Year 11 Ict 3RD Term Note 2024-2025
Year 11 Ict 3RD Term Note 2024-2025
HOME
Topic : TABLE OF CONTENT
WEEK 1: BASIC PROGRAMMING WEEK 2: BASIC PROGRAMMING
WEEK 7: COMPUTER ETHICS AND HUMAN WEEK 8: COMPUTER, ETHICS AND HUMAN
ISSUES ISSUES
WEEK 13:
HOME
Topic :
WEEK 1:
BASIC
PROGRAMMING
HOME
Topic :
LEARNING OBJECTIVES:
By the end of the lesson, the students should be
able to:
1. give a full meaning of BASIC.
2. highlight the 7 Basic programming concepts.
3. state the steps in program development.
4. mention rules of Basic programming.
HOME
WK 4 :Topic :INTRODUCTION TO BASIC
Topic
BASIC stands for Beginner’s All Purpose Symbolic Instruction Code. It
was invented in 1963, at Dartmouth College, by the mathematicians John
George Kemeny and Tom Kurtz.
BASIC is an interpreter which means it reads every line , translates it
and lets the computer execute it before reading another. Each instruction
starts with a line number.
FEATURES OF QBASIC
1. It is a user friendly language.
2. It is widely known and accepted programming language.
3. It is one of the most flexible languages, as modification can easily be done in already
existing program.
4. Language is easy since the variables can be named easily and uses simple English
phrases with mathematical expressions.
HOME
HOME
Topic : BASIC PROGRAMMING CONCEPTS
TYPES OF VARIABLES
2. Constant variables: Values do not change.
3. Global variables: These are declared outside a function.
4. Class variables: These are variables accessible within a
specified class.
5. Instant variables: These are declared inside class but
outside.
6. Local variables: These are declared in classes, methods.
HOME 0-7
Topic : BASIC PROGRAMMING CONCEPTS
2. Control structures
A control structure specifies the flow of control in a
program. Analyzing certain parameters and conditions
determines the flow direction of a program. Control
structures make it easier to understand a flow of logic
when developing algorithms or writing programs.
There are three basic types of control structures:
Sequential logic: The flow of a program executes in
a specific order without skipping, jumping, or
switching to another block of code.
Selection logic: A condition determines whether a
block of code gets executed or skipped. Common
examples include if and else-if.
Iteration logic: A block of code repeats a fixed
number of times to achieve the desired result.
Common examples include HOME for and while loop 0-8
Topic : BASIC PROGRAMMING CONCEPTS
3. Data structures
A data structure provides an effective way to store and
retrieve data. These are some common data structures
used in software development:
Arrays: Arrays organize data by storing similar elements
together and using contiguous memory allocation.
Stacks: Stacks are linear structures that follow a last-in,
first-out (LIFO) order for executing operations. You can
use stacks to implement backtracking algorithms.
Queues: The queue is a linear structure that follows a
first-in, first-out (FIFO) order for executing operations.
You can use them in mail queues, CPU scheduling, and
first-come, first-serve (FCFS) scheduling.
Linked lists: Linked lists are linear data structures that
use pointers to link elements as opposed to contiguous
memory locations. 0-9
HOME
Topic : BASIC PROGRAMMING CONCEPTS
4. Object-oriented programming
Object-oriented programming is based on the
concept of objects and classes where an object
may contain data in the form of attributes and
methods.
1. Problem definition
2. Problem analysis
3. Flowcharting
4. Desk checking
5. Program coding
6. Program compilation
7. Program testing and debugging
8. Program documentation
HOME 0-13
Topic : What is Basic?
BASIC :
Beginners All-purpose Symbolic Instruction Code
BASIC is a computer programming language developed at
Dartmouth College as an instructional tool in teaching
fundamental programming concepts.
This language has since gained wide acceptance as a
timesharing language and is considered one of the easiest
programming languages to learn.
HOME
WK 4 :Topic : RULES OF BASIC
Topic
Every programming language has a set of rules that have to be followed while writing a program,
The following are some rules of QBASIC language:
1. All QBasic programs are made up of series of statements, which are executed in the order in
which they are written.
2. Every statement should have at least one QBasic command word. The words that BASIC
recognizes are called keywords.
3. All the command words have to be written using some standard rules, which are called
“Syntax
Rules”. Syntax is the grammar of writing the statement in a language. Syntax Errors are
generated when improper syntax is detected.
QBASIC DATA
Data is a collection of facts and figures that is entered into the computer through the keyboard.
