AICT Lecture 1

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 111

• Course Objectives

• Introduction to ICT
• Information Technology
Course Objectives
 This course provides
 Basic introduction to information and communication
technologies and their application in the workplace.
 Basic understanding of computer software, hardware,
and associated technologies.
 Basic learning about using computers in the workplace.
 Basic knowledge of Internet technologies and how they
can influence the workplace.

10/19/2016 ICT 2
Introduction to ICT
 ICT is the combination of information technology and
communication technology.
 Information technology is all about
 how a computer works and what it can do.
 Devices and programs used to store, retrieve and process
information.
 Communication technology includes
 Electronic systems used for communication between
individuals or groups not physically present at the same
location.
 It is about ways people can talk or write to each other and
exchange messages, pictures or sounds.

10/19/2016 ICT 3
Introduction to ICT
 Information and communication technology
 Is used in every aspect of life as the mobile phones,
computers, emails and internet have become a central
part of every culture and society.
 Has enabled the people to communicate quickly and
efficiently.
 Has contributed a lot towards the elimination of
language barriers

10/19/2016 ICT 4
Introduction to ICT
 Some popular ICT tools are
 Emails
 Instant messaging
 Cellular phones
 Social networking websites such as Facebook and
Twitter.

10/19/2016 ICT 5
Uses of ICT in education

6
Uses of ICT in education
 Increased access to resources
 ICT allows the students to access educational resources
from anywhere at any time. This increased access to
resources is very useful for the students. It is especially
valuable for the students with special needs and
students form rural areas and developing countries.

10/19/2016 ICT 7
Uses of ICT in education
 Provide distant learning
 The learning has become web based with the help of
ICT. It has resulted in the distance learning and online
education.

10/19/2016 ICT 8
Uses of ICT in education
 Supplement traditional learning
 ICT also helps the students in traditional learning.
Students use software programs such as MS Word to
prepare assignments and MS PowerPoint for presenting
their work.

10/19/2016 ICT 9
Information Technology
 IT is the study or use of electronic systems especially
computers for storing, retrieving, and sending
information.
 IT is the technology that uses computing with high
speed communication links to spread information
from one place to another.
 IT is the technology involving the development,
maintenance, and use of computer systems, software,
and networks for the processing and distribution of
data.

10/19/2016 ICT 10
Information Technology

10/19/2016 ICT 11
IT in Society
 Personal Communication
 Conversations (phone, cellular phone)
 Messaging (E-mail, SMS)
 Video Calls
 Entertainment
 Web searching
 Downloading video and audio files
 Interactive gaming
 Day-to-Day living
 Buying airline ticket
 Ordering books
 Electronic banking/ stock market
 Online shopping
12
IT in Society
 Electronic Commerce
 Call Centers
 Electronic transactions
 Online sales
 Business operations
 Operation softwares
 Databases

13
Computers In Society
 Computers at home
 Many homes have multiple computers
 Most American homes have Internet
 Computers are used for
 Business
 Entertainment
 Communication
 Education

1A-14
Components of IT
 Three components of IT are
 Computers
 Communication network
 Know-how
 COMPUTERS: electronic systems that can be
instructed to accept, process, store and present data
and information.

15
Components of IT
 COMMUNICATION NETWORK:
 It is an interconnection of different locations through a
medium that allows people to send and receive
information.
 It allows people and businesses to interact.
 It includes hardware, software and information.
 It helps in easy and quick transfer of information from
one place to another.

10/19/2016 ICT 16
Components of IT
 KNOW-HOW:
 IT know-how includes the familiarity with the tools of
information technology including the internet as well as
the skills needed to use these tools.
 It also includes the understanding of using IT for
problem solving.

17
What is Computer?
 Electronic device
 Converts data into information
 Modern computers are digital
 Older computers were analog

1A-18
Computers For Individual Use
 Desktop computers
 The most common type of computer
 Sits on the desk or floor
 Performs a variety of tasks
 Workstations
 Specialized computers
 Optimized for science or graphics
 More powerful than a desktop

1A-19
Computers For Individual Use
 Notebook computers
 Small portable computers
 Weighs between 3 and 8 pounds
 About 8 ½ by 11 inches
 Typically as powerful as a desktop
 Can include a docking station

1A-20
Computers For Individual Use
 Tablet computers
 Newest development
in portable computers
 Input is through
a pen
 Run specialized
versions of office
products

