Marquee13 presentation it_essentials

41

description

Presentation on IT Essentials by marquee

Transcript of Marquee13 presentation it_essentials

Page 1: Marquee13 presentation it_essentials
Page 2: Marquee13 presentation it_essentials

© Paradigm Publishing, Inc. 2 Concepts

The Information Processing Cycle

Input

Processing

Output

Storage

CHECKPOINT 1

System Unit Ports

Computer Software

Networks

CHECKPOINT 2

The Internet

Security Issues

Email Etiquette and Computer Ethics

CHECKPOINT 3

CONCEPTS

Page 3: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 3

The Information Processing Cycle

The information processing cycle can be divided into four segments:

1. Input

2. Processing

3. Output

4. Storage

Page 4: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 4

Input

A keyboard is primarily used for typing text.

A mouse is a pointing device used to issue commands and select text or files.

With a touchpad, you move your forefinger across the pad to position the cursor, then use your thumb to press the button located at the bottom of the pad.

A touch screen allows you to select an item and input commands by physically touching a specific area of the monitor.

Page 5: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 5

Input…continued

A scanner works like a photocopier to transfer pictures or text into the computer.

Better detail can be achieved with a digitizing pen and drawing tablet.

A joystick is an input device used to move objects on a computer screen and is a common input device for computer gaming.

A digital camera captures images in a digital format and often contains an output device for viewing those images.

A webcam is a digital camera that can be controlled remotely over the Internet.

Page 6: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 6

Input…continued

With a microphone you can add a “sound bite” to a computerized slide presentation or speak to a friend over the Internet.

A bar code reader scans a UPC, and resulting input can be used to check a patient’s identity and medication requirements.

Flash drives are small, easy-to-handle, portable storage devices that many people use to carry important data with them wherever they go.

Page 7: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 7

Processing

A processor chip performs the calculations in a computer.

Memory chips are the hardware that provides the workspace for the data and instructions the computer is processing.

The motherboard is a container for the computer’s CPU and RAM, and contains slots for adding expansion cards.

Page 8: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 8

Output

A monitor is the screen used to display graphics and text.

Printers provide hard copy printouts on paper.

Speakers and headphones provide audio output in stereo for movies, radio programs, streaming video, online learning courses, and telephone calls.

Page 9: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 9

Storage

Hard drives contain a stack of metal platters (disks), a drive motor, and read/write heads.

Data CDs are made of the same material that is used for music CDs.

DVDs can hold from 4 GB to 8 GB, depending on whether they can record on both sides and on one or two layers per side.

Blu-ray discs are used both for high-definition video and for data.

The flash drive storage device has a USB connector that fits into a standard USB port.

Page 10: Marquee13 presentation it_essentials

© Paradigm Publishing, Inc. 10 Concepts

1) The information processing cycle can be divided into how many segments?

a. 2

b. 3

c. 4

d. 5

3) This is a temporary version and includes any output that cannot be physically handled.

a. hard copy

b. soft copy

c. temp copy

d. perm copy

2) This works like a photocopier to transfer pictures or text into the computer.

a. scanner

b. mouse

c. touch pad

d. joystick

4) CDs can hold about this much data.

a. 100 MB

b. 100 GB

c. 700 MB

d. 700 GB

Next Question

Next Question

Next Question

Next Slide

Answer

Answer

Answer

Answer

CHECKPOINT 1

Page 11: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 11

System Unit Ports

Ports are the sockets that the input, output, and storage devices plug into as displayed in the image on this slide.

In the early days of personal computing, serial, parallel, and printer cables and ports were found on all PCs. Today, most peripheral devices use Universal Serial Bus (USB) cables and ports.

Page 12: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 12

Computer Software

Software refers to the operating instructions and applications that allow computers to process the numbers, pictures, sounds, and text we enter into them.

Today, most operating systems use Graphical User Interfaces (GUIs), in which a mouse is used to manipulate graphic objects such as icons and windows onscreen.

The Windows 8 and Windows 7 operating systems require a CPU that runs at 1 GHz and has 1 GB of RAM.

The Mac OS X operating system can run on IBM-compatible PCs.

Page 13: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 13

Computer Software…continued

The thousands of software applications available provide the instructions that empower users to perform these and other tasks from the mundane to the amazing.

A word processing program such asMicrosoft Word can support photosand drawings, mathematicalcalculations, text in table format,text in varying sizes, shapes, andcolors, and even sound bites.

Spreadsheet software such asMicrosoft Excel can be used forboth simple and complex calculations.

Page 14: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 14

Computer Software…continued

Database software such as Microsoft Access is designed to keep track of information.

Presentation software such as Microsoft PowerPoint allows users to create slide shows that can be viewed on the computer or projected onto a large screen.

Page 15: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 15

Computer Software…continued

Photo editing software is used to organize, retouch, and edit photographs and videos that have been saved on CDs and DVDs, scanned, or transferred directly from the camera to a PC.

