0% found this document useful (0 votes)
194 views8 pages

1365 - Jss 3 First Term Ict Note

The document outlines the roles and qualities of computer professionals, detailing various types such as managers, programmers, and educators, along with the professional bodies in Nigeria. It also discusses computer viruses, their history, types, sources, and prevention methods, as well as the functions and disadvantages of search engines. Overall, it provides a comprehensive overview of the computer profession and associated challenges in the digital landscape.

Uploaded by

chelaw Richard
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
194 views8 pages

1365 - Jss 3 First Term Ict Note

The document outlines the roles and qualities of computer professionals, detailing various types such as managers, programmers, and educators, along with the professional bodies in Nigeria. It also discusses computer viruses, their history, types, sources, and prevention methods, as well as the functions and disadvantages of search engines. Overall, it provides a comprehensive overview of the computer profession and associated challenges in the digital landscape.

Uploaded by

chelaw Richard
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

HUMAN ISSUES

COMPUTER PROFESSIONALS
Computer professional refer to those people who have undergone training in Colleges,
Universities and Computer Training Institutes; or is someone who acquired formal training in
the field of computer.
Computer professional can also refers to one who has vast knowledge in the area of computing.
Types of Computer Professional:
The following are types of Computer Professional:
1. Computer Manager: These are people that have the overall responsibility for the
computer department in organization. They plan, manage, coordinate and control the
activities of the staff in the department.
2. Computer Programmer: These are people who develop software packages (i.e program)
3. System Analysts: These are people who look after the details of existing systems and also
implement and review new systems.
4. Computer Operators: They are the people that operate the computer system,
communicating with the operating system (just like typist does with the typewriter)
5. Computer Educators: These are people who teach computer at various levels ranging
from elementary school level to tertiary level
6. Computer Engineers and Technicians: These are people who install, maintain and repairs
computers.
7. Computer Policy Maker: These are people who make laws concerning the manufacturing
and use of computers.
8. Data Processing Manager: He manages the resource center
QUALITIES OF GOOD COMPUTER PROFESSIONALS
1. There are numbers of qualities that good computer professionals must possess. These
include:
2. Mathematically inclined: Many tend to be mathematically inclined although increasingly
people from various backgrounds are entering computer professions and performing very
well.
3. A good Computer professional must have undergone appropriate training either through
formal school system or through appropriate professional certificate training
programmes.
4. Good communication skill
5. They must be people who pay attention to details.
6. A good computer professional must be trustworthy because he/she will handle sensitive
information about the organization.
7. He/she must be knowledgeable and always ready to learn new things.
8. A good computer professional should be able to work with other people because
computer – based projects often require teamwork.
9. A good computer professional must be flexible and dynamic.
10.Technical writing skills
11.A good computer professional must be versatile
COMPUTER PROFESSIONAL BODIES IN NIGERIA
There are a number of professional bodies that a computer professional in Nigeria can join.
These include:-
1. Nigeria Computer Society (NCS): The Nigeria Computer Society is the umbrella body
for all professional computer associations in Nigeria. This means that other computer
bodies in the country are also members of NCS.
Aims of NCS:
a) Promote training of computer scientists, Engineers and other professionals
b) Encourage research in the advancement of computer science and technology in
Nigeria.
c) Develop the competence and encourage integrity in individuals engaged in the
practice of the computing profession
d) Co-operate with similar professional organizations throughout the world.
2. Computer Professional Registration Council of Nigeria (CPRCN): - Was established in
1995. The major function of the CPRCN is to set the standards of knowledge and skills
that people or organizations seeking to become members of the computing profession in
Nigeria should possess.
3. Information Technology (Industry) Association of Nigeria (ITAN):- It was established in
1991. The members are mainly companies and institutions engaged in the practice,
application and teaching of Information Technology in Nigeria.
4. Nigeria Internet Group (NIG): This is a non-governmental agency dedicated towards the
promotion and efficient use of the internet in Nigeria.
5. Institute of Software Professionals of Nigeria (ISPON): This institute was set up in 1999
to organize software professionals in Nigeria. Its membership includes professionals and
companies (local and international) who engaged in the development of software in
Nigeria.
6. Internet Service Providers of Nigeria (ISPAN): This is an association of companies
involved in the provision of internet services in Nigeria.
COMPUTER VIRUS
Computer viruses are software programs that are designed to delete, change, steal or block files
or settings on computer.
OR
A computer virus can be defined as a program that can replicate itself and spread from one
computer to another.
OR
It is a program or piece of code that is coded onto your knowledge
OR
Computer virus is a software programme written with machines intention.
Viruses tend to interfere with the smooth running of computer systems.
Some types of viruses are simply annoying, while other types can be intrusive, hostile, or even
destructive. Viruses are mostly spread through internet but are also widely spread through USB
sticks and mobile devices.
What are viruses designed to do?
Through the course of using the internet and your computer, you may have come in contact
with computer viruses. A computer virus might corrupt or delete data on your computer, use
your email program to spread itself to other computers, or even everything on your hard disk.
HISTORY OF COMPUTER VIRUSES
The known computer virus was done in 1971 by Robert Thomas an engineer at BBN
Technological known as the creeper virus. Thomas Experimental program infected mainframes
on the advance research protect Agency Network (ARPANET) displaying the teletype message
“I am the creeper catch me if you can
The first computer virus to be disware in the wild was Elkdoner, which infected apple II oses
through Eksppy dislas and displayed a humorous message on infected computers. Elkdoner
which was develop by at 15 years.
Richard Skretain in 1982 was designed as a prank, but it demonstrated how a potentially
malicious program could be installed in a apple computer’s memory and prevent users from
removing the program the term Computer wasn’t used until a year later Freld Cohen a graduate
student of university of souteiern calfonia (USC) write an academic proper titled “computer
viruses theory and experiments and are edited his academic adviser and RSA security cofounder
Loagard and leman with earning the term computer virus in 1983
There are thousands and thousands of different viruses and malware on the internet today. So
you may be asking why do people create viruses and malwares.
WHY DO PEOPLE CREATE VIRUSES AND MALWARES
1. To make money
2. To steal account information
3. To cause problem and trouble for other

