0% found this document useful (0 votes)
193 views61 pages

Introduction To IT 500

Uploaded by

THABISILE MBATHA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
193 views61 pages

Introduction To IT 500

Uploaded by

THABISILE MBATHA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 61

Faculty of

Information Technology
Introduction to Information Technology 500
Year 1 Semester 2
Registered with the Department of Higher Education as a Private Higher Education Institution under the Higher Education Act, 1997.
Registration Certificate No. 2000/HE07/008

FACULTY OF INFORMATION TECHNOLOGY

LEARNER GUIDE
MODULES: ,1752'8&7,2172,1)250$7,217(&+12/2*<(1' SEMESTER)

PREPARED ON BEHALF OF
RICHFIELD GRADUATE INSTITUTE OF TECHNOLOGY (PTY) LTD

GRADUATE INDTITUTE OF TECHNOLOGY (PTY) LTD


Registration Number: 2000/000757/07
All rights reserved; no part of this publication may be reproduced in any form or by any
means, including photocopying machines, without the written permission of the
Institution.

Page 2 of 61
TABLE OF CONTENT

TOPICS

 TOPIC 1- PROGRAMS AND APPS


 TOPIC 2- DIGITAL SAFETY AND SECURITY
 TOPIC 3- DIGITAL STORAGE

Prescribed Textbook
Vermaat, M. E. 2018. Discovering Computers, Essentials: Digital Technology,
Data & Devices. 1st Ed. UK: Cengage Learning. ISBN: 9781337285100

Page 3 of 61
TOPIC 1: PROGRAMS AND APPS (USING SOFTWARE AT SCHOOL, WORK AND HOME)

Learning Outcomes

After reading this Section of the guide, the learner should be able to:
1. Identify the general categories of programs and apps
2. Describe how an operating system interacts with applications and hardware
3. Describe how an operating system interacts with applications and hardware
4. Identify key features of productivity applications
5. Identify the purpose of software used in communications
6. Identify key features of productivity applications
7. Identify the purpose of software used in communications
8. Identify the purpose of software used in communications
9.

1.1 PROGRAMS AND APPS

Defining Computer Program; a computer program is a set of instructions that directs a computer o
performs the tasks necessary to process data into information. Using programs and apps, you can
accomplish a variety of tasks on a computer and mobile device.

A program, or software, consists of a series of related instructions, organized for a common purpose,
that tells the computer what tasks to perform and how to perform them. An application, or app,
sometimes called application software, consists of programs designed to make users more productive
and/or assist them with personal tasks. Other programs, often called tools or utilities, enable you to
perform maintenance-type task usually related to managing devices, media, and programs used by
computer and mobile devices. An operating system is a set of programs that coordinates all the
activities among computer or mobile device hardware.

With programs and apps you can create letters, memos, reports, and other documents; develop
presentations; prepare and file taxes; draw and alter images; record and enhance audio and video
clips etc.

Page 4 of 61
Page 5 of 61
Example of How an Operating System Interacts with User, an Application, and Hardware

1.1.1 Software Availability

Software is available in variety of forms; retail, custom, web app, mobile app, mobile web app, open
source, shareware, freeware, and public domain.

 Retail software
It is a mass-produced, copyrighted software that meets the needs of a wide variety of users, not
just single user or company. Some retail programs have a trial version.

 Custom software
It performs functions specific to a business or industry. Sometimes a company cannot locate retail
software that meets its unique requirements. In this case the company may use software
developers to create tailor-made custom software. This software usually cost more than a retail
software.

Page 6 of 61
 Web App

It is an application stored on a web server that you can access through a browser. Users typically
interact with web apps directly at a website.

 A mobile app

It is an application you download from a mobile device’s app store, sometimes called a market place

 Mobile web app

It is a web app that is optimised for display in a browser on a mobile device.

 Open source software

It is a software provided for use, modification, and redistribution. This software has no restrictions
from the copyright holder regarding modification of the software’s internal instructions and its
redistribution. Open source can be downloaded from internet often at no costs.

 Shareware

It is a copyrighted software that is distributed at no cost for a trial period. To use a shareware program
beyond that period, you send payment to the software developer.

 Freeware

It is a copyrighted software provided at no cost by an individual or company that retains all right to
the software. The software developers cannot incorporate freeware in applications they intend to sell.

 Public-domain software

This software has been donated for public use and has no copyright restrictions. Anyone can copy or
distribute public-domain software to others at no costs.

1.2 PRODUCTIVITY APPLICATIONS

Productivity applications can assist you in becoming more effective and efficient while performing
daily activities at work, school, and home. Productivity applications include word processing,
presentation, spreadsheet, database, note work, calendar and contact management, project

Page 7 of 61
management, accounting, personal finance, legal, tax preparation, document management, support
services, and enterprise computing.

 Project Development

With productivity applications, users often create, edit, format, save, and distribute projects.

 When you create a project, you enter text or numbers, insert images, and perform other
tasks using a variety of inputs methods, such as keyboard, a mouse, touch or voice.
 To edit a project means to make changes to its existing content.
 When users format a project, they change its appearance.
 When you save a document, the computer transfers the project from memory to local
storage medium, such as USB flash drive or hard disk, or cloud storage.
 A hard copy is information that exists on a physical medium, such as paper. To generate a
hard copy, you print a project.

 Word Processing

Word processing software, sometimes called a word processor, is an application that allows users to
create and manipulate documents containing mostly text and sometimes graphics.

Page 8 of 61
A major advantage of using word processing software is that it enables users to change their written
words easily. Word processing software also has many features to make a document professional and
visually appealing. Word processing was one of the earliest applications for the personal computer in
office productivity, and was the most widely used application on personal computers until the World
Wide Web rose to prominence in the mid-1990s. Typical features of a modern word processor include:
multiple font sets, spell checking, grammar checking, a built-in thesaurus, automatic text correction,
Web integration, HTML conversion, pre-formatted publication projects such as newsletters and to-do
lists, and much more. In its simplest form, a word processor is like an Expensive Typewriter or
Typewriter machine, with the improvement of being able to proofread, and correct mistakes before
printing.

 Presentation Software

Presentation software allows users to create visual aids for presentations to communicate ideas,
messages, and other information to a group. The presentations can be viewed as slides, sometimes
called slide show, that are displayed on a large monitor or on a projection screen from a computer or
mobile device. It has three major functions: an editor that allows text to be inserted and formatted, a
method for inserting and manipulating graphic images, and a slide-show system to display the content.

Page 9 of 61
There are many different types of presentations including professional (work-related), education,
entertainment, and for general communication. Presentation programs can either supplement or
replace the use of older visual aid technology, such as pamphlets, handouts, chalkboards, flip charts,
posters, slides and overhead transparencies.

 Spreadsheet

Spreadsheet software allows users to organize data in columns and rows and perform calculations on
the data. These rows and columns collectively are called worksheets. Most spreadsheet software has
basic features to help users create, edit, and format worksheets.

Page 10 of 61
Although spreadsheets are typically used with anything containing numbers, the uses of a spreadsheet
are almost endless. Below are some other popular uses of spreadsheets.

 Finance

Spreadsheets are ideal for financial data, such as your checking account information, budgets,
transactions, billing, invoices, receipts, forecasts, and any payment system.

 Forms

Form templates can be created to handle inventory, evaluations, performance reviews, quizzes, time
sheets, patient information, and surveys.

 School and Grades

Teachers can use spreadsheets to track students, calculate grades, and identify relevant data, such as
high and low scores, missing tests, and students who are struggling.