Data is of two types:
1. CONSTANT: Data whose value does not change or remains fixed. There are two types of
constants:
(a) NUMERIC CONSTANT: Numbers - negative or positive used for mathematical
Calculations e.g. –10, 20, 0
(b) ALPHANUMERIC CONSTANT / STRING: Numbers or alphabets written within double
quotes(inverted commas “ “). e.g. “Computer”, “Operating System”
HOME
HOME
WK 4 :Topic :The BASIC Character Set
Topic
There are three types of characters used in BASIC.
1. ALPHABETIC CHARACTERS.—The alphabetic characters used in BASIC are the standard
English alphabet, A through Z.
2. NUMERIC CHARACTERS .—The numeric characters used in BASIC are the digits 0 through 9.
3. SPECIAL CHARACTERS.—The following are special characters used in BASIC:
Blank
= Equal sign or assignment symbol
+ Plus sign
- Minus sign
Asterisk or multiply symbol
*
Slash or divide symbol
/
Up-arrow or exponentiation symbol
)
Right parenthesis
(
Left parenthesis
, Comma
. Point or period
HOME
HOME
Topic :Topic :The BASIC Character Set
' Single quotation mark
" Double quotation mark
; Semicolon
: Colon
! Exclamation symbol
? Question mark
& Ampersand
< Less than symbol
> Greater than symbol
# Number or pound sign
$ Dollar sign
% Percent sign
HOME
Topic :Arithmetic Expressions and Arithmetic
Topic :
WK 4
Operators
HOME
HOME
Topic :
CLASSWORK
• Highlight the steps involved in program development.
ASSIGNMENT
List the arithmetic operators and their order of execution.
HOME
Topic :
WEEK 2: Basic programming
LEARNING OBJECTIVES:
By the end of the lesson, the students should be
able to:
1. compute simple Basic program.
2. identify some statements used in basic
3. highlight major Arithmetic Operators.
HOME
Topic : Sample Basic program
10 PI=3.14
20 INPUT "WHAT IS THE RADIUS"; R
30 A=PI*R^2
40 PRINT "THE AREA OF THE CIRCLE IS"; A
50 PRINT
– Rem 60 GOTO 20
– RUN
– WHAT IS THE RADIUS? 7.4
– THE AREA OF THE CIRCLE IS 171.9464
HOME
Topic : Assignment
• Write a simple basic program to calculate the
area of a triangle.
HOME
Topic : STATEMENTS USED IN BASIC
What is a statement?
Statements:
A statement, such as ON ERROR...GOTO, is a group
of GW-BASIC keywords generally used in
GW-BASIC program lines as part of a program.
When the program is run, statements are
executed when, and as, they appear.
HOME
Topic : INPUT Statement
Purpose:
To prepare the program for input from the terminal during program
execution.
Syntax:
INPUT[;][prompt string;] list of variables
INPUT[;][prompt string,] list of variables
Example 1:
To find the square of a number:
10 INPUT X
20 PRINT X "SQUARED IS" X^2
30 END
HOME
Topic : LET Statement
Purpose:
To assign the value of an expression to a variable.
Syntax:
[LET] variable=expression
Example
110 LET D=12
120 LET E=12^2
130 LET F=12^4
140 LET SUM=D+E+F
HOME
Topic : READ Statement
Purpose:
To read values from a DATA statement and assign them to variables.
Syntax:
READ list of variables
Example
5 PRINT
10 PRINT "CITY", "STATE", "ZIP"
20 READ C$, S$, Z
30 DATA "DENVER,", "COLORADO", 80211
40 PRINT C$, S$, Z
RUN
CITY STATE ZIP
DENVER, COLORADO 80211
This program reads string and numeric data from the DATA statement in line 30.
HOME
Topic : DATA Statement
Purpose:
To store the numeric and string constants that are accessed by
the program READ statement(s).
Syntax:
DATA constants
Example 1:
80 FOR I=1 TO 10
90 READ A(I)
100 NEXT I
110 DATA 3.08,5.19,3.12,3.98,4.24
120 DATA 5.08,5.55,4.00,3.16,3.37
HOME
Topic : DATA Statement
This program segment reads the values from the DATA statements into array A.
After execution, the value of A(1) is 3.08, and so on. The DATA statements
(lines 110-120) may be placed anywhere in the program; they may even be placed
ahead of the READ statement.