1A-21
Computers For Individual Use
 Handheld computers
 Very small computers
 Personal Digital Assistants (PDA)
 Note taking or contact management
 Data can synchronize with a desktop
 Smart phones
 Hybrid of cell phone and PDA
 Web surfing, e-mail access

1A-22
Computers For Organizations
 Network servers
 Centralized computer
 All other computers connect
 Provides access to network resources
 Multiple servers are called server farms
 Often simply a powerful desktop

1A-23
Computers For Organizations
 Mainframes
 Used in large
organizations
 Handle thousands
of users
 Users access through a
terminal

1A-24
Computers For Organizations
 Minicomputers
 Called midrange computers
 Powerful between mainframe and desktop
 Handle hundreds of users
 Used in smaller organizations
 Users access through a terminal

1A-25
Computers For Organizations
 Supercomputers
 The most powerful
computers made
 Handle large and
complex calculations
 Process trillions of
operations per second
 Found in research
organizations

1A-26
Basic concepts
 Data and Information
 Digital Technology
 The Computer Advantage
 How Computers Work
 Computers and Computer Systems
 Components of a Computer System
 Categories of Computers
Some Basic Definitions
 DATA is a collection of raw facts and figures, raw
means the facts have not been processed to get their
exact meaning.

 INFORMATION is basically the processed data. It is


an organized and processed form of data. It is more
meaningful than data and is used in making decisions.
Digital Technology……
Digital
 Refers to an electronic signal that is processed, sent, and
stored as bits.
 Bits are represented by “on” and “off” states
Digital Technology
How has digital technology infiltrated your daily life?
 Computer technology powers HDTVs, microwave ovens,
watches, cell phones, and automobiles.
 Embedded chips, computers, networks, and the
Internet and WWW enable us to communicate
globally.
Digital Technology
A computer is an electronic device that
 operates under a set of instructions
 accepts data that a user supplies
 manipulates data according to a program
 produces results
 stores the results
Advantages of Computer
 Speed
 Accuracy
 Use of computers for entertainment, communications,
budgeting, online shopping, homework, playing
games, and listening to music.
 Use of computers in Universities, government
agencies, hospitals, and scientific organizations
 Storage
Computer Network
 A computer network is a group of computers linked to
each other that enables the computer to communicate
with another computer and share their resources, data,
and applications.
Types of computer Networks

34
LAN
A local area network (LAN) is a network confined to
a small geographic area, such as a building, factory,
or college campus.
WAN
 A wide area network (WAN) spans a large geographical
area and might connect a company’s manufacturing
plants dispersed throughout the United States.
Example of WAN
 The Internet is a
worldwide network of
large and small
networks linked
together via
communications
hardware, software,
and media for the
purpose of
communicating and
sharing information.
MAN
 A network where
numerous LANs are
united jointly through a
networking device is
known as Bridge, and it
forms a MAN
(metropolitan area
network).

1A-38
PAN
 Personal Area Network
is a network arranged
within an individual
person, typically within
a range of 10 meters.
 Personal Area Network
covers an area of 30
feet.

1A-39
The Web, Browsing the Web
 World Wide Web – a system of linked computer
networks that allows users to move from one site to
another by way of links on Web pages
 Web page – an electronic document stored on a
computer running the Web site
 Search engine – a software program that locates and
retrieves requested information
Types of Data
 Text data – letters, numbers, and special characters
 Graphic data – photographs, charts, and drawings
 Audio data – voice and music
 Video data – moving pictures and images
How Computers Work

During the information processing cycle, data is entered


into a computer, processed, sent as output, and stored (if
required for future use).
Computers and Computer Systems
A personal computer
system includes
 The system unit
 Input devices
 Output devices
 Storage devices
 Communications
devices
Components of a Computer System
Parts of a Personal Computer System
 The system unit – the electronic components
process data into info
 Input devices – allow users to enter instructions,
data, and commands into computers (keyboard,
mouse, microphone)
 Output devices – make information available to the
user (display screen, printer)
Components of a Computer System
Parts of a Personal Computer System
 Storage devices – provide for permanent storage of
programs, data, and information
 Communications devices – allow a user to exchange
instructions, data, and information with other computer
users
Network Technology
 Definition: The technology which is used to exchange
the data between small and large information.
 This technology can be used in educational
institutions as well as businesses. Network technicians
know the installation; configuration &
troubleshooting of the network technology and this
can be used to send digital data like audio, data and
visual files. By using networking, users can send
messages, files through e-mail or other channels based
on the organization’s requirement.