 Lists

Managing a list in a spreadsheet is a great example of data that does not contain numbers, but still
can be used in a spreadsheet. Great examples of spreadsheet lists include telephone, to-do, and
grocery lists.

 Sports

Page 11 of 61
Spreadsheets can keep track of your favourite player stats or stats on the whole team. With the
collected data, you can also find averages, high scores, and other statistical data. Spreadsheets can
even be used to create tournament brackets.

Each worksheet usually can have thousands of columns and rows. A cell is the intersection of a
column and row.

 Database

A database is a collection of data organized in a manner that allows access, retrieval, and use of that
data. Database software is an application that allows users to create, access, and manage a database
using data from the database; and create forms and reports using the data in the database. It is a
computer software application that interacts with the user, other applications, and the database itself
to capture and analyse data. Database software, sometimes referred to as database management
systems (DBMS) is primarily used to store and manage data/databases, typically in a structured
format. It generally provides a graphical interface that allows users to create, edit and manage data
fields and records in a tabular or organized form. The data/database stored using this software can be

Page 12 of 61
retrieved in a raw or report based format. For example, MS Access software allows users to create,
manage and query a database using its GUI controls and features, without having to write
programming queries.

Database software is used for a number of reasons in any industry - from keeping your bookkeeping
on task, compiling client lists to running your online Web site.

Existing DBMSs provide various functions that allow management of a database and its data which
can be classified into four main functional groups:

 Data definition – Creation, modification and removal of definitions that define the
organization of the data.

 Update – Insertion, modification, and deletion of the actual data.

 Retrieval – Providing information in a form directly usable or for further processing by other
applications. The retrieved data may be made available in a form basically the same as it is
stored in the database or in a new form obtained by altering or combining existing data from
the database.

 Administration – Registering and monitoring users, enforcing data security, monitoring


performance, maintaining data integrity, dealing with concurrency control, and recovering
information that has been corrupted by some event such as an unexpected system failure.

Page 13 of 61
 Note taking

Note taking software is an application that enables users to enter typed text, handwritten comments,
drawings, sketches, photos, and links anywhere on a page.

 Calendar and Contact Management

Calendar and contact management software is an application that helps you organize your
calendar, keep track of contacts, and share this information with other users.

Page 14 of 61
 Software Suite

A software suite is a collection of individual related applications available together as a unit. A


software suite or application suite is a collection of computer programs —usually application
software or programming software— of related functionality, often sharing a more-or-less common
user interface and some ability to smoothly exchange data with each other. A software suite is a
collection of two or more software programs that are bundled and sold together. The software
programs may have correlative features and functionality, or they may be completely different from
one another, but share a similar theme.

 Project Management Software

Project management software is an application that allows a user to plan, schedule, track, and analyse
the events, resources, and costs of a project. It can manage estimation and planning, scheduling, cost
control and budget management, resource allocation, collaboration software, communication,
decision-making, quality management and documentation or administration systems.

Project management software provides small to large businesses, who undoubtedly juggle a number
of tasks, with a solution that helps keep them organized.

Page 15 of 61
 Accounting Software

Accounting software is an application that helps businesses of all sizes record and report their
financial transactions.

 Legal software

Legal software is an application that assists in the preparation of legal documents and provides legal
information to individuals, families, and small businesses. (Read page 164)

Page 16 of 61
 Tax Preparation Software

Tax preparation software is an application that can guide individuals, families, or small businesses
through the process of filing federal and state taxes.

 Document Management Software

Document management software is an application that provides a means for sharing, distributing,
and searching through documents by converting them into a format that can be viewed by any user.

Page 17 of 61
 Enterprise Computing

A large organization, commonly referred to as an enterprise, requires special computing solutions


because of its size and geographic distribution.

1.3 GRAPHICS AND MEDIA APPLICATIONS

Many people work with software designed specifically for their field of work. Power users such as
architects, desktop publishers, and graphic artists often use sophisticated software that allows them
to work with graphics and media. Graphics and media applications include computer-aided design,
desktop publishing, paint/ image editing and photo management, clip art/image gallery, video and
audio editing, multimedia and website authoring, media players, and disc burning.

 Computer-Aided Design

Computer Aided Design software is used to increase the productivity of the designer, improve the quality
of design, improve communications through documentation, and to create a database for manufacturing.
Computer-aided design (CAD) software is a type of application that assists professionals and designers in
creating engineering, architectural, and scientific designs and models. Three-dimensional CAD programs

Page 18 of 61
allow designers to rotate designs of 3-D objects to view them from any angle. These applications usually
contain thousands of pre-drawn plans that users can customise to meet their needs. For example home
design, landscaping software.

 Desktop Publishing

Desktop publishing software (DTP software) is an application that enables designers to create sophisticated
publications that contain text, graphics, and many colours. Professional DTP software is ideal for the
production of high-quality colour documents such as textbooks, corporate newsletters, marketing
literature, product catalogues, and annual reports.

 Paint/ Image Editing

Image editing software is an application that provides the capabilities of paint software and also include
adjusting or enhancing image colours, adding special effects such as shadows and glows, creating
animations, and image stitching. Paint/ image editing software for the home or small business user
provides an easy-to-use interface; includes various simplified tools that allows you to draw pictures,
shapes, and other images. Paint software is also called illustration software, is an application that allows
users to draw pictures, shapes, and other graphics with various on-screen tools such as a pen, brush,
eyedropper, and paint bucket. These products also include many templates to assist you in adding images
to documents such as greeting cards, banners, calendars, signs, labels, business cards, and letterhead.

 Photo Editing and Photo Management

 Multimedia Authoring Software

Multimedia authoring software allows users to combine text, graphics, audio, video, and animation
in an interactive application

 Website Authoring Software

Website authoring software helps users of all skill levels create webpages that include graphics,
video, audio, animation, and special effects with interactive content


 Media Player

A media player is a program that allows you to view images and animations, listen to audio, and
watch video files on your computer or mobile device

Page 19 of 61
 Disc burning software

Disc burning software writes text, graphics, audio, and video files on a recordable or rewritable disc

1.4 PERSONAL INTEREST APPLICATIONS


Most of the programs in this category are relatively inexpensive; many are free.
 Lifestyle applications
Access the latest news or sports scores, check the weather forecast, compose music,
research genealogy, find recipes, or locate nearby restaurants, gas stations, or points of
interests.
 Medical applications
Research symptoms, establish a fitness or health program, track exercise activity, refill
prescriptions, count calories, or monitor sleep patterns
 Entertainment application
Listen to music or the radio, view photos, watch videos or shows, read a book or other
publication, organise and track fantasy sports team, and play games individually or with
others.
 Convenience application
Obtain driving directions or current location, remotely start your vehicle or unlock/lock the
doors, set an alarm or timer, check the time, calculate a tip, or use flashlight.
 Education applications
Access how-to guides, learn or fine-tune a particular skill, follow a tutorial etc.
1.5 COMMUNICATIONS APPLICATIONS

One of the main reasons people use computers is to communicate and share information with
others. The list of communications applications includes the following:

 Blogging
 Browsing
 Chat room
 Discussion Forum
 Email
 FTP
 Instant Messaging
 Video Conference
 VoIP
 Web Feeds

Page 20 of 61
 Wireless messaging

1.6 SECURITY TOOLS


 Personal Firewall

A personal firewall is a security tool that detects and protects a personal computer and its data from
unauthorized intrusions. When connected to the Internet, your computer is vulnerable to attacks from
nefarious individuals who try to access a computer or network illegally. These attacks may destroy
your data, steal information, damage your computer, or carry out some other malicious actions.

