IT Reviewer

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

IT Reviewer

Lesson 1

Computer - an electronic device, operating under the control of instructions stored in its own memory.

-Accepts -Processing -Produces


data information(output)
(input)

Computers

• Laptop
• Tablet
• Desktop
and All-in-One
• Server
Mobile and Game Devices
• Smartphone
• Digital camera
• Portable and digital media player
• E-book reader
• Wearable device
• Game device

Data and Information


Keyboard - contains keys you press to enter data and instructions into a computer or mobile device.
Mouse/Touchpad - pointing device is an input device that allows a user to control a small symbol on the
screen called the pointer.
• Some mobile devices and computers enable you to speak data instructions using voice input and
to capture live full-motion images using video input.
Scanner - a light-sensing input device that converts printed text and images into a form the computer
can process.
Output device - any hardware component that conveys information from a computer or mobile device
to one or more people.
• Printer - an output device that produces text and graphics on a physical medium, such as paper
or other material.
- A 3-D printer can print solid objects, such as clothing, prosthetics, eyewear, implants, toys,
parts, prototypes, and more

Display – Screen/monitor, an output device that visually conveys text, graphics, and video information.

Speakers - allow you to hear audio such as music, voice, and other sounds.

– Earbuds -Headphones
Memory - consists of electronic components that store instructions waiting to be executed and the data
needed by those instructions.

Storage media – is where a computer keeps data, instructions, and information.

storage device - records (writes) and/or retrieves (reads) items to and from storage media.

- Hard Disk - Solid-State Drive - USB Flash Drive

- Memory Card - Optical Disc - Cloud Storage

Internet - a worldwide collection of computer networks that connects millions of businesses,


government agencies, educational institutions, and individuals.

• The World Wide Web (or web, for short) is a global library of information available to anyone
connected to the Internet

• Web - consists of a worldwide collection of electronic documents, each of which is called a


webpage.

• Website - is a collection of related webpages

• web server - is a computer that delivers requested webpages to your computer.

Browser – a software that enables users with an Internet connection to access and view webpages on a
computer or mobile device.

search engine - is a software that finds websites, webpages, images, videos, news, maps, and other
information related to a specific topic.

online social network - encourages members to share their interests, ideas, stories, photos, music, and
videos with other registered users.

Digital Safety and Security

• It is important that users protect their computers and mobile devices

-Viruses and Other Malware -Privacy -Health Concerns -Environmental Issues

Green computing - involves reducing the electricity consumed and environmental waste generated
when using a computer

Strategies include:

- Recycling
- Using energy efficient hardware and energy saving features
- Regulating manufacturing processes
- Extending the life of computers
- Immediately donating or properly disposing of replaced computers

Programs and Apps

Software/program, - tells the computer what tasks to perform and how to perform them.
software developer/developer/programmer - someone who develops programs and apps or writes the
instructions that direct the computer or mobile device to process data into information.

Communications and Networks

communications device – is a hardware capable of transferring items from computers and devices to
transmission media and vice versa.

examples of wireless communications technologies include:

WIFI BLUETOOTH CELLULAR RADIO

Network - a collection of computers and devices connected together, often wirelessly, via
communications devices and transmission media.

Home Networks

- Connect to the Internet


- Share a single high-speed Internet connection
- Access photos, music, videos, and other content
- Share devices
- Play multiplayer games
- Connect game consoles to the Internet
- Subscribe to and use VoIP
- Interact with other devices in a smart home

Business Networks

- Facilitate communications
- Share hardware
- Share data, information, and software

Technology Uses

Education Government Finance Retail Entertainment Health Care

Science Travel Publishing Manufacturing

Technology User

Home User Small/Home Office User Mobile User Power User Enterprise User

Lesson 3

Mobile Computers and Desktops

mobile computer - a portable personal computer, designed so that a user easily can carry it from place
to place

personal computer (PC) - a mobile computer or desktop that can perform all of its input, processing,
output, and storage activities by itself and is intended to be used by one person at a time
laptop/notebook computer - a thin, lightweight mobile computer with a screen in its lid and a keyboard
in its base

tablet - a thin, lighter-weight mobile computer that has a touch screen

handheld computer - a computer small enough to fit in one hand

desktop - a personal computer designed to be in a stationary location, where all of its components fit on
or under a desk or table

