Introduction To IT 500
Introduction To IT 500
Information Technology
Introduction to Information Technology 500
Year 1 Semester 2
Registered with the Department of Higher Education as a Private Higher Education Institution under the Higher Education Act, 1997.
Registration Certificate No. 2000/HE07/008
LEARNER GUIDE
MODULES: ,1752'8&7,2172,1)250$7,217(&+12/2*<(1' SEMESTER)
PREPARED ON BEHALF OF
RICHFIELD GRADUATE INSTITUTE OF TECHNOLOGY (PTY) LTD
Page 2 of 61
TABLE OF CONTENT
TOPICS
Prescribed Textbook
Vermaat, M. E. 2018. Discovering Computers, Essentials: Digital Technology,
Data & Devices. 1st Ed. UK: Cengage Learning. ISBN: 9781337285100
Page 3 of 61
TOPIC 1: PROGRAMS AND APPS (USING SOFTWARE AT SCHOOL, WORK AND HOME)
Learning Outcomes
After reading this Section of the guide, the learner should be able to:
1. Identify the general categories of programs and apps
2. Describe how an operating system interacts with applications and hardware
3. Describe how an operating system interacts with applications and hardware
4. Identify key features of productivity applications
5. Identify the purpose of software used in communications
6. Identify key features of productivity applications
7. Identify the purpose of software used in communications
8. Identify the purpose of software used in communications
9.
Defining Computer Program; a computer program is a set of instructions that directs a computer o
performs the tasks necessary to process data into information. Using programs and apps, you can
accomplish a variety of tasks on a computer and mobile device.
A program, or software, consists of a series of related instructions, organized for a common purpose,
that tells the computer what tasks to perform and how to perform them. An application, or app,
sometimes called application software, consists of programs designed to make users more productive
and/or assist them with personal tasks. Other programs, often called tools or utilities, enable you to
perform maintenance-type task usually related to managing devices, media, and programs used by
computer and mobile devices. An operating system is a set of programs that coordinates all the
activities among computer or mobile device hardware.
With programs and apps you can create letters, memos, reports, and other documents; develop
presentations; prepare and file taxes; draw and alter images; record and enhance audio and video
clips etc.
Page 4 of 61
Page 5 of 61
Example of How an Operating System Interacts with User, an Application, and Hardware
Software is available in variety of forms; retail, custom, web app, mobile app, mobile web app, open
source, shareware, freeware, and public domain.
Retail software
It is a mass-produced, copyrighted software that meets the needs of a wide variety of users, not
just single user or company. Some retail programs have a trial version.
Custom software
It performs functions specific to a business or industry. Sometimes a company cannot locate retail
software that meets its unique requirements. In this case the company may use software
developers to create tailor-made custom software. This software usually cost more than a retail
software.
Page 6 of 61
Web App
It is an application stored on a web server that you can access through a browser. Users typically
interact with web apps directly at a website.
A mobile app
It is an application you download from a mobile device’s app store, sometimes called a market place
It is a software provided for use, modification, and redistribution. This software has no restrictions
from the copyright holder regarding modification of the software’s internal instructions and its
redistribution. Open source can be downloaded from internet often at no costs.
Shareware
It is a copyrighted software that is distributed at no cost for a trial period. To use a shareware program
beyond that period, you send payment to the software developer.
Freeware
It is a copyrighted software provided at no cost by an individual or company that retains all right to
the software. The software developers cannot incorporate freeware in applications they intend to sell.
Public-domain software
This software has been donated for public use and has no copyright restrictions. Anyone can copy or
distribute public-domain software to others at no costs.
Productivity applications can assist you in becoming more effective and efficient while performing
daily activities at work, school, and home. Productivity applications include word processing,
presentation, spreadsheet, database, note work, calendar and contact management, project
Page 7 of 61
management, accounting, personal finance, legal, tax preparation, document management, support
services, and enterprise computing.
Project Development
With productivity applications, users often create, edit, format, save, and distribute projects.
When you create a project, you enter text or numbers, insert images, and perform other
tasks using a variety of inputs methods, such as keyboard, a mouse, touch or voice.
