Upload
hoangminh
View
216
Download
2
Embed Size (px)
Citation preview
Learning Outcome
At the end of this course, participant will beable to:
• use basic program computer• apply the ethics of internet while using
internet and communicate through email
At the end of this course, participant will beable to:
• use basic program computer• apply the ethics of internet while using
internet and communicate through email
Agenda
• Computers• Operating system• Internet• Computer Ethics
• Computers• Operating system• Internet• Computer Ethics
3
What Is a Computer?A computer is an electronic device, operatingunder the control of instructions stored in itsown memory
6
Collectsdata
(input)Processing
Producesinformation
(output)
Information Processing Cycle
The Components of a ComputerA computer contains many electric, electronic, andmechanical components known as hardware
• Allows you to enter data and instructions into a computer• Allows you to enter data and instructions into a computerInput Device
7
• Hardware component that conveys information to one or more people• Hardware component that conveys information to one or more peopleOutput Device
• Case that contains the electronic components of the computer thatare used to process data
• Case that contains the electronic components of the computer thatare used to process dataSystem Unit
• Holds data, instructions, and information for future use• Holds data, instructions, and information for future useStorage Device
• Enables a computer to send and receive data, instructions, andinformation to and from one or more computers or mobile devices
• Enables a computer to send and receive data, instructions, andinformation to and from one or more computers or mobile devices
CommunicationsDevice
Computer Software• Software, also called a program, tells the
computer what tasks to perform and howto perform them
System Software• Operating system• Utility program
9
System Software• Operating system• Utility program
Application Software
Categories of Computers
Mobile computers and mobile devices
Personal computers
Embedded computers
Servers
Mobile computers and mobile devices
10
Embedded ComputersAn embedded computer is a special-purposecomputer that functions as a component in alarger product
ConsumerElectronics
HomeAutomation
DevicesAutomobiles
ProcessControllers and
Robotics
Comp Devices &Office Machines
11
ConsumerElectronics
•Mobile anddigitaltelephones
•Digitaltelevisions
•Cameras•Video recorders•DVD players and
recorders•Answering
machines
•Mobile anddigitaltelephones
•Digitaltelevisions
•Cameras•Video recorders•DVD players and
recorders•Answering
machines
HomeAutomation
Devices•Thermostats•Sprinkling
systems•Security
monitoringsystems
•Appliances•Lights
•Thermostats•Sprinkling
systems•Security
monitoringsystems
•Appliances•Lights
•Antilock brakes•Engine control
modules•Airbag controller•Cruise control
•Antilock brakes•Engine control
modules•Airbag controller•Cruise control
ProcessControllers and
Robotics•Remote
monitoringsystems
•Power monitors•Machine
controllers•Medical devices
•Remotemonitoringsystems
•Power monitors•Machine
controllers•Medical devices
Comp Devices &Office Machines
•Keyboards•Printers•Faxes•Copiers
•Keyboards•Printers•Faxes•Copiers
Using Computers
Speed
Reliability
• Advantages • Disadvantages
Health Risks
Violation of PrivacyReliability
Consistency
Storage
Communications
12
Violation of Privacy
Public Safety
Impact on Labor Force
Impact on Environment
Operating Systemsis a set of programs containing instructions that worktogether to coordinate all the activities amongcomputer hardware resources
Start and shutdown a
computer
Provide a userinterface
Manageprograms
Managememory
13
Start and shutdown a
computer
Provide a userinterface
Manageprograms
Managememory
Coordinatetasks
Configuredevices
Establish anInternet
connection
Monitorperformance
Provideutilities
Automaticallyupdate
Control anetwork
Administersecurity
Operating systems often provide users with thecapability of:
Managing filesManaging files Searching forfiles
Searching forfiles
ViewingimagesViewingimages
Securing acomputerSecuring acomputer
14
