Compilation of Handouts
Compilation of Handouts
COMPUTER APPLICATION
Submitted by:
BT-NFT 3C / 3D
Submitted to:
Cloud Computing
- Cloud computing is the delivery of different services through the Internet. These
resources include tools and applications like data storage, servers, databases,
networking, and software.
- Rather than keeping files on a proprietary hard drive or local storage device,
cloud-based storage makes it possible to save them to a remote database.
- Cloud computing is a popular option for people and businesses for a number of
reasons including cost savings, increased productivity, speed and efficiency,
performance, and security.
Email
Storage, backup, and data retrieval
Creating and testing apps
Analyzing data
Audio and video streaming
Delivering software on demand
Deployment Methods
Public Clouds - Provide their services on servers and storage on the Internet.
These are operated by third party companies, who handle and control all the
2|Page
hardware, software, and the general infrastructure. Clients access services
through accounts that can be accessed by just about anyone.
Private Clouds - Are reserved for specific clientele, usually one business or
organization. The firm's data service center may host the cloud computing
service. Many private cloud computing services are provided on a private
network
Hybrid Clouds - are, as the name implies, a combination of both public and
private services. This type of model allows the user more flexibility and helps
optimize the user's infrastructure and security.
3|Page
Disadvantages of Cloud Computing
- Security has always been a big concern with the cloud especially when it
comes to sensitive medical records and financial information.
- Servers maintained by cloud computing companies may fall victim to natural
disasters, internal bugs, and power outages, too.
- As with any technology, there is a learning curve for both employees and
managers.
Google Cloud
Amazon Web Services (AWS)
Microsoft Azure
IBM Cloud
Alibaba Cloud
Origin of Internet
- The origins of the internet are rooted in the USA of the 1950s. The Cold War was
at its height and huge tensions existed between North America and the Soviet
Union. Both superpowers were in possession of deadly nuclear weapons, and
people lived in fear of long-range surprise attacks. The US realized it needed a
communications system that could not be affected by a Soviet nuclear attack.
- At this time, computers were large, expensive machines exclusively used by
military scientists and university staff.
- The Elliott-NRDC 401 was one of the first electronic
computers, developed by British electrical company
Elliott Brothers in 1952
- President Dwight D. Eisenhower formed the Advanced
Research Projects Agency (ARPA) in 1958, bringing
together some of the best scientific minds in the
country. Their aim was to help American military technology stay ahead of its
enemies and prevent surprises, such as the launch of the satellite Sputnik 1,
5|Page
happening again. Among ARPA’s projects was a remit to test the feasibility of a
large-scale computer network.
- Lawrence Roberts was responsible for developing computer networks at ARPA,
working with scientist Leonard Kleinrock. Roberts was the first person to connect
two computers. When the first packet-switching network was developed in 1969,
Kleinrock successfully used it to send messages to another site, and the ARPA
Network—or ARPANET—was born.
- As ARPANET grew, a set of rules for handling data packets needed to be put in
place. In 1974, computer scientists Bob Kahn and Vint Cerf invented a new
method called transmission-control protocol, popularly known as TCP/IP, which
essentially allowed computers to speak the same language.
- After the introduction of TCP/IP, ARPANET quickly grew to become a global
interconnected network of networks, or ‘Internet’.
- The ARPANET was decommissioned in 1990.
- The terms ‘World Wide Web’ and ‘internet’ are often confused. The internet
is the networking infrastructure that connects devices together, while the
World Wide Web is a way of accessing information through the medium of
the internet.
- Tim Berners-Lee first proposed the idea of a ‘web of information’ in 1989. It
relied on ‘hyperlinks’ to connect documents together. Written in Hypertext
Markup Language (HTML), a hyperlink can point to any other HTML page
or file that sits on top of the internet.
- In 1990, Berners-Lee developed Hypertext Transfer Protocol (HTTP) and
designed the Universal Resource Identifier (URI) system. HTTP is the
language computers use to communicate HTML documents over the internet,
and the URI, also known as a URL, provides a unique address where the
pages can be easily found.
- Berners-Lee also created a piece of software that could present HTML
documents in an easy-to-read format. He called this ‘browser’ the
‘Worldwide Web’.
6|Page
over damaged networks; it also uses bandwidth very efficiently and doesn’t
need a single dedicated link, like a telephone call does.
- The world’s first packet-switching computer network was produced in 1969.
Computers at four American universities were connected using separate
minicomputers known as ‘Interface Message Processors’ or ‘IMPs’. The
IMPs acted as gateways for the packets and have since evolved into what we
now call ‘routers. Packet switching is the basis on which the internet still
works today.
What is TCP/IP?
What is DNS?
7|Page
University of Southern California. It was one of the innovations that paved
the way for the World Wide Web.
Website
- Tim Berners-Lee was the first to create a piece of software that could present
HTML documents in an easy-to-read format. He called this ‘browser’ the
‘Worldwide Web’. However, this original application had limited use as it
could only be used on advanced NeXT machines. A simplified version that
could run on any computer was created by Nicola Pellow, a math’s student
who worked alongside Berners-Lee at CERN.
8|Page
Examples of Web Browsers
Mosaic - Mosaic was easy to download and install, worked on many different
computers and provided simple point-and-click access to the World Wide
Web. Mosaic was also the first browser to display images next to text, rather
than in a separate window.
Netscape Navigator - A widely used internet browser that at the time was
faster and more sophisticated than any of the competition.
Opera 1.0 - released April 1995. This was originally a research project for a
Norwegian telephone company.
Websites are hosted on servers, and require a web browser such as Chrome, Firefox, or
Internet Explorer to be visited (either on a computer or mobile device).
Although these top-level domains extensions still exist, they say little about a website's
actual content. In modern days’ internet, the ".com" extension is by far the most popular
domain, together with many other country-specific extensions (.it, .de, .co.uk, .fr, etc.).
Search Tool
- Search allows you to search content created by tools within a worksite or course.
It achieves this by creating an index of all content that other tools make available
to the search tool. This index is updated automatically, so as content is added to
the worksite or course, it will be indexed.
- For example, if the worksite or course has an Email Archive, as emails are posted
to the list, the content of those emails will be indexed and become searchable in
the search tool. Or, if the site has documents uploaded to Resources, the
documents will become searchable.
9|Page
- Search indexes many different types of content, including messages, web pages in
HTML format, documents in DOC, PDF, or RTF format, spreadsheets in XLS
format, and Wiki pages.
Databases
Search Engines
- A search engine is a software program that helps people find the information they
are looking for online using keywords or phrases.
- Search engines are able to return results quickly—even with millions of websites
online—by scanning the Internet continuously and indexing every page they find.
- When a user enters a search term, the search engine looks at the website page
titles, contents and keywords it has indexed and uses algorithms (step-by-step
operations) to produce a list of sites—with the most relevant websites at the top of
the list.
Crawling
- Search engines use pieces of software called web crawlers to locate publicly
available information from the internet, which is why this process is known
as crawling. Web crawlers can also sometimes be referred to as search engine
spiders. The process is complicated, but essentially the crawlers/spiders find
the webservers (also known as just servers for short) which host the websites
and then proceed to investigate them.
11 | P a g e
- A list of all the servers is created, and it is established how many websites are
hosted on each server. The number of pages each website has, as well as the
nature of the content, for example, text, images, audio, video, is also
ascertained. The crawlers also follow any links that the website has, whether
internal ones that point to pages within the site, or external ones that point to
other websites and use them to discover more pages.
Indexing
Ranking
- When a query is entered into a search engine, the index is scoured for
relevant information and then sorted into a hierarchical order by an algorithm.
This ordering of the search engine results pages (SERPS) is known as
ranking. Different search engines use different algorithms, and so give
different results. Over the years, algorithms have become more and more
complex as they attempt to present more relevant and accurate answers in
response to the queries of search engine users.
Pros
Cons
1. Google - Google is the biggest search engine in the world by far. It handles
over 5 billion searches each day and has a market share of over 90% at the
12 | P a g e
time of writing (August 2019). Developed originally by Larry Page and
Sergey Brin in 1997, Google has become so successful that it has become
synonymous with search engine services, even entering the dictionary as a
verb, with people using expressions such as: "I googled it" when they've
searched for something online.
2. Bing - The origins of Microsoft's Bing can be found in the technology
company's earlier search engines, MSN Search, Windows Live Search, and
Live Search. Bing was launched in 2009 with high hopes that it could usurp
its rival Google, but despite attracting many fans, things haven't quite worked
out that way. Even so, Bing is the third largest search engine worldwide after
Google and Baidu. It is available in 40 different languages.
3. Yahoo! - Yahoo! Search is another big player in the search engine world.
However, for much of its history it has supplied the user interface, but relied
on others to power the searchable index and web crawling. From 2001 to
2004, it was powered by Inktomi and then Google. From 2004, Yahoo!
Search was independent until a deal was struck with Microsoft in 2009
whereby Bing would power the index and crawling.
4. Ask.com - Originally known as Ask Jeeves, Ask.com is a little different from
Google and Bing, as it uses a question-and-answer format. For a number of
years, Ask.com was focused on becoming a direct rival to the big search
engines, but nowadays, answers are supplied from its vast archive and users
contributions, along with the help of an unnamed and outsourced third-party
search provider.
5. Baidu - Founded in the year 2000 by Robin Li and Eric Xu, Baidu is the most
popular search engine in China, and the fourth most visited website in the
world, according to Alexa rankings. Baidu has its origins in RankDex, a
search engine previously developed by Robin Li in 1996. As well as its
Chinese search engine, Baidu also offers a mapping service called Baidu
Maps and more than 55 other internet-related services.
6. AOL.com - AOL, now styled as Aol. and originally known as America
Online, was a big player in the early days of the internet revolution, providing
a dial-up service for millions of Americans in the late 1990's. Despite AOL's
decline as broadband gradually replaced dial-up, the AOL search engine is
still used by a significant minority of searchers. On June 23, 2015, AOL was
acquired by Verizon Communications.
7. DuckDuckGo - DuckDuckGo (DDG) has a number of features that
distinguish it from its main competitors. It has a strong focus on protecting
searchers' privacy, so rather than profiling users and presenting them with
personalized results, it provides the same search results for any given search
term. There's also an emphasis on providing quality rather than quantity when
13 | P a g e
it comes to search results. DDG's interface is very clean and not overladen
with adverts.
8. Wolfram Alpha - Wolfram Alpha markets itself as a computational
knowledge engine. Instead of answering the queries of searchers with a list of
links, it responds with mathematical and scientific answers for their
questions, using externally sourced "curated data". Wolfram Alpha was
launched in 2009 and has become a valuable tool for academics and
researchers.
9. Yandex - Launched in 1997, Yandex is Russia's largest search engine, and
the country's fourth most popular website. Outside of Russia, the search
engine also has a major presence in Ukraine, Belarus, Kazakhstan, and other
countries of the Commonwealth of Independent States. As well as search,
Yandex offers many other internet-related products and services, including
maps and navigation, music, eCommerce, mobile applications, and online
advertising.
10. Internet Archive - The Internet Archive provides free public access to a
wide range of digital materials. A nonprofit digital library based in San
Francisco, it's a great tool for tracing the history domains and seeing how
they have evolved over the years. Besides websites, you can also find
software applications and games, movies/videos, music, moving images, and
a huge collection of public-domain books. The Internet Archive also
campaigns for a free and open internet.
Electronic Commerce
- At its core, electronic commerce or e-commerce is simply the buying and selling
of goods and services using the internet, when shopping online. However, the
term is often used to describe all a seller’s efforts, when selling products directly
to consumers.
- Most people think of e-commerce as selling or purchasing a physical product
online. But e-commerce also includes the sale and purchase of non-physical
goods, such as services and digital products. It's when a business sells online.
14 | P a g e
(B2B e-commerce refers to when a company purchases goods
or services online from another enterprise. Some examples
include a restaurant buying an ice machine or a law firm
purchasing accounting software. Business software like
customer relationship management (CRM) platforms and
payment processing companies are considered to be B2B, too.
B2B online sales tend to be more complicated than other
forms of e-commerce because they rely on large catalogs of
complex products to sell.
Business-to-consumer (B2C)
B2C online retail happens when a consumer purchases an item
over the internet for their own use. Although B2C e-commerce
seems more prominent, it’s only about half the size of the
worldwide B2B e-commerce market.
Consumer-to-consumer (C2C)
Consumer-to-consumer (C2C)
C2C operates like a digital yard sale or an internet auction in
which individual people sell goods to each other. These might
be products they make, such as handcrafts or art, or
secondhand items they own and want to sell.
Consumer-to-business (C2B)
When a consumer creates value for a business, that's C2B
commerce. Creating value can take many forms. For instance,
C2B can be as simple as a customer leaving a positive review
for a business or a stock photography website purchasing
images from freelancers. In addition, businesses that sell
secondhand products sometimes purchase merchandise from
private citizens online.
Business-to-government (B2G)
These are sometimes called business-to-administration (B2A)
sales. They happen when a private firm exchanges goods or
services with a public agency. Usually, a business contracts
with a public organization to carry out a mandated service. For
instance, a custodial firm might bid online for a contract to
clean the county courthouse, or an IT firm might reply to a
proposal to manage a city's computer hardware.
Consumer-to-government (C2G)
Consumer-to-government (C2G)
Ever paid a parking ticket online? Then you've experienced
C2G. This model also includes paying taxes online and
15 | P a g e
purchasing goods from a government agency's e-auction. Any
time you turn money over to a public agency using the
internet, you engage in C2G e-commerce.
Direct to Consumer (D2C)
Direct to consumer e-commerce is the newest model of
ecommerce, and trends within this category are continually
changing. D2C means that a brand is selling directly to their
end customer without going through a retailer, distributor, or
wholesaler. Subscriptions are a popular D2C item, and social
selling via platforms like Instagram, Pinterest, TikTok,
Facebook, Snap Chat, etc. are popular platforms for direct-to-
consumer sales.
ALIBABA
AMAZON
WALMART
EBAY
WAYFAIR
16 | P a g e
Lazada
Monthly Traffic Estimate: 43.38M
Shopee
Monthly Traffic Estimate: 74.91M
Metro deal
Monthly Traffic Estimate: 770,000
Carousell
Monthly Traffic Estimate: 4.95M
FACEOOK MARKETPLACE
Web Utilities
- Web Utilities are specialized utility program that make using the internet and the
web easier and safer. Some of these utilities are browser related program that
either become part of your browser or are executed from your browser. In
addition, the administrator can perform operations such as setting up account
tracks, registering scan destination, and importing/exporting various setting data.
Web Utilities is the device management utility embedded in this system. This
function allows you to remotely operate the Touch panel of this system or monitor
the status of this system using the computer’s browser via the network. In
[Machine Manager Setting], configure various functions of Web Utilities.
Shockwave
QuickTime
17 | P a g e
Some widely used plug-ins are:
Shockwave
Quick Time
Off-line browsers
Information pushers
Filters
18 | P a g e
APPLICATION SOFTWARE
19 | P a g e
Business Process Management - BPM is designed to facilitate rapid
development and automation of strategic processes and uses web-
based modeling, rule creation, and a simple interface to enable the
user to perform business functions more quickly.
Word Processing
- Word Processing refers to the act of using a computer to create, edit, save and
print documents. In order to perform word processing, specialized software
(known as a Word Processor) is needed
Spreadsheet
Mobile App
App Store
- app store refers to an online shop where customers can purchase and download
various software applications. the apps sold through app stores are intended for
mobile device
20 | P a g e
Emails
Files
Calendars
Document types
Related metadata
Applications
User permissions
Compound structures
Linked components
- Cloud office suites present your users with a plethora of ways to work
collaboratively. By storing content in a centralized, cloud-based repository
such as SharePoint Online, documents and records can be edited, viewed, and
interacted with by multiple users. Apps such as Microsoft Teams give users
the power to work, communicate and collaborate in real-time, regardless of
location or device.
- Both popular cloud office suites offer intelligent search solutions, such as
Microsoft Delve and Google Cloud Search. Both these solutions provide
higher quality search and data discovery capabilities compared to on-premises
deployments.
- Most cloud office suites provide the attractive benefit of increased storage
space per user. In fact, Office 365 provides each user with a very generous
1TB of storage space via OneDrive for Business (easily increased to 5TB),
while Google G Suite provides 30GB per user as standard.
Popular examples of cloud office suites include Microsoft’s Office 365 and Google’s G
Suite:
Application Software
Spreadsheet Software
Presentation Software
23 | P a g e
- Databases are a powerful and convenient way to organize information. Using
tables, they offer an organized mechanism for storing, managing and
retrieving information. Spreadsheet users will already be accustomed to
storing data in tabular form, and will find it easy to make the switch to
databases.
Email Client
Publishing Platform
Collaboration Software
24 | P a g e
today relies mainly on technology, not on proximity. Workers today are always
on the run, and with time being a scarce resource, productivity cannot be
compromised for issues such as travel.
The 6 Best Office Suites for Your Documents, Spreadsheets, and Presentations:
- A block letter format is a minimalist letter type that utilizes simple outlines to
delineate a message. Block letter format’s text is aligned to the left with single
spacing between the lines and double spacing to separate the paragraphs instead
of the usual indentations.
- Block letter formats, especially the traditional block, have specific punctuation
guidelines in the letter’s salutation part. Different block formats stem from the
original block format with varied specifications
25 | P a g e
- A block letter format is a reserve for official letters. Its minimalist and clear
view outline salient information on the first skim. Many human resource
managers and other formal letter recipients spend a maximum of an average of
2 minutes on a letter.
- The full block letter format or the traditional block is the most common block
letter format.
- Full block letters have the entire text aligned to the left and have closed
punctuation requirements.
26 | P a g e
- A colon or comma is usually common after the salutation clause. However, you
will not require ending punctuation in open punctuation full block letters after the
salutation. All enclosures and dates are also left-aligned.
- Content is aligned to the left margin of the page.
- In appearance, it is quite simple. It means that the reader would find it easy to
read.
- A typist would also find it easier.
- There is a single line space in the paragraphs.
Example:
27 | P a g e
Semi-Block Format
- Semi block or indented style is similar to a full block style, albeit informal.
- The beginning of every paragraph is indented five-character spaces and
paragraphs separated by double space.
- The text is left-justified, while the date and signoff are similar.
- The beginning of the paragraph is indented at five-character spaces. The rest of
the paragraph is not indented.
- Sign off and date have a similar alignment.
Example:
28 | P a g e
Modified Block Format
- In a modified block, the entire text is aligned to the left except for the date,
signoff, and sender’s address aligned to the right.
- However, the date and sign are roughly set at the center but offset towards the
right of the letter.
- The paragraphs are not intended, and the spacing is similar to a full block
structure spacing.
- The address of the sender is roughly set at the center of the sheet.
- Date and sign off also have a similar alignment
Example:
29 | P a g e
System Software
- System Software is a set of programs that control and manage the operations of
computer hardware. It also helps application programs to execute correctly.
- System Software are designed to control the operation and extend the processing
functionalities of a computer system. System software makes the operation of a
computer more fast, effective, and secure.
Operating systems
Programming language translators
Communication Software
Utility programs
30 | P a g e
Features Of System Software
Application Software
- Application Software is a program that does real work for the user.
- It is mostly created to perform a specific task for a user
- Application Software acts as a mediator between the end-user and System
Software. It is also known as an application package.
- This type of software is written using a high-level language like C, Java, VB. Net,
etc. It is a user-specific and is designed to meet the requirements of the user.
- You can also install multiple Application Software on a single System Software.
- You can store this kind of software on CDs, DVDs, flash derive, or keychain
storage devices.
- Applications are a class of software that are primarily designed to be used by
people.
- This includes areas such as knowledge tools, information access, decision
support, business services, ecommerce, entertainment, media and games.
Example:
Word-processing
Spreadsheet
Database, etc.
31 | P a g e
Graphics software - It allows computer systems for creating, editing, drawings,
graphs, etc.
Education software - Education software allows a computer to be used as a
learning and teaching tool.
Entertainment software - This type of app allows a computer to be used as an
entertainment tool.
32 | P a g e
- Application software is a type of computer program that performs a specific
personal, educational, and business function. Each application is designed to
assist end-users in accomplishing a variety of tasks, which may be related to
productivity, creativity, or communication.
- An application program is a computer program designed to carry out a specific
task other than one relating to the operation of the computer itself, typically to
be used by end-users. Word processors, media players, and accounting software
are examples. The collective noun refers to all applications collectively.
Driver Software
- In the most fundamental sense, a driver is a software component that lets the
operating system and a device communicate with each other. For example,
suppose an application needs to read some data from a device.
- Many parts of a computer need drivers, and common examples are:
Computer printers.
Graphic cards.
Modems.
Network cards.
Sound cards.
34 | P a g e
SYSTEM UNIT
- A system unit is the part of a computer that houses the primary devices that
perform operations and produce results for complex calculations. It includes the
motherboard, CPU, RAM and other components, as well as the case in which
these devices are housed. This unit performs the majority of the functions that a
computer is required to do.
- The term "system unit" is frequently used to distinguish between the computer's
internal components and its external hardware, including the keyboard, mouse,
and display. In layman's terms, a system unit is also referred to as a chassis or a
tower.
- The system unit covers the system devices, which can range from a
microprocessor to a capacitor or system clock and perform calculations as
requested by the input device. Each system device serves a specific purpose. The
system unit is made up of electronic components that work together to perform
calculations and transfer the results to the appropriate input and output devices.
35 | P a g e
System Boards
CPU socket
Memory slots
Power connector
Chipset
CPU Socket
1. LGA Sockets - The LGA (Land Grid Array) is a socket whose assembly is in
packaging for integrated circuits. In these types of sockets, the needles are
located in the CPU socket, and there are metallic points of contact in the lower
area of the processor. The LGA can be electrically connected to a
motherboard through a connector or by soldering the board directly.
2. PGA Sockets - The PGA (Pin Grid Array) is an integrated circuit packaging
identified by being rectangular or square, whose pins are aligned in a regular
matrix. Here, the pins may not cover the entire surface but leave gaps between
them, with the standard spacing of 2.54mm.
3. ZIF Sockets - ZIF (Zero Insertion Force): This is an evolution of the PGA,
where the pins are carried by the microprocessor and inserted into the socket
connectors. This mechanism is defined by not exerting any pressure (Zero
Insertion Force) when installing or removing the processor from the socket.
4. BGA Sockets
- Not as famous as other types of sockets, the BGA (Ball Grid Array)
socket is not technically a socket because its main characteristic is that
the microprocessors are permanently mounted in this socket.
- In this case, instead of pins, some copper balls are soldered directly to
the motherboard. Eliminate any possibility of upgrading or replacing
the microprocessor.
37 | P a g e
- A bus is a common pathway through which information flows from one
computer component to another. This pathway is used for communication
purposes and it is established between two or more computer components.
We are going to check different computer bus architectures that are found in
computers.
Data Sharing - All types of buses found in a computer transfer data between
the computer peripherals connected to it. The buses transfer or send data
either in the serial or parallel method of data transfer. This allows for the
exchange of 1, 2, 4 or even 8 bytes of data at a time. (A byte is a group of 8
bits). Buses are classified depending on how many bits they can move at the
same time, which means that we have 8-bit, 16-bit, 32-bit or even 64-bit
buses.
Addressing - A bus has address lines, which match those of the processor.
This allows data to be sent to or from specific memory locations.
Power - A bus supplies power to various peripherals connected to it.
Timing - The bus provides a system clock signal to synchronize the
peripherals attached to it with the rest of the system.
Bus Terminologies
1. Network Card - Network card is used to connect our computer system to the
computer networks over the Internet OR it is used for communication
between our system and the other computer networks. Network card is also
known as the Network adapter or Network interface card (NIC). NIC card has
the pins at the bottom so that it can be fixed in the expansion slot on the
motherboard. Similarly, it has Rj-45 port at the back of the card which is used
to connect to the LAN network.
2. Video Card - Network card is used to connect our computer system to the
computer networks over the Internet OR it is used for communication
between our system and the other computer networks. Network card is also
known as the Network adapter or Network interface card (NIC). NIC card has
the pins at the bottom so that it can be fixed in the expansion slot on the
motherboard. Similarly, it has Rj-45 port at the back of the card which is used
to connect to the LAN network.
3. Modem - Network card is used to connect our computer system to the
computer networks over the Internet OR it is used for communication
between our system and the other computer networks. Network card is also
known as the Network adapter or Network interface card (NIC). NIC card has
the pins at the bottom so that it can be fixed in the expansion slot on the
motherboard. Similarly, it has Rj-45 port at the back of the card which is used
to connect to the LAN network.
4. Audio Card - Network card is used to connect our computer system to the
computer networks over the Internet OR it is used for communication
between our system and the other computer networks. Network card is also
known as the Network adapter or Network interface card (NIC). NIC card has
the pins at the bottom so that it can be fixed in the expansion slot on the
motherboard. Similarly, it has Rj-45 port at the back of the card which is used
to connect to the LAN network.
Expansion Slots
Characteristics of Ports
Serial Port
40 | P a g e
- Data travels at 115 kilobits per second
Parallel Port
PS/2 Port
- It can connect all kinds of external USB devices such as external hard disk,
printer, scanner, mouse, keyboard, etc.
- It was introduced in 1997.
- Most of the computers provide two USB ports as minimum.
- Data travels at 12 megabits per seconds.
- USB compliant devices can get power from a USB port.
VGA Port
Power Connector
- Three-pronged plug.
- Connects to the computer's power cable that plugs into a power bar or wall
socket.
Firewire Port
41 | P a g e
- Data travels at 400 to 800 megabits per seconds.
- Invented by Apple.
- It has three variants: 4-Pin FireWire 400 connector, 6-Pin FireWire 400
connector, and 9-Pin FireWire 800 connector.
Modem Port
Game Port
- Connect a joystick to a PC
- Now replaced by USB
- Digital Video Interface, DVI port
- Connects Flat panel LCD monitor to the computer's high-end video graphic
cards.
- Very popular among video card manufacturers.
Sockets
- Sockets connect the microphone and speakers to the sound card of the
computer.
42 | P a g e
INPUT AND OUTPUT
Pointing Devices
- The pointing devices are used to point or select anything on the screen using
devices such as a mouse. These pointing devices are also called “Input devices “
Scanning Devices
- Scanners read data or information from source and which can be a written
document, inventory card, price tag, photograph or picture. A scanning device
reads data or information and converts it into a form that the computer can
process.
44 | P a g e
- A portable scanner can be helpful when
you are looking to digitally upload small
photos or documents. Traditional
scanning devices can usually handle a
number of sizes, some of which may be
larger than you need. Portable scanners
are usually designed with more standard
sizes in mind.
Pointing Devices
- An input device used to control a pointer on the screen is called a pointing
device. A pointer is a small symbol that appears on the screen in a graphical
user interface.
45 | P a g e
Optical Mouse
Wireless Mouse
46 | P a g e
exits between keys on the keyboard. When the user pushes the pointing stick,
the pointer on the screen also moves.
Graphics Tablet - A graphics tablet consists of a flat
pad on which the user draws with a special pen called a
stylus. The image is created on the screen as the user
draws on the pad. A designer can produce very accurate
drawings using a graphics tablet.
Touchscreen - The touchscreen is a video display
screen that receives input from the touch of a finger.
The screen is covered with a plastic layer. There are
undetectable beams of infrared light at the back of the
screen.
Light Pen - A light pen is a hand-held pen-like device. It
is a light-sensitive stylus. The light pen is connected by a
wire to the computer. It has a device at the tip that emits
light. The pen sends information to the computer when a
user touches the pen on certain areas of a specially
designed screen.
Joystick - A joystick consists of a base and a stick. The
stick can be moved in several directions to shift an
object anywhere on the computer screen. A joystick
can perform a similar function to a mouse or trackball.
Stylus - The stylus is similar to a ballpoint pen. It uses
pressure to write text and draw lines. It was also called a
pen. A stylus is used in graphical applications.
- Image Capture Devices These devices are used to capture the images from outer
environment. Following are the important image capture devise:
1. Digital Camera
2. Digital Video Camera
3. Camcorder
4. Webcam
5. Scanner
Digital Camera
47 | P a g e
- A digital camera is an important image capturing device. It has a grid of light
sensors that captures image of outer environment.
- The sensors generate analogue signals representing the image and send these
signals to the embedded/built-in processor of camera. This processor digitizes
the analogue signals and displays them on the LCD screen of camera.
- A digital image is made up of pixels. A pixel is a small rectangular sized
picture element. A digital image with a greater number of pixels has good
resolution/image quality. The camera processes and stores the images in non-
volatile memory or it may save images on removable digital storage.
- A digital video camera captures the sequence of digital images at the rate of
usually 30 images per second. This sequence of digital images is stored as a
video file. The file may also include audio as well.
- A digital video camera (DVCAM) is a device that captures motion picture
information from live environments, encoding it into data that can be decoded
or transcoded into electronic visual media. A typical digital camera consists
of a lens, image sensor, storage media and a number of other features that can
also be found on other cameras (such as scalable aperture, filters and flash).
49 | P a g e
Point-and-Shoot Video Cameras are one of the most common types of
cameras that we all have seen. They are small in size and does not
offer us many functionalities. Like you cannot change lenses. Also,
they do come with autofocus and a built-in flash component.
4. Sports And Action Video Cameras
Action cameras are far better compared to any other cameras out
there. The thing about them is that they come with quite a lot of
accessories. As a result, you can attach an action camera to your
helmet, bike, or anywhere. They are small in size and made out of
durable materials.
They come with a single lens that is capable of shooting in high
definition from a wide-angle perspective. Also, some of the cameras
are capable of shooting in 4K. This kind of camera is mostly used by
travelers or at the sports events when you need to capture shots from a
bike, car, or anything.
5. Professional-Grade Camera
In the end, there are the Professional-Grade Cameras. As you can see
in the name, they are made for professional users. Professional-grade
cameras are powerful enough to produce high-quality video, and it is
mostly used by the filmmakers. As the need to shoot high-quality
videos.
They are also very reliable and comes with a robust body, which
makes them long-lasting. Even these cameras are pretty expensive
compared to any other cameras. Even they are highly customizable
and come with no plastic parts.
Camcorder
Advantages of Webcam
- Work
- Personal relationships
- Education and Training
- Versatility
Scanner
A scanner creates a digital photograph of a paper document. Scanner
has a single row of hundreds of light sensors. It throws light on the
51 | P a g e
document and each sensor generate an analogue signal depending
upon the intensity of light it receives.
The scanners we usually use are 2 D scanners. A 3 D scanner is a
device that analyzes a real-world object or environment to collect data
on its shape and possibly its appearance. The collected data can then
be used to construct digital three-dimensional models.
Advantage Of Scanner
Advantage Of Midi
- The advantages of MIDI are the file sizes are smaller than the others
everything of the sound file can be edited and change also effects can be
52 | P a g e
added to an instrument, when editing the sound file and making changes
there is no background noise during making the changes.
Output Devices
- An output device is any hardware device used to send data from a computer to
another device or user. Usually, most output peripherals are meant for human use,
so they receive the processed data from the computer and transform it in the form
of audio, video, or physical reproductions.
53 | P a g e
54 | P a g e
Job Applicant Letter
- A job application letter (also known as a cover letter) is a letter you send with
your resume to provide information on your skills and experience. This letter is
your chance to “sell” yourself to an employer, explaining why you are an ideal
candidate for a position.
- When you write your job application letter, it’s essential to pay close attention
to formatting. There’s a right way to format a cover letter; deviate from the
standard guidelines and hiring managers may drop you from consideration. In
fact, anything that makes your job application letter appear less than professional
can prevent hiring managers from taking you seriously as a candidate. Make sure
your cover letter is formatted properly and is free from errors before you send.
- The purpose of a job-application or résumé cover letter is to improve your
chances of being called for an interview, by convincing the reader that you would
be the best person for the job. If your letter is poorly written, the reader will not
likely take the time to look at your résumé. So, your job-application letter is a
crucial chance at making a good first impression.
Selectivity. Choose only your best points—two or three that will be of the
most interest to the reader—to present in well-developed paragraphs. Focus
on skills you can bring to the company and how your accomplishments may
have benefited a previous employer.
A job-application letter should:
- Be single spaced, leaving one space between paragraphs.
- Be about one full page in length (longer if you are more experienced).
- Have carefully chosen words—pack a lot into a small space, making
each word count to show that you are the most qualified candidate for
the position.
- Each cover letter takes preparation. Here are some things to keep in mind
while you prepare:
Think about yourself and your experiences.
Then think about how you would like to relate these
experiences to the organization you're writing to. Which of
your talents, skills, personality traits and accomplishments
should this particular organization know about? Brainstorm a
list for yourself.
55 | P a g e
How did you hear about this opportunity?
If it was through a personal contact, write down the name. If
through an advertisement, write down where and when you
saw it and list the specific points the ad wants you to include.
What do you know about the organization you're writing to?
Consider what attracted you to it in the first place. Maybe it's
personal (a friend worked there), or maybe you are impressed
with what the organization does or admire their unique work
philosophy. Do some research about the company online or
through trade magazines, etc.
To whom are you writing?
It's always best to write to an actual person (with a title) if you
can. If you're responding to an ad that does not include a
specific contact, try to look up the name of someone related to
the role. Be sure to spell both name and title perfectly. If you
cannot find a specific person to write to, try "Dear Hiring
Manager" or "Dear Human Resources."
1. Do Not Copy Your Resume. A cover letter is a sales pitch. The purpose of
this letter is to convince the hiring manager that you’re a strong candidate and
to highlight your relevant experience and abilities. Your application letter
should show how exactly your background makes you a good fit for a
particular position. In contrast, your resume is a general record of your
experience, education, and accomplishments.
2. Tailor Each Application Letter To The Job. As mentioned above,
emphasize in your letter why you are an ideal candidate for the specific job.
This requires that you personalize each letter to fit the company and
position. Match your qualifications to the job posting by highlighting the
skills, experience, and requirements listed in the description.
3. Be Professional. Application letters have a fairly rigid format—as hiring
managers read your letter, they will expect to see certain information
included in set areas. You have freedom within the structure to be personable,
but it is important to stick to a certain level of formality. Pay particular
attention to the professionalism of your salutation. You wouldn't, for
instance, want to refer to the letter's recipient by their first name unless
specifically requested.
4. Carefully Proofread. Employers are likely to overlook an application with a
lot of errors. Therefore, read through your cover letter, and even consider
asking a friend or career counselor to read the letter. Proofread for grammar
56 | P a g e
and spelling errors. Be particularly mindful to spell the letter recipient's name
correctly, as well as the company name.
5. Follow Business Letter Format. Use business letter format when writing
your letter. If you’re sending a typed hard-copy letter, be sure to lead with a
paragraph containing your address, followed by the date, followed by the
address of the recipient. If you’re sending an email, you can omit the address
and date sections.
6. Decide Whether to Send a Hard Copy or Email. The main difference
in formatting an email application letter is that you need to include a subject
line that clearly lays out your purpose for writing, e.g. “Graphic Designer—
Joe Smith.” And, instead of placing your contact information at the top of the
letter, as you would in a hard copy, you'll include it below your signature.
1. Inside Address - Include the name, title, organization, and mailing address.
Spell the name correctly to avoid offending the recipient—phone the
company if you do not know to whom to address the letter
2. Salutation - Begin your letter with “Dear” followed by the reader's title and
last name, ending with a colon, not a comma.
3. Four Paragraphs Minimum - Your letter should have at least an
introductory paragraph, an education paragraph, an employment paragraph,
and a concluding paragraph.
Introductory Paragraph
This paragraph captures your reader's attention and creates the
tone of your letter. You want to establish the tone of quiet self-
confidence, not self-effacement. Avoid all negative statements.
For example, do not say, "I do not have a strong background in
computers, but I am willing to learn." Your reader will walk
away remembering your weaknesses instead of your strengths.
Functions of the Introductory Paragraph:
Identifies your source of information. For a solicited application,
name your source of information: ad, website, current employee's
name and title. If your application is unsolicited, simply ask if a
position is available.
Identifies the position you are interested in. Make it clear which
position you are applying for; in case the organization has
advertised many job openings.
States that you wish to be considered for the position.
Forecasts the rest of the letter. Choose a few phrases in the opening
paragraph that let your reader know what to expect in the body of
57 | P a g e
the letter. For example, “retail experience” or “computer
experience” prepares your reader for a discussion of these
qualifications later in your letter
The Education Paragraph
If your education paragraph is stronger than your employment
paragraph, as most students’ will be, place it before your
employment paragraph. In your paragraph, consider what
aspect of your education best fits the job requirements. A good
strategy is to discuss skills and knowledge gained from
advanced coursework in your major.
You can also discuss the range and diversity of your courses to
show your versatility, if the job you are applying for stresses
this. Your business or communication skills that you acquired
in college, as well as extracurricular activities, are often
valuable to mention in your education paragraph. Employees
with leadership experience and skills are of value to many
companies. Be sure to mention your college major in the
education paragraph, if you have not already done so in your
introductory paragraph. Here is an example of an education
paragraph that develops one unified idea, rather than a series
of unrelated facts:
\\
Your own education paragraph should strive for a unified idea, as this one does.
58 | P a g e
The Concluding Paragraph
The purpose of the concluding paragraph is to encourage the
reader to invite you for an interview. In the earlier paragraphs,
you provided information to convince the reader to give you a
second look. Your last paragraph should make it easy for the
person to contact you.
The following elements are in a good concluding paragraph: a
reference to your résumé, a polite but confident request for an
interview, and your phone number and e-mail address. Use the
phrase “at your convenience” when requesting an interview
and state the time of day you can be reached. Below is an
effective example of a concluding paragraph:
59 | P a g e
Job Application Letter Template
60 | P a g e
61 | P a g e
The DON’TS when Writing Job Application Letter
- This letter plays on the sympathy of the reader. Instead of making excuses for
one’s weaknesses and asking for pity, the cover letter should focus on one’s
Gentlemen:
I would like to apply for the position of . I recently earned a bachelor’s degree in
marketing, and I worked the past two summers at College Town Bookstore as a sales clerk.
Enclosed is a copy of my résumé, and I will gladly send my references upon request. I
request, though, that you do not contact College Town Bookstore.
strengths.
- If you are concerned about having a previous employer contacted, do not write it
in your cover letter. It raises questions in the reader’s mind about your past work
relationships, taking the focus off your cover letter’s purpose. During an
interview, you will have the opportunity to address your concerns.
62 | P a g e
To Whom It May Concern:
It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of
foolishness, it was the spring of hope, the winter of despair, we had everything before us
............................................................................................” In his quote, Charles Dickens
could be describing the business world of today. All of us will be faced with decisions to be
made that will affect our futures. Sometimes we will need help with the choices we will need
to make when opportunities for personal growth occur. I believe your management trainee
position is the very challenge and opportunity that will help my career grow, and I would
- This cover letter sounds more like a graduation speech. Being overly dramatic
is not appropriate for a job-application cover letter; strive for a more
professional, neutral tone.
Dear Mr. Adams:
I wish to be considered for your management trainee position. I have no working experience in
a company like Carlton Data Management or in the advertised position, but I acquired
excellent organizational skills from my college courses. I think that my enthusiasm will more
than make up for my lack of work experience. Please consider my enclosed résumé.
- It is best not to lead with your weaknesses. Rather, concentrate on what you can
offer the company.
Dear Sirs:
I am applying for the management trainee position that I saw advertised in the newspaper.
I feel I am qualified for the position.
With four years of college behind me, I am seeking a new challenge in a position where I can
use my people-oriented skills.
Here is my résumé and a list of contacts who will give you information about my background,
skills, and my tireless energy. I am an action-oriented people person and a team player, excited
about the potential for growth and ever-increasing responsibility. I would love to share ideas
with you.
I look forward to meeting you as you search for the best possible candidate for this important
position in your company.
63 | P a g e
- This letter is shallow and slightly jumbled. Strive for better organization and stay
focused on the company’s needs
- It is a marketing tool and may be one of the most important documents you write
in your professional life. It is the sum and substance of your work history and
education and indicates a particular career direction. It should demonstrate
credibility and be interesting.
- Because your CV is like a personal advertisement, it should convince a potential
employer that you are an outstanding candidate for the job and that you will
contribute to the organization. Your CV has to sell you in short order. While you
may have all the requirements for a particular position, your CV is a failure if the
employer does not instantly come to the conclusion that you "have what it takes."
The first hurdle your CV has to pass - whether it ends up in the "consider file" or
the "reject file" - may take less than thirty seconds.
- To prepare a successful CV, you need to know how to review, summarize, and
present your experiences and achievements on one page. Unless you have
considerable experience, you don't need two pages. Outline your achievements
briefly and concisely. Your CV is your ticket to an interview where you can sell
yourself!
1. Personal Data
The only required information is your name, address, phone number,
and e-mail address. Be sure to provide both permanent and current
address, and the telephone numbers.
2. Career Objective
An objective tells potential employers the sort of work you are hoping
to do. A concise statement indicating your career goals is
recommended if you have specific career desires. Otherwise, include
your objective in your cover letter to a specific employer or for a
specific job.
3. Summary of Skills/Professional Expertise
A concise statement highlighting your strongest skills and areas of
professional expertise can be an advantage to you, especially if you
have a mix of experiences in your career history.
4. Education
64 | P a g e
One rule of thumb is that unless you are more than five years out of
school, your education section should precede your experience
section. List the names of the institutions you attended with the most
recent listed first. List the degree received plus your major area of
study. Include special programs from your university, such as junior
year abroad, a six-month internship, etc. Indicate either the degree
name or the degree initials.
Indicate the area of specialization or major after the degree title.
Include the thesis topic in italics if it relates to your professional
goals. Mention academic honors including a brief explanation of
honors or awards that are not self-explanatory, particularly for
international students. It is not necessary to include your grade point
average unless requested by an employer.
5. Work Experience
Internships and volunteer experience can be considered in this section
if they relate to your professional goals, or you can create a section
called “Additional or Related Experience," or "Community Service."
In a CV, work and education may be listed in chronological order
however many employers prefer the reverse chronological order (put
your last job first and work backward to your first). It should include
title of position, name of organization, location of work (town, state),
dates of employment, describe your work responsibilities with
emphasis on specific skills and achievements. When describing work
experience, summarize your accomplishments rather than listing job
tasks.
Students and recent grads often fail to make an effective presentation
of their experience because they use to narrow a definition of work
experience. First of all, relevant "work" experience is in no way
limited to paid employment. Also consider including nonpaid work,
volunteer work, part-time and temporary positions, internships,
unstructured work, self-employment, odd jobs, and miscellaneous
informal services you may have provided to your academic
department or a favored professor.
6. Publications
List those publications that relate directly to your career goal.
Employers most interested in publications will be teaching hospitals,
research organizations, consulting, and international organizations. It
is usually recommended to create a separate list and indicate on your
resume that publications are available upon request.
7. Computer Skills
It is advisable to provide information about your computer skills.
65 | P a g e
8. Languages
If you are fluent or conversant in several languages, list the languages
you speak and/or write as follows: "Fluent in French, proficient in
Japanese, knowledgeable in Spanish." Think carefully about your
level of proficiency. Do not overrate your skills as you may be asked
to demonstrate your language ability during an interview.