 Antivirus program

An antivirus program protects a computer against viruses by identifying and removing any computer
viruses found in memory, on storage media, or on incoming files. To protect a computer from virus
attacks, users should install an antivirus program and keep it updates by purchasing revisions or
upgrades to the software. Antivirus programs scans for programs that attempt to modify a computer’s
start up files, the operating systems, and other programs that normally are read from but not
modified.

 Spyware, Adware, and Other Malware Removers

Spyware is a type of program placed on a computer or mobile device without the user’s knowledge
that secretly collects information about the user and then communicates the information it collects
to some outside source while the user is online. Adware is a type of program that displays an online
advertisement in a banner or pop-up or pop-under window on webpages, email messages, or other
Internet service. A spyware remover is a type of program that detects and deletes spyware and similar
programs. An adware remover is a program that detects and deletes adware.

1.7 FILE AND DISK MANAGEMENT TOOLS

A file manager is a tool that performs functions related to file management. Some of the file
management functions that a file manager performs are displaying a list of files on a storage medium,
organising files in folders; and copying, renaming, deleting, moving, and sorting files. A folder is a
specific named location on a storage medium that contains related documents.

Page 21 of 61
 Search Tool

A search tool is a program, usually included with an operating system that attempts to locate a file,
contact, calendar event, app, or any other item stored on your computer or mobile device based on
criteria you specify. This criteria could be word or words contained in a file, date the file was created
or modified, size of the file, location of the file, file name, author/ artist etc. Search tools typically
use an index to assist with locating files quickly. An index stores a variety of information about a file,
including its name, date created, date modified etc.

 Image Viewer

An image viewer is a tool that allows users to display, copy, and print the contents of a graphics file,
such as a photo. With the image viewer, users can see images without having to open them in a
paint or image editing program.

 Uninstaller

An uninstaller is a tool that removes a program, as well as any associated entries in the system files.
When you install a program, the operating system records the information it uses to run the
software in the systems files. The uninstaller deletes files and folders from the hard disk, as well as
removes programs entries from the system files.

 Disk Cleanup

A disk cleanup tool searches for and removes unnecessary files.

 Disk Defragmenter

A disk defragmenter is a tool that reorganizes the files and unused space on a computer’s hard disk
so that the operating system accesses data more quickly and programs run faster. Fragmentation
slows down file access and thus the performance of the entire computer. Defragmenting the disk, or
reorganizing it so that the files are stored in a contiguous sectors, solves this problem.

 Screen Saver

A screen saver is a tool that causes a display device’s screen to show a moving image or
blank screen if no keyboard or mouse activity occurs for a specified time.

 File Compression

A file compression tool shrinks the size of a file(s). A compressed file takes up less storage
space than the original file. You may need to compress a file so that it will fit on a smaller

Page 22 of 61
storage medium, such as USB flash drive. Uploading and downloading compressed files to
and from the internet reduces the file transmission time.

 PC Maintenance

A PC maintenance tool is a program that identifies and fixes operating system problems,
detects and repairs drive problems, and includes the capability of improving a computer’s
performance.

 Backup and Restore

A backup tool allows users to copy, or back up, selected files or the contents of an entire storage
medium to another storage location. A restore tool reverses the process and returns backed up
files to their original form

REVIEW QUESTIONS

The Checkpoint exercises test your knowledge of the chapter concepts. The page number
containing the answer appears in parentheses after each exercise. The Consider this
exercises challenge your understanding of chapter concepts.

Discover more: Visit this chapter’s premium content to complete the Checkpoint exercises
interactively; complete the self-assessment in the Test Prep resource from your
smartphone, tablet, laptop, or desktop; and then take the Practice Test

Mark T for True and F for False.

1. _____ Application software serves as the interface between the user, the apps, and the
computer’s or mobile device’s hardware.
2. _____ While a computer or mobile device is running, the operating system remains in
memory.
3. _____ Open source software is mass-produced, copyrighted software that meets the
needs of a wide variety of users.
4. _____ When downloading shareware, freeware, or public-domain software, it is good
practice to seek websites with ratings for and reviews of products.
5. _____ with web apps, you always access the latest version of the software.
6. _____ with database software, users run functions to retrieve data.

Page 23 of 61
7. _____ Software suites offer three major advantages: lower cost, ease of use, and
integration.
8. _____ A PDF file can be viewed and printed without the software that created the original
document.
9. _____ the military and airlines use CBT simulations to train pilots to fly in various conditions
and environments.
10. _____ A router also can function as a hardware firewall.

Multiple Choice: Select the best answer.

1. _____ software performs functions specific to a business or industry.


a. Retail
b. Open source
c. Shareware
d. Custom

2. A(n) _____ is the right to use a program or app.


a. license agreement
b. product activation
c. software registration
d. automatic update

3. _____ software is an application that allows users to organize data in columns and rows
and perform calculations on the data.
a. Spreadsheet
b. Database
c. Presentation
d. Document management

4. _____ is a type of application that assists professionals and designers in creating


engineering, architectural, and scientific designs and models.
a. Enterprise software
b. CAD software
c. Public-domain software
d. A software suite

Page 24 of 61
5. The term _____ refers to removing unwanted areas of a photo.
a. crop
b. snip
c. compress
d. shrink

6. A(n) _____ is a device intended to stop network intrusions before they attempt to affect
your computer or network maliciously.
a. anti-spam program
b. pop-under blocker
c. hardware firewall
d. quarantine drive

7. _____ is a small text file that a web server stores on your computer.
a. A pop-under blocker
b. A cookie
c. Adware
d. Spyware

Short Questions

1. What is system software?


2. What are the advantages of open source software?
3. Why do app developers opt for web delivery?
4. What is the difference between software registration and product activation?
5. In reference to malware, what is a quarantine?
6. What is a phishing scam?
7. Why is spam potentially dangerous?
8. What are the different types of file, disk, and system management tools?
9. How does a search tool locate a file on your computer or mobile device? 10. How does
fragmentation affect a computer’s performance?

Group Activities

The How To: Your Turn exercises present general guidelines for fundamental skills when
using a computer or mobile device and then require that you determine how to apply these
general guidelines to a specific program or situation.

Discover more: Visit this chapter’s premium content to challenge yourself with additional
How To: Your Turn exercises, which include App Adventure.

Page 25 of 61
Instructions: You often can complete tasks using technology in multiple ways. Figure out
how to perform the tasks described in these exercises by using one or more resources
available to you (such as a computer or mobile device, articles on the web or in print, online
or program help, user guides, blogs, podcasts, videos, other individuals, trial and error,
etc.). Summarize your ‘how to’ steps, along with the resource(s) used, in the format
requested by your instructor (brief report, presentation, discussion, blog post, video, or
other means).

Obtain Help about Programs and Apps Multiple ways are provided to obtain help while using
the programs and apps on a computer or mobile device. The program or app developer
usually includes a Help feature in the program and/or online. In addition, third parties often
post resources online that can provide further assistance. The following steps describe how
to obtain help about various programs and apps using various methods.

Help System
You typically can access help in a program or app using one of the following methods:

• Tap or click the Help or Information icon in the program or app. The appearance of Help or
Information icons may vary, but typically they are identified by a question mark or the letter
‘i’ formatted in italic.
• Navigate the program or app’s menu to locate the Help command.
• If you are using a program or app on a Windows laptop or desktop, press the F1 key on the
keyboard to display Help content.