Servers

Servers - a computer dedicated to providing one or more services to other computers or devices on a
network

Rack server Blade server Tower server

Virtualization - is the practice of sharing or pooling computing resources, such as servers and storage
devices

– Server virtualization uses software to enable a physical server to emulate the hardware
and computing capabilities of one or more servers, known as virtual servers

server farm - is a network of several servers together in a single location

mainframe - a large, expensive, powerful server that can handle hundreds or thousands of connected
users simultaneously

Terminals

Terminals - is a computer, usually with limited processing power, that enables users to send data to
and/or receive information from a server, or host computer

ATM (automated teller machine) - a self-service banking terminal that connects to a host computer
through a network

self-service kiosk - a freestanding terminal that usually has a touch screen for user interaction

supercomputer - the fastest, most powerful computer – and the most expensive

– Capable of processing many trillions of instructions in a single second

Cloud computing - refers to an environment that provides resources and services accessed via the
Internet

Mobile devices

smartphone - is an Internet-capable phone that usually also includes a calendar, an address book, a
calculator, a notepad, games, browser, and numerous other apps

Short Message Service (SMS) Multimedia Message Service (MMS)

- Mobile to mobile -Mobile to mobile


- Mobile to email -Mobile to email
- Mobile to provider
- Web to mobile

digital camera - is a mobile device that allows users to take photos and store the photographed
images digitally

Smart digital camera Point-and-shoot camera SLR camera

Resolution - is the number of horizontal and vertical pixels in a display

portable media player - is a mobile device on which you can store, organize, and play or view digital
media

digital media player or streaming media player - is a device, typically used in a home, that streams digital
media from a computer or network to a television, projector, or some other entertainment device

e-book reader (short for electronic book reader), or e-reader- is a mobile device that is used primarily
for reading e-books and other digital publications

wearable device/wearable - is a small, mobile computing device designed to be worn by a consumer

Game Devices

game console - is a mobile computing device designed for single-player or multiplayer video games

handheld game device - is a small mobile device that contains a screen, speakers, controls, and game
console all in one unit

Game controllers - include gamepads, joysticks and wheels, dance pads, and a variety of motion-sensing
controllers

Embedded Computers - a special-purpose computer that functions as a component in a larger product

Ports and Connections

port -is the point at which a peripheral device attaches to or communicates with a computer or mobile
device so that the peripheral device can send data to or receive information from the computer or
mobile device

connector -joins a cable to a port. A connector at one end of a cable attaches to a port on the computer
or mobile device, and a connector at the other end of the cable attaches to a port on the peripheral
device

USB port - short for universal serial bus port, can connect up to 127 different peripheral devices together
with a single connector

Protecting Hardware

Security measures

- Physical access controls


- Alarm system
- Physical security devices
- Security or device-tracking app
- Require identification

Hardware can fail for a variety of reasons: aging hardware; random events such as electrical power
problems; and even errors in programs or apps

o Undervoltage

o Overvoltage or power surge

surge protector/ surge suppressor - uses electrical components to provide a stable current flow and
minimize the chances of an overvoltage reaching the computer and other electronic equipment

uninterruptible power supply (UPS) - is a device that contains surge protection circuits and one or more
batteries that can provide power during a temporary or permanent loss of power

Health Concerns of Using Technology

A repetitive strain injury (RSI) - is an injury or disorder of the muscles, nerves, tendons, ligaments, and
joints

Computer vision syndrome (CVS) - is a technology-related health condition that affects eyesight

Ergonomics - is an applied science devoted to incorporating comfort, efficiency, and safety into the
design of items in the workplace

Technology addiction - occurs when the technology consumes someone’s entire social life

Lesson 4

Programs and Apps

Program/software, - consists of a series of related instructions, organized for a common purpose, that
tells the computer what tasks to perform and how to perform them

Application/ app - sometimes called application software, consists of programs designed to make users
more productive and/or assist them with personal tasks

• Software is available in a variety of forms:

Retail Custom Web app Mobile app Mobile web app Shareware

Freeware Open source Public domain

Productivity Applications

- can assist you in becoming more effective and efficient while performing daily activities at work,
school, and home