To edit a project means to make changes to its existing content.
When users format a project, they change its appearance.
When you save a document, the computer transfers the project from memory to local
storage medium, such as USB flash drive or hard disk, or cloud storage.
A hard copy is information that exists on a physical medium, such as paper. To generate a
hard copy, you print a project.
Word Processing
Word processing software, sometimes called a word processor, is an application that allows users to
create and manipulate documents containing mostly text and sometimes graphics.
Page 8 of 61
A major advantage of using word processing software is that it enables users to change their written
words easily. Word processing software also has many features to make a document professional and
visually appealing. Word processing was one of the earliest applications for the personal computer in
office productivity, and was the most widely used application on personal computers until the World
Wide Web rose to prominence in the mid-1990s. Typical features of a modern word processor include:
multiple font sets, spell checking, grammar checking, a built-in thesaurus, automatic text correction,
Web integration, HTML conversion, pre-formatted publication projects such as newsletters and to-do
lists, and much more. In its simplest form, a word processor is like an Expensive Typewriter or
Typewriter machine, with the improvement of being able to proofread, and correct mistakes before
printing.
Presentation Software
Presentation software allows users to create visual aids for presentations to communicate ideas,
messages, and other information to a group. The presentations can be viewed as slides, sometimes
called slide show, that are displayed on a large monitor or on a projection screen from a computer or
mobile device. It has three major functions: an editor that allows text to be inserted and formatted, a
method for inserting and manipulating graphic images, and a slide-show system to display the content.
Page 9 of 61
There are many different types of presentations including professional (work-related), education,
entertainment, and for general communication. Presentation programs can either supplement or
replace the use of older visual aid technology, such as pamphlets, handouts, chalkboards, flip charts,
posters, slides and overhead transparencies.
Spreadsheet
Spreadsheet software allows users to organize data in columns and rows and perform calculations on
the data. These rows and columns collectively are called worksheets. Most spreadsheet software has
basic features to help users create, edit, and format worksheets.
Page 10 of 61
Although spreadsheets are typically used with anything containing numbers, the uses of a spreadsheet
are almost endless. Below are some other popular uses of spreadsheets.
Finance
Spreadsheets are ideal for financial data, such as your checking account information, budgets,
transactions, billing, invoices, receipts, forecasts, and any payment system.
Forms
Form templates can be created to handle inventory, evaluations, performance reviews, quizzes, time
sheets, patient information, and surveys.
Teachers can use spreadsheets to track students, calculate grades, and identify relevant data, such as
high and low scores, missing tests, and students who are struggling.
Lists
Managing a list in a spreadsheet is a great example of data that does not contain numbers, but still
can be used in a spreadsheet. Great examples of spreadsheet lists include telephone, to-do, and
grocery lists.
Sports
Page 11 of 61
Spreadsheets can keep track of your favourite player stats or stats on the whole team. With the
collected data, you can also find averages, high scores, and other statistical data. Spreadsheets can
even be used to create tournament brackets.
Each worksheet usually can have thousands of columns and rows. A cell is the intersection of a
column and row.
Database
A database is a collection of data organized in a manner that allows access, retrieval, and use of that
data. Database software is an application that allows users to create, access, and manage a database
using data from the database; and create forms and reports using the data in the database. It is a
computer software application that interacts with the user, other applications, and the database itself
to capture and analyse data. Database software, sometimes referred to as database management
systems (DBMS) is primarily used to store and manage data/databases, typically in a structured
format. It generally provides a graphical interface that allows users to create, edit and manage data
fields and records in a tabular or organized form. The data/database stored using this software can be
Page 12 of 61
retrieved in a raw or report based format. For example, MS Access software allows users to create,
manage and query a database using its GUI controls and features, without having to write
programming queries.
Database software is used for a number of reasons in any industry - from keeping your bookkeeping
on task, compiling client lists to running your online Web site.
Existing DBMSs provide various functions that allow management of a database and its data which
can be classified into four main functional groups:
Data definition – Creation, modification and removal of definitions that define the
organization of the data.
