Mrs. Cueni IC3 Certification Study Guide. Chapter 1 Hardware and Peripherals Computer Systems are...
126
IC3 Training Two Minute Drills Mrs. Cueni IC3 Certification Study Guide
Mrs. Cueni IC3 Certification Study Guide. Chapter 1 Hardware and Peripherals Computer Systems are generally categorized in 4 primary groups Desktop Portable
Chapter 1 Hardware and Peripherals Computer Systems are
generally categorized in 4 primary groups Desktop Portable Handheld
Embedded
Slide 3
Chapter 1 Hardware and Peripherals A Desktop computer or
personal computer (PC) is the most frequently used computer system
A desktop consists of 4 major component groups System unit Monitor
Keyboard and mouse Peripheral devices
Slide 4
Chapter 1 Hardware and Peripherals The components inside the
system unit are: Computer case Motherboard CPU Memory Cooling
system Power supply Storage devices
Slide 5
Chapter 1 Hardware and Peripherals Portable computers
lightweight, transportable PCs Notebook PC Laptop PC Tablet PC PDAs
Personal Digital Assistants Subnotebook PCS Wearable computers
Slide 6
Chapter 1 Hardware and Peripherals Embedded computers is a
self-contained system with its hardware and electron mechanical
parts integrated into a single device Cars Sewing Machine
Manufacturing equipment
Slide 7
Chapter 1 Hardware and Peripherals Standard input devices on a
PC Keyboard and mouse Serve two purposes User to command and
control the PC A Way to capture and enter data
Slide 8
Chapter 1 Hardware and Peripherals A mouse converts motion into
electrical signals that track the pointer Two types of mice
Optomechanical- ball and rollers move mechanically LED and sensors
track motion Optical Other input devices Trackpads, trackballs and
joysticks
Slide 9
Chapter 1 Hardware and Peripherals Output devices Monitor
(displays) CRT uses electronic guns and phosphor LCD flat panel
uses liquid crystal display Networking devices Audio systems
Computer speakers external better sound than internal speakers
Slide 10
Chapter 1 Hardware and Peripherals Other input devices Digital
cameras USB connection or CF cards Compact Flash memory Image
scanners saves in in BMP, GIF, JPEG, PNG or TIFF File format
Joysticks tracks movement from a center point Game controllers-
better level of control
Slide 11
Chapter 1 Hardware and Peripherals Output devices printers Dot
matrix multipart forms Inkjet- good quality print inexpensive Laser
printers high-quality results
Slide 12
Chapter 1 Hardware and Peripherals Peripheral devices Internal
connect to the PC through expansion cards PC card slot External
peripherals connects through a devices cable to a jack or port of
computers Device driver software than communicates with the
hardware device and the OS (operating system)
Slide 13
Chapter 1- IC3 test Information from this chapter will be used
throughout the test and it is assumed that you already know this
The different computer types and applications Peripheral devices
used for inputting data and outputting data The process used to
install or connect a peripheral device to a computer
Slide 14
Chapter 2 Internal Hardware Everything a computer does is
controlled by a microprocessor or CPU The CPU is a multifunctional
integrated circuit that is made up of Control unit CU Arithmetic
logic unit ALU Memory management unit MMU Registers
Slide 15
Chapter 2 Internal Hardware Bus system carries signals,
addresses and data that needs to be transferred between the CPU,
motherboard, I/O ports and expansion cards Types of bus structures
Data bus Address bus Control bus
Slide 16
Chapter 2 Internal Hardware Processor kept at its designed
operating temperature Too hot shuts down, performs poorly, gets
damaged Heat sinks and fans help cool the processor
Slide 17
Chapter 2 Internal Hardware Processors are attached to a
motherboard through two types of mounting sockets PGA-pin grid
array have holes where the pins of the processor fit LGA-land grid
arrays pins make contact with the pins of the processor
Slide 18
Chapter 2 Internal Hardware Chipset- allows PC to accept,
display and move data Northbridge set controls and supports the
main memory, cache memory and PCI bus controllers Southbridge set-
peripheral devices and devices not essential to the PC
Slide 19
Chapter 2 Internal Hardware ROM Read Only Memory Non-volatile
and retains its contents without a power source Stores PC startup
instructions and the system BIOS Three types PROM, EPROM and EEPROM
RAM- Random Access Memory Volatile and stores data as long as there
is a power source RAM upgrades and replacement must match the PCs
CPU and bus speed Most common type DRAM refreshed every 2
milliseconds
Slide 20
Chapter 2 Internal Hardware SDRAM is refreshed only when data
is written to it SDRAM faster than DRAM SDRAM is commonly used for
cache memory DRAM is common for system memory
Slide 21
Chapter 2 Internal Hardware Memory modules come in three types
SIMMs singleinline memory modules Memory chips on one side of the