Online Help

Online help usually is available from the program or app developer. The following steps
describe how to obtain online help.
a. Navigate to the program or app developer’s website.
b. Locate, and then tap or click a Help or Support link.
c. Select the program or app for which you wish to obtain help to display the help
information.

Searching for Help

In addition to obtaining help from within a program or app or on the developer’s website,
you also can search the web for help as described in the following steps.
a. Navigate to a search engine, such as google.com or yahoo.com.
b. Type the program or app name, as well as the type of help for which you are searching, as
the search text, and then press the enter key or tap or click the Search (or a similar) button.
c. Scroll through the search results and then tap or click the search result to display more
information. Be aware that not all help originates from reputable or accurate sources.

Page 26 of 61
Exercises
1. Under what circumstances would you use each of these methods to obtain help with a
program or app you are using?
2. Compare and contrast the different methods of obtaining help. Which method do you
think is the best? Why?
3. What are some reputable websites that can provide you with help for the operating system
installed on your computer? Why do you consider them reputable?

Page 27 of 61
TOPIC 2: DIGITAL SAFETY AND SECURITY

Learning Outcomes

After reading this Section of the guide, the learner should be able to:
1. Define the term, digital security risks, and briefly describe the types of
cybercriminals
2. Describe various types of Internet and network attacks, and explain ways to
safeguard against these attacks
3. Discuss techniques to prevent unauthorized computer access and use
4. Explain the ways that software manufacturers protect against software piracy
5. Discuss how encryption, digital signatures, and digital certificates work
6. Identify safeguards against hardware theft, vandalism, and failure
7. Explain the options available for backing up
8. Identify risks and safeguards associated with wireless communications
9. Recognize issues related to information accuracy, intellectual property rights,
codes of conduct, and green computing
10. Discuss issues surrounding information privacy

2.1 DIGITAL SECURITY RISKS

A digital security risk is any event or action that could cause a loss of or damage to a computer or
mobile device hardware, software, data, information, or processing capability. The more common
digital security risks include Internet and network attacks, unauthorized access and use, hardware
theft, software theft, information theft, and system failure.

 Cybercrime

Any illegal act involving the use of a computer or related devices generally is referred to as a computer
crime. The term cybercrime refers to online or Internet-based illegal acts such as distributing malicious
software or committing identity theft. Software used by cybercriminals sometimes is called
crimeware.

Page 28 of 61
Cybercrime typically fall into one of these basic categories:

 Hacker
 Cracker
 Script kiddie
 Cyberextortionist
 Cyber terrorist

2.2 INTERNET AND NETWORK ATTACKS

Information transmitted over networks has a higher degree of security risk than information kept on
an organization’s premises.

 Malware

Malware, short for malicious software, consists of programs that act without a user’s knowledge and
deliberately alter the operations of computers and mobile devices. A common way that computers
and mobile devices become infected with viruses and other malware is through users opening
infected email attachments.

Page 29 of 61
 Botnets

A botnet is a group of compromised computers or mobile devices connected to a network. A


compromised computer or device, known as a zombie, is one whose owner is unaware the
computer or device is being controlled remotely by an outsider. A bot is a program that performs a
repetitive task on a network.

 Denial of Service Attack

A denial of service attack (DoS attack) disrupts computer access to an Internet service. A more
devastating type of DoS attack is the distributed DoS attack (DDoS attack) in which

 Back Doors

A back door is a program or set of instructions in a program that allow users to bypass security
controls when accessing a program, computer, or network.

 Spoofing

Spoofing is a technique intruders use to make their network or internet transmission appear
legitimate to a victim computer network. Two common types of spoofing schemes are:

 Email spoofing
 IP spoofing

2.2.1 Safeguards against Internet and Networks Attacks

Methods that protect computers, mobile devices and networks from attacks include the following:

 Use antivirus software


 Be suspicious of unsolicited email attachments
 Scan removable media for malware before using it
 Implement firewall solutions
 Back up regularly

 Firewalls

A firewall is a hardware and/ or software that protects a network’s resources from intrusion by
users on another network such as the Internet.

Page 30 of 61
A firewall is a program or hardware device that filters the data packets coming through the internet
connection into your personal computer or into a company's network. It is set up to allow mainly one
way access, i.e. you can go out onto the internet and access pages, but it checks everything coming
back against a set of rules. If the data coming back is from an unauthorised source, then it is blocked.

You may have heard people saying, 'I can't get on that site at school because it's been blocked'; that
is the firewall in action.

Firewalls can also protect your system from hackers who might try to 'break-in' and access or steal
data.

Page 31 of 61
2.3 UNAUTHORISE ACCESS AND USE

Unauthorised access is the use of a computer or network without permission.

Organizations take several measures to help prevent unauthorized access and use

 Acceptable use policy


 Disable file and printer sharing

 Access Controls

Access controls define who can access a computer, device, or network; when they can access it; and
what actions they can take while accessing it. The computer, device, or network should maintain an
audit trail that records in a file both successful and unsuccessful access attempts. An unsuccessful
access attempt could result from a user mistyping his or her password or it could result from a
perpetrator trying thousands of passwords.

 Possessed Objects

A possessed object is any item that you must possess, or carry with you, in order to gain access to a
computer or computer facility. A PIN (personal identification number), sometimes called a passcode,
is a numeric password, either assigned by a company or selected by a user. PINs provide an
additional level of security. An ATM card typically requires a 4 digit PIN. If someone steals these
cards, the thief must enter the user’s PIN to access the account.

 Biometric Devices

A biometric device authenticates a person’s identity by translating a personal characteristic into a


digital code that is compared with a digital code in a computer or mobile device verifying a physical
or behavioral characteristic. If the digital code of the computer does not match the personal
characteristic code, the computer denies access to the individual.

 Examples of Biometric devices are:


Fingerprint Reader
Face Recognition System
Hand Geometry System
Voice Verification System
Signature Verification System

Page 32 of 61
Iris Recognition System

 Digital Forensics

Digital forensics is the discovery, collection, and analysis of evidence found on computers and
networks. Digital forensics involves the examination of media, programs data and log files on
computers, mobile devices, servers, and networks. Many areas use digital forensics, including law
enforcement, criminal prosecutors, military intelligence, insurance agencies, and information
security departments in the private sector.

2.4 SOFTWARE THEFT

Software theft occurs when someone steals software media, intentionally erase programs, illegally
registers and/or activates a program, or illegally copies a program. It includes the following:

 Physically stealing software


 Intentionally erasing software
 Illegal copying
 Illegal registration/ activation

 Safeguards against Software Theft

Many manufacturers incorporate an activation process into their programs to ensure the
software is not installed on more computers than legally licensed. During the product
activation, which is conducted either online or by phone, users provide the software
product’s identification number to associate the software with the computer or mobile
device on which the software is installed. A license agreement is the right to use software

2.5 INFORMATION THEFT

Information theft occurs when someone steals personal or confidential information. An


information theft is often linked to other types of cybercrime. For example, a corrupt person
may steal credit card numbers to make fraudulent purchases.

 Encryption

Encryption is a process of converting data that is readable by humans into encoded


characters to prevent unauthorized access. The encrypted (scrambled) data is called

Page 33 of 61
ciphertext. An encryption algorithm, or cypher, is a set of steps that can convert readable
plaintext into unreadable ciphertext. Two basic types of encryption are private key and
public key. With private key encryption, also called symmetric key encryption, both the
originator and the recipient use the same secret key to encrypt and decrypt the data. Public
key encryption, also called asymmetric key encryption, uses two encryption keys: a public
key and a private key .