Retrieval – Providing information in a form directly usable or for further processing by other
applications. The retrieved data may be made available in a form basically the same as it is
stored in the database or in a new form obtained by altering or combining existing data from
the database.
Page 13 of 61
Note taking
Note taking software is an application that enables users to enter typed text, handwritten comments,
drawings, sketches, photos, and links anywhere on a page.
Calendar and contact management software is an application that helps you organize your
calendar, keep track of contacts, and share this information with other users.
Page 14 of 61
Software Suite
Project management software is an application that allows a user to plan, schedule, track, and analyse
the events, resources, and costs of a project. It can manage estimation and planning, scheduling, cost
control and budget management, resource allocation, collaboration software, communication,
decision-making, quality management and documentation or administration systems.
Project management software provides small to large businesses, who undoubtedly juggle a number
of tasks, with a solution that helps keep them organized.
Page 15 of 61
Accounting Software
Accounting software is an application that helps businesses of all sizes record and report their
financial transactions.
Legal software
Legal software is an application that assists in the preparation of legal documents and provides legal
information to individuals, families, and small businesses. (Read page 164)
Page 16 of 61
Tax Preparation Software
Tax preparation software is an application that can guide individuals, families, or small businesses
through the process of filing federal and state taxes.
Document management software is an application that provides a means for sharing, distributing,
and searching through documents by converting them into a format that can be viewed by any user.
Page 17 of 61
Enterprise Computing
Many people work with software designed specifically for their field of work. Power users such as
architects, desktop publishers, and graphic artists often use sophisticated software that allows them
to work with graphics and media. Graphics and media applications include computer-aided design,
desktop publishing, paint/ image editing and photo management, clip art/image gallery, video and
audio editing, multimedia and website authoring, media players, and disc burning.
Computer-Aided Design
Computer Aided Design software is used to increase the productivity of the designer, improve the quality
of design, improve communications through documentation, and to create a database for manufacturing.
Computer-aided design (CAD) software is a type of application that assists professionals and designers in
creating engineering, architectural, and scientific designs and models. Three-dimensional CAD programs
Page 18 of 61
allow designers to rotate designs of 3-D objects to view them from any angle. These applications usually
contain thousands of pre-drawn plans that users can customise to meet their needs. For example home
design, landscaping software.
Desktop Publishing
Desktop publishing software (DTP software) is an application that enables designers to create sophisticated
publications that contain text, graphics, and many colours. Professional DTP software is ideal for the
production of high-quality colour documents such as textbooks, corporate newsletters, marketing
literature, product catalogues, and annual reports.
Image editing software is an application that provides the capabilities of paint software and also include
adjusting or enhancing image colours, adding special effects such as shadows and glows, creating
animations, and image stitching. Paint/ image editing software for the home or small business user
provides an easy-to-use interface; includes various simplified tools that allows you to draw pictures,
shapes, and other images. Paint software is also called illustration software, is an application that allows
users to draw pictures, shapes, and other graphics with various on-screen tools such as a pen, brush,
eyedropper, and paint bucket. These products also include many templates to assist you in adding images
to documents such as greeting cards, banners, calendars, signs, labels, business cards, and letterhead.
Multimedia authoring software allows users to combine text, graphics, audio, video, and animation
in an interactive application
Website authoring software helps users of all skill levels create webpages that include graphics,
video, audio, animation, and special effects with interactive content
Media Player
A media player is a program that allows you to view images and animations, listen to audio, and
watch video files on your computer or mobile device
Page 19 of 61
Disc burning software
Disc burning software writes text, graphics, audio, and video files on a recordable or rewritable disc
One of the main reasons people use computers is to communicate and share information with
others. The list of communications applications includes the following:
Blogging
Browsing
Chat room
Discussion Forum
Email
FTP
Instant Messaging
Video Conference
VoIP
Web Feeds
Page 20 of 61
Wireless messaging
A personal firewall is a security tool that detects and protects a personal computer and its data from
unauthorized intrusions. When connected to the Internet, your computer is vulnerable to attacks from
nefarious individuals who try to access a computer or network illegally. These attacks may destroy
your data, steal information, damage your computer, or carry out some other malicious actions.