Example 2:
5 PRINT
10 PRINT "CITY","STATE","ZIP"
20 READ C$,S$,Z
30 DATA "DENVER,","COLORADO",80211
40 PRINT C$,S$,Z
RUN
CITY STATE ZIP
DENVER, COLORADO 80211
This program reads string and numeric data from the DATA statement in line
HOME
Topic : PRINT Statement
Purpose:
To output a display to the screen.
Syntax:
PRINT [list of expressions][;]
?[list of expressions][;]
HOME
Topic : Arithmetic Operators
The following are the arithmetic operators recognized by GW-BASIC. They
appear in order of precedence.
Operator Operation
^ Exponentiation
- Negation
* Multiplication
/ Floating-point Division
+ Addition
- Subtraction
Operations within parentheses are performed first. Inside the parentheses, the
usual order of
precedence is maintained.
HOME
Topic : 3. OPERATIONS - 1
HOME
Topic : OPERATIONS
Arithmetic operations are carried out LEFT to RIGHT.
Use parentheses whenever their use will help clarify the order of the
operations that must be carried out. Inner parentheses are calculated
first.
Examples
3.6*89.2+6^3-8.7+2.3-1.9
((2.8-3.5*6)/3.9)-(2.7/3.8+43.3)
Algebraic expressions are constructed using the numeric constants,
variables and the arithmetic operations discussed above. Built-in
mathematical functions in Gwbasic enlarge the kind of algebraic
expressions we can employ in a program.
HOME
Topic : Algebraic Expression/BASIC Expression
HOME
Topic : Sample program1
To find the area of a circle when the radius is
known:
10 PI=3.14
20 INPUT "WHAT IS THE RADIUS"; R
30 A=PI*R^2
40 PRINT "THE AREA OF THE CIRCLE IS"; A
50 PRINT
HOME
Topic : BUILT-IN FUNCTIONS
FUNCTION SYNTAX
1. Sine SIN(X) , X in radians
2. Cosine COS(X)
3. Tangent TAN(X)
4. Arc tangent ATN(X)
5. Square root SQR(X) , X >= 0
6. Exponential EXP(X)
7. Natural logarithm LOG(X) , X > 0
8. Absolute value ABS(X)
HOME
Topic : BUILT-IN FUNCTIONS
FUNCTION SYNTAX
9. Greatest integer INT(X)
less than or equal
to X
10. Remove decimal FIX(X)
part of a number
11. Remove the number SGN(X)
but keep its sign
12. Convert X to integer constant CINT(X)
13. Convert X to single precision CSNG(X)
constant
14. Convert X to double precision CDBL(X)
constant
HOME
Topic: COMMANDS & KEYWORDS IN QBASIC AND THEIR
Topic :
WK 5 FUNCTIONS
1. LIST - The command is used to list the program on the screen.
2. RUN - The command is used to execute the program.
3. LLIST - The command is used to list of program as a hardcopy.
4. LPRINT- The command is used to get the output of the program on the hard
copy.
5. NEW - The command is used clear the memory of the existing program.
6. SYSTEM – The command is used to take you back to dos prompt.
7. PRINT AND CLS command can also be used without a line number and
CLS to clear the screen.
8. RME - The command is used to show the position of the mistake.
9. SAVE -The keyword is used to save the program.
E.g. QBasic will automatically add a period and an extension “bas” to the
filename.
10. LOAD - The keyword is used to LOAD the program from the disk to the
memory.
E.g. LOAD ”PROGRAM1”
HOME
HOME
Topic :
CLASSWORK
Write a simple basic program to calculate the
perimeter of a circle.
ASSIGNMENT
LEARNING OBJECTIVES:
By the end of the lesson,the students should
be able to:
1. compute simple Basic program.
2. execute looping in Basic programming.
3. use the verb “WHILE...WEND”.
4. use the verb “FOR...NEXT”.
HOME
WK 5 :Topic :Program Example 1
Topic
10 CLS
20 PRINT "Hello, world!"
30 PRINT "I'm learning about commands in BASIC."
40 PRINT "This text is being printed via the PRINT command."
50 PRINT "On the next line, I'll use CLS."
60 CLS "Now the next word would be PRINT."
70 PRINT "Finally, on line 80, I'll use END."
80 END "And return to PRINT"
90 PRINT "Now my program is over."
HOME
HOME
WK 5 :Topic :Example 2
Topic
This example means that if a equals to 15, QBasic will first print OK and
then will go to the line labelled 1. Here is an example of full program (a
simple game):
1 CLS
score = 0
PRINT "How many days are there in a week?"
INPUT a
IF a = 7 THEN GOTO 2
PRINT "Wrong answer!"