Mobile users today often access their company networks through a virtual private network.
When a mobile user connects to a main office using a standard Internet connection, a virtual
private network (VPN) provides the mobile user with a secure connection to the company
network server, as if the user has a private line. VPNs help ensure that data is safe from being
intercepted by unauthorized people by encrypting data as it transmits from a laptop,
smartphone, or other mobile device.

 Digital signature

A digital signature is an encrypted code that a person, website, or organization attaches to


an electronic message to verify the identity of the message sender. Digital signatures often
used to ensure that an impostor is not participating in an Internet transaction. A digital
certificate is a notice that guarantees a user or a website is legitimate. A website that uses
encryption techniques to secure its data is known as a secure site.

2.5 HARDWARE THEFT, VANDALISM, AND FAILURE

Hardware theft is the act of stealing digital equipment. Hardware vandalism involves
defacing or destroying digital equipment. Hardware can fail for a variety of reasons: aging

Page 34 of 61
hardware, natural or man-made disasters, or random events such as electrical power
problems, and even errors in programs or apps.

 Summary of the Hardware Theft and Vandalism Safeguards


 Alarm system
 Physical access controls i.e. Locked doors and windows)
 Physical security device (i.e. cables and locks)
 Device- tracking app
 Hardware Failure Safeguards
 Surge protector
 Uninterruptible power supply (UPS)
 Duplicate components or duplicate computers
 Fault- tolerant computers

2.6 BACKING UP- THE ULTIMATE SAFE GUARD

To protect against data loss caused by hardware/software/information theft or system


failure, users should back up computer and mobile device files regularly. A backup is a
duplicate of a file, program, or media that can be used if the original is lost, damaged, or
destroyed. To back up a file means to make a copy of it. In case of system failure or the
discovery of corrupted files, you restore the files by copying the backed up files to their
original location on the computer or mobile device. Off-site backups are stored in a location
separate from the computer or mobile device site

• Categories of backups:

 Full

 Differential

 Incremental

 Selective

 Continuous data protection

 Cloud

Page 35 of 61
Read Table 5-3, page 220 of the prescribed book, Various Backup Methods.

 Three generations of Backup

Some users or companies implement a three generation backup policy to preserve three
copies of important files

Grandparent

Parent

Child

 Grandparent

This is the oldest copy of the files

 The Parent

It is the second oldest copy of the file

 The child

It is the most recent copy of the file

2.7 WIRELESS SECURITY

Although wireless access provides many conveniences to users, it also poses additional
security risks. Some perpetrators connect to other’s wireless networks to gain free Internet
access; others may try to access an organization’s confidential data. Others connect to a
network through an unsecured wireless access point (WAP) or combination router/WAP

Page 36 of 61
2.8 ETHICS AND SOCIETY

As with any powerful technology, computers and mobile devices can be used for both good and bad
intentions. The standards that determine whether an action is good or bad are known as ethics.

Computer ethics also known as technology ethics are moral guidelines that govern the use of
computers, mobile devices and information systems. Frequently discussed areas of computer ethics
are unauthorized use of computers, mobile devices, and networks; software theft (piracy);
information accuracy; intellectual property rights; codes of conducts, green computing; and
information privacy.

 Information Accuracy

Information accuracy is a concern today because many users access information maintained by other
people or companies, such as on the Internet. Sometimes it is assumed that because the information
is on the Web therefor it is correct of which, that is not true.

 Intellectual Property Rights

Intellectual property (IP) refers to unique and original works, such as ideas, inventions, art, writings,
processes, company and product names, and logos. Intellectual property rights are the rights to which
creators are entitled for their work. A copyright gives authors, artists, and other creators of original
work exclusive rights to duplicate, publish, and sell their materials. A copyright protects any tangible
form of expression. A common infringement of copyright is piracy, where people illegally copy
software, movies, and music.

 Code of Conduct

A code of conduct is a written guideline that helps determine whether a specification is


ethical/unethical or allowed/not allowed. An IT code of conduct focuses on accept- able use of
technology. Employers and schools often specify standards for the ethical use of technology in an IT
code of con- duct and then distribute these standards to employees and students.

 Green Computing

People use, and often waste, resources such as electricity and paper while using technology. Green
computing involves reducing the electricity and environmental waste while using computers, mobile
devices, and related technologies. The United States Department of Energy (DOE) and the United
States Environmental Protection Agency (EPA) developed the ENERGY STAR program to help reduce
the amount of electricity used by computers and related devices. This program encourages

Page 37 of 61
manufacturers to create energy-efficient devices. For example, many devices switch to sleep or power
save mode after a specified number of inactive minutes or hours. Personal computers, displays,
printers, and other devices should comply with guidelines of the ENERGY STAR program.

Green Computing Tips

1. Conserve Energy

 Use computers and devices that comply with the ENERGY STAR program.
 Do not leave a computer or device running overnight. c. Turn off the monitor, printer,
and other devices when not in use.

2. Reduce Environmental Waste

 Use paperless methods to communicate.


 Recycle paper and buy recycled paper.
 Recycle toner and ink cartridges, computers, mobile devices, printers, and other
devices.
 Telecommute.
 Use videoconferencing and VoIP for meetings.

Measures that organizations can use to reduce electrical waste:

 Consolidate servers by using virtualization.


 Purchase high-efficiency equipment.
 Use sleep modes and other power management features for computers and devices.
 Buy computers and devices with low power consumption processors and power supplies.
 When possible, use outside air to cool the data center or computer facility.
2.9 INFORMATION PRIVACY

Information privacy refers to the right of individuals and companies to deny or restrict the
collection, use, and dissemination of information about them. Organizations often use huge
databases to store records, such as employee records, medical records, financial records, and more.
Much of the data is personal and confidential and should be accessible only to authorized users.

 Electronic Profiles
 Cookies

Page 38 of 61
A cookie is a small text file that a web server stores on your computer. Cookie files typically contain
data about you, such as your user name, postal code, or viewing preferences. Websites uses cookies
for variety of purposes:

 Most websites that allow for personalization use cookies to track user preferences.
 Some websites use cookies to store user names and/or passwords, so that users do not need
to enter this information every time they sign in to the website.
 Online shopping sites generally use a session cookie to keep track of items in a user’s
shopping cart. This way, users can start an order during one web session and finish it on
another day in another session. Session cookies usually expire after a certain time, such as a
week or a month.
 Some websites use cookies to track how often users visit a site and the webpages they visit
while at the website.
 Websites may use cookies to target advertisements. These websites store a user’s interests
and browsing habits in the cookie.

 Phishing

Phishing is a scam in which a perpetrator sends an official looking email message that attempts to
obtain your personal and /or financial information. These messages look legitimate and request that
you update credit card numbers, Social Security numbers, bank account numbers, passwords, or
other private information. Clickjacking is yet another scam. Clickjacking, an object that can be clicked
on a website, such as a button, Image, or link, contains a malicious program. When a user clicks the
disguised object, a variety of nefarious events may occur.

 Spyware and Adware

Spyware is a program placed on a computer or mobile device without the user’s knowledge that
secretly collects information about the user and then communicates the information it collects to
some outside source while the user is online. Some vendors or employers use spyware to collect
information about program usage or employees. Internet advertising firms often collect information
about users’ web browsing habits. Adware is a program that displays an online advertisement in a
banner or pop-up window on webpages, email messages, or other Internet services. Adware on
mobile phones is known as madware, for mobile adware.