Applications such as CorelDraw, Adobe Illustrator, SmartDraw, Microsoft Paint, and PaintShop Pro are popular software packages that provide the tools to design graphical images that can be used for web pages, posters, marketing brochures, and greeting cards.

Page 16: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 16

Computer Software…continued

Software applications are often bundled into packages called “suites.”

Money management software enables users to manage their money by helping them pay bills, balance checkbooks, keep track of income and expenses, maintain investment records, and manage other financial activities.

Tax preparation software allows users to efficiently fill out state and federal tax forms, submit them electronically, and direct the refund to your bank account.

Page 17: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 17

Computer Software…continued

Microsoft Outlook and Lotus Organizer are examples of personal information management (PIM) programs that keep track of your to-do list, address book, and personal calendar.

Collaborative software or groupware, such as Lotus Notes and Microsoft Office SharePoint, provide a way to keep track of who has made or suggested changes to documents or plans and to distribute everything electronically.

Page 18: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 18

Computer Software…continued

Today’s games contain high-quality 3D animation, sound, and action that are very realistic.

Open source software is the general term for applications that are provided completely free of charge, with no license fees or restrictions, and no copyrights to worry about. You can download the software, copy it, and give it to your friends.

Page 19: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 19

Networks

A Local Area Network (LAN) consists of several computers that are physically connected to one another via a central hub called a switch.

LANs can be connected to one another to form Wide Area Networks (WANs).

Page 20: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 20

Networks…continued

Clients are the computer workstations where end users run the various applications necessary for them to do their jobs.

Servers are data providers that are often larger and more powerful computers than clients. They house the network operating system software that organizes the sharing of data among the end users’ PCs.

Page 21: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 21

Networks…continued

A switch provides a central connection place for cables from multiple computers.

A router enables you to join two or more networks, or to join your LAN to the Internet.

Page 22: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 22

Networks…continued

The PCs that make up a network have to be connected to each other in some way.

The original method uses physical cables containing several strands of wire.

The latest method is wireless and uses radio frequencies to carry data over short distances from a PC to a switch or router.

All the devices are often located in the same room, but the signals are strong enough to penetrate the types of walls found in homes and offices.

The most commonly used network cable is unshielded twisted pair cable (UTP).

Page 23: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 23

Networks…continued

continues on next slide…

802.11n is the current Wi-Fi standard. It has a maximum data rate of 150 Mbps and a range of about 70 meters indoors or 250 meters outdoors.

802.11g is an earlier Wi-Fi standard; many 802.11g devices are still in use today. It has a maximum data rate of 54 Mbps and a range of 38 meters indoors or 140 meters outdoors.

802.11b and 802.11a are now obsolete Wi-Fi standards, with a maximum data rate of 54 Mbps and 11 Mbps, respectively.

TCP/IP (Transmission Control Protocol/Internet Protocol) defines the rules for sending and receiving data between network devices. Each device has a unique IP address, which is a series of four numbers between 0 and 255, separated by periods, like this: 192.168.0.1.

HTTP (HyperText Transfer Protocol) defines the rules for sending and receiving web pages (hypertext) on the Internet. For example, you might see http://emcp/myschool.edu on the uniform resource locator (URL) or Address line of your Internet browser.

Page 24: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 24

Networks…continued

HTTPS (HyperText Transfer Protocol Secure Sockets) encrypts data before sending it over the Web. You can see the letters https on the URL line when you reach a web page asking for your credit card number or when you are paying your bills online, such as https://emcp/mybank.com/my account.

POP3 is the current version of Post Office Protocol for receiving email. POP is a store-and-forward system in which your email waits on the mail server until you pick it up via an email application such as Outlook, then is forwarded to that application.

SMTP (Simple Mail Transfer Protocol) enables you to send email. The message is transferred to the recipient’s mail server on the Internet, where it waits for the user to pick it up via his or her email application.

FTP (File Transfer Protocol) provides an efficient, fast way to transfer files between computers. It is commonly used for files that are too large for email attachments, and for large repositories of files.

Page 25: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 25

Networks…continued

Data moves across the Internet by traveling through a collection of physical devices.

Page 26: Marquee13 presentation it_essentials

© Paradigm Publishing, Inc. 26 Concepts

1) The Windows 8 operating system requires a CPU that runs at this speed.

a. 100 GHz

b. 100 MHz

c. 1 GHz

d. 1 MHz

3) Software applications are often bundled into packages called this.

a. suites

b. collections

c. groups

d. piles

2) Microsoft Access is an example of this type of program.

a. word processing

b. presentation

c. spreadsheet

d. database

4) This is the term for applications that are provided completely free of charge.

a. Open Use

b. Open Source

c. Source Free

d. Source Use

Next Question

Next Question

Next Question

Next Slide

Answer

Answer

Answer

Answer

CHECKPOINT 2

Page 27: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 27

The Internet

The World Wide Web is a collection of hypertext files containing graphics, audio, and video that can be accessed on the Internet.