Antivirus program
An antivirus program protects a computer against viruses by identifying and removing any computer
viruses found in memory, on storage media, or on incoming files. To protect a computer from virus
attacks, users should install an antivirus program and keep it updates by purchasing revisions or
upgrades to the software. Antivirus programs scans for programs that attempt to modify a computer’s
start up files, the operating systems, and other programs that normally are read from but not
modified.
Spyware is a type of program placed on a computer or mobile device without the user’s knowledge
that secretly collects information about the user and then communicates the information it collects
to some outside source while the user is online. Adware is a type of program that displays an online
advertisement in a banner or pop-up or pop-under window on webpages, email messages, or other
Internet service. A spyware remover is a type of program that detects and deletes spyware and similar
programs. An adware remover is a program that detects and deletes adware.
A file manager is a tool that performs functions related to file management. Some of the file
management functions that a file manager performs are displaying a list of files on a storage medium,
organising files in folders; and copying, renaming, deleting, moving, and sorting files. A folder is a
specific named location on a storage medium that contains related documents.
Page 21 of 61
Search Tool
A search tool is a program, usually included with an operating system that attempts to locate a file,
contact, calendar event, app, or any other item stored on your computer or mobile device based on
criteria you specify. This criteria could be word or words contained in a file, date the file was created
or modified, size of the file, location of the file, file name, author/ artist etc. Search tools typically
use an index to assist with locating files quickly. An index stores a variety of information about a file,
including its name, date created, date modified etc.
Image Viewer
An image viewer is a tool that allows users to display, copy, and print the contents of a graphics file,
such as a photo. With the image viewer, users can see images without having to open them in a
paint or image editing program.
Uninstaller
An uninstaller is a tool that removes a program, as well as any associated entries in the system files.
When you install a program, the operating system records the information it uses to run the
software in the systems files. The uninstaller deletes files and folders from the hard disk, as well as
removes programs entries from the system files.
Disk Cleanup
Disk Defragmenter
A disk defragmenter is a tool that reorganizes the files and unused space on a computer’s hard disk
so that the operating system accesses data more quickly and programs run faster. Fragmentation
slows down file access and thus the performance of the entire computer. Defragmenting the disk, or
reorganizing it so that the files are stored in a contiguous sectors, solves this problem.
Screen Saver
A screen saver is a tool that causes a display device’s screen to show a moving image or
blank screen if no keyboard or mouse activity occurs for a specified time.
File Compression
A file compression tool shrinks the size of a file(s). A compressed file takes up less storage
space than the original file. You may need to compress a file so that it will fit on a smaller
Page 22 of 61
storage medium, such as USB flash drive. Uploading and downloading compressed files to
and from the internet reduces the file transmission time.
PC Maintenance
A PC maintenance tool is a program that identifies and fixes operating system problems,
detects and repairs drive problems, and includes the capability of improving a computer’s
performance.
A backup tool allows users to copy, or back up, selected files or the contents of an entire storage
medium to another storage location. A restore tool reverses the process and returns backed up
files to their original form
REVIEW QUESTIONS
The Checkpoint exercises test your knowledge of the chapter concepts. The page number
containing the answer appears in parentheses after each exercise. The Consider this
exercises challenge your understanding of chapter concepts.
Discover more: Visit this chapter’s premium content to complete the Checkpoint exercises
interactively; complete the self-assessment in the Test Prep resource from your
smartphone, tablet, laptop, or desktop; and then take the Practice Test
1. _____ Application software serves as the interface between the user, the apps, and the
computer’s or mobile device’s hardware.
2. _____ While a computer or mobile device is running, the operating system remains in
memory.
3. _____ Open source software is mass-produced, copyrighted software that meets the
needs of a wide variety of users.
4. _____ When downloading shareware, freeware, or public-domain software, it is good
practice to seek websites with ratings for and reviews of products.