Page 39 of 61
 Social Engineering

Social engineering is defined as gaining unauthorized access to or obtaining confidential information


by taking advantage of the trusting human nature of some victims and the naivety of others. Some
social engineers trick their victims into revealing confidential information such as user names and
passwords on the phone, in the phone, in person, or on the Internet.

 Privacy Laws

The concern about privacy has led to the enactment of federal and state laws regarding the storage
and disclosure of personal data.

 Employee Monitoring

Employee monitoring involves the use of computers, mobile devices, or cameras to observe, record,
and review an employee’s use of a technology, including communications such as email messages,
keyboard activity (used to measure productivity), and websites visited. Many programs exist that
easily allow employers to monitor employees. Further, it is legal for employers to use these programs

 Content Filtering

Content filtering is the process of restricting access to certain material. Many businesses use
content filtering to limit employee’s web access. Web filtering software is a program that restricts
access to specified website.

REVIEW QUESTIONS

The Checkpoint exercises test your knowledge of the chapter concepts. The page number
containing the answer appears in parentheses after each exercise. The Consider this exercises
challenge your understanding of chapter concepts.

Discover More: Visit this chapter’s premium content to complete the Checkpoint exercises
interactively; complete the self-assessment in the Test Prep resource from on your
smartphone, tablet, laptop, or desktop; and then take the Practice Test.

Mark T for True and F for False.

1. _____Any illegal act involving the use of a computer or related devices generally is
referred to as a crime ware.
2. _____A rootkit displays an online advertisement in a banner or pop-up window on
webpages, email, or other Internet services.
3. _____ Viruses, worms, and other malware can be hidden in downloaded game files and
mobile apps.
4. _____An audit trail records in a file both successful and unsuccessful access attempts.
5. _____It is good practice to change your password frequently.
6. _____Intentionally erasing software would be considered software theft.

Page 40 of 61
7. _____A typical license agreement allows you to rent or lease the software.
8. _____ Unencrypted, readable data is called cipher text.
9. _____Private key encryption also is called asymmetric key encryption.
10. _____VPNs encrypt data to help ensure that the data is safe from being intercepted by
unauthorized people.

Multiple Choice: Select the best answer.

A _____ is someone who demands payment to stop an attack on an organization’s


technology infrastructure.
a. cyberterrorist
b. script kiddie
c. cracker
d. cyber extortionist

2. _____ is a program that hides in a computer or mobile device and allows someone from a
remote location to take full control of the computer or device.
a. A rootkit
b. Spyware
c. A Trojan horse
d. Adware

3. A ____ is a program or set of instructions in a program that allows users to bypass security
controls when accessing a program, computer, or network.
a. zombie
b. botnet
c. back door
d. session cookie

4. An employee using an organization’s computer to send personal email messages might be


an example of _____.
a. cybercrime
b. hardware vandalism
c. intellectual property rights violation
d. unauthorized access and use

Page 41 of 61
5. A _____ is a private combination of words, often up to 100 characters in length and
containing mixed capitalization and punctuation, associated with a user name that allows
access to certain computer resources.
a. passphrase
b. private key
c. passcode
d. encryption algorithm

6. A (n) _____ is a set of characters that the originator of the data uses to encrypt the text
and the recipient of the data uses to decrypt the text.
a. cipher
b. plaintext
c. public key
d. encryption key

7. A (n) _____ backup method is the only real-time back up, providing very fast recovery of
data.
a. selective
b. full
c. incremental
d. continuous data protection

Short Questions

1. What are some common digital security risks?


2. How does a hacker differ from a cracker?
3. What is cyberwarfare?
4. What is a hacktivist?
5. What is a password manager?
6. Are passphrases more secure than passwords? Why or why not?
7. What is meant by a three-generation backup policy?
8. What should you include in a disaster recovery plan for natural disasters?
9. What should you include for man-made disasters?
10. What steps can you take to secure your wireless network?
11. What screening techniques do proxy servers use?
12. How does unauthorized access differ from unauthorized use?

Page 42 of 61
Group Activities

How to: Your Turn Update Virus Definitions

In addition to installing or activating an antivirus program on your computer or mobile device


to keep it safe from viruses, it also is necessary to keep the virus definitions updated so that
the antivirus program can search for and detect new viruses on your computer or mobile
device. New virus definitions can be released as often as once per day, depending on the
number of new viruses that are created. Antivirus programs either can search for and install
new virus definitions automatically at specified intervals, or you can update the virus
signatures manually. The following steps describe how to update the virus definitions for an
antivirus program.

Update Virus Definitions Manually

a. If necessary, establish an Internet connection so that you will be able to update the virus
definitions.
b. Run an antivirus program.
c. Tap or click the button to check for updated virus definitions.
d. If new virus definitions are available for the antivirus program, tap or click the link to
download the definitions to the computer or mobile device.
e. When the update is complete, tap or click the button to scan the computer or mobile
device for viruses.

Configure Automatic Updates for Virus Definitions


a. If necessary, establish an Internet connection so that you will be able to update the virus
definitions.
b. Run an antivirus program.
c. Tap or click the option to update virus definitions automatically.
d. Tap or click the option to display the virus definition update schedule.
e. To provide the maximum protection from viruses, configure the antivirus program to
update definitions as frequently as possible.
f. After configuring the update schedule, tap or click the button to update virus definitions
manually. g. When the update is complete, tap or click the button to scan the computer or
mobile device for viruses.

Exercises

Page 43 of 61
1. What antivirus program, if any, currently is installed on your computer? Is it scheduled to
update virus definitions automatically?
2. In addition to downloading and installing virus definitions from within the antivirus
program, are other ways available to obtain the latest virus definitions?
3. In addition to keeping the antivirus program’s virus definitions current, what other ways
can you protect a computer or mobile device from viruses?

Page 44 of 61
TOPIC 3: DIGITAL STORAGE

Learning Outcomes

After reading this Section of the guide, the learner should be able to:
1. Differentiate between storage and Memory
2. Describe the characteristics of internal hard disks
3. Identify uses of external hard disks and RAID
4. Describe the benefits of solid-state drives
5. Differentiate among various types of memory cards and USB flash drives
6. Discus the benefits and uses of cloud storage
7. Describe characteristics of and differentiate among types of optical discs
8. Explain types of enterprise storage: RAID, NAS, SAN and tape
9. Identify uses of magnetic stripe cards, smart cards, RFID tags, and microfilm and
microfiche

3.1 STORAGE

Page 45 of 61
A storage medium, also called secondary storage, is the physical material on which a computer keeps
data, information, programs, and applications. Examples of storage media include hard disks, solid-
state drives (both of which can be internal or external), memory cards, USB flash drives, optical discs,
network attached storage devices, magnetic stripe cards, smart cards, RFID tags, and NFC tags.
Another storage option is cloud storage, which keeps information on servers on the Internet.

In addition to programs and apps, users store a variety of data and information on storage media in
their computers and mobile devices or on cloud storage. For example, many users store digital photos,
appointments, schedules, contacts, email messages, and tax records. A home user also might store
budgets, bank statements, a household inventory, stock purchase records, homework assignments,
recipes, music, and videos. A storage device is the hardware that records and/or retrieves items to
and from storage media. Writing is the process of transferring data, instructions, and information from
memory to a storage medium. Reading is the process of transferring these items from a storage
medium into memory. When storage devices write on storage media, they are creating output.
Similarly, when storage devices read from storage media, they function as a source of input.