circuit card DIMMS double-inline memory module current memory
standard Memory chips on both sides of the circuit card SODIMMS
smaller DIMMS for notebook
Slide 22
Chapter 2 Internal Hardware Front Side bus FSB specific path
that connects the CPU and the RAM, the device controllers and the
expansion bus
Slide 23
Chapter 2 Internal Hardware Cache memory fast memory used for
frequently requested data and instructions Cache is located between
RAM and the CPU Reduces access time Two types L1 - internal cache
L2 external cache
Slide 24
Chapter 2 Internal Hardware Storage Media Hard disk drive
secondary storage media Platters where data is stored on a HDD Two
types of material for platters aluminum alloys and glass Most hard
drives have two platters Accessed by a read-write head Hard drive
platters are coated with a thin film medium
Slide 25
Chapter 2 Internal Hardware Each side of the platter has one
read-write hear The read write heads moves in unison connected by
the same actuator mechanism The read-write head uses magnetic flux
to record data
Slide 26
Chapter 2 Internal Hardware Factors that Affect Computer
Performance How well the CPU, memory and bus are aligned A wider
data bus can speed up data transfer High end motherboards and
chipsets will allow you to separate the data and the address buses
Install a motherboard, chipset, caching, RAM and processor that use
synchronous clocking Read manufacturers recommendations for the
best memory size make sure speeds of the CPU, cache, FSB and RAM
match
Slide 27
Chapter 2 Internal Hardware Run defragment software on your
hard disk to better arrange the stored data for faster retrieval
Install a virus scanner that looks for viruses, spyware, adware and
malware Monitor the Windows task managers CPU and RAM utilization
graphics Poor computer performance sometimes is based on a bad
configuration of the operating system
Slide 28
Chapter 2 IC3 test 1-2 questions of test over this chapter
understand the following: The purpose and use of the components
that make up the CPU How primary memory is used in the storage of
data and in the execution of program instructions The different
types of storage media **The components, features, configuration
settings that can impact the performance of a computer
Slide 29
Chapter 3 Power & Environmental Secure the area where the
PC sits locked room Physically restrict the movement of the PC
lockdown Key locks to prevent keyboard or mouse usage Cable locks
to secure to a desk or table BIOS locks lowest level of security
password needed Windows XP and Vista press Windows logo key and the
L (lock) key you need to enter the password to get back in
Slide 30
Chapter 3 Power & Environmental Environment Smoke, fire,
heat, water, foam and tiny particles of burnt material can damage
computers Dust and debris- cause the cooling fan to bring the dust
into the computer components Dry environments - Static electricity
Humidity moisture in the air can damage parts
Slide 31
Chapter 3 Power & Environmental Public Power System
High-voltage periods over- voltage, spikes or surges can burn/fry
PC components Low-voltage periods under-voltage, brownouts Six
types of electrical events EMI electromagnetic interference
equipment in house RFI radio frequency interference fluctuations in
power Power surges lightning storms Power spikes sudden high
over-voltage event Power sags temporary dip in the voltage
Brownouts when demand exceeds supply Blackouts total loss of
power
Slide 32
Chapter 3 Power & Environmental Devices that help Surge
suppressor suppress power surges Should include an MOV metal-oxide
varistor which redirects the current to the ground Line conditioner
controls surges and spikes and eliminate electric noise UPS
Uninterruptible power supply protects against brownouts and
blackouts
Slide 33
Chapter 3 IC3 test Physical risks to a computer Theft or
malicious damage Environmental issues Electrical power risks
Slide 34
Chapter 4 Maintaining & Troubleshooting Most common
hardware issues Electrical power source I/O switch Device
connections Device configuration Device drivers
Slide 35
Chapter 4 Maintaining & Troubleshooting Cleanliness is the
best prevention for hardware issues Hardware issues caused by poor
maintenance Poor system case cooling and ventilation Slow hard disk
performance Power supply degradation Keyboard and mouse issues
Slide 36
Chapter 4 Maintaining & Troubleshooting Preventative
maintenance by users include cleaning, checking and scanning
activities such as: Virus scanning Cleaning PC exterior Disk drive
scanning Checking power protection devices
Slide 37
Chapter 4 Maintaining & Troubleshooting Leave the following
to an expert: Internal components of a monitor Power supply
Microprocessor Memory Electrical connections in the system
case
Slide 38
Chapter 4 Maintaining & Troubleshooting Professional
computer technician Cleaning the inside of the case Checking cables
and expansion cards Checking or replacing power supply Installation