46
Applications of Network Technologies
 Network technology is essential for remote application
access, secure data storage, and efficient distribution
of media.
 Network technology has become integral to our
modern-day existence and is essential for businesses in
today's highly connected world.

47
Wired Network
 Wired networks, also called Ethernet networks is
simply a collection of two or more computers, printers,
and other devices linked by Ethernet cables.
 Ethernet is the fastest wired network protocol, with
connection speeds of 10 megabits per second (Mbps)
to 100 Mbps or higher.
 Wired networks can also be used as part of other
wired and wireless networks.•
 To connect a computer to a network with an Ethernet
cable, the computer must have an Ethernet adapter
(sometimes called a network interface card, or NIC).
48
Wireless Network
 The term wireless refers to the communication or
transmission of information over a distance without
requiring wires, cables or any other electrical
conductors.
 Wireless communication is one of the important
mediums of transmission of data or information to
other devices.
 The Communication is set and the information is
transmitted through the air, without requiring any
cables, by using electromagnetic waves like radio
frequencies, infrared, satellite, etc.
49
Types of Wireless
Communication Technologies
 In recent days, the wireless communication
technology has become an integral part of several
types of communication devices as it allows users to
communicate even from remote areas.
 The devices used for wireless communication are
 cordless
 Telephones
 Mobiles
 ZigBee technology
 wireless computer parts etc. 50
Wi-Fi
 Wi-Fi is a form of low-power wireless communication
used by many electronic devices such as laptops,
systems, smart phones, etc.
 In a Wi-Fi setup, a wireless router serves as the
communication hub. These networks are extremely
limited in range due to low power of transmissions
allowing users to connect only within close proximity
to a router or signal repeater.
 Provides portability without any need of cables.
 Wi-Fi networks need to be secured with passwords for
security purposes in order not to be accessed by others
51
Advantages
 Ease of Integration and Convenience
 Mobility
 Expandability.

52
Disadvantages
 Range will be insufficient for a larger structure - and,
in order to increase its range, repeaters or additional
access points have to be purchased.
 The speed on most wireless networks will be slower
than the slowest common wired networks.•
Installation of an infrastructure-based wireless
network is a complex to set up.

53
Bluetooth
 Bluetooth technology allows you to connect a variety
of different electronic devices wirelessly to a system for
the transfer and sharing of data
 Cell phones are connected to hands-free earpieces,
wireless keyboard, mouse and mike to laptops with the
help of Bluetooth as it transmits information from one
device to other device.

54
 Bluetooth technology uses radio waves to
communicate between devices. Most of these radio
waves have a range of 15-50 feet.
 Bluetooth uses a low-power signal with a maximum
range of 50 feet with sufficient speed to enable
transmission of data.
 The pairing process identifies and connects any two
devices to each other. It also prevents interference
from other non-paired Bluetooth devices in the area. It
uses maximum power only when it is required, thus
preserving battery life.

55
ZigBee
 ZigBee devices are designed for low-power
consumption.
 ZigBee is used in Commercial Applications like
sensing and monitoring applications.
 ZigBee uses very low power and extremely long device
battery life.
 ZigBee gives flexibility to do more with the reliable
wireless performance and battery operation.

56
Infrared
 Infrared is a media transmission system that transmits
data signals through light emitting diodes (LEDs) or
Lasers.
 Infrared is an electromagnetic energy at a wavelength
which is longer than that of the red light.
 The information cannot be travelled through obstacles
in an infrared system, but can be inhibited by light.
 One type of infrared is the point to point system in
which transmission is possible between two points
limited to a range and line of sight.
57
• Software
• Types of Software
• Difference between system and application
software
• Operating Systems
• Types of Operating systems
• Utility programs
Software
 A set of instructions given to the computer to solve a
program is called software.
 It is also known as program.
 A computer works according to the instructions
written in software.
Types of Software
 Two main types of software are
 System software
 Application software
 System software is set of programs to control and manage
the actual operations of a computer hardware by
 Controlling the usage and allocation of hardware resources.
 Enabling application programs to execute properly.
 Systems software carries out middleman tasks to ensure
communication between other software and hardware.
System Software
 Two main types of system software are
 Operating system
 Utility programs
 Operating system is a software that communicates
with the hardware and allows other software to run.
 Utility program is a software that is used for effective
management of computer system, it keeps the
computer system running smoothly.
Application software
 Application software is a program or group of
programs designed for end users.
 People use application software according to their
needs.
 Examples of an application include a word processor, a
spreadsheet, a web browser, a media player or a photo
editor.
Difference between
system and application software
Operating System
 An operating system (OS) is a set of programs that
manages all computer components and operations.
 Users interact with computer through operating
systems.
 Operating systems must be installed on every
computer, a computer can do nothing without an
operating system.
 Some examples are Windows, Linux, Unix and Mac
OS.
Operating System
 When a computer is turned on, the OS runs and
checks that all parts of computer are functioning
properly.
Operating System
 Multiuser operating system
 It allows multiple users to use same computer at same
time e.g. Linux, Unix and Windows server 2008.
 Multiprocessor operating system
 It supports two or more processors running programs at
the same time e.g. Linux, Unix and Windows server
2008.
Operating System
 Multitasking operating system
 It can execute more than one programs at the same time
e.g. Unix and windows 8.1
 Time sharing operating system
 It allows many users to share the computer
simultaneously. It is used when several users are linked
through communication networks to a single computer.
Functions of Operating System
 An OS performs following functions
 Booting
 Memory management
 Job scheduling
 Device controlling
 Accessing the web
 Monitoring performance
 Housekeeping services
 Administrating security
 Providing user interface
Types of operating systems
 A stand alone operating system works on a desktop
or laptop computer.
 Some stand alone operating systems can work with a
server operating system and are called client operating
system.
 Some examples are DOS, Windows, Unix, Linux and
Mac OS.
 Windows is the most widely used OS developed by
Microsoft.
Types of operating systems
 A server operating system is an operating system
that is designed to support a network.
 It is also called network operating system.
 It usually resides on a server and client computers on
the network depend on the server for resources.
 Some examples are Windows Server 2012, OS X Server,
Sun Solaris, NetWare,
Types of operating systems
 Mobile operating system is an operating system that
is used in handheld computers and mobile devices.
 It provides graphical user interface (GUI) and other
features such as touch screen support, navigation
systems, speech recognition, wireless connectivity etc.
 Some examples are Android, iOS, Windows phone and
BlackBerry.
Utility Programs
 Utility program is a software that is used for effective
management of computer system.
 It keeps the computer system running smoothly.
 Users can use utility programs to perform maintenance
tasks related to different devices and programs.
 Most operating systems include different built-in
utility programs.
Types of Utility Programs
 Different types of utility programs are
 Antivirus
 It is an application that is certain to be installed on every
operating system, especially in the operating system
Windows. Because without Anivirus, the operating
system will be very high risk of loss or damage to a
number of data and theft of sensitive data can occur
with all hacking techniques.
 Examples of popular antivirus applications such as
Avast, SmAdav, AVG, BitDevender, and so forth. The
variants of antivirus are also varied, some are paid and
some are free.
Types of Utility Programs
 Archivers and Data Compression
 Software that can make a file into an archive and can
also reduce or compress its size.
 An example is when you have 80 pdf files that you will
send via email to your co-workers. If you want to send
one file at a time, as many as 80 pdf files through
attachment tools in the email, then that will be very
troublesome for you. You can send as many as 80 pdf
document files by archiving them in a .zip file and
sending them via email.
 Some examples are WinZip, WinRAR, 7-Zip, FilZip
Types of Utility Programs
 Backup Software
 If the WinZip and FilZip software as above can be used
to create an archive of a file, then the backup software
can be used to create an archive from the hard disk drive
partition.
 That way it can also be said that the data to be archived
is the entire partition. As for some software that can
perform backup needs, such as Nova Backup software,
Norton Ghost and others.
Types of Utility Programs
 Recovery Software
 Data is an asset that is very important for today's
technological life. Indeed a number of data that you
have deleted or when you do quick form disk, that means
only the database table is left blank.
 Some of your actual old data is still in storage and has
not been completely erased. So because of that, we can
still restore power that has been erased by using data
recovery software. Some data recovery software, such as
Recuva, TestDisk, and so forth.
Types of Utility Programs
 Software Uninstaller
 You all must have uninstalled some of the software that
is on your computer. By uninstalling the software, you
no longer need the application. But have you ever found
an application that cannot be uninstalled? If true, then
you can overcome it with an uninstaller software.
 Some kinds of uninstaller software such as REVO
uninstaller, IObit Uninstaller, Geek Uninstaller, and so
on.
Types of Utility Programs
 Disk Cleaner
 Disk cleaner software works to clean the files on the
hard disk drive that is no longer useful. Usually we
mention it with junk files, that way, the free space on the
hard disk drive can be optimized.
 An example of this Disk Cleaner application is CCleaner.
Where the application has the main feature to clean disk
files that are no longer useful.
Types of Utility Programs
 Disk Defragmenter
 On an operating system Windows There is already a
built-in app that has the name Disk Defragmenter. The
tool is useful for defragmenting a hard disk drive
partition, so that the free space on the hard disk drive
can be optimized and then the process of reading data
inside will be faster.
 To defragment, you can also use the application.
Examples of applications for disk defragmenter are
smart defrag, spin defrag, disk speed up and so on.
Types of Utility Programs
 Driver Scanner
 Driver Scanner is a tool that is easily used to be able to
scan a computer for drivers, identify those who are out
of date, incompatible, or damaged. Application to scan
the driver is the Scanner Driver.
Types of Utility Programs
 Task Manager Utility
 Windows task manager appears when the user presses
CTRL+ALT+DEL keys.
 It displays information about programs and processes
running on the computer.
 It also displays data about CPU and memory usage.
© Educational Technology Department, Group
Head Office, The City School. 82
Generations of Computer
 The computer has evolved from a large-sized simple
calculating machine to a smaller but much more
powerful machine.

 The evolution of computer to the current state is


defined in terms of the generations of computer.

 Each generation of computer is designed based on a


new technological development, resulting in better,
cheaper and smaller computers that are more
powerful, faster and efficient than their predecessors.
83
Generations of Computer
 Currently, there are five generations of computer. In
the following subsections, we will discuss the
generations of computer in terms of the technology
used by them (hardware and software), computing
characteristics (speed, i.e., number of instructions
executed per second), physical appearance, and their
applications.

84
First Generation Computers
(1940-1956)
 The first computers used vacuum tubes(a sealed glass tube containing
a near-vacuum which allows the free passage of electric current.) for
circuitry and magnetic drums for memory.
 They were often enormous and taking up entire room.
 First generation computers relied on machine language.
 They were very expensive to operate and in addition to using a great
deal of electricity, generated a lot of heat, which was often the cause of
malfunctions(defect or breakdown).
 The UNIVAC and ENIAC computers are examples of first-generation
computing devices.

85
First Generation Computers
Advantages :
 It was only electronic device
 First device to hold memory

Disadvantages :
 Too bulky i.e. large in size
 Vacuum tubes burn frequently
 They were producing heat
 Maintenance problems 86
Second Generation Computers
(1956-1963)
• Transistors replaced vacuum tubes and ushered in the
second generation of computers.
• Second-generation computers moved from
cryptic binary machine language to symbolic.
• High-level programming languages were also being
developed at this time, such as early versions
of COBOL and FORTRAN.
• These were also the first computers that stored their
instructions in their memory.

87
Second Generation Computers
Advantages :
 Size reduced considerably
 The very fast
 Very much reliable

Disadvantages :
 They over heated quickly
 Maintenance problems
88
Third Generation Computers
(1964-1971)
 The development of the integrated circuit was the
hallmark of the third generation of computers.
 Transistors were miniaturized and placed
on siliconchips, called semiconductors.
 Instead of punched cards and printouts, users
interacted with third generation computers
through keyboards and monitors and interfaced with
an operating system.
 Allowed the device to run many
different applications at one time.
89
Third generation computers
Advantages :
 ICs are very small in size
 Improved performance
 Production cost cheap

Disadvantages :
 ICs are sophisticated

90
Fourth Generation Computers (1971-present)
 The microprocessor brought the fourth generation of
computers, as thousands of integrated circuits were
built onto a single silicon chip.
 The Intel 4004 chip, developed in 1971, located all the
components of the computer.
 From the central processing unit and memory to
input/output controls—on a single chip.
 . Fourth generation computers also saw the
development of GUIs, the mouse and
handheld devices.
91
Fourth Generation Computers

92
Fifth Generation Computers
(present and beyond)
 Fifth generation computing devices, based on artificial
intelligence.
 Are still in development, though there are some
applications, such as voice recognition.
 The use of parallel processing and superconductors is
helping to make artificial intelligence a reality.
 The goal of fifth-generation computing is to develop
devices that respond to natural language input and are
capable of learning and self-organization.

93
Fifth Generation Computers

94
Contents
 Introduction
 Types of Malware
 Viruses
 Trojan Horse
 Spyware
 Adware
 Worms
 Protection from Malware
Digital Privacy and Security
What is a malware ?
 A Malware is a set of instructions that run on your
computer and make your system do something that an
attacker wants it to do.
 Malware, or malicious software, is any program or file
that is intentionally harmful to a computer, network or
server.
Virus
 A virus is a small piece of software that convey on real
programs in order to get executed
 Once it’s running, it spreads by inserting copies of
itself into other executable code or documents
Typical things that some current Personal
Computer (PC) viruses do
 Display a message
 Erase files
 Scramble data on a hard disk
 Cause erratic screen behavior
 Halt the PC
 Many viruses do nothing obvious at all except
spread!
Typical things that some current Personal
Computer (PC) viruses do
 Display a message
Worms
 Worm - is a self-replicating program, similar to a
computer virus. A virus attaches itself to, and
becomes part of, another executable program;
however, a worm is self-contained and does not
need to be part of another program to propagate
itself.
Worms…
 Worms – is a small piece of software that uses
computer networks and security holes to
replicate itself. A copy of the worm scans the
network for another machine that has a specific
security hole. It copies itself to the new machine
using the security hole, and then starts
replicating from there, as well.
 They are often designed to exploit the file
transmission capabilities found on many
computers.
Zombies
 Infected computers — mostly Windows machines —
are now the major delivery method of spam.

 Zombies have been used extensively to send e-mail


spam; between 50% to 80% of all spam worldwide is
now sent by zombie computers
Distributed Denial of Service
 A denial-of-service attack is an attack that causes a
loss of service to users, typically the loss of network
connectivity and services by consuming the
bandwidth of the victim network or overloading the
computational resources of the victim system.
 Trojan Horse is designed to appear as a
legitimate/genuine software program to gain access
to a system. Once activated following installation,
Trojans can execute their malicious functions.
 Spyware collects information and data on the
device and user, as well as observes the user's activity
without their knowledge.
 Ransomware infects a user's system and encrypts
its data. Cybercriminals then demand a ransom
payment from the victim in exchange for decrypting
the system's data.
 A rootkit obtains administrator-level access to the victim's
system. Once installed, the program gives threat actors
root or privileged access to the system.
 A backdoor virus or remote access Trojan (RAT) secretly
creates a backdoor into an infected computer system that
enables threat actors to remotely access it without alerting
the user or the system's security programs.
 Adware tracks a user's browser and download history with
the intent to display pop-up or banner advertisements that
lure the user into making a purchase. For example, an
advertiser might use cookies to track the webpages a user
visits to better target advertising.
 Keyloggers also called system monitors, track nearly
everything a user does on their computer. This includes
emails, opened webpages, programs and keystrokes.
Prevention
 Updates
 Anti-Viruses
 More secure operating systems
e.g. UNIX
How to detect malware
 Users may be able to detect malware if they observe unusual
activity such as a sudden loss of disk space, unusually slow
speeds, repeated crashes or freezes, or an increase in
unwanted internet activity and pop-up advertisements.
 Antivirus and antimalware software may be installed on a
device to detect and remove malware. These tools can
provide real-time protection or detect and remove
malware by executing routine system scans.
 Windows Defender, for example, is Microsoft antimalware
software included in the Windows 10 operating system (OS)
under the Windows Defender Security Center. Windows
Defender protects against threats such as spyware, adware
and viruses.
Digital Security and Privacy
 Digital privacy and safety refer to the protection of
individuals' personal information and security while
using digital devices, technologies, and the internet.
Digital privacy refers to the ability to control access
to personal information, while digital
security/safety refers to the measures taken to
ensure the security of digital devices and data.
 Digital security pertains to protecting your digital
assets and stay anonymous online by safeguarding
personally identifiable information such as names,
addresses, and credit card details.
How Can We Protect Digital Privacy?
Digital privacy can be protected through various
measures, such as
 using strong passwords. Strong passwords are
vital to good online security.
 encrypting data, Control access to data and
systems
 Put up a firewall
 Use security software
 Update programs and systems regularly
 Monitor for intrusion
Assignment:
Explain Input And Output Devices

111

You might also like