5. _____ with web apps, you always access the latest version of the software.
6. _____ with database software, users run functions to retrieve data.
Page 23 of 61
7. _____ Software suites offer three major advantages: lower cost, ease of use, and
integration.
8. _____ A PDF file can be viewed and printed without the software that created the original
document.
9. _____ the military and airlines use CBT simulations to train pilots to fly in various conditions
and environments.
10. _____ A router also can function as a hardware firewall.
3. _____ software is an application that allows users to organize data in columns and rows
and perform calculations on the data.
a. Spreadsheet
b. Database
c. Presentation
d. Document management
Page 24 of 61
5. The term _____ refers to removing unwanted areas of a photo.
a. crop
b. snip
c. compress
d. shrink
6. A(n) _____ is a device intended to stop network intrusions before they attempt to affect
your computer or network maliciously.
a. anti-spam program
b. pop-under blocker
c. hardware firewall
d. quarantine drive
7. _____ is a small text file that a web server stores on your computer.
a. A pop-under blocker
b. A cookie
c. Adware
d. Spyware
Short Questions
Group Activities
The How To: Your Turn exercises present general guidelines for fundamental skills when
using a computer or mobile device and then require that you determine how to apply these
general guidelines to a specific program or situation.
Discover more: Visit this chapter’s premium content to challenge yourself with additional
How To: Your Turn exercises, which include App Adventure.
Page 25 of 61
Instructions: You often can complete tasks using technology in multiple ways. Figure out
how to perform the tasks described in these exercises by using one or more resources
available to you (such as a computer or mobile device, articles on the web or in print, online
or program help, user guides, blogs, podcasts, videos, other individuals, trial and error,
etc.). Summarize your ‘how to’ steps, along with the resource(s) used, in the format
requested by your instructor (brief report, presentation, discussion, blog post, video, or
other means).
Obtain Help about Programs and Apps Multiple ways are provided to obtain help while using
the programs and apps on a computer or mobile device. The program or app developer
usually includes a Help feature in the program and/or online. In addition, third parties often
post resources online that can provide further assistance. The following steps describe how
to obtain help about various programs and apps using various methods.
Help System
You typically can access help in a program or app using one of the following methods:
• Tap or click the Help or Information icon in the program or app. The appearance of Help or
Information icons may vary, but typically they are identified by a question mark or the letter
‘i’ formatted in italic.
• Navigate the program or app’s menu to locate the Help command.
• If you are using a program or app on a Windows laptop or desktop, press the F1 key on the
keyboard to display Help content.
Online Help
Online help usually is available from the program or app developer. The following steps
describe how to obtain online help.
a. Navigate to the program or app developer’s website.
b. Locate, and then tap or click a Help or Support link.
c. Select the program or app for which you wish to obtain help to display the help
information.
In addition to obtaining help from within a program or app or on the developer’s website,
you also can search the web for help as described in the following steps.
a. Navigate to a search engine, such as google.com or yahoo.com.
b. Type the program or app name, as well as the type of help for which you are searching, as
the search text, and then press the enter key or tap or click the Search (or a similar) button.
c. Scroll through the search results and then tap or click the search result to display more
information. Be aware that not all help originates from reputable or accurate sources.
Page 26 of 61
Exercises
1. Under what circumstances would you use each of these methods to obtain help with a
program or app you are using?
2. Compare and contrast the different methods of obtaining help. Which method do you
think is the best? Why?
3. What are some reputable websites that can provide you with help for the operating system
installed on your computer? Why do you consider them reputable?
Page 27 of 61
TOPIC 2: DIGITAL SAFETY AND SECURITY
Learning Outcomes
After reading this Section of the guide, the learner should be able to:
1. Define the term, digital security risks, and briefly describe the types of
cybercriminals
2. Describe various types of Internet and network attacks, and explain ways to
safeguard against these attacks
3. Discuss techniques to prevent unauthorized computer access and use
4. Explain the ways that software manufacturers protect against software piracy
5. Discuss how encryption, digital signatures, and digital certificates work
6. Identify safeguards against hardware theft, vandalism, and failure
7. Explain the options available for backing up
8. Identify risks and safeguards associated with wireless communications
9. Recognize issues related to information accuracy, intellectual property rights,
codes of conduct, and green computing
10. Discuss issues surrounding information privacy
A digital security risk is any event or action that could cause a loss of or damage to a computer or
mobile device hardware, software, data, information, or processing capability. The more common
digital security risks include Internet and network attacks, unauthorized access and use, hardware
theft, software theft, information theft, and system failure.
