Basic Computer Skills (B.SC)
Basic Computer Skills (B.SC)
An input device is any hardware that is used to enter data or instructions into a computer system.
It allows users to communicate with the computer by typing, clicking, speaking, scanning, or
touching.
Keyboard – to type text and commands
Mouse – to click, drag, and select items
WHAT IS CYBERCRIME?
Cybercrime is any illegal activity that involves a computer, network, or digital device.
Criminals use technology to commit crimes, either by attacking computers or using them to carry out
other offenses. Cybercrime refers to criminal acts done using computers or the internet, either as the
target or the tool of the crime.
1. Hacking – Unauthorized access to someone’s computer or data.
2. Phishing – Fake emails or messages that trick people into giving personal info.
3. Identity Theft – Stealing someone’s personal information to commit fraud.
WHAT IS A HYPERLINK?
A hyperlink (or just link) is a clickable element in a digital document or webpage that takes you to
another place, like a different page, website, or section of the same document. A hyperlink is a text,
image, or button that connects to another resource, such as a web page, file, or email address.
1. Text Link – Usually underlined and colored (e.g., Google)
2. Image Link – Clicking an image takes you somewhere else
BOOTING PROCESS OF A COMPUTER SYSTEM
Booting is the process of starting up a computer and getting it ready for use. It involves loading the operating
system (OS) from the storage into the computer’s memory (RAM). This process can be divided into two
stages: Cold Booting (or Hard Booting) and Warm Booting (or Soft Booting).
Stages of the Booting Process:
1. Power-On (Cold Booting):
o Step 1: When you press the power button, electrical power is supplied to the system.
o Step 2: The Power Supply Unit (PSU) provides the necessary power to the computer's
components (e.g., CPU, memory, storage).
2. POST (Power-On Self Test):
o Step 3: The BIOS/UEFI (Basic Input/Output System / Unified Extensible Firmware Interface)
is activated. It is a firmware stored on a chip on the motherboard.
o Step 4: The BIOS/UEFI performs a self-diagnosis called the POST. It checks hardware
components like RAM, CPU, and storage devices to ensure they are functioning correctly. If
everything is fine, it proceeds to the next step; if there's an issue, it may display an error message
or beep codes.
3. Loading the Bootloader:
o Step 5: After successful POST, the BIOS/UEFI looks for the bootable storage device (e.g., hard
drive, SSD, USB, or CD).
o Step 6: The BIOS/UEFI hands control to the bootloader. The bootloader is a small program
located in the boot sector of the storage device.
o Step 7: The bootloader loads the operating system (OS) into the computer’s RAM. In the case
of Windows, this is the Windows Boot Manager; for Linux, it's GRUB.
4. Loading the Operating System:
o Step 8: The operating system begins to load into the computer’s memory (RAM). It starts
essential system services and drivers needed for the hardware to function properly.
o Step 9: After the OS has loaded, the user interface (e.g., desktop in Windows) is displayed,
allowing the user to interact with the computer.
5. Ready for Use:
o Step 10: At this point, the system is fully booted and ready for use. The user can begin
interacting with the operating system and running applications.
WHAT IS CYBERSECURITY?
Cybersecurity refers to the practice of protecting computer systems, networks, and data from digital attacks,
unauthorized access, and damage. It involves implementing technologies, processes, and policies to defend
against cyber threats that can compromise personal, organizational, and governmental information.
Components of Cybersecurity:
1. Network Security: Protects the integrity, confidentiality, and accessibility of networks and data. This
includes firewalls, encryption, and intrusion detection systems.
2. Information Security: Ensures that data is protected from unauthorized access, alteration, or
destruction. This can include both physical security and digital security measures like encryption and
access controls.
3. Application Security: Focuses on ensuring that software applications are free from vulnerabilities that
could be exploited by attackers. This involves regular updates, patches, and secure coding practices.
4. Endpoint Security: Secures devices like smartphones, laptops, and desktops that connect to the
network. Anti-virus software and device encryption are common protections.
5. Identity and Access Management (IAM): Ensures that only authorized individuals can access certain
data or systems. It involves using strong authentication methods (like multi-factor authentication) and
setting user permissions.