or major upgrades to computer components Upgrading the BIOS
Slide 39
Chapter 4 Maintaining & Troubleshooting General
troubleshooting - 5 step process Identify the symptoms of the
problem Replicate the problem Evaluate all possible causes fro the
problem Diagnose each of the possible causes and isolate the likely
cause Apply a correction, configuration, repair or replacement to
solve the problem
Slide 40
Chapter 4 Maintaining & Troubleshooting Keep a maintenance
log of past problems it can be valuable when troubleshooting issues
Questions to ask When did this first happen? Is this the first time
this happened? What activity was being performed? Can the problem
be recreated? Did you add hardware or software to the PC right
before the problem? Is there a weather or environmental issue
present?
Slide 41
Chapter 4 Maintaining & Troubleshooting Good staring point
for unidentified problems: power sources/supply Also, include the
PCs environment when diagnosing issues
Slide 42
Chapter 4 Maintaining & Troubleshooting Processor issues
due to: Issue with cooling of processor Power supply Compatibility
issue with the motherboard and chipset Symptoms of processor
failure The PC wont boot The PC boots, but OS doesnt start PC
crashes during startup PC suddenly has parity errors integrity of
the data PC locks up after a few minutes of operation
Slide 43
Chapter 4 Maintaining & Troubleshooting Hard Disk problems
caused by: Hard disk drive Hard disk controller SCSI host adapter
Cabling Power supply
Slide 44
Chapter 4 Maintaining & Troubleshooting RAM problems caused
by: After new memory is installed Electrical problems on the
motherboard Configuration of RAM Compatibility of RAM Improper
installation of RAM
Slide 45
Chapter 4 Maintaining & Troubleshooting Video performance
issues: Power or data connection issues Video configuration Monitor
compatibility Device driver issues
Slide 46
Chapter 4 Maintaining & Troubleshooting Power supply issues
Use a multimeter to check for proper voltage on each power
connector
Slide 47
Chapter 4 Maintaining & Troubleshooting To diagnose audio
or sound issues Verify that there are no system resource conflicts
Speakers are plugged into the jacks Speaker wire is not crimped or
broken Proper device drivers are installed
Slide 48
Chapter 4 Maintaining & Troubleshooting Keep in mind
computer technicians do not have the same abilities Guidelines when
selecting a technician: Certifications IC3, Comp TIA A+ References
Warranties do they offer warranties on their work? Years of
experience more experience might be more efficient
Slide 49
Chapter 4 IC3 test At least two questions on computer hardware
and software problems and troubleshooting
Slide 50
Chapter 5 Computer Software Software is divided into three
groups System software Utility software Application software
Slide 51
Chapter 5 Computer Software System software creates and manages
the foundation structure on which other software operates Utility
or special purpose software performs tasks that help the operating
system Applications is task oriented software and assists a user to
perform a work or recreational task
Slide 52
Chapter 5 Computer Software CPU uses a fetch-decode-execute
cycle to obtain instructions from memory Fetch requests
instructions to be provided from CPU, RAM, cache, storage or a
register device Decode- certain opcodes have certain functions so
there is no overlap 04 Add E6 - output to port Executes performs
the opcode through the CPU
Slide 53
Chapter 5 Computer Software 4 primary actions opcodes perform
Control operations Data processing Input/output Data transfer
Slide 54
Chapter 5 Computer Software A buffer is memory used to hold
data in transit especially when the sending device has a faster
transfer rate than the receiving device
Slide 55
Chapter 5 Computer Software PC architecture has system
resources that are assigned to specific devices to facilitate
requests for service Interrupts CPU checks this after each
instruction is executed making sure the request for service has
been made I/O addresses CPU assigns an address to that instruction
hexadecimal number DMA channels allows devices to read or write
directly to and from memory without intervention from the CPU
Direct memory access
Slide 56
Chapter 5 Computer Software PC system resources are viewed
through the Windows Device manager A device driver is the interface
between the hardware device and the operating system and
application software
Slide 57
Chapter 5 Computer Software A software license grants a user to
install and use software according to the rules in the EULA End
User License Agreement Three types of software licenses Free
licenses Open source licenses Proprietary licenses
Slide 58
Chapter 5 Computer Software Software upgrade replaces an
installed version of a software package with a completely new
version Software update applies a patch and corrections to an
installed version of a software package.