Managing files Searching forfiles
Searching forfiles
ViewingimagesViewingimages
Securing acomputerSecuring acomputer
Uninstallingprograms
Uninstallingprograms
Cleaning updisks
Cleaning updisks
Defragmentingdisks
Defragmentingdisks
Diagnosingproblems
Diagnosingproblems
Backing upfiles and disks
Backing upfiles and disks
Setting upscreen savers
Setting upscreen savers
Utility Programs - Compression• A file compression utility shrinks the size of a
file(s)– Compressing files frees up room on the storage media– Two types of compression
• Lossy• Lossless
• Compressed files sometimes are called zippedfiles– Can be uncompressed
• A file compression utility shrinks the size of afile(s)– Compressing files frees up room on the storage media– Two types of compression
• Lossy• Lossless
• Compressed files sometimes are called zippedfiles– Can be uncompressed
16
Activity using Utility Programs• Compress Files using winzip/winrar• Split File using winzip / winrar• Disk Defragment• Scan Virus
• Compress Files using winzip/winrar• Split File using winzip / winrar• Disk Defragment• Scan Virus
17
Networks and the InternetPeople use the Internet for a variety of reasons:
Discovering Computers 2011: Living ina Digital World Chapter 1 19
Communicate Research andAccess Information
Shop Bank and Invest Online Trading
Entertainment Download Videos Share Information Web Application
Ethics• Ethics are standards of moral conduct
– Standards of right and wrong behavior
– A gauge of personal integrity
– The basis of trust and cooperation in relationships withothers
• Ethics are standards of moral conduct– Standards of right and wrong behavior
– A gauge of personal integrity
– The basis of trust and cooperation in relationships withothers
21
Computer Ethics• Computer ethics are morally acceptable use of
computers
– i.e. using computers appropriately
• Standards or guidelines are important in thisindustry, because technology changes areoutstripping the legal system’s ability to keep up
• Computer ethics are morally acceptable use ofcomputers
– i.e. using computers appropriately
• Standards or guidelines are important in thisindustry, because technology changes areoutstripping the legal system’s ability to keep up
22
Computer Ethics• Four primary issues
– Privacy – responsibility to protect data aboutindividuals
– Accuracy - responsibility of data collectors toauthenticate information and ensure its accuracy
– Property - who owns information and softwareand how can they be sold and exchanged
– Access - responsibility of data collectors to controlaccess and determine what information a personhas the right to obtain about others and how theinformation can be used
• Four primary issues– Privacy – responsibility to protect data about
individuals– Accuracy - responsibility of data collectors to
authenticate information and ensure its accuracy– Property - who owns information and software
and how can they be sold and exchanged– Access - responsibility of data collectors to control
access and determine what information a personhas the right to obtain about others and how theinformation can be used
23
Avoiding Computer-Related LegalProblems
• Most organizations have a policy definingwhat they consider to be acceptablecomputer use.
• Types of legal problems that arise fromcomputer use include:– Plagiarism– Copyright Infringement– Software Piracy
• Most organizations have a policy definingwhat they consider to be acceptablecomputer use.
• Types of legal problems that arise fromcomputer use include:– Plagiarism– Copyright Infringement– Software Piracy
24
Plagiarism
• Plagiarism is the unauthorized and/oruncited use of someone else’s intellectualproperty.– Intellectual property rights refer to an individual’s
ownership over original works.
• Copyright infringement is plagiarism ofcopyrighted material.
• Legal implications of plagiarism:– Dismissal from school– Lawsuits
• Plagiarism is the unauthorized and/oruncited use of someone else’s intellectualproperty.– Intellectual property rights refer to an individual’s
ownership over original works.
• Copyright infringement is plagiarism ofcopyrighted material.