PRINT "To try again – press 'y'."
INPUT a$
IF a$ = "y" THEN GOTO 1 ELSE END
2 score = 10
PRINT "It's the right answer!"
PRINT "Your score is now"; score; "!"
PRINT "Thanks for playing."
END
HOME
HOME
WK 5 :Topic : Loops
Topic
"Loops" make it easier to do an action multiple times. There are at least four types of loops:
IF...GOTO, WHILE...WEND, DO...LOOP, and FOR...NEXT.
IF...GOTO
HOME
HOME
WK 5 :Topic : WHILE...WEND
Topic
The WHILE...WEND commands continue a loop until a specified expression is false.
To use WHILE...WEND:
1. Place an expression after WHILE
2. Enter a list of commands
3. Place WEND at the end
Run the following:
x = 10
WHILE x < 15
PRINT x
x=x+1
WEND
Output (same as in previous example):
10
11
12
13
14
HOME
HOME
WK 5 :Topic : FOR...NEXT
Topic
This command allows you to execute a part of a program a certain
number of times.
FOR...NEXT provides an easier way to create a loop.
FOR x = 1 TO 5
PRINT x
NEXT x
Output:
1
2
3
4
5
TIP: The X after NEXT is optional (unless you have a loop within a loop).
HOME
HOME
WK 5 :Topic :FOR...NEXT examples
Topic
FOR i = 1 TO 4 The letter i can be another letter, c for example. It
is actually a variable, which changes its value
PRINT "I am looping!" each time the program loops (in this example -
from 1 to 3). So, if you make a program like this:
NEXT i
Output: FOR a = 1 TO 5
I am looping! PRINT "This is loop number"; a
I am looping! NEXT a
I am looping!
I am looping! This will print:
This is loop number 1
This is loop number 2
This is loop number 3
This is loop number 4
This is loop number 5
HOME
HOME
WK 5 :Topic : DO...LOOP
Topic
Imagine that you have a program that works like an ordinary
calculator: you enter numbers, QBasic calculates and shows the result,
and the program ends.
Here is an example:
DO
PRINT "Enter a number."
PRINT "When you want to quit, press 0."
INPUT n
r=n/2
PRINT n; "/2 ="; r
LOOP WHILE n > 0
END
HOME
HOME
Topic :
Classwork
HOME
Topic : WEEK 4: Basic programming
LEARNING OBJECTIVES:
By the end of the lesson, the students should
be able to:
1. compute simple Basic program.
2. learn more about variables.
3. do implementation of array (looping).
HOME
WK 4 :Topic :More about Variables
Topic
So far, you know that there are string variables (for holding text) and
numeric variables (for holding numbers). But numbers can be very different,
and in QBasic there are some different types of numeric variables:
As you see, those types of variables have a special symbol as part of their names:
% - INTEGER
& - The SINGLE type of variable is the most widely used in QBasic, and you don’t have to stick the ! symbol to
it. If you put a variable without an y symbol, QBasic will know that this is a SINGLE PRESICION variable.
! - LONG SINGLE
# - DOUBLE
HOME
Topic :
HOME
Topic :
IMPLEMENTATION OF
ARRAY(LOOPING)
HOME
Topic : Looping
A loop is a way of repeating a statement a number of times until some
way of ending the loop occurs.
To review, if we want to add up a random series of 10 numbers given
by the user, we could write:
10 x = 1
20 sum = 0
30 print x
40 input "enter a number";n
50 sum = sum + n
60 x = x + 1
70 if x < 11 then goto 30
80 print "The sum of the numbers you gave is";sum |
HOME
Topic :
HOME
Topic : WEEK 5 : Basic computer operations
LEARNING OBJECTIVES:
By the end of the lesson, the students should
be able to:
1. list the basic computer operation.
2. describe the booting process & list types of booting.
3. start up a computer and Identify components of a
desktop.
4. run an application program and Shut down the
computer.
HOME
Topic : Basic computer operations
There are five basic types of computer operations:
1. inputting,
2. processing,
3. outputting,
4. storing and
5. controlling.
Computer operations are
executed by the five primary
functional units that make
up a computer system. The
units correspond directly to
the five types of operations.
HOME
Topic : BOOTING
Booting is basically the process of starting the computer. When the CPU is
first switched on it has nothing inside the Memory. In order to start the
Computer, load the Operating System into the Main Memory and then
Computer is ready to take commands from the User.