TYPES OF COMPUTER VIRUSES


There are several different categories of viruses and malware. Here is a breakdown of the types
of computer viruses around today.
1 Trojan Horse: Is a deceptive form of virus that disguises its true intention until
downloaded unto a computer drive.
2 Worms is a program that makes and facilitates the distribution of copies of itself; for
example, from one disk drive to another, or by copying itself using email or another
transport mechanism to cause damage on a computer.
3 Boot sector Virus: This virus type that attaches itself to the first part of the hard disk
that is read by the computer upon boot – up. These are normally spread by floppy
disks.
4 Macro Virus: Macro viruses are viruses that use another application’s macro
programming language to distribute themselves. They infect document such as MS
Word or MS Excel and are typically spread to other similar document.
5 Memory Resident Viruses: Memory Resident Viruses reside in a computers’ volatile
memory (RAM).
6 Rootkit Virus: Is an undetectable virus which attempts to allow someone to gain
control of a computer system.
7 Polymorphic Viruses: Is a virus that replicates itself by creating multiple files of itself,
but it also changes its digital signature every time it replicates.
8 Logic Bombs/Time Bombs: These are viruses which are programmed to initiate at a
specific date or when a specific event occurs. Some examples are virus which deletes
your photos.
9 Over write virus
10 Root hit virus
11 Multipartite Virus
12 Directory/cluster virus
13 Fat virus
14 Web scripting virus
EXAMPLES OF COMPUTER VIRUS
1 Melissa
2 The brain virus which was initially appeared in 1986
3 The Jerusalem virus also known as the Friday the 13th virus was discovered
4 The Melissa virus which first appeared in 1999, it was distributed as an email attachment
5 The zeus Torajan and Zbet
6 The sleeper virus
7 The creeper virus found in 1971
8 The Christmas virus
9 The albama virus
10 The logic virus
11 The MIMBA virus
12 The Mydoem virus
13 The I love you virus
14 MS Blast
15 My Doom
16 Code Red
17 Bad boy
18 Slammer
19 Conficker
20 Jerusalem etc.
SOURCES OF COMPUTER VIRUSES
Below are the two most common ways a computer can contract these infections listed in the
order we believe are most commonly done.
1 The Internet and the World Wide Web: The internet is the largest source of viruses as
virus creators generally tend to spread their creations faster using the internet.
2 Flash Drives and Floppies: Always scan any flash drive and floppy diskette you put
into a port on your computer as these have become easy access point for most viruses.
3 By downloading game from the internet
4 By downloading music/videos from the internet
5 By downloading file from the internet
6 By sharing files infected by virus
7 By using storage device infected by virus
VIRUS WARNING SIGNS
The following are warning sign of virus:
a. Applications that don’t work properly.
b. Disks that can’t be accessed
c. Printers not working correctly
d. Pull-down menus are distorted
e. File size changes for no apparent reason.
f. Date last access does not match date of last use.
g. An Increase in the number of files on the system when nothing has been added.
h. Unprotected disk drive activity.
i. Unusual error messages
j. System slow down, freezes or crashes
VIRUS DETECTION (ANTI-VIRUS SOFTWARE)
A virus could cause major damage to your computer. Viruses can delete files, overwrite hard
drive sectors, replace a computer’s coding, and alter memory and more. It is also necessary to
pay attention to some terms used in anti-virus programs these days. These include:
a. False positive
b. On-demand scanning
c. On-the-fly scanning: all the objects that are processed in any way (opened, closed,
created, read from or written to etc) are being constantly checked for viruses. To
detect a virus you will need to use anti-viruses software. These include:
i. Avira
ii. Avast
iii. Norton
iv. Kaspersky
v. AVG
vi. McAfee Virus scan
vii. Symantec
viii. Eset Nod32 antivirus
ix. Bit defender etc
x. Smatdav
xi. Panda
xii. 360 Total Security.
xiii. The Eset
xiv. The smart dave
xv. The symatec Anti-virus