3.1.1 Storage Capacity

Capacity is the number of bytes (characters) a storage medium can hold. Table 8-1 identifies the terms
manufacturers may use to define the capacity of storage media. For example, a storage medium with
a capacity of 750 GB can hold approximately 750 billion bytes.

3.1.2 Storage versus Memory

Items on a storage medium remain intact even when you turn off a computer or mobile device. Thus,
a storage medium is non-volatile. Most memory (i.e., RAM), by contrast, holds data and instructions
temporarily and, thus, is volatile.

Page 46 of 61
3.1.3 Storage Access Times

The speed of storage devices and memory is defined by access time. Access time measures

(1) The amount of time it takes a storage device to locate an item on a storage medium or

(2) The time required to deliver an item from memory to the processor.

The access time of storage devices is slow, compared with the access time of memory. Memory (chips)
accesses items in billionths of a second (nanoseconds). Storage devices, by contrast, access items in
thousandths of a second (milliseconds) or millionths of a second (microseconds). Transfer rate is the
speed with which data, instructions, and information transfer to and from a device. Transfer rates for
storage are stated in KBps (kilobytes per second), MBps (megabytes per second), and GBps (gigabytes
per second).

3.2 HARD DISKS

A hard disk, also called a hard disk drive (HDD), is a storage device that contains one or more inflexible,
circular platters that use magnetic particles to store data, instructions, and information. The term,
hard drive, refers collectively to hard disks and SSDs. Hard drives can be internal or external. That is,
they can reside inside a computer or mobile device, or they can be an external device that connects
to a computer or some mobile devices. A hard disk, also called a hard disk drive (HDD), is a storage
device that contains one or more inflexible, circular platters that use magnetic particles to store data,
instructions, and information. Desktop and laptops often contain at least one hard disk. The entire
hard disk is enclosed in an airtight, sealed case to protect it from contamination.

Reading is the process of transferring


items from a storage medium into
memory

Writing is the process of transferring


items from memory to a storage
medium

Page 47 of 61
Hard disks are read/write storage media. Before any data can be read from or written on a hard disk,
however, the disk must be formatted. Formatting is the process of dividing the disk into tracks and
sectors, so that the operating system can store and locate data and information on the disk. A track is
an arrow recording band that forms a full circle on the surface of the disk. The disk’s storage locations
consist of wedge-shaped sections, which break the tracks into small arcs called sectors. On a hard disk,
a sector typically stores up to 512 bytes of data.

 Characteristics of a Hard Disk

The storage capacity of hard disks varies and is determined by the number of platters the hard disk
contains, the composition of the magnetic coating on the platters etc.

 A platter is made of aluminium, glass or ceramic and has a thin coating of alloy material that
allows items to be recorded magnetically on its surface
 Longitudinal recording aligns the magnetic particles horizontally around the surface of the
disk.
 Perpendicular recording, by contrast, hard disks align the magnetic particles vertically or
perpendicular to the disk’s surface , making much greater storage capacities possible
 Density is the number of bits in an area on a storage medium. A higher density means more
storage capacity.

Page 48 of 61
 SSD

An SSD (solid-state drive) is a flash memory storage device that contains its own processor to
manage its storage. Flash memory chips are a type of solid-state media, which means they consist
entirely of electronic components, such as integrated circuits, and contain no moving parts.

A head crash occurs when a read/write head touches the surface of a platter. Always keep a
backup of your hard disk. An SSD (solid state drive) is a flash memory storage device that contains
its own processor to manage its storage. An SSD (solid state drive) has several advantages over
traditional (magnetic) hard disks:

SSDs have several advantages over traditional (magnetic) hard disks, including the following:

 Faster access times (can be more than 100 times faster)


 Faster transfer rates

Page 49 of 61
 Quieter operation
 More durable
 Lighter weight
 Less power consumption (leads to longer battery life)
 Less heat generation
 Longer life (more than 10 times longer)
 Defragmentation is not required

SSDs may be in the form of flash memory chips installed directly on a motherboard or an adapter card.
They also may be housed in a separate casing that attaches to the motherboard.

 External Hard Disks

An external hard drive is a separate freestanding storage device that connects with a cable to
a USB port or other port on a computer or mobile device. Both hard disks and SSDs are
available as external hard drives. Smaller external hard drives are portable and enable mobile
users to transport photos and other files from one computer to another easily. External hard
drives units can include multiple hard drives that you can use for different purposes, if
desired.

 RAID

A group of two or more integrated hard drives is called a RAID (redundant array of
independent disks). RAID is an ideal storage solution in situations where uninterrupted access
to the data is critical.

Page 50 of 61
3.3 PORTABLE FLASH MEMORY STORAGE

In addition to SSDs discussed in the previous section, two other widely used types of flash
memory storage include memory cards and USB flash drives.
 Memory cards

Memory cards enable mobile users easily to transport digital photos, music, videos, or other
files to and from mobile devices and computers or other devices. A memory card is a
removable flash memory storage device, usually no bigger than 1.5 inches in height or width
that you insert in and remove from a slot in a computer, mobile device, or card reader/writer.
Common types of memory cards includes the following:

 CF (CompactFlash)
 SDHC(Secure Digital High Capacity)
 SDXC(Secure Digital Expanded Capacity)
 miniSD
 microSD
 microSDHC
 microSDXC
 xD Picture Card
 Memory Stick PRO Duo
 M2(Memory Stick Micro)

Page 51 of 61
 USB Flash Drives

USB flash drive, sometimes called a thumb drive, is a flash memory storage device that plugs
in a USB port on a computer or mobile device. With a USB flash drive, users easily transfer
documents, photos, music, and videos from one computer to another. Storage capacities of
USB flash drives vary.

Page 52 of 61
3.4 CLOUD STORAGE

Cloud storage is an Internet service that provides storage to computer or mobile device
users. Cloud storage is available for home and business users, with various levels of storage
services available.

What are some advantages of cloud storage?

Users subscribe to cloud storage for a variety of reasons:


 To access files on the Internet from any computer or device that has Internet access
 To store large audio, video, and graphics files on the Internet instantaneously,
instead of spending time downloading to a local hard drive or other media
 To allow others to access their files on the Internet so that others can listen to an
audio file, watch a video clip, or view a photo — instead of sending the file to them
via an email message
 To view time-critical data and images immediately while away from the main office
or location; for example, doctors can view X-ray images from another hospital,
home, or office, or while on vacation
 To store off-site backups of data
 To provide data center functions, relieving enterprises of this task

 Optical Disc
An optical disc consists of a flat, round, portable disc made of metal, plastic, and lacquer
that is written and read by a laser. Optical discs used in computers typically are 4.75 inches
in diameter and less than one-twentieth of an inch thick.

Page 53 of 61
 Characteristics of Optical Discs

Optical discs store items by using microscopic pits (indentations) and lands (flats areas) that are in the
middle layer of the disc. Optical discs commonly store items in a single track that spirals from the
center of the disc to the edge of the disc. Track is divided into evenly sized sectors.

 CDs

CDs are available in three basic formats: read-only, recordable, and rewritable

 CD-ROM
 CD-R
 CD-RW

 DVDs

Page 54 of 61
As with CDs, are available in three basic formats: read-only, recordable, and rewritable.