TYPES OF BOOTING: There are two types of booting:
Cold Booting
A cold boot is also called a hard boot. It is the process when we first start
the computer. In other words, where the computer is started from its
initial state by pressing the power button it is called cold boot. The
instructions are read from the ROM and the operating system is loaded in
the main memory.
Warm Booting
Warm Boot is also called soft boot. It refers to when we restart the
computer. Here, the computer does not start from the initial state. When
the system gets stuck, sometimes it is required to restart it while it is ON.
Therefore, in this condition the warm boot takes place. Restart button or
CTRL+ALT+DELETE keys are used for warm boot.
HOME
Topic : STEPS IN SYSTEM BOOTING
Steps of Booting
We can describe the booting process in six steps:
1. The Startup
It is the first step that involves switching the power ON. It
supplies electricity to the main components like BIOS and
processor.
2. BIOS: Power On Self Test
It is an initial test performed by the BIOS. Further, this test
performs an initial check on the input/output devices,
computer’s main memory, disk drives, etc. Moreover, if any
error occurs, the system produces a beep sound.
HOME
Topic : STEPS IN SYSTEM BOOTING
3. Loading of OS
In this step, the operating system is loaded into the main memory.
The operating system starts working and executes all the initial files
and instructions.
4. System Configuration
In this step, the drivers are loaded into the main memory. Drivers
are programs that help in the functioning of the peripheral devices.
5. Loading System Utilities
System utilities are basic functioning programs, for example,
volume control, antivirus, etc. In this step, system utilities are
loaded into the memory.
6. User Authentication
If any password has been set up in the computer system, the
system checks for user authentication. Once the user enters the
login Id and password correctly the system finally starts.
HOME
Topic : STEPS IN STARTING A PROGRAM
Start and Shut Down a Computer System
HOME
Topic : STEPS IN CLOSING A PROGRAM
Method 2
1.Right-click the Start icon.
2.Click or hover over Shut down or sign out.
3.Click Shut down.
Method 1
1.Press Ctrl-Alt-Del keys at the same time.
2.Click Sign out.
Method 2
3.Click the Start icon.
2.Click the User profile icon.
3.Click Sign out.
HOME
Topic : STEPS IN CLOSING A PROGRAM
Close a Program
Close (exit) a program (close an active
open window)
Method 1
1.Click the Close icon (x) in the upper-right
corner of the window.
Method 2
HOME
Topic : STEPS IN CLOSING A PROGRAM
Close a Program
Method 2
HOME
Topic :
WEEK 6
Mid Term break
HOME
Topic
Wk 7
: WEEK 7
HOME
HOME
Topic :WEEK 7: Computer Ethics and Human Issues
LEARNING OBJECTIVES:
By the end of the lesson ,the students should be able
to:
1. define the term ,“Computer security”.
2. highlight possible source of security breaches e.g. Malware,
Spyware, Phishing, Spoofing, Phishing, Hacking etc.
3. identify Viruses, Worms and Trojan horse.
4. list Types of Computer Viruses and Common Signs of Computer
Viruses.
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Definition of computer security
Computer security is the protection of computer
components such as hardware, software and data from
unauthorized access. The need for computer security is as a
result of a number of security breaches.
- Sources of security breaches
Security breach is an act of breaking security policies,
practices or procedures. When security in computer is
breached, it may result in the damage of vital files, failure of
certain hardware components e.g. keyboard, mouse,
printer, hard disk, ram etc, alter software programs, etc.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
The following are possible sources of security breaches
1. Malware
2. Spyware
3. Phishing
4. Spoofing
5. Phishing
6. Hacking
7. Computer viruses
8. Poorly maintained
computer network
9. Poorly implemented or
lack of ICT policy
10. Carelessness.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Malware
Malicious software (malware) is any software code or
computer program "intentionally written to harm a
computer system or its users." Once present on a computer,
it can leak sensitive details such as personal information,
business information and passwords, can give control of the
system to the attacker, and can corrupt or delete data
permanently. Another type of malware is ransom ware,
which is when "malware installs itself onto a victim's
machine, encrypts their files, and then turns around and
demands a ransom (usually in Bitcoin) to return that data to
the user."
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Spyware is a type of malware that secretly gathers information
from an infected computer and transmits the sensitive
information back to the attacker. One of the most common
forms of spyware are keyloggers, which record all of a user's
keyboard inputs/keystrokes, to "allow hackers to harvest
usernames, passwords, bank account and credit card numbers."
Scareware, as the name suggests, is a form of malware which
uses social engineering (manipulation) to scare, shock, trigger
anxiety, or suggest the perception of a threat in order to
manipulate users into buying or installing unwanted software.