Slide 59
Chapter 5 IC3 test Three primary types of software: System
software Applications software Utility software Give examples of
software under each category How hardware interacts with system
software, how application software interacts with system software
How and when utility software is used
Slide 60
Chapter 6 Application Software
Slide 61
Chapter 17 Data communications Basics Digital Signals transmits
on two primary frequencies Analog signals use multiple frequencies
and amplitudes to represent data. Requires a frequency spectrum to
transmit sound and data
Slide 62
Chapter 17 Data communications Basics Modern networks are
digital networks Modem translates between digital and analog
signals Modulates digital signals into analog signals for
transmission Demodulates received analog signals to digital
format
Slide 63
Chapter 17 Data communications Basics Protocol set of rules
that govern devices to transmit data Most common protocols for LANs
and WANs are the TCP/IP suite Protocols are most influenced by the
OSI model First Seven steps Ensures networks can communicate with
others
Slide 64
Chapter 17 Data communications Basics Protocols are modelled
from the OSI model Open System Interconnect (OSI) Reference Model 7
layers each layer identifies an operation that must occur in a
network data communication Physical Data Link Network Transport
Session Presentation Application
Slide 65
Chapter 17 Data communications Basics As data is transferred in
is divided into packets called Protocol Data Units (PDU) Data
transmitted over wires and through air use radio frequency (RF)
signaling that can be intercepted. Needs to be encrypted Network
security provided by TCP/IP
Slide 66
Chapter 17 Data communications Basics Standard wiring used in
networks is called TP cable (twisted pair) UTP unshielded twisted
pair doesnt include shielding STP- Shielded twisted pair have foil
or metallic shielding
Slide 67
Chapter 17 Data communications Basics Cable categories for
Twisted Pair (TP) CAT 5 CAT 5e CAT 6 Varies in number of wire
pairs. Twists per inch, bandwidth, usage, maximum segment
length
Slide 68
Chapter 17 Data communications Basics Coaxial cable Single core
wire encased in a layer of insulation, wrapped in wire mesh and
enclosed in plastic Used when a more robust cable is needed for
damp, exposed or short vertical installations
Slide 69
Chapter 17 Data communications Basics Fiber Optic Higher
bandwidth than TP or coaxial Can be single mode or multimode
Single-mode carries a single signal over long distances Multimode
carries multiple signals over shorter distances
Slide 70
Chapter 17 Data communications Basics TP Twisted pair use the
RJ-45 connector on the end Coaxial cable terminated with a BNC
connector named after Bayonet Neill-Concelman connector Can use an
F connector for cable TV Fiber Optics connectors are SC, ST, LC and
MT
Slide 71
Chapter 17 Data communications Basics Securing a network
Authentication verifies users by username and password
Authorization determines actions and accesses the user has been
granted
Slide 72
Chapter 17 Data communications Basics Use a strong password to
avoid unauthorized access Sufficient length Variety of characters
Easy to remember
Slide 73
Chapter 17 Data communications Basics Network threats try to
occupy the network router or server The most common types if
network home threats are DoS Denial of Service and IP spoofing page
482
Slide 74
Chapter 17 Data communications Basics A firewall performs
packet filtering and denies access to internal networks from
external sources
Slide 75
Chapter 17 Data communications Basics Wireless security systems
are MAC Media Access Control address filtering WPA Wi-Fi Protected
Access WEP Wired Equivalent Privacy
Slide 76
Chapter 18 Network Basics A network is an arrangement the
interconnects two or more computers for the purpose of sharing
resources. A network varies in size and scope. It can be small
enough for a company or large enough for a whole company The
biggest network in the Internet
Slide 77
Chapter 18 Network Basics Network topology is the pattern of
how the computers are arranged Five basic topologies Peer-to-peer
Bus Star Ring Mesh
Slide 78
Chapter 18 Network Basics Peer-to-peer Most primitive As you
connect computers in a daisy chain fashion Practical limit of 10-15