 DVD-ROM
 DVD-R and DVD+R
 DVD-RW, DVD+RW, DVD+RAM

3.5 ENTERPRISE STORAGE

Enterprise hardware allows large organizations to manage and store data and information using
devices intended for heavy use, maximum efficiency, and maximum availability. The availability of
hardware to users is a measure of how often it is online. Enterprise storage often uses Fibre Channel
(FC) technology as the interface that connects the devices to the network because FC technology has
much faster transmission rates than SCSI and other previously discussed interfaces.

 NAS and SAN

Network attached storage (NAS) is a server that is placed on a network with the sole purpose of
providing storage to users, computers, and devices attached to the network. A network attached
storage server, often called a storage appliance, has its own IP address, usually does not have a
keyboard or display, and contains at least one hard drive, often configured in a RAID. Administrators
can add storage to an existing network quickly by connecting a network attached storage server to a
network.

A storage area network (SAN) is a high-speed network with the sole purpose of providing
storage to other attached servers.

Page 55 of 61
 Tape
Tape is a magnetically coated ribbon of plastic capable of storing large amounts of data and
information. Tape no longer is used as a primary method of storage. Instead, businesses use
tape most often for long- term storage and backup.
Comparable to a cassette recorder, a tape drive reads from and writes on a magnetic tape.
Although older computers used reel-to-reel tape drives, today’s tape drives use tape
cartridges.

 Magnetic stripe card


A magnetic stripe card has a magnetic stripe that contains information. The information in
the stripe often includes your name, account number, and the card’s expiration date. When
you swipe the card through a magstripe reader, discussed in the previous chapter, it reads
information stored on the stripe.

Page 56 of 61
 Smart Cards
A smart card, which is an alternative to a magnetic stripe card, stores data on an integrated
circuit embedded in the card.
Two types of smart cards, also called chip cards, are:
 contact and
 Contactless
When you insert a contact smart card in a specialized card reader, the information on the
smart card is read and, if necessary, updated. Contactless smart cards communicate with a
reader using a radio frequency, which means the user simply places the card near the reader.

 RFID Tags
The RFID tag consists of an antenna and a memory chip that contains the information to be
transmitted via radio waves. RFID tags are either active or passive. An active RFID Tag contains
a battery that runs the chip’s circuitry and broadcasts a signal to the RFID reader. A passive
RFID tag does not contain a battery and, thus, cannot send a signal until the reader activates
the tag’s antenna by sending out electromagnetic waves.

 NFC Chips and Tags

Page 57 of 61
NFC is a technology (based on RFID) that uses close-range radio signals to transmit data
between two NFC-enabled devices or an NFC-enabled device and an NFC tag. NFC-enabled
devices include smartphones, digital cameras, computers, televisions, and terminals. An NFC-
enabled

REVIEW QUESTIONS
The Checkpoint exercises test your knowledge of the chapter concepts. The page number
containing the answer appears in parentheses after each exercise. The Consider this
exercises challenge your understanding of chapter concepts.

Discover More: Visit this chapter’s premium content to complete the Checkpoint exercises
interactively; complete the self-assessment in the Test Prep resource from your
smartphone, tablet, laptop, or desktop; and then take the Practice Test.

Mark T for True and F for False

1. _____ Storage devices can be categorized as input or output devices.


2. _____A storage medium is volatile; that is, items stored on it remain intact even when you
turn off a computer or mobile device.
3. _____Compared with the access time of memory, the access time of storage devices is
slow.
4. _____On storage media, a higher density means less storage capacity.
5. _____Because of current standards, head crashes no longer occur.
6. _____The access time of a hard disk can be more than 100 times faster than an SSD.
7. _____While encrypted files offer greater security than unencrypted files, an operating
system may require more time to open and access encrypted files.

8. _____While each program may use a different method of encrypting files, they all use the
process of cryptography.

Page 58 of 61
9. _____With serial transfers, data is sent one bit at a time.
10. _____When you are finished using a USB flash drive, simply remove it from the USB port.

Multiple Choice: Select the best answer.


1. _____ measures the amount of time it takes a storage device to locate an item on a storage
medium and/or the time required to deliver an item from memory to the processor.
a. Rpm(s)
b. Transfer time
c. Access time
d. Clock speed

2. A (n) _____ is a storage device that contains one or more inflexible, circular platters that
use magnetic particles to store data, instructions, and information.
a. hard disk
b. SSD
c. USB flash drive
d. optical disc

3. Which of the following is not an advantage of SSDs over hard disks?


a. faster transfer time
b. lighter weight
c. more durable
d. higher storage capacity

4. Which of the following is not an advantage of SSDs over hard disks?


a. faster transfer time
b. lighter weight
c. more durable
d. higher storage capacity

5. The process of copying audio and/or video data from a purchased disc and saving it on
your own media is called _____.
a. ripping
b. burning
c. tearing
d. formatting

6. A disc you can read but not write on or erase is a _____.


a. CD-RW
b. CD-ROM
c. multisession
d. WORM

Page 59 of 61
7. A selective backup sometimes is called a(n) _____ backup.
a. differential
b. incremental
c. partial
d. archival

8. Enterprise storage often uses _____ technology as the interface that connects the devices
to the network because it has much faster transmission rates than SCSI.
a. SAS
b. serial transfer
c. Fibre Channel (FC)
d. SATA

Short Questions
1. What are the differences among a CD-ROM, a CD-R, and a CD-RW?
2. What does redundancy mean with respect to enterprise storage?
3. What does the term, geofence, mean?
4. How does mirroring differ from striping?
5. How do businesses most often use tape?
6. Which is faster: sequential or direct access? Why?
7. What is contained in an NFC card?
8. What are three types of backup plans?
9. What does Creative Commons provide?
10. How does longitudinal recording differ from perpendicular recording?
11. What is a head crash?
12. What are some disadvantages of SSDs?
13. Why might you opt for a hard disk rather than an SSD?

GROUP ACTIVITIES

Copy Individual Files to Another Storage Device, and Copy Files to Cloud Storage If you save
a file on your computer or mobile device and later will need to access it on another device,
you likely will have to copy the file to another storage device or to the cloud so that you
can access the file on the other device. The following steps guide you through the process
of copying files to another storage device or to the cloud.

Copying Files to another Storage Device

a. Navigate to the location containing the file you want to copy. If the file is on an external
storage device or memory card, connect the storage device to your computer or insert the

Page 60 of 61
memory card into your computer’s card reader. Next, navigate to the location containing the
file you want to copy.
b. Navigate to the location to which you want to copy the file. If the location to which you
want to copy the file is on an external storage device or on a memory card, connect the
external storage device to your computer or insert the memory card into your computer’s
card reader. Next, navigate to the location to which you want to copy the file.
c. Drag the file you want to copy to the destination location. After you drag the file, make
sure the file exists both in the source and destination location.

Copying Files to the Cloud

a. If necessary, sign up for an account with an online service that can store your files. Some
online services store only photos and videos, while other services store all types of files, such
as documents and other media files.
b. Sign in to the online service and navigate to the page where you can upload files.
c. Tap or click the button or link to upload a file.
d. Navigate to and then tap or click the file you want to upload.
e. Tap or click the button or link to upload the file.

Exercises
1. What types of files might you want to copy to the cloud? Why would you copy files to
the cloud instead of copying them to an external storage device?

2. What are at least three online services that allow you to store files? Are they free, or do
they charge a fee? How much space do they provide? How do you obtain more storage
space?

3. What steps would you take to copy a file from the cloud to your computer or mobile
device?

Page 61 of 61

You might also like