These attacks often begin with a "sudden pop-up with an urgent
message, usually warning the user that they've broken the law
or their device has a virus."
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Phishing is the attempt of acquiring sensitive information such
as usernames, passwords, and credit card details directly from
users by deceiving the users. Phishing is typically carried out by
instant messaging, text message, or on a phone call. They often
direct users to enter details at a fake website whose look and
feel are almost identical to the legitimate one. Preying on a
victim's trust, phishing can be classified as a form of social
engineering. Attackers can use creative ways to gain access to
real accounts. A common scam is for attackers to send fake
electronic invoices to individuals showing that they recently
purchased music, apps, or others, and instructing them to click
on a link if the purchases were not authorized.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Spoofing: Spoofing is an act of pretending to be a valid entity
through the falsification of data (such as an IP address or
username), in order to gain access to information or resources
that one is otherwise unauthorized to obtain. Spoofing is closely
related to phishing. There are several types of spoofing,
including:
Email spoofing.This is where an attacker forges the sending
(From, or source) address of an email.
IP address spoofing, where an attacker alters the source IP
address in a network packet to hide their identity or
impersonate another computing system.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Hacking—Definition
This is the act of compromising digital devices and networks
through unauthorized access to an account or computer
system. Hacking is not always a malicious act, but it is most
commonly associated with illegal activity and data theft by
cyber criminals.
But what is hacking in a cyber-security context?
Hacking in cyber security refers to the misuse of devices like
computers, smartphones, tablets, and networks to cause
damage to or corrupt systems, gather information on users,
steal data and documents, or disrupt data-related activity.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Spamming
Spamming in the context of cyber-security, refers to any
unsolicited and often irrelevant or inappropriate messages
sent over the internet, typically to a large number of users,
primarily for advertising, phishing, spreading malware, or
other similar purposes.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Types of malware include some of the following:
Viruses are a specific type of malware, and are normally a
malicious code that hijacks software with the intension to "do
damage and spread copies of itself." Copies are made with the
aim to spread to other programs on a computer.
Worms are similar to viruses, however viruses can only function
when a user runs (opens) a compromised program. Worms are
self-replicating malware that spread between programs, apps
and devices without the need for human interaction.
Trojan horses: are programs that pretend to be helpful or hide
themselves within desired or legitimate software to "trick users
into installing them." Once installed, a RAT (remote access
trojan) can create a secret backdoor on the affected device to
cause damage.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer
Types of Computer Viruses
Ethics and Human Issues
There are several types of computer viruses that can infect devices.
1. Resident virus
These viruses propagate themselves by infecting applications on a host
computer. A resident virus achieves this by infecting applications as they are
opened by a user. A non-resident virus is capable of infecting executable files
when programs are not running
2. Multipartite virus
A multipartite virus uses multiple methods to infect and spread across
computers. It will typically remain in the computer’s memory to infect the hard
disk, then spread through and infect more drives by altering the content of
applications. This results in performance lag and application memory running
low.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Types of Computer Virus
3. Direct action: A direct action virus accesses a computer’s main
memory and infects all programs, files, and folders located in the
autoexec.bat path, before deleting itself. This virus typically alters the
performance of a system but is capable of destroying all data on the
computer’s hard disk and any USB device attached to it.
4. Browser hijacker: A browser hijacker manually changes the settings
of web browsers, such as replacing the homepage, editing the new
tab page, and changing the default search engine. Technically, it is not
a virus because it cannot infect files but can be hugely damaging to
computer users, who often will not be able to restore their
homepage or search engine. It can also contain adware that causes
unwanted pop-ups and advertisements.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Types of Computer Virus
5. Overwrite virus: Overwrite viruses are extremely dangerous.
They can delete data and replace it with their own file content
or code. Once files get infected, they cannot be replaced, and
the virus can affect Windows, DOS, Linux, and Apple systems, 6.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Types of Computer Virus
7. File infector
A file infector is one of the most common computer viruses. It
overwrites files when they are opened and can quickly spread
across systems and networks. It largely affects files with .exe
or .com extensions.
8. Network Virus: Network viruses are extremely dangerous
because they can completely cripple entire computer networks.
They are often difficult to discover, as the virus could be hidden
within any computer on an infected network. These viruses can
easily replicate and spread by using the internet to transfer to
devices connected to the network. Trusted, robust antivirus
solutions and advanced firewalls are crucial to protecting against
network viruses.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Types of Computer Virus
9. Boot Sector Virus
A boot sector virus targets a computer’s master boot record
(MBR). The virus injects its code into a hard disk’s partition
table, then moves into the main memory when a computer
restarts. The presence of the virus is signified by boot-up
problems, poor system performance, and the hard disk
becoming unable to locate. Most modern computers come with
boot sector safeguards that restrict the potential of this type of
virus.
Steps to protecting against a boot sector virus include ensuring
disks are write-protected and not starting up a computer with
untrusted external drives connected.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Common Signs of Computer Viruses
1. Speed of system
A computer system running slower than usual is one of the
most common signs that the device has a virus. This
includes the system itself running slowly, as well as
applications and internet speed suffering. If a computer
does not have powerful applications or programs installed
and is running slowly, then it may be a sign that it is infected
with a virus.
2. Pop-up windows: Unwanted pop-up windows appearing
on a computer or in a web browser are a telltale sign of a
computer virus. Unwanted pop-ups are a sign of malware,
viruses, or spyware affecting a device.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Common Signs of Computer Viruses
3. Programs self-executing: If computer programs unexpectedly close
by themselves, then it is highly likely that the software has been
infected with some form of virus or malware. Another indicator of a
virus is when applications fail to load when selected from the Start
menu or their desktop icon.
4. Accounts being logged out: Some viruses are designed to affect
specific applications, which will either cause them to crash or force
the user to automatically log out of the service.
5. Crashing of the device
System crashes and the computer itself unexpectedly closing down
are common indicators of a virus. Computer viruses cause computers
to act in a variety of strange ways, which may include opening files by
themselves, displaying unusual error messages, or clicking keys at
random.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Common Signs of Computer Viruses
6. Mass emails being sent from your email account
Computer viruses are commonly spread via email. Hackers can use
other people's email accounts to spread malware and carry out wider
cyber-attacks. Therefore, if an email account has sent emails in the
outbox that a user did not send, then this could be a sign of a
computer virus.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Prevention of Computer Viruses
1. Use a trusted antivirus product: Trusted computer antivirus
products are crucial to stop malware attacks and prevent computers
from being infected with viruses. These antivirus concepts will protect
devices from being infected through regular scans and identifying and
blocking malware.
2. Avoid clicking pop-up advertisements: Unwanted pop-up
advertisements are more than likely to be linked to computer viruses
and malware. Never click on pop-up advertisements because this can
lead to inadvertently downloading viruses onto a computer.
3. Scan your email attachments: A popular way to protect your
device from computer viruses is to avoid suspicious email
attachments, which are commonly used to spread malware.
Computer antivirus solutions can be used to scan email attachments
for potential viruses.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
Prevention of Computer Viruses
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
What is a Trojan horse?
In computing, a Trojan horse is a program downloaded and installed
on a computer that appears harmless, but is, in fact, malicious.
Unexpected changes to computer settings and unusual activity, even
when the computer should be idle, are strong indications that a
Trojan is residing on a computer.
Typically, the Trojan horse is hidden in an innocent-looking email
attachment or free download. When the user clicks on the email
attachment or downloads the free program, the malware hidden
inside is transferred to the user's computing device. Once inside, the
malicious code can execute whatever task the attacker designed it to
carry out.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
7: Computer Ethics and Human Issues
What is a Trojan horse?
Trojan horses are programs that pretend to be helpful or hide
themselves within desired or legitimate software to "trick users into
installing them." Once installed, a RAT (remote access trojan) can
create a secret backdoor on the affected device to cause damage.
HOME
HOME
Topic :
Classwork
Explain five (5) means of preventing
computer viruses.
Assignment
Highlight five types of computer
viruses.
HOME
Topic :Topic
Wk 7 WEEK :
8: Computer Ethics and Human Issues
HOME
HOME
Topic :WEEK 8: Computer Ethics and Human Issues
LEARNING OBJECTIVES:
By the end of the lesson, the students should be able
to:
HOME
Topic :Topic
Wk 7 WEEK :
8: Computer Ethics and Human Issues
Ways to Prevent Network Security Breaches in the Workpla
1. Installing centralized firewalls: Firewalls are the first line of defense
in network security. A suitably configured firewall acts as a barrier
between networks with differing levels of trust. It is vital that you keep
the local firewall on all the time as this is the best way you can arm your
network against malicious attacks.
2. Encrypted transmission: Stolen encrypted data is of no value to
cyber-criminal. The power of cryptography is such that it can restrict
access to data and can render it useless to those who do not possess
the key. Using encryption is a big step towards mitigating the damages
of a security breach.