Word processing Presentation Spreadsheet Database Accounting Project management

With productivity applications, users often:


Word processing software - allows users to create and manipulate documents

Presentation software - allows users to create visual aids for presentations to communicate ideas,
messages, and other information to a group

Spreadsheet software -allows users to organize data in columns and rows and perform calculations on
the data

database - is a collection of data organized in a manner that allows access, retrieval, and use of that data

– Database software allows users to create, access, and manage a database

Note taking software - an application that enables users to enter typed text, handwritten comments,
drawings, sketches, photos, and links anywhere on a page

Calendar and contact management software - a application that helps you organize your calendar, keep
track of contacts, and share this information with other users

software suite - is a collection of individual related applications available together as a unit

Project management software -is an application that allows a user to plan, schedule, track, and analyze
the events, resources, and costs of a project

Accounting software - is an application that helps businesses of all sizes record and report their financial
transactions

Personal finance software is a simplified accounting application that helps home users and small/home
office users balance their checkbooks, pay bills, track personal income and expenses, verify account
balances, transfer funds, track investments, and evaluate financial plans

Legal software - is an application that assists in the preparation of legal documents and provides legal
information to individuals, families, and small businesses

Tax preparation software- is an application that can guide individuals, families, or small businesses
through the process of filing federal and state taxes

Document management software- is an application that provides a means for sharing, distributing, and
searching through documents by converting them into a format that can be viewed by any user

A large organization, commonly referred to as an enterprise, requires special computing solutions


because of its size and geographic distribution

Engineering or
Human resources Accounting product Manufacturing
Marketing software
software software development software
software

Software for
Distribution Customer service
Sales software information
software software
technology staff
Graphics and Media Software

Computer-aided design (CAD) Photo editing and


software photo management
software

Desktop publishing software

Video and audio


Paint/Image editing software editing software

Multimedia authoring software allows users to combine text, graphics, audio, video, and animation in an
interactive application

Website authoring software helps users of all skill levels create webpages that include graphics, video,
audio, animation, and special effects with interactive content

media player is a program that allows you to view images and animations, listen to audio, and watch
video files on your computer or mobile device

Disc burning software writes text, graphics, audio, and video files on a recordable or rewritable disc

Personal Interest Applications

Lifestyle Medical Entertainment Convenience Education


applications applications applications applications applications

Communications Applications

Blog Browsing Chat Online Discussion Email File Transfer

Instant Mobile
Internet Phone Videoconference Web Feeds
Messaging Messaging

Security Tools

personal firewall is a security tool that detects and protects a personal computer and its data from
unauthorized intrusions
antivirus program protects a computer against viruses by identifying and removing any computer viruses
found in memory, on storage media, or on incoming files

Spyware is a type of program placed on a computer or mobile device without the user’s knowledge that
secretly collects information about the user and then communicates the information it collects to some
outside source while the user is online

Adware is a type of program that displays an online advertisement in a banner or pop-up or pop-under
window on webpages, email messages, or other Internet services

• spyware remover is a type of program that detects and deletes spyware and similar programs

• adware remover is a program that detects and deletes adware

Pop-up and
Anti-spam Web filtering
Phishing filters pop-under
programs software
blockers
file manager - is a tool that performs functions related to file management

search tool is a program, usually included with an operating system, that attempts to locate a file,
contact, calendar event, app, or any other item stored on your computer or mobile device based on
criteria you specify

uninstaller is a tool that removes a program, as well as any associated entries in the system files

image viewer is a tool that allows users to display, copy, and print the contents of a graphics file, such as
a photo

disk cleanup tool searches for and removes unnecessary files

disk defragmenter is a tool that reorganizes the files and unused space on a computer’s hard disk so that
the operating system accesses data more quickly and programs run faster

– Defragmenting

screen saver is a tool that causes a display device’s screen to show a moving image or blank screen if no
keyboard or mouse activity occurs for a specified time

file compression tool shrinks the size of a file(s)

PC maintenance tool is a program that identifies and fixes operating system problems, detects and
repairs drive problems, and includes the capability of improving a computer’s performance

backup tool allows users to copy, or back up, selected files or the contents of an entire storage medium
to another storage location

restore tool reverses the process and returns backed up files to their original form

