or%20physical%20reproductions.
https://www.tutorialsmate.com/2021/05/output-devices-of-computer.html
https://www.blinn.edu/writing-centers/pdfs/Writing-Job-Application-Letters.pdf
https://www.washington.edu/doit/key-elements-cover-letter
https://www.higheredjobs.com/career/CoverLetterDos.cfm
http://www.hsph.harvard.edu/Admins/offstuds/intro.html#resumes
http://www.jobweb.com/catapult/guenov/res.html
http://www.careersoar.com/interviewing_tips.asp
http://www.wetfeet.com/asp/article2.asp?aid=246&atype=Resumes
http://jobstar.org/tools/resume/res-def.htm
http://topechelon.com/jobseekers/sixresumerules.htm
http://jobstar.org/tools/resume/

104 | P a g e
http://safetynet.doleta.gov/resume.htm
http://www.wetfeet.com/advice/resumes.asp
http://www.impactonline.org/about/advice/resume.jsp
http://jobstar.org/tools/resume/clet-ex1.htm
http://www.virtualville.com/employment_agency/interviewing.html
http://www.jobsontheweb.com/tips.htm
http://careers.altavista.com/intvTips.html
http://web.mit.edu/personnel/www/policy/2-5.html
https://www.fusionconnect.com/blog/what-is-network-architecture?
fbclid=IwAR07UvZAjqb_6uM1ZX0w46mJRW78c9-
Ww0O9wGI7I1F3Kl0lc8jKROig0wo
https://www.checkpoint.com/cyber-hub/network-security/what-is-network-security/?
fbclid=IwAR3pvXJkUxE5waxhpZ6zsCIn_Ub_wgQyQt3Z0YAGp43PkEif3v4hjnTjk_Y
https://www.brainkart.com/article/Connecting-Devices_13460/?
fbclid=IwAR0bb7H8OLjbhQYzDm2B-pF02d_KE3-7o3BaJAEDIb2K6I6YHlg7BUSQ-
Ss
https://www.easytechjunkie.com/what-are-the-different-types-of-network-services.htm?
fbclid=IwAR1clC5-p2ERaHsxeCv0hLRsrtmqn-O3BJM92a8U_eu1IzTmx66U6qReDLQ
https://www.learnpick.in/prime/documents/ppts/details/1245/cybercrime
https://www.youtube.com/watch?v=w-lCziHRlD8
https://www.oxfordreference.com/view/10.1093/acref/9780191744150.001.0001/acref-
9780191744150-e-2812#:~:text=An%20attack%20on%20a%20computer,holds%20their
%20bank%20account%20details.
https://www.youtube.com/watch?v=hamJzUXVwTw

105 | P a g e

You might also like