Bus Designed around a primary network cable Computers connect to
the main network cable Use hub switch or tap
Slide 79
Chapter 18 Network Basics Star Connects computers or nodes to a
signal source Each computers has a dedicated bandwidth Ring The
network backbone is arranged in a loop Devices connect to the ring
through MSAUs Multiple- station access units (smart hubs)
Slide 80
Chapter 18 Network Basics Mesh Connects each node to all other
nodes The benefit is that the nodes can communicate with each other
even when direct connectivity is lost
Slide 81
Chapter 18 Network Basics Two types of networks LAN Local Area
Network Must have at least two computers Exists for the purpose of
sharing resources LANs can host Intranets or Extranets WAN Wide
area Network Allows communication between other networks Larger
geographical area
Slide 82
Chapter 18 Network Basics Other types of networks PAN Personal
Area Network Home use Can use cables, Radio Frequency, Infra-red 30
feet or less CAN Campus Area network Business schools College
campuses MAN Metropolitan Area network Downtown core of a city for
business, government, schools, libraries
Slide 83
Chapter 18 Network Basics Network devices include: Repeaters
used to boost a signal Hubs allows sharing of bandwidth between
devices Smart hubs Switches think of a switch board operator
Signals directed to correct device Bridges connects two networks
Can be with dissimilar types (Token Ring and Ethernet) Routers-
primary connection point Determines the best path for data
packets
Slide 84
Chapter 18 Network Basics Majority of local networks are
client/server types Benefit is that shared resources are
centralized Files / Programs Printers/Scanners Benefits of
Networked computers Enhanced communication/collaboration Cost and
error reduction Simplified system maintenance
Slide 85
Chapter 18 Network Basics Risks to Networks includes: Weak
passwords Viruses Weak or non existent security measures
Catastrophic loss External and internal threats
Slide 86
Chapter 19 E-Mail systems Email message made up of two
components Message header Source and destination address Subject
and Data CC,BCC Message ID Reply to Message Body Text, graphics,
video Sent either ASCII or HTML format
Slide 87
Chapter 19 E-Mail systems Email address three parts Local-part
mailbox or user name @ address separator Domain identity the
Internet address of the server [email protected]
Slide 88
Chapter 19 E-Mail systems Security risks Email attachments
Attach a file paper clip Include an item Attach an electronic
business or address card Dont open from unknown sources Generally
they are safe
Slide 89
Chapter 19 E-Mail systems Signature block Can be manually or
automatically placed in the email body Incoming emails are placed
in an Inbox until the client connects or downloads them
Slide 90
Chapter 19 E-Mail systems Two protocols are used POP3 Post
Office Protocol version 3 After each message is downloaded, it is
deleted from the mail server Downloads message (desktop computers)
IMAP Internet Message Access Protocol Message resides on the mail
server mailbox (mobile devices) User sees header information
Slide 91
Chapter 19 E-Mail systems Address book stores email addresses
and other contact information Email security involves Protect
against unsolicited messages Securing outgoing mail
Slide 92
Chapter 19 E-Mail systems A spam filter and antivirus software
provides defense against unsolicited and potentially harmful email
messages Two methods can be applied to secure outgoing mail Digital
signatures Security device Sender is who they claim to be
registered or certified mail Encryption- Transfers readable text to
encodes or unreadable text Private keyssending end Public key that
matches on receiving end
Slide 93
Chapter 20 Communication over a Network Major types of
electronic communications Blogs Social Networking Computer-based
teleconferencing E-Mail Internet telephony Vontage, Skype
alternative to public phone system Video and images Text and
Instant messaging
Slide 94
Chapter 20 Communication over a Network Electronic
collaboration- two or more people discussing, developing, creating
or reviewing a common entity College example High school projects
Google docs
Slide 95
Chapter 20 Communication over a Network Advantages of