Cybercrime
Any illegal act involving the use of a computer or related devices generally is referred to as a computer
crime. The term cybercrime refers to online or Internet-based illegal acts such as distributing malicious
software or committing identity theft. Software used by cybercriminals sometimes is called
crimeware.
Page 28 of 61
Cybercrime typically fall into one of these basic categories:
Hacker
Cracker
Script kiddie
Cyberextortionist
Cyber terrorist
Information transmitted over networks has a higher degree of security risk than information kept on
an organization’s premises.
Malware
Malware, short for malicious software, consists of programs that act without a user’s knowledge and
deliberately alter the operations of computers and mobile devices. A common way that computers
and mobile devices become infected with viruses and other malware is through users opening
infected email attachments.
Page 29 of 61
Botnets
A denial of service attack (DoS attack) disrupts computer access to an Internet service. A more
devastating type of DoS attack is the distributed DoS attack (DDoS attack) in which
Back Doors
A back door is a program or set of instructions in a program that allow users to bypass security
controls when accessing a program, computer, or network.
Spoofing
Spoofing is a technique intruders use to make their network or internet transmission appear
legitimate to a victim computer network. Two common types of spoofing schemes are:
Email spoofing
IP spoofing
Methods that protect computers, mobile devices and networks from attacks include the following:
Firewalls
A firewall is a hardware and/ or software that protects a network’s resources from intrusion by
users on another network such as the Internet.
Page 30 of 61
A firewall is a program or hardware device that filters the data packets coming through the internet
connection into your personal computer or into a company's network. It is set up to allow mainly one
way access, i.e. you can go out onto the internet and access pages, but it checks everything coming
back against a set of rules. If the data coming back is from an unauthorised source, then it is blocked.
You may have heard people saying, 'I can't get on that site at school because it's been blocked'; that
is the firewall in action.
Firewalls can also protect your system from hackers who might try to 'break-in' and access or steal
data.
Page 31 of 61
2.3 UNAUTHORISE ACCESS AND USE
Organizations take several measures to help prevent unauthorized access and use
Access Controls
Access controls define who can access a computer, device, or network; when they can access it; and
what actions they can take while accessing it. The computer, device, or network should maintain an
audit trail that records in a file both successful and unsuccessful access attempts. An unsuccessful
access attempt could result from a user mistyping his or her password or it could result from a
perpetrator trying thousands of passwords.
Possessed Objects
A possessed object is any item that you must possess, or carry with you, in order to gain access to a
computer or computer facility. A PIN (personal identification number), sometimes called a passcode,
is a numeric password, either assigned by a company or selected by a user. PINs provide an
additional level of security. An ATM card typically requires a 4 digit PIN. If someone steals these
cards, the thief must enter the user’s PIN to access the account.
Biometric Devices
Page 32 of 61
Iris Recognition System
Digital Forensics
Digital forensics is the discovery, collection, and analysis of evidence found on computers and
networks. Digital forensics involves the examination of media, programs data and log files on
computers, mobile devices, servers, and networks. Many areas use digital forensics, including law
enforcement, criminal prosecutors, military intelligence, insurance agencies, and information
security departments in the private sector.
Software theft occurs when someone steals software media, intentionally erase programs, illegally
registers and/or activates a program, or illegally copies a program. It includes the following:
Many manufacturers incorporate an activation process into their programs to ensure the
software is not installed on more computers than legally licensed. During the product
activation, which is conducted either online or by phone, users provide the software
product’s identification number to associate the software with the computer or mobile
device on which the software is installed. