Lesson Notes Spocial Impact
Lesson Notes Spocial Impact
Web page
This is a collection of text and multimedia documents.
Web server
A computer that stores and makes available hypertext and hypermedia documents.
Hyperlink
This is an element in a document (text or graphics) that allows you to move easily from one document to the
next or to another position in the document.
Protocol://www.Server/Path/Filename
e.g. http://www.limewire.com/home/aboutUs.html
Protocol Path
Upload and download
Server Filename
1
Uploading is the transferring of data and information from your personal computer to the world wide web
(internet).
Downloading is the transferring of data and information from the world wide web to your personal computer.
Computer Security
Computer security, which is also known as cybersecurity or information technology security, describes the
techniques employed for protecting computers, networks, programs, information systems and data from
unauthorised access or attacks, theft, or damage to the hardware, the software and the information stored on
them.
Companies or organisations will ensure that computer security is implemented to minimise the risk of the
following elements: vulnerability, threat, attack and countermeasure.
COMPUTER MISUSE
Computers make it so easy for you to collect, store and share information; likewise, it is also easy for the misuse
of information or the committing of computer crimes.
Information may be misused in the following ways:
■ By collecting information about people without their permission.
■ By revengeful employees or employers who want to spread propaganda on suspecting persons.
■ By using information for purposes other than those for which it was intended.
2. COPYRIGHT INFRINGEMENT
A copyright infringement is a violation of an individual or organisation’s copyright. It describes the
unauthorised use of copyrighted material, such as text, photos, videos, music, software and other original
content.
3. DATA THEFT
This is the act of stealing computer-based information from an unknowing target with the intention of
compromising privacy or obtaining confidential information.
4. DENIAL-OF-SERVICE ATTACK
A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from
accessing specific computer systems, devices, services or other IT resources.
6. IDENTITY THEFT
This is the crime of obtaining the personal (name, identifying number, etc) or financial information, such as a
credit card number, of another person for the main purpose of assuming the person’s name or identity to make
transactions or purchases, without their permission, to commit fraud or other crimes.
8. PHISHING ATTACKS
This is the fraudulent use of electronic communications to deceive and take advantage of users, often to steal
the user’s data, including login credentials and credit card numbers. It occurs when an attacker poses as a
trusted entity and deceives a victim into opening an email, instant message or text message.
12. PROPAGANDA
The use of computer systems to distribute information for spreading both beneficial and harmful material. The
widespread use of the Internet by computer users has created a readily accessible means of transmitting such
material.
Electronic Eavesdropping
Electronic eavesdropping is the tapping into a communication channel to retrieve information. This is the act of
secretly listening to the private conversation of others without their consent. It can be accomplished on phones,
instant messages, VoIP, video conferences and fax transmissions.
Entities Impacted
The entities that such misuse acts would impact include individuals, organisations and government.
4
For example: entering of Facebook passwords, emails or logging into the school’s computer.
Prevention of and protection against viruses
Install an anti-virus software package on your computer system.
Do not use storage media (floppy disk, tape, CD, memory stick) from other computers in your computer.
If you have to use them, make sure you run a virus scan first to remove any viruses.
Do not open any e-mail attachments that contain an executable file: these are files with extensions such
as .exe, .com and .vbs.
Computers in Business
In business, computers are used create bills (invoices), monitor inventory (stock control), in point–of-sale
systems (store checkouts), in accounting (profit and loss accounts), in marketing (promotion of merchandise), e-
commerce and telecommuting.
5
E-commerce
Electronic commerce consists of buying, selling, marketing and servicing of products and services over
computer networks. It also includes the transfer of funds in the buying process. There are two types of e-
commerce:
B2C or Business to Customer (where businesses retail their supply goods and services over the Internet
to individual private consumers).
B2B or Business to Business (where businesses supply other businesses with products and services that
are required in the operations of that business).
Telecommuting
This is also called teleworking. It is working from home and communicating with colleagues and customers
using computer facilities – modem, telephony, e-mail, teleconferencing and faxing. Telecommuting can be part-
time or full-time.
Computers in Education
Computer-Assisted Assessment (CAA)
This is the use of computers to assist in the marking of examination scripts, such as multiple choice papers.
Distance Learning
This involves classes being conducted via the Internet, an extranet or intranet, satellite broadcasting, interactive
television and CD-ROM.
Computers in Industry (engineering and manufacturing)
In engineering and manufacturing computers are used to:
Direct assembly line operations
Perform simulations
Design, draw and manipulate engineering, architectural, product, graphic and textile designs.
Computer Aided Design (CAD) and Computer Aided Design and Drafting (CADD)
This includes the hardware and software used to draw, manipulate and design engineering and architectural
designs, electronic products and even clothing designs.
Computer Aided Manufacturing (CAM)
These systems are used to control manufacturing plant equipment and production equipment e.g. in a car
manufacturing plant or a factory that makes microprocessors for computers.
6
These systems analyses engineering designs, simulating varying conditions to determine in advance whether the
design is likely to work. For example, an aeroplane manufacturer might be able to simulate the forces of a
hurricane wind on a plane wing using a CAE computer, or an engineer might be able to simulate the stresses
applied to a bridge.
Computers in Artificial Intelligence (AI)
In AI computers are used to:
Control robots
Produce expert systems
Robotics
Robotics is the use of computer-controlled machines in place of humans to perform repetitive and dangerous
tasks.
Expert Systems
These systems provide a vast knowledge database of information in specific fields such as medicine,
mathematics, engineering, geology, computer science, business, law, defense and education. Expert systems or
knowledge-based systems make decisions based on the results of questions put to the user; the program
analyses input data and provides answers at the level of an expert in the particular field.
Computers in law enforcement
Computers are used in law enforcement to:
Maintain criminal databases
Examine forensic evidence
Communicate with other departments and agencies
Provide electronic surveillance
Control traffic systems
Provide assistance to officers through easy access to information
Computerize many of the traditional office tasks
Prepare reports
Equipment inventory
Tracking parolees
Transmitting, exchanging and obtaining information from other police officers
Security cameras
These can act as a visible deterrent to a criminal. Sometimes they are hidden in order to catch criminals in
action. They can capture video footage of a crime in progress and the images can be used to identify the
criminals. Most cameras today are linked to computer systems which can store and process the raw data.
Electronic surveillance
Wire-taps, email and online communication interception, location information ( e.g. determining where you are
from calls going to your cell phone) and communication analysis (e.g. monitoring when and where credit cards
are used) are all forms of electronic surveillance. Such surveillance can help police track criminals’ movements
and activities.
Computers in medicine
Computers are used in medicine to:
Monitor patients’ vital signs
7
Maintain databases of patients, diseases and drugs
Aid in detecting and diagnosing diseases
Assist in generating case-sensitive advice through the use of expert systems
Helps doctors to collaborate with colleagues and administer treatment over the Internet.
Perform research
Patient Monitoring Systems
These help doctors monitor and treat patients – either at home or in hospital intensive care – by providing 24
hour service. These are computerized systems that monitor a person’s vital signs, such as blood pressure,
temperature and heart rate, using sensors attached to the patient. The system records the information at specific
intervals and may sound an alert in the event of a dangerous abnormality in the readings.
Computers in Entertainment
Computers are used to:
Record, synthesize, edit and distribute music
Create and play computer games
Create animations and special effects in movies
Teleconferencing
A teleconference is a meeting or conference held via a telephone or network connection between participants in
remote cities or work sites. Many types of teleconferences exist, with the simplest form involving the use of a
speaker phone at each location to conduct an audio conference. More sophisticated teleconference meetings
involve the exchange of audio, video, and data. The term teleconference can also refer to a live event that is
transmitted via satellite to various locations simultaneously.
Teachers
Use word-processors to prepare exercises and notes
Use presentation software to make demonstrations
Use the Internet for research purposes and teach students how to do so
Teach students how to use the multimedia, simulation or tutorial software designed to aid learning
Use spreadsheets applications to record and calculate students’ marks
Assemble the main parts of a computer and do simple troubleshooting
8
Engineers
Use CAAD software, simulation software and in some cases graphics plotters
Design computer-based process control systems
Medical personnel
Use computer-controlled devices to monitor a patient’s condition
Use expert systems for the diagnosis and treatment of illnesses
Store, edit and retrieve a patient’s record using database management software
Use specialized equipment for performing operations
Musicians
Do sound sampling
Record sounds
Do music synthesizing
Edit songs and add special effects
Movie Industry
Use animation software
Use graphics editors
Use custom-written special effects software
Operate robots to imitate dangerous animals etc.
Mass Media Personnel
Use a word-processor to produce and edit articles
Scan photos with a scanner
Use desktop publishing to design advertisements
Use the Internet for research and communication
Take photographs with a digital camera
Law Enforcement Personnel
Knowing how to use a scanner to scan photographs of criminals
Knowing how to use computers for fingerprint matching and DNA analysis
Knowing how to use database management software to store and retrieve data
Knowing how to use statistical analysis software
Roles of various personnel in computer-related professionals;
Roles or duties of a Programmer
Discuss program specifications with the systems analyst
Write programs
Test programs for correct operation and intended results
Debug programs
Document programs
Update, repair, modify and expand existing programs
10
Assemble and service computer equipment
Find and fix computer problems
Roles or duties of a Software Trainer
Train people to use computer hardware and software
Develop training manuals
Examine and mark examination scripts
11