• Legal implications of plagiarism:– Dismissal from school– Lawsuits
25
Software Piracy• Selling software that contains all or part of a
commercial software program• Using shareware beyond its evaluation period• Violating the terms of a software license• Making copies of site-licensed programs for
personal use• Giving or selling commercial software to others
• Selling software that contains all or part of acommercial software program
• Using shareware beyond its evaluation period• Violating the terms of a software license• Making copies of site-licensed programs for
personal use• Giving or selling commercial software to others
26
Computer Ethics for Computer Users• When using the company computers:
– Respect yourself.– Respect others.– Respect your company.
• When using the company computers:– Respect yourself.– Respect others.– Respect your company.
27
Computer Ethics in Business• A business must protect its data from:
– Loss or damage– Misuse or errors– Unauthorized access
• Backup procedures are used to protect datafrom loss.
• It is the organization’s responsibility to ensurethat its data is as complete as possible.
• Divulging customer data without askingpermission is considered unethical behavior byprivacy advocates.
• A business must protect its data from:– Loss or damage– Misuse or errors– Unauthorized access
• Backup procedures are used to protect datafrom loss.
• It is the organization’s responsibility to ensurethat its data is as complete as possible.
• Divulging customer data without askingpermission is considered unethical behavior byprivacy advocates.
28
Netiquette
Netiquette refers to the guidelinesthat involve showing respect forothers and yourself while you areonline.
29
Netiquette refers to the guidelinesthat involve showing respect forothers and yourself while you areonline.
Rules on NetiquetteAccording to Virginia, had 10 Rules on Netiquette :1. Remember Human2. Adhere to the same standards of behavior online
that you follow in real life.3. Know where you are4. Respecting others5. Make yourself appear online well6. Share expert knowledge7. Helps maintain harmony8. Respect Others Privacy9. Do not Abusing the power and ability10.Be forgiving for mistakes of others
According to Virginia, had 10 Rules on Netiquette :1. Remember Human2. Adhere to the same standards of behavior online
that you follow in real life.3. Know where you are4. Respecting others5. Make yourself appear online well6. Share expert knowledge7. Helps maintain harmony8. Respect Others Privacy9. Do not Abusing the power and ability10.Be forgiving for mistakes of others
30
E-Mail Netiquette• Promptly respond to
messages.• Delete messages after
you read them.• Speak of others
professionally andcourteously.
• Run your computer’santi-virus program onany e-mail received orsent.
• Promptly respond tomessages.
• Delete messages afteryou read them.
• Speak of othersprofessionally andcourteously.
• Run your computer’santi-virus program onany e-mail received orsent.
31
E-Mail Netiquette (Cont)• Keep the message short and to the point.• Don’t type in all capital letters.• Spell check your message before sending it.• Be careful with sarcasm and humor in your
message.• Be mindful of the recipient’s reaction
when you request a return receipt. Thisfeature can be annoying and intrusive.
• Keep the message short and to the point.• Don’t type in all capital letters.• Spell check your message before sending it.• Be careful with sarcasm and humor in your
message.• Be mindful of the recipient’s reaction
when you request a return receipt. Thisfeature can be annoying and intrusive.