WAYS TO PREVENT COMPUTER VIRUSES


How can you prevent your devices against computer virus. Here are some of the thing you
can do to help keep our computer safe.
1. Use a trusted anti-virus product such as Norton Anti-Virus basic and keep it updated
with the latest virus definition Norton security premium offers additional protection
for even more device plus backup
2. Avoid clicking on any pop-up advertisements
3. Always scan your e-mail attachments before opening them
4. Install a hard-ware base fire war
5. Install a reliable Anti-virus program
6. Avoid suspicious websites
7. Never open email attachment without scanning
8. Install anti-spyware and anti-malware programs
9. Set up automatic scans
10. Watch your downloads
11. Update your Anti-virus software
12. Know what to look for on internet.
13. Stay away from cracked software.
14. Install a firewall.
SEARCH ENGINE
A search engine is a website that helps users for different types of data warehoused within
computers on the World Wide Web. Different search engine exist. These include: Google
search, Yahoo search, Hotbot and Mamma Search, Safira, Opera, UC browser etc.
TYPES OF SEARCH ENGINE
1. Google search
2. Yahoo Search
3. Hot bot
4. Mamma search
5. Safari search
6. Opera search
7. Uc browser
8. Web crawler
9. Bing
10.Dog pile
11.Ask. Com.
1. Google search: is a search engine provided by Google. Handling over 3.5 billion searches
per day. It has a 92% share of the global search engine market. It is also the most visited
website in the world. The order of search results required by Google is based in part on a
priory rank system called page rank
2. Yahoo Search: is a search engine founded since 1994. It helps you find the information
you need while on-the-go and get fast answers to help navigate you life.
3. Hot bot: was launched in May 1996 by hot-wired a total providing, search results served
by intom database
4. Mamma. Com: the mother of all search engine is one of the most popular meta search
engines on the internet, as it makes it easier and fasted for people to find information by
gathering the most relevant result from the best search engines on the internet.
5. Safari: is a graphic web browser developed by Apple INC based primarily on opens
software properties in notably including which kit. It was first introducing on Mac, Os,
Panther in 2003 and was later incorporate to the iphone and ipad touch with iphone Os1
in 2007
6. Opera: uses the Google search engine by default to search the web click the search or
enter address field
7. Uc browser: is a web browser developed by mobile internet company Uc browser.
8. Web crawler is a search engine and is the oldest surviving search engine on the world
wide today
9. Bing sometimes also referred to as Bing search is a search engine developed by Microsoft
and primarily known for being a search by Bing. Com
10.Dog pile’s is a meta search engine for information on the world wide web that fetches
results from Google, Yahoo, Yandex, Bing and other popular search
11.Ask. Com is a search engine that was started in 1996. This website helps people find web
pages that they are looking for web page about Jss Pasali. They would type jss pasali
“They press the search button
FUNCTIONS OF SEARCH ENGINES
The following are major functions of search engines:
 Crawling: The crawler or web spider is a vital software component of the search engine.
Crawlers can scan brand new information on the internet or it can locate older data.
Crawlers have the ability to search a wide range of websites at the same time and collect
large amounts data.
 Indexing: Once the search engine has crawled through contents of the internet, it indexes
the content based on the occurrence of keyword phrases in each individual website. This
allows a particular search query and subject to be found easily.
 Storage: Storing web content within the database of the search engine is essential for fast
and easy searching. Larger search engine like Google and Yahoo are able to store large
amounts of data ranging in the terabytes.
 Results Generation: Results are the hyperlinks to websites that show up in the search
engine page when a certain keyword or phrase is queried. When you type in a search
term, the crawler runs through the index and matches what you typed with other
keywords.
 It help to sort information in alphabetical order
 It help to store information for future use
 It help to rank information value on the web
 It is relevant
 It is comprehensive in nature
 It enable advance search
DISADVANTAGES OF SEARCH ENGINES
 It is highly expensive
 It is highly competitive
 It’s interruptive
 Sometimes it response’s very low
 It gives unpresentable sample
 There is limited access to certain portal
 It contains non behavioural data
 It has limited length of study

You might also like