9. Interests
One or two lines about your outside interests, hobbies, or travels can
sometimes add interesting information to the interview and may spark
conversation. You may add key or special skills or competencies,
leadership experience in volunteer organizations Generally, avoid
information about your marital status, children, or age in this section
(unless you feel it is relevant to the work you will be expected to do).
10. References
References You can write "References Available upon Request" if
you have space. Employers will ask directly for references, so prepare
a list with names, titles, addresses, and telephone/fax numbers. Ask
people if they are willing to serve as references before you give their
names to a potential employer. Give careful consideration to your
choice of references, as some will be more appropriate to an employer
than others.
Content
- Run a spell check on your computer before anyone sees your resume.
- Get a friend (an English major would do nicely) to do a grammar
review.
- Ask another friend to proofread. The more people who see your
resume, the more likely that misspelled words and awkward phrases
will be seen (and corrected).
- The use of power verbs denote that you took action. Examples include
words like "accomplished," "achieved," and "managed." When
reviewers see these action words, they realize that you are a person
that takes initiative: you are a self-starter.
- The use of power words helps measure the result of the actions you
took. Examples of power words are "positive," "results," and
"significant."
66 | P a g e
- Emphasize your recent work experience. In today's changing world,
reviewers don't care what you were doing fifteen-twenty years ago.
- Try to highlight your strengths, and minimize your weaknesses.
Design - These tips will make your resume easier to read and/or scan into an
employer's data base.
- Use white or off-white paper.
- Use 8-1/2- x 11-inch paper.
- Print on one side of the paper.
- Use a friendly font (Arial, Times or Courier) size of 10 to 14 points
- Use nondecorative typefaces.
- Choose one typeface and stick to it.
- Avoid italics, script, and underlined words
- Do not use horizontal or vertical lines, graphics, or shading.
- Do not fold or staple your resume.
- If you must mail your resume, put it in a large envelope
- There is no consensus as to what length your resume should be. The
length depends on the depth and scope of your individual experiences.
Try to keep it to either one full page or two full pages. Leaving it at
1½ pages isn't as professional as one or two full pages.
- Keep paragraphs brief: no more than five to six lines. If you have a
long paragraph on your resume, break it up into several shorter ones.
Eliminate every unnecessary word.
Putting your resume/CV on-line
- Once you are satisfied with your resume/CV you should consider
putting it in one of the CSO’s electronic resume books. Employers are
very interested in viewing resumes/CVs on line when hiring. This will
also give a larger number of employers the opportunity to view your
resume/CV easily and often.
67 | P a g e
Example of Curriculum Vitae
68 | P a g e
How to Create Brochure Using Microsoft Publisher
70 | P a g e
● Choose A Design Scheme. - You can add custom colors and fonts to your
brochure. Each template comes with a default color and font scheme, but
if you wish to use a different color or font scheme, you can do so by
selecting the appropriate new scheme. Choose a new color scheme from
one of the named color schemes in the Color Scheme dropdown and a new
font from the Font Scheme dropdown.
71 | P a g e
● Insert Your Company Information. Select your company information
set from the Business Information dropdown or select "Create new" to
create a new information set. This information will be inserted into your
brochure.
● Create The Brochure. - Click the "Create" button at the bottom of the
task pane to create your brochure. You may want to print out the brochure
at this point to see if the design is what you want. You can also create a
PDF of it at this point to email to others for their input on the design.
72 | P a g e
● Replace Any Placeholder Text with Your Own Text. - Click on the text
you want to replace and type your new text in the text field. Select "Text
Fit" in the Text group of the Text Box Tools Format ribbon and then select
"Do Not Autofit" (Publisher 2010). You can then manually select a new
text size. Repeat this step for any other text you wish to replace, on both
sides of the brochure.
73 | P a g e
● Save The Brochure. Choose "Save" or "Save As" from the File menu
(2003 or 2007) or from the left menu of the File tab (2010). Give your
brochure a descriptive name.
74 | P a g e
SECOND STORAGE
Primary Storage
75 | P a g e
Cache Memory
Hard Drives
76 | P a g e
Optical Media
Magnetic Tape
Disk Caching
Disk cache memory is a type of cache memory that is used to store and access
data from a host hard drive more quickly. By using this technology, the hard
disk, memory, and computing components can process input and output data
more quickly.
Raid - is a technology used to increase the performance and reliability of data storage
by combining multiple smaller disks into a single, more capable, device.
77 | P a g e
Raid Benefits - RAID arrays grant numerous advantages, and they vary depending
on the chosen RAID configuration.
Optical Storage
- Optical storage, electronic storage medium that uses low-power laser beams to
record and retrieve digital (binary) data. In optical-storage technology, a laser
beam encodes digital data onto an optical, or laser, disk in the form of tiny pits
arranged in a spiral track on the disk’s surface.
They are useful lightweight media for transporting data and programs. Data is
written onto the disc by a laser and is read from the disc by another laser.
The discs are cheap, but they are vulnerable to scratches. They cannot store
much data as a hard drive.
CD-ROM
DVD-ROM
A read-only DVD disc used to permanently store data files. DVD-ROM discs
are widely used to distribute large software applications that exceed the
capacity of a CD-ROM disc. DVD-ROM discs are read in DVD-ROM and
78 | P a g e
DVD-RAM drives in computers, but typically not in DVD drives connected
to TVs and home theater systems.
BLUE RAY
is an optical disc format like CD and DVD. Blu-ray discs can hold more
information than other optical media, because of the blue lasers that the disc
drives use. A single Blu-ray disc can hold up to 25GB of data.
HD DVD
Due to the structure of the single-lens optical head, both red and blue laser
diodes can be used in smaller, more compact HD DVD players. However, HD
DVD discs can’t be played on standard DVD players.
DVD-RAM
CD-R&DVD-R
are optical disc storage formats. Choosing the best one to use is a case-by-
case decision. DVD-R discs have much more storage space, but CD-R discs
work with more devices. CD-Rs are an older medium, but they still get the
job done, although USB flash drives have replaced the role of CD-R and
DVD-R discs in many cases.
The first hard disk drive was the IBM Model 350 Disk File that came with the
IBM 305 RAMAC computer in 1956. It had 50 24-inch discs with a total
storage capacity of 5 million characters (just under 5 MB). Above: IBM
Model 350, the first-ever hard disk drive.
Data storage is a key component of a successful business. You need to store
all the files you’re currently processing in accounts payable, expense
reporting, and other departments somewhere you won’t lose them
79 | P a g e
What Is Digital Storage Capacity?
Storage capacity refers to how much disk space one or more storage devices
provides. It measures how much data a computer system may contain. For an
example, a computer with a 500GB hard drive has a storage capacity of 500
gigabytes. A network server with four 1TB drives, has a storage capacity of 4
terabytes.
80 | P a g e
COMMUNICATIONS AND NETWORKS
- Cell phones and other wireless technologies are allowing us to stay connected in
today’s world like never before. Increased connectivity potentially means
increased productivity especially in the business world.
Numerous applications depend on communication systems
- Communication Channels
- Channels carry data from one computer to another
- Two categories of communication channels:
● Physical Connection
Telephone lines (Twisted pair Cables)
Coaxial cable
Fiber-optic cable
● Wireless Connection
1 Infrared
2 Broadcast radio
Wi-Fi (wireless
Fidelity)802.11
3 Microwave
Stations
Bluetooth
4 Satellite
GPS
Connection Device Signals
● Types Of Signals
1. Analog signal
2. Digital signal
81 | P a g e
Connection Device Types and Transfer Speeds
● Types Of Modems:
1. External
2. Internal
3. Wireless
4. PC Card
Connection Service
Protocols
Networks
82 | P a g e
Computer Networks
etwork Types
Network Architecture
83 | P a g e
Star Network
Bus Network
Rin
g Network
84 | P a g e
Hierarchical Network
Principal Network
Strategy
Organizational Internets
Careers In IT
85 | P a g e
Connection Devices
- Connected devices are physical objects that can connect with each other and other
systems via the internet. They span everything from traditional computing
hardware, such as a laptop or desktop, to common mobile devices, such as a
smartphone or tablet, to an increasingly wide range of physical devices and
objects.
- This growing list of objects includes household appliances, heating and cooling
systems, vehicles, health and fitness monitors, environmental sensors, and more.
These devices, which are commonly embedded with technology such as
processing chips, software, and sensors, collect data and share it with other
devices and systems. Connected devices are typically monitored and controlled
remotely. They connect with the internet and each other via various wired and
wireless networks and protocols, such as Wi-Fi, NFC, 3G and 4G networks.
86 | P a g e
decisions about the route. The routing tables are normally dynamic and are
updated using routing protocols.