32
The nature of threats against informationsystems
1. Passive threat• Natural disasters and political• Human error• system failures
2. Active Threat• Fraud and computer crime• Malicious programs / nosy
1. Passive threat• Natural disasters and political• Human error• system failures
2. Active Threat• Fraud and computer crime• Malicious programs / nosy
33
Roots of computer crime• Information = Money?Information has a value (value) that can
be sold tradedThe value of information can change
with time
• Information = Money?Information has a value (value) that can
be sold tradedThe value of information can change
with time
34
Computer Security RisksA computer security risk is any event or action that
could cause a loss of or damage to computerhardware, software, data, information, or processingcapability
A cybercrime is an online or Internet-based illegal act
A computer security risk is any event or action thatcould cause a loss of or damage to computerhardware, software, data, information, or processingcapability
A cybercrime is an online or Internet-based illegal act
35
Hackers Crackers Script Kiddies Corporate Spies
UnethicalEmployees Cyberextortionists Cyberterrorists
Internet and Network AttacksComputer
Virus
• Affects acomputernegativelyby alteringthe way thecomputerworks
Worm
• Copies itselfrepeatedly,using upresourcesand possiblyshuttingdown thecomputer ornetwork
Trojan Horse
• A maliciousprogramthat hideswithin orlooks like alegitimateprogram
Root kit
• Programthat hides ina computerand allowssomeonefrom aremotelocation totake fullcontrol
• Affects acomputernegativelyby alteringthe way thecomputerworks
• Copies itselfrepeatedly,using upresourcesand possiblyshuttingdown thecomputer ornetwork
• A maliciousprogramthat hideswithin orlooks like alegitimateprogram
• Programthat hides ina computerand allowssomeonefrom aremotelocation totake fullcontrol
37
Infected computer has one or more of thefollowing symptoms:
Operating systemruns much slower
than usual
Available memory isless than expected
Files becomecorrupted
Screen displaysunusual message or
image
38
Music or unusualsound playsrandomly
Existing programsand files disappear
Programs or files donot work properly
Unknown programsor files mysteriously
appear
System propertieschange
Operating systemdoes not start up
Operating systemshuts down
unexpectedly
Unauthorized Access and Use
Unauthorized accessis the use of a
computer or networkwithout permission
Unauthorized use isthe use of a
computer or its datafor unapproved or
possibly illegalactivities
Unauthorized accessis the use of a
computer or networkwithout permission
Unauthorized use isthe use of a
computer or its datafor unapproved or
possibly illegalactivities
39
Theft Hardware Theft Software Theft Information Theft
– Identification– Authentication– User name– Password– Passphrase– CAPTCHA– Biometric
Summary• Computer is an electronic device, operating
under the control of instruction stored in itsown memory, that can accept data, processthe data according to specified rules, produceresults, and store the results for future use.
• Computer Security Risk is any event or actionthat could cause a loss of or damage tocomputer hardware, software, data,information or processing capability
• Computer is an electronic device, operatingunder the control of instruction stored in itsown memory, that can accept data, processthe data according to specified rules, produceresults, and store the results for future use.
• Computer Security Risk is any event or actionthat could cause a loss of or damage tocomputer hardware, software, data,information or processing capability
41
Reference• Discovering Computers, Living in a Digital
World. Shelly. B. gary, Vermaat. B. Misty. ShellyCashman 2011.
• http://indah.blog.widyatama.ac.id/2013/04/27/teknik-kompresi-data/
• http://www.kompasiana.com/dennyyapari/apakah-plagiarisme-merupakan-pelanggaran-hak-cipta_550e6254a33311bf2dba81ce
• Net Etiquette. Virginia Shea, Gly kawasaki.2004.
• Discovering Computers, Living in a DigitalWorld. Shelly. B. gary, Vermaat. B. Misty. ShellyCashman 2011.
• http://indah.blog.widyatama.ac.id/2013/04/27/teknik-kompresi-data/
• http://www.kompasiana.com/dennyyapari/apakah-plagiarisme-merupakan-pelanggaran-hak-cipta_550e6254a33311bf2dba81ce
• Net Etiquette. Virginia Shea, Gly kawasaki.2004.
42
Internet Facilities• E-mail• Web Browser• FTP• Telnet• Mailing List• NewsGroup• Messenger
• E-mail• Web Browser• FTP• Telnet• Mailing List• NewsGroup• Messenger
45
Terms in the Internet• Attachment• Browser• Link• Upload• Download• Domain• FTP• Homepage• Hyperlink• Internet• Intranet
• HTTP• WWW• ISP• URL• Web Hosting• Web server
• Attachment• Browser• Link• Upload• Download• Domain• FTP• Homepage• Hyperlink• Internet• Intranet
46
• HTTP• WWW• ISP• URL• Web Hosting• Web server