electronic collaboration Elimination of travel Avoids interruptions
in other duties Availability of input rom team members
Disadvantages Conflicts due to personal philosophies, cultural
differences, unfamiliarity with software Online Technical support
becomes important
Slide 96
Chapter 20 Communication over a Network In s synchronous
collaborative session Each participant gets a password for access
to the session Users are assigned usernames to identify them to
other participants Blackboard example
Slide 97
Chapter 20 Communication over a Network Advantages of
electronic communications Enhanced participation Flexibility Speed
of exchange Disadvantages Diversity of audience Performance
Voice
Slide 98
Chapter 20 Communication over a Network Netiquette guidelines
and best practices that should be followed in electronic
communications Chain letters jokes etc to mutiple recipients
Copyright-know and understand copyright Flames-angry mesages
Identity subject line, signature block Message length Ownership be
sure you know who owns the email Security always assume messages
are not secure
Slide 99
Chapter 20 Communication over a Network Timely response
Addresses make sure you are on the To: line Spelling and grammar
E-mail attachments E-mail privacy-dont share addresses without
permission E-mail graphics animated, innapropraite, sound
files
Slide 100
Chapter 20 Communication over a Network Acceptable Use Policy
AUP defines what authorized users on a network can and can not do
Signed in school At work Can get fired Top reasons for people
getting fired
Slide 101
Chapter 21 The Internet and the Web The Internet is the largest
WAN in the world It is a physical structure Consists of
sub-networks Web subnetworks E-mail subnetworks Voice communication
sub-networks
Slide 102
Chapter 21 The Internet and the Web Internet terms IP address
Internet Protocol 32 bit, 128 bit Each nodes has an IP address
Router directs network traffic TCP/IP Transmission Control
Protocol/Internet Protocol rules and guidelines to transmit and
receive messages (for structure, not people) World Wide Web
information Web-vehicle to navigate the WWW Uses links
Slide 103
Chapter 21 The Internet and the Web Hyperlink contains URL of
page, the name of the host or server and domain identity Web
Browser-software to see the file and interpret the HTML or
scripting code used Window to the Internet Internet Explorer
Firefox Opera Safari Chrome
Slide 104
Chapter 21 The Internet and the Web IANA and ICANN agencies
that assigns and monitors the IP addresses, domain names, content
and media types 9 types Content Media Audio MPEG, MP3, WMA, RA, WAV
Human-readable-CSS, HTML and XML Image-GIF, JPEG,PNG, TIF, SVS, ICO
Message - HTTP Multipart MIME Multipurpose Internet Mail Extensions
Multipurpose-ZIP HTML, XHTML Non-standard PHP, Adobe Flash Vendor
specific- Word, Open office, Excel Video-MPEG1, MP4, QuickTime
Windows Media Player WMV
Slide 105
Chapter 21 The Internet and the Web Website can contain many
webpage types Active Server, HTML Each has a purpose Blog,
ecommerce, forum site, portal site
Slide 106
Chapter 21 The Internet and the Web Website layout and contents
Consistency is the key Design features Banner, sidebar, body An
contain forms, frames, hyperlinks, horizontal bars and tables
Slide 107
Chapter 21 The Internet and the Web Security settings of a Web
Browser Customized for home, school or business Can prevent
unwanted pages, popups or drop down windows and browser script
attacks
Slide 108
Chapter 21 The Internet and the Web Web Browsers Navigation bar
is important Built in search features History of sites visited List
of favorite sites Bookmarks
Slide 109
Chapter 21 The Internet and the Web Most common Web Browser
errors are misspellings of URLs Browser version compatibility
Garbled text- improper font substitution Page Not Found errors 400
error codes problem caused by resource request 500 error codes
problem with the host server Plug-ins or Add-ins Pop-up pages Slow
or interrupted page loading Spoofing or phishing
Slide 110
Chapter 22 Working with Content on the Internet Content on the
Web is created using HTML Hypertext Markup Language Defines
characteristics of text, graphics and links 3 parts- page itself,
header, body Page is made up of tables, lists and forms Scripting