3. Antivirus software: Make sure that you have an updated antivirus,
antispyware and anti-malware software installed so that your server is
continuously protected and monitored. Such software prevents
malicious programs from stealing or destroying data assets.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
8: Computer Ethics and Human Issues
Ways to Prevent Network Security Breaches in the Workpl
4. Good password policy
Maintaining an unpredictable and complex password is a huge step in
the right direction. Make sure that you never reuse passwords and
change them regularly as and when you’re prompted by an expiry alert.
Choosing a strong password is itself the best security measure of all.
5. Update regularly
The pop-ups that we get from time to time notifying us of updates are
not just there to pester us. Such updates do numerous things to help
you improve security. One of the best ways to foil breach attempts is to
update your operating system and all application software as the new
versions have most likely been fine-tuned to prevent current threats.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
8: Computer Ethics and Human Issues
Ways to Prevent Network Security Breaches in the Workpla
6. Securing the router
Cybercriminals could easily compromise your data without setting foot
inside your premises. They can do this by breaking into your network,
and it’s far easier for them to do it if your network is unsecured. You can
secure all the devices in your network by ensuring that encryption is
enabled on your wireless traffic.
7. Proper backing up of data
Data is the most valued asset of any organization and it’s what criminals
want to exploit. Storing and backing up such assets with private
information is critical. Backing up data can be considered another line of
defense protecting you against ransom-ware.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
8: Computer Ethics and Human Issues
Ways to Prevent Network Security Breaches in the Workpla
8. Educating the employees: Educating your employees about the
deadly consequences of security breaches is vital. If a culture of security
is adopted at all levels of the organization, from junior staff to the CEO,
then it will be far less likely you’ll suffer an otherwise avoidable data
breach.
9. Breach response: With the surge of high-profile attacks targeting
sensitive data assets, developing a breach response plan in advance
helps in triggering a quick response in the wake of an incident. Such
plans assist in identifying and analyzing attacks that otherwise would go
undetected.
10. Identifying and analyzing suspicious activity: Proactive and
continuous auditing enables you to spot potentially dangerous
situations which could result in a serious breach in the future. Auditing
your network environment on a regular basis is the best.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
8: Computer Ethics and Human Issues
What Is Software Copyright?
HOME
HOME
Topic :Topic
Wk 7 WEEK :
8: Computer Ethics and Human Issues
What Is Software Copyright?
Software Copyright: is used by software developers and owners to
keep people from copying their intellectual property without permission
or from using it in any way they haven’t agreed to.
When someone creates an original piece of software, that person then
holds legal protection called the copyright for that software. (This is
also true when people create books, films and songs.)
Holding the copyright for software means that you have the protection
of the law if anyone tries to steal your software.
Under copyright law, people must not:
copy the software for other people.
lend the software to other people.
rent the software to other people.
Install the software on a network where other users can access it
(unless it is a special ‘network’ version)
HOME
HOME
Topic :Topic
Wk 7 WEEK :
8: Computer Ethics and Human Issues
What Is Software Copyright?
If someone breaks the copyright, they
can be punished by fines or even by
imprisonment.
HOME
HOME
Topic :Topic
Wk 7 WEEK :
8: Computer Ethics and Human Issues
Why do we need Copyright?
Copyright legislation is essential to protect the rights of creators and
developers
It prevents the unauthorized use, duplication, or distribution of
software, known as software piracy.
It ensures developers are rewarded for their work, encouraging further
innovation and development.
Principles of Copyright in Computer Software
Copyright law prohibits the unauthorized copying, distribution, or
modification of software.
It also includes the End-User License Agreement (EULA), which outlines
what the software can and cannot be used for
Violations of these principles, such as software piracy, can lead to legal
consequences
HOME
HOME
Topic :Topic
Wk 7 WEEK :
8: Computer Ethics and Human Issues
Preventing Software Copyright Violations
Software producers use various methods to protect their copyright,
such as Digital Rights Management (DRM).
DRM involves technologies or systems that control the use,
modification, and distribution of copyrighted works
Other methods include product activation, where software requires a
unique code to be fully operational
Automatic updates can also serve as a form of copyright protection, as
pirated software often can't receive these updates, making it less
functional or secure over time
HOME
HOME
Topic :
Classwork
1. State ways to prevent network security
breaches in the workplace.
Assignment
2.Define the term ,“Software Copyright”.
3. Highlight Why we need Copyright.
HOME