87 | P a g e
Types of Networking Architecture
● Peer-To-Peer
In a peer-to-peer model, all devices in a network have equal
responsibilities and privileges with each other. This means tasks are
allocated equally throughout the network. Files in one computer can
be shared with every other computer, essentially making every node a
network storage drive. Resources like a printer connected to one
device are also visible to every other device on the network.
A peer-to-peer architecture is suitable for small networks, such as a
branch office. Your home network, by the way, often uses a peer-to-
peer model.
● Client/Server Architectures
In a client/server architecture, all devices in the network, called
“clients,” are connected to a central hub, called a “server.” The server
handles the bulk of the network operations – data storage, processing
of client requests, cybersecurity, and access control.
Most large networks, such as WANs, often use the client/server
model. The web server you’re accessing this article on, for instance, is
a perfect example. In this case, your computer or smartphone is the
client device. Client/server is also the preferred enterprise network
architecture.
88 | P a g e
have various properties that determine how fast data travels
from one point to another.
They come in two forms: wired and wireless. Wired media
involve physical cables for connection. Examples include
coaxial and fiber optic. Wireless media, on the other hand,
relies on microwave or radio signals. The most popular
examples are Wi-Fi and cellular.
Protocols
Protocols are the rules and models that govern how data
transfers between devices in a network. It’s also the common
language that allows different machines in a network to
communicate with each other. Without protocols, your iPhone
couldn’t access a web page stored on a Linux server.
There are many network protocols, depending on the nature of
the data. Examples include the Transmission Control Protocol
/ Internet Protocol (TCP/IP) used by networks to connect to
the Internet, the Ethernet protocol for connecting one
computer to another, and the File Transfer Protocol for
sending and receiving files to and from a server.
Topology
How the network is wired together is just as important as its
parts. Optimizing this is the goal of network topology.
Topology is the structure of the network. This is important
because factors like distance between network devices will
affect how fast data can reach its destination, impacting
performance. There are various network topologies, each with
strengths and weaknesses.
- Network Security protects your network and data from breaches, intrusions and
other threats. This is a vast and overarching term that describes hardware and
software solutions as well as processes or rules and configurations relating to
network use, accessibility, and overall threat protection.
- Network Security involves access control, virus and antivirus software,
application security, network analytics, types of network-related security
(endpoint, web, wireless), firewalls, VPN encryption and more
89 | P a g e
- Network Security is vital in protecting client data and information, keeping
shared data secure and ensuring reliable access and network performance as
well as protection from cyber threats. A well-designed network security
solution reduces overhead expenses and safeguards organizations from costly
losses that occur from a data breach or other security incident. Ensuring
legitimate access to systems, applications and data enables business
operations and delivery of services and products to customers.
Types of Network Security Protections
90 | P a g e
PRIVACY, SECURITY, AND ETHICS
Privacy Issues
- Online users are incredibly vulnerable to security threats, and there is a long
list of issues associated with their safety. Here we are discussing only the
major issues concerning online privacy.
1. Spying and Snooping - When you are online, you are spied by a
number of trackers for various purposes. Trackers keep a record of
your search history and track all your online activities through various
means. This provides them a clear picture of who you are and your
interests, which is a breach of online privacy policy and makes you a
public property. Most of the time, this tracking is for advertisement
purposes only and it allows advertisers to show ads according to your
taste and interests. But sometimes this information is used by
cybercriminals to carry out unauthorized and illegal activities risking
your online existence.
2. Information Mishandling - There are various sites on the internet
that need your personal information to get access to their services.
These sites often store cookies and save your personal information and
later use it for various purposes. Most of the time this information is
not encrypted and can be accessed by anyone. This mishandling of
personal information may lead to serious consequences. The modern
trend of e-banking and e-business portals have multiplied the risks
associated with online privacy. By sharing your bank details and
91 | P a g e
crucial files on the internet, you are paving ways for burglars and
making yourself vulnerable to cybercriminals.
3. Location Tracking - Most of the internet users proudly upload their
social media posts highlighting their current location along with
tagging friends and family members. It's fun and exciting to share your
life events with friends and family, but this data does not remain
restricted to your expected audience only. This same data is stored on
the social media site you are using and stays there forever, often
without you knowing (though you may have given consent through a
terms and services agreement). Along with social media apps, Google
Maps and other apps also ask for your location and by turning on your
location you are providing first-hand information to the world about
where exactly you are and what your next move is, which is certainly
risky and insecure.
1. Use a VPN
There are various ways of protecting your online privacy, but the most
successful and certain way is through VPN. It is a tool that provides
an encrypted tunnel for all your online activities, which means it
encodes all the information transferred between you and your host site
and leaves no chances of snooping and spying. It also provides you an
anonymous IP and disguises your actual identity, hiding your
geographical location and making your online existence more safe and
secure.
There are various VPN available including free and paid ones. Some
VPN work on a small scale and have access to a few countries only
while others are international ones with access to most parts of the
world.
2. Conduct Safe Browsing
92 | P a g e
Hackers can easily track your activities and get into your system
through your browser. It’s highly recommended to keep your browser
updated to the latest version. Avoid using spammy websites that asks
for user details. You can also block ads on your browser and take
extra time to actually read privacy policies before giving your
consent.
3. Keep Your System Up-to-Date
Keep your system up to date to ensure that you don’t miss out any
feature and security fixes. If you find it a hassle to manually apply
updates, you can always use tools to automate your software updates.
Regularly scan your system or it’s better to keep auto scan on in your
system.
4. Use Anti-Virus
A strong anti-virus program will keep your device free from all types
of malwares, such as spyware, viruses, Trojans, etc. You can also use
a good anti-virus that will keep you updated if it found something
wrong in your system. Using anti-virus is essential as it helps you to
get real time updates.
Privacy Laws
- The potential for breaches of online privacy has grown significantly over the
years. There is no single law regulating online privacy. Instead, a patchwork of
federal and state laws applies. Some key federal laws affecting online privacy
include:
The Federal Trade Commission Act (FTC) [1914]– regulates unfair or deceptive
commercial practices. The FTC is the primary federal regulator in the privacy
area and brings enforcement actions against companies. This includes failing to
comply with posted privacy policies and failing to adequately protect personal
information.
93 | P a g e
● Electronic Communications Privacy Act (ECPA) [1986] - protects
certain wire, oral, and electronic communications from unauthorized
interception, access, use, and disclosure.
● Computer Fraud & Abuse Act (CFAA) [1986] – makes unlawful
certain computer-related activities involving the unauthorized access of a
computer to obtain certain information, defraud or obtain anything of
value, transmit harmful items, or traffic in computer passwords. The law
has been in amended six times.
● Children’s Online Privacy Protection Act (COPPA) [1998] – requires
certain website and online service providers to obtain verifiable parental
consent before collecting, using, or disclosing personal information from
minors under the age of 13. It also requires websites to post an online
privacy policy, collect only the personal information necessary, and create
and maintain reasonable security measures.
● Controlling the Assault of Non-Solicited Pornography and Marketing
Act (CAN-SPAM Act) [2003] – governs sending unsolicited commercial
email and prohibits misleading header information and deceptive subject
lines. It also requires senders to disclose certain information, include a
valid opt-out mechanism, and it creates civil and criminal penalties for
violations.
● Financial Services Modernization Act (GLBA) [1999] – regulates the
collection, use, and disclosure of personal information collected or held
by financial institutions and requires customer notices and a written
information security program.
● Fair and Accurate Credit Transactions Act (FACTA) [2003] – requires
financial institutions and creditors to maintain written identity theft
prevention programs.
94 | P a g e
- Republic Act No. 10173, otherwise known as the Data Privacy Act is a law
that seeks to protect all forms of information, be it private, personal, or
sensitive. It is meant to cover both natural and juridical persons involved in
the processing of personal information.
95 | P a g e
What Is Cybercrime?
- Cybercrime is a crime that involves a computer and a network. The computer may
have been used in the commission of a crime, or it may be the target. Cybercrime
may harm someone's security and financial health.
- Cybercrime refers to any illegal activity carried out using computers or the
internet. Cybercriminals ranging from rogue individuals to organized crime
groups to state-sponsored factions use techniques like phishing, social
engineering, and all kinds of malware as part of their cyber-attacks.
- Because of:
● Anonymity
● Weakness in operating system
● Lack of awareness
Types Of Cybercrime:
96 | P a g e
● PORNOGRAPHY – Cyber Pornography means the publishing, distributing
or designing pornography by using cyberspace
● Credit Card Fraud - Credit card fraud is a form of identity theft that
involves an unauthorized taking of another's credit card information for the
purpose of charging purchases to the account or removing funds from it.
● Phishing - Phishing is a type of social engineering attack often used to steal
user data, including login credentials and credit card numbers. It occurs when
an attacker, masquerading as a trusted entity, dupes a victim into opening an
email, instant message, or text message.