Lesson 5

Digital Security Risks


digital security risk is any event or action that could cause a loss of or damage to a computer or mobile
device hardware, software, data, information, or processing capability

computer crime any illegal act involving the use of a computer or related devices

cybercrime is an online or Internet-based illegal act

Unethical
Hacker Cracker Script kiddie Corporate spies
employees

Cyberextortionist Cyberterrorist

Malware - short for malicious software, consists of programs that act without a user’s knowledge and
deliberately alter the operations of computers and mobile devices

botnet is a group of compromised computers or mobile devices connected to a network

- compromised computer or device is known as a zombie

denial of service attack (DoS attack) disrupts computer access to an Internet service

- Distributed DoS attack (DDoS attack)

back door is a program or set of instructions in a program that allow users to bypass security controls

Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate

firewall is hardware and/or software that protects a network’s resources from intrusion

Unauthorized Access and Use

– Acceptable use policy


Unauthorized access is Unauthorized use is the
the use of a computer or use of a computer or its
– Disable file and printer sharing data for unapproved or
network without
permission possibly illegal activities

passphrase is a private combination of words, often containing mixed capitalization and punctuation,
associated with a user name that allows access to certain computer resources

PIN (personal identification number) sometimes called a passcode, is a numeric password, either
assigned by a company or selected by a user

biometric device authenticates a person’s identity by translating a personal characteristic into a digital
code that is compared with a digital code in a computer or mobile device verifying a physical or
behavioral characteristic
Face Hand
Fingerprint
recognition geometry
reader
system system

Voice Signature Iris


system system system

Two-step verification uses two separate methods, one after the next, to verify the identity of a user

Digital forensics is the discovery, collection, and analysis of evidence found on computers and
networks

Information
Law Criminal Military Insurance
security
enforcement prosecutors intelligence agencies
departments
Software Theft

• Software theft occurs when someone:

Illegally registers
Steals software Intentionally Illegally copies a
and/or activates
media erases programs program
a program

license agreement - is the right to use software

Information theft occurs when someone steals personal or confidential information

Encryption is a process of converting data that is readable by humans into encoded characters to
prevent unauthorized access

digital signature is an encrypted code that a person, website, or organization attaches to an electronic
message to verify the identity of the message sender

digital certificate is a notice that guarantees a user or a website is legitimate

website that uses encryption techniques to secure its data is known as a secure site

Hardware Theft, Vandalism, and Failure

Hardware vandalism
Hardware theft is
is the act of defacing
the act of stealing
or destroying digital
digital equipment
equipment

Backing Up – The Ultimate Safeguard


backup is a duplicate of a file, program, or media that can be used if the original is lost, damaged, or
destroyed

– To back up a file means to make a copy of it

• Categories of backups: Three-generation backup policy

- Full Grandparent
- Differential
- Incremental
Parent
- Selective
- Continuous data protection
- Cloud Child

Ethics and Society

Technology ethics are the moral guidelines that govern the use of computers, mobile devices,
information systems, and related technologies

Digital rights management (DRM) - a strategy designed to prevent illegal distribution of movies, music,
and other digital content

code of conduct is a written guideline that helps determine whether a specification is ethical/unethical
or allowed/not allowed

Green computing involves reducing the electricity and environmental waste while using computers,
mobile devices, and related technologies

Information privacy

Information privacy refers to the right of individuals and companies to deny or restrict the collection,
use, and dissemination of information about them

cookie is a small text file that a web server stores on your computer

use of cookies:

Store user Track how


Allow for Assist with Target
names and/or often users visit
personalization online shopping advertisements
passwords a site
Phishing is a scam in which a perpetrator sends an official looking email message that attempts to obtain
your personal and/or financial information

Spyware is a program placed on a computer or mobile device without the user’s knowledge that secretly
collects information about the user and then communicates the information it collects to some outside
source while the user is online

Adware is a program that displays an online advertisement in a banner or pop-up window on webpages,
email messages, or other Internet services
Social engineering is defined as gaining unauthorized access to or obtaining confidential information by
taking advantage of the trusting human nature of some victims and the naivety of others

Employee monitoring involves the use of computers, mobile devices, or cameras to observe, record, and
review an employee’s use of a technology, including communications such as email messages, keyboard
activity (used to measure productivity), and websites visited

Content filtering is the process of restricting access to certain material

Web filtering software restricts access to specified websites

Lesson 6

Inside the Case

Inside the Case- The case contains and protects the electronics of the computer or mobile device from
damage.

motherboard -is the main circuit board of the computer. A computer chip contains integrated circuits.