Page 28: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 28

The Internet…continued

Page 29: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 29

The Internet…continued

Electronic mail (email) uses its own protocols (such as SMTP and POP3) to route a message between computers on the Internet and hold it at a destination mail server until the recipient picks it up.

File Transfer Protocol (FTP) is an information workspace on the Internet and is used to transfer files.

Page 30: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 30

Security Issues

Malware is a relatively new term that describes computer programs that have a malicious intent. Viruses, worms, spyware, and adware programs all fall into this category.

A computer virus is a string of code written by someone who wants to hurt others by damaging or destroying their computer files or making their computer experience difficult.

Page 31: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 31

Security Issues…continued

A worm is a self-replicating computer program that distributes itself via a network. Unlike a virus, it does not necessarily attach itself to another file.

Named after the infamous Trojan horse of the Greek legend, a Trojan is malware that masquerades as a useful program.

Page 32: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 32

Security Issues…continued

Spyware tracks your activity as you surf the Internet and reports it to companies that want to sell you their products—or steal your identity.

Adware looks at files on your computer and then sends pop-up advertisements that try to sell you products and services.

Page 33: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 33

Security Issues…continued

Spyware programs can steal your personal information and share it with or sell it to other people who might be able to impersonate you and take money from your bank account or charge large purchases to your credit card.

Phishing is a method of convincing people to reveal their passwords, credit card numbers, social security numbers, and other private or confidential information.

Page 34: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 34

Security Issues…continued

Several computer programs are available to provide protection from virus attacks and from the installation of spyware or adware on your computer.

Some examples are McAfee VirusScan and Symantec AntiVirus for viruses; and Spybot Search & Destroy, SpySweeper, AdAware, and Spyware Detector for spyware and adware.

Windows 8 and Windows 7 include an anti-spyware program called Windows Defender.

Page 35: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 35

Email Etiquette and Computer Ethics

Etiquette refers to the rules that govern courteous behavior.

Etiquette also involves the rules for language appropriate in a businesslike environment.

Using proper etiquette is a way of showing a person respect.

Page 36: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 36

Email Etiquette and Computer Ethics…continued

Ethics are the moral principles that govern behavior.

Ethics are the rules we use to determine what is right and wrong.

Page 37: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 37

Email Etiquette and Computer Ethics…continued

Speedy communication with other people all over the world can be fun, exciting, and productive. However, it can also cause problems.

What you write in an email message can hurt someone’s feelings, be misinterpreted, or might accidentally be sent to the wrong person.

You can cause yourself embarrassment or even get yourself fired.

Page 38: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 38

Email Etiquette and Computer Ethics…continued

continues on next slide…

1. Be brief and to the point. Emails are supposed to be a fast way to communicate. Don’t slow down the process.

2. Don’t use ALL CAPITAL letters. It looks and feels like you’re shouting or angry.

3. Remember to attach the attachment. Mentioning what you are “enclosing” in any type of letter is a good idea. Get in the habit of stopping as soon as you type the phrase “I am attaching…” and immediately click the Attach button.

4. Use the spelling check (even if you’re a great speller). Using the spelling check feature only takes a few seconds and it shows that you care about quality. But watch out! It is easy to click “Change” instead of “Ignore” and change a person’s name to a common word.

5. Reread what you wrote from the perspective of the receiver. Ask yourself how the recipient is likely to interpret your words. Did you leave out or misspell a word that changes the meaning?

Page 39: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 39

Email Etiquette and Computer Ethics…continued

6. Double-check the address in the To box. Confirm that you clicked the correct name in your address list. Once you click the Send button, there is no way to stop the message or undo an address mistake.

7. Watch your language. Profanity can come back to haunt you.

8. Assume your email will be read by lots of other people. Emails are often forwarded so others can take action or to inform a supervisor. Avoid cute or friendly asides and comments that you only want a close friend to see.

9. Always put something in the Subject line. A well-written subject will help the receiver decide where to file your message and whether to read it now or wait until later.

10. Privacy does not exist in emails, especially those in a corporate environment. The email administrator can potentially see the contents of any email. Company policy may allow checking emails to ensure that no company secrets are exposed, or to stop harassing or abusive email.

Page 40: Marquee13 presentation it_essentials

Concepts© Paradigm Publishing, Inc. 40

Email Etiquette and Computer Ethics…continued

Most software is copyrighted. The exception is open source software.

Infringing on a copyright is illegal.

Page 41: Marquee13 presentation it_essentials

© Paradigm Publishing, Inc. 41 Concepts

1) This is an information workspace on the Internet and is used for file transfer.

a. ftf

b. ftp

c. fpt

d. fft

3) This is a self-replicating computer program that distributes itself via a network.

a. Spyware

b. Trojan

c. Worm

d. Virus

2) This is typically spread via an email attachment.

a. Spyware

b. Trojan

c. Worm

d. Virus

4) This refers to the rules that govern courteous behavior.

a. Etiquette

b. Ethics

c. Morale

d. Protocol

Next Question

Next Question

Next Question

Next Slide

Answer

Answer

Answer

Answer

CHECKPOINT 3