● Cyber Stalking - Cyberstalking involves using electronic means, including
the Internet, to stalk or harass a person or group of people. Cyberstalking can
include many things including threats, solicitation for sex, false accusations,
defamation, slander, libel, identity theft, and vandalism.
● Threatening - A cyber or cybersecurity threat is a malicious act that seeks to
damage data, steal data, or disrupt digital life in general. Cyber threats
include computer viruses, data breaches, Denial of Service (DoS) attacks, and
other attack vectors.
● Salami Attack - An attack on a computer network which involves the
intruder siphoning off small amounts of money from a file and placing them
in another file that he or she can access; for example, a file that holds their
bank account details.
97 | P a g e
● Back Up Important Files
- There are two types of Security. these two are used to protect against
unauthorized access to data centers and other computerized systems.
1. Physical Security – The protection of personnel, hardware, software
and data from physical actions and events (eg: protection from fire,
flood, and any natural disasters)
2. Cyber Security – Cyber or Computer Security is the protection of
computing system, including hardware, software from cyber-attack.
This system includes in:
● PC
● Laptops
● Smartphones
● Mobile
● Devices
● Printers
98 | P a g e
Cyber Security Threats
- These threats able to operate in security failures and damages to the assets of
a user.
- With a global population as of 2019 of 7.5 billion 42% people facing cyber
crimes
Examples:
● Hacking
● Social Engineering
● Phishing
● Trojan Horses
● Spamming
● Virus
● Malware
- Computer ethics is a field of applied ethics that addresses ethical issues in the use,
design and management of information technology and in the formulation of
ethical policies for its regulation in society.
- Computer ethics essentially protect individuals online from predation: they
prevent the breach of privacy, identify theft, interference with work, and unlawful
use of proprietary software, among other events. Computer ethics govern the
behavior of users online and date back to 1992.
100 | P a g e
- To Protect Personal & Commercial Information such as login & password
info, credit card and account information and government and commercial
databases. It also controls unwanted internet mail and ads (Spam).
- To Make ICT Available and Accessible to all People, including the Disabled
and the Deprived. Accessibility needs to be kept in mind during curriculum
design (in educational contexts), in order to maximize the capabilities of the
technology
- To suppress dishonest business practices and to protect and encourage fair
competition
- To promote moral and social values in society
- To control plagiarism, student identity fraud, and the use of copyrighted
material, etc.
PowerPoint
101 | P a g e
Excel Worksheet
102 | P a g e
References:
https://www.investopedia.com/terms/c/cloud-computing.asp
https://www.scienceandmediamuseum.org.uk/objects-and-stories/short-history-internet
https://www.techopedia.com/definition/5411/website#:~:text=A%20website%20is%20a
%20collection,constitute%20the%20World%20Wide%20Web.
https://www.slideshare.net/priyasoni91/the-internet-10511600
https://www.britannica.com/technology/Internet
https://www.computerhope.com/jargon/w/website.htm
https://www.scienceandmediamuseum.org.uk/objects-and-stories/short-history-internet
https://www.techopedia.com/definition/5411/website#:~:text=A%20website%20is%20a
%20collection,constitute%20the%20World%20Wide%20Web.
https://www.techopedia.com/definition/5175/hyperlink
https://weblearn.ox.ac.uk/portal/help/TOCDisplay/content.hlp?
docId=whatisthesearchtool
https://libguides.lub.lu.se/c.php?g=656004&p=4610765
https://www.bdc.ca/en/articles-tools/entrepreneur-toolkit/templates-business-guides/
glossary/search-engine
https://turbofuture.com/internet/What-is-a-Search-Engine-Definition-and-Examples
https://www.investopedia.com/terms/c/cloud-computing.asp
http://w.sunybroome.edu/basic-computer-skills/functions/word_processing/
1word_processing.html? fbclid=IwAR299u6WMjKPvzodklosx01J72rAGysMa-
1Z7lwPQ71BfrkXpyqt8- LfdS4#:~:text=Word%20Processing%20refers%20to
%20the,applications%20are%20also%20widely%20used
https://www.techopedia.com/definition/9510/spreadsheet-software?
fbclid=IwAR13MvCZLZcBKoiPUa022g1yCrJZOwAJraN3_7hTODCG0Zd1VYk3KVA
Rai8
https://www.techopedia.com/definition/27519/app-store?fbclid=IwAR222-dX-
5LqdgY8oKdRoWQnFoylO5JYkjts9XPkX-ayOO832nKTvLL-hRs
https://www.quickbase.com/articles/application-software-basics?
fbclid=IwAR0lmC7mfLvYyAZg9N7m5ktvtzsLfJiPDyKYKIIvAjgdAwSGIPO5i1TNXB
s#:~:text=Application%20software%20is%20a%20type,productivity%2C%20creativity
%2C%20or%20communication
https://www.proventeq.com/blog/cloud-office-and-its-business-benefits
103 | P a g e
https://www.techopedia.com/definition/10206/office-suite#:~:text=An%20office
%20suite%20is%20a,suite%20or%20office%20productivity%20software.
https://zapier.com/blog/microsoft-office-vs-g-suite/
https://www.digit.in/technology-guides/fasttrack-to-office-suites/an-introduction-to-
office-suites.html/
https://www.guru99.com/operating-system-tutorial.html
https://www.emerald.com/insight/content/doi/10.1108/eb045169/full/html?
skipTracking=true#:~:text=Types%20of%20scanning%20devices%20which,scanners
%20and%20hand%2Dheld%20scanners.&text=Flatbed%20scanners%20operate%20in
%20a,down%2C%20on%20a%20glass%20platen.
https://www.moglix.com/articles/scanners-definition-types-advantages-and-price
https://www.scanjunction.com/what-are-the-different-types-of-scanners-and-their-uses/
https://slidetodoc.com/input-devices-image-capture-devices-sound-capture-devices/
https://www.circuitstoday.com/different-types-of-digital-cameras
https://unsignedbyte.com/different-types-of-video-cameras/
https://www.sciencedirect.com/topics/engineering/camcorder
https://www.streetdirectory.com/travel_guide/120163/technology/
the_types_of_camcorders.html
https://www.techopedia.com/definition/3538/output-device#:~:text=An%20output
%20device%20is%20any,%2C%20video%2C%20or%20physical%20reproductions.
https://www.tutorialsmate.com/2021/05/output-devices-of-computer.html
https://www.blinn.edu/writing-centers/pdfs/Writing-Job-Application-Letters.pdf
https://www.washington.edu/doit/key-elements-cover-letter
https://www.higheredjobs.com/career/CoverLetterDos.cfm
http://www.hsph.harvard.edu/Admins/offstuds/intro.html#resumes
http://www.jobweb.com/catapult/guenov/res.html
http://www.careersoar.com/interviewing_tips.asp
http://www.wetfeet.com/asp/article2.asp?aid=246&atype=Resumes
http://jobstar.org/tools/resume/res-def.htm
http://topechelon.com/jobseekers/sixresumerules.htm
http://jobstar.org/tools/resume/
104 | P a g e
http://safetynet.doleta.gov/resume.htm
http://www.wetfeet.com/advice/resumes.asp
http://www.impactonline.org/about/advice/resume.jsp
http://jobstar.org/tools/resume/clet-ex1.htm
http://www.virtualville.com/employment_agency/interviewing.html
http://www.jobsontheweb.com/tips.htm
http://careers.altavista.com/intvTips.html
http://web.mit.edu/personnel/www/policy/2-5.html
https://www.fusionconnect.com/blog/what-is-network-architecture?
fbclid=IwAR07UvZAjqb_6uM1ZX0w46mJRW78c9-
Ww0O9wGI7I1F3Kl0lc8jKROig0wo
https://www.checkpoint.com/cyber-hub/network-security/what-is-network-security/?
fbclid=IwAR3pvXJkUxE5waxhpZ6zsCIn_Ub_wgQyQt3Z0YAGp43PkEif3v4hjnTjk_Y
https://www.brainkart.com/article/Connecting-Devices_13460/?
fbclid=IwAR0bb7H8OLjbhQYzDm2B-pF02d_KE3-7o3BaJAEDIb2K6I6YHlg7BUSQ-
Ss
https://www.easytechjunkie.com/what-are-the-different-types-of-network-services.htm?
fbclid=IwAR1clC5-p2ERaHsxeCv0hLRsrtmqn-O3BJM92a8U_eu1IzTmx66U6qReDLQ
https://www.learnpick.in/prime/documents/ppts/details/1245/cybercrime
https://www.youtube.com/watch?v=w-lCziHRlD8
https://www.oxfordreference.com/view/10.1093/acref/9780191744150.001.0001/acref-
9780191744150-e-2812#:~:text=An%20attack%20on%20a%20computer,holds%20their
%20bank%20account%20details.
https://www.youtube.com/watch?v=hamJzUXVwTw
105 | P a g e