languages VBScript, JavaScript Can access data from other objects
on the page
Slide 111
Chapter 22 Working with Content on the Internet Web search
engine creates a database of Web content operates in three steps
Web crawling a spider returns content from search Indexing content
returned is then indexed or ordered Searching search engine,
searches its content for matches
Slide 112
Chapter 22 Working with Content on the Internet Selection Based
Search engine use the mouse to highlight any term and the search is
conducted outside the web page Meta-Search Engine meta-crawler
DogPile and Vivisimo sends search criteria to other search engines
and compiles the results
Slide 113
Chapter 22 Working with Content on the Internet 4
considerations to verify the quality and validity of information
Identify the source and the level of the expertise on the topic
Check the objectivity-bias un Control Check the timeliness Verify
the validity of the information
Slide 114
Chapter 22 Working with Content on the Internet Everything on
the Web is copyrighted The creator, originator, poet, composer,
author owns the copyright the instant the information is posted
Trademark is a word, phrase or image that has been registered with
the US Patent and Trademark Office Retina Display
Slide 115
Chapter 22 Working with Content on the Internet Plagiarism is
using or closely imitating the words or thought of another person
and representing them as your own pg 599 FTP File Transfer Protocol
transfer files from one computer to another over the Internet
Slide 116
Chapter 23- Computers at Home, Work and School Computer
Technology has evolved over 5 generations Mechanical device
generation 300 years 1600-1900 1 st 1930-1950 ENIAC, UNIVAC 2 nd
smaller and faster components COBOL, Fortran 3 rd Early 602-70s
(1st generation as we know it today) 4 th generation mid 70s
present personal computers
Slide 117
Chapter 23- Computers at Home, Work and School Computer
technology benefits every industry Banking Forecasting Tracking
Manufacturing Law enforcement Transportation Medical
Slide 118
Chapter 23- Computers at Home, Work and School Technology has
changed the way people work Telecommute Use VPNs virtual private
networks
Slide 119
Chapter 23- Computers at Home, Work and School Computer in
school Interactive learning Record-keeping Research and analysis
Commuter at Home Home theater systems Environmental control systems
Security systems
Slide 120
Chapter 23- Computers at Home, Work and School Physically
disabled people benefit through adaptive technologies to help with
Speech text messaging on phones Hearing speech recognition software
Vision-talking watches, talking computers Mobility computer
keyboards, joysticks, hand foot switches Sip and puff control
devices
Slide 121
Chapter 24- The Risks and Disadvantages of Computers in Society
Risks and threats with the use of a computers if not properly
addressed, could become major issues Users should Safeguard against
software threats Protect their privacy Avoid e-commerce hazards Use
computers ethically Dispose of equipment responsibly
Slide 122
Chapter 24- The Risks and Disadvantages of Computers in Society
To avoid injuries to your neck, shoulders, wrists arms hands and
eyes follow guidelines Read from page 619-621 OSHA guidelines for
safe computing How to sit and work on a computer Workspace
furniture
Slide 123
Chapter 24- The Risks and Disadvantages of Computers in Society
Viruses, Malware, worms and Trojan Horses can invade your computer
Install and update antivirus software Run regularly Install a
software firewall Protect sensitive information on your computer
Encryption passwords
Slide 124
Chapter 24- The Risks and Disadvantages of Computers in Society
Protect your privacy Restrict personal information shared Email
address Social networking
Slide 125
Chapter 24- The Risks and Disadvantages of Computers in Society
When using the Internet and Web, observe: copyright rules trademark
laws user agreements AUPs software licenses Data ownership
Permitted access
Slide 126
Chapter 24- The Risks and Disadvantages of Computers in Society
Computers and peripherals contain a significant amount of lead,
mercury, cadmium and other toxic materials Follow EPA regulations
when disposing of these items Recycling centers