Control unit- is the component of the processor that directs and coordinates most of the operations in
the computer.

arithmetic logic unit (ALU) performs arithmetic, comparison, and other operations

Processors

Processor - also called the central processing unit (CPU), interprets and carries out the basic instructions
that operate a computer. A

multi-core processor is a single chip with two or more separate processor cores. Processors contain a
control unit and an arithmetic logic unit (ALU).

Processors - The leading manufacturers of personal computer processor chips are Intel and AMD.

• A processor chip generates heat that could cause the chip to malfunction or fail

• Require additional cooling

– Heat sinks

– Liquid cooling technology

– Cooling pads

Cloud Computing- Home and business users choose cloud computing for a variety of reasons.

Analog signals are continuous and vary in strength and quality

Digital signals are in one of two states: on or off


Most computers are digital
The binary system uses two unique digits (0 and 1)
Bits and bytes
Data Representation - The circuitry in a computer or mobile device represents the on or the off states
electronically by the presence or absence of an electronic charge.

Eight bits grouped together as a unit are called a byte. A byte represents a single character in the
computer or mobile device

Memory consists of electronic components that store instructions waiting to be executed by the
processor, data needed by those instructions, and the results of processing the data

Stores three basic categories of items:

-The operating system and other programs

- application

- data being processed and the resulting information

Computers and mobile devices contain two types of memory:

Volatile memory

Loses its contents when power is turned off

Example includes RAM

• Nonvolatile memory

Does not lose contents when power is removed

Examples include ROM, flash memory, and CMOS

Two common types of RAM exist:

- Dynamic RAM(DRAM)
- Static RAM(SRAM)

RAM- chips usually reside on a memory module and are inserted into memory slots.

Memory cache- speeds the processes of the computer because it stores frequently used instructions and
data.

Read-only memory (ROM)- refers to memory chips storing permanent data and instructions

Flash memory- can be erased electronically and rewritten

Access time - is the amount of time it takes the processor to read from memory

- Measured in nanoseconds

adapter card-enhances functions of a component of a desktop or server system unit and/or provides
connections to peripherals
o Sound card and video card

expansion slot- is a socket on a desktop or server motherboard that can hold an adapter card

Plug and Play- the computer automatically can recognize peripheral devices as you install them

Bus- allows the various devices both inside and attached to the system unit to communicate with one
another

– Data bus

– Address bus

Word size- is the number of bits the processor can interpret and execute at a given time

power supply - or laptop AC adapter converts the wall outlet AC power into DC power.

Types of buses

• System bus

• Backside bus

• Expansion bus

Lesson 9

Operating system
Operating system (OS)- is a set of programs that coordinate all the activities among computer or mobile
device hardware

Operating System Functions

user interface (UI)- controls how you enter data and instructions and how information is displayed on
the screen

• How an operating system handles programs directly affects your productivity

Single tasking Foreground


Single user
and and
and multiuser
multitasking background
Memory management- optimizes the use of the computer or device’s internal memory

Virtual memory - is a portion of a storage medium functioning as additional RAM

operating system- determines the order in which tasks are processed


performance monitor- is a program that assesses and reports information about various computer
resources and devices

automatic update- feature that regularly provides new features or corrections to the program

Operating systems often provide users with a variety of tools related to managing a computer, its
devices, or its programs:

File Manager Search Image Viewer Uninstaller Disk Cleanup

Disk
File PC Backup and
Defragmente Screen Saver
Compression Maintenance Restore
r
desktop operating system - is a complete operating system that works on desktops, laptops, and some
tablets

Chrome OS - is a Linux-based operating system designed to work primarily with web apps

Android- is an open source, Linux-based mobile operating system designed by Google for smartphones
and tablets

iOS- developed by Apple, is a proprietary mobile operating system specifically made for Apple’s mobile
devices

Windows Phone- developed by Microsoft, is a proprietary mobile operating system that runs on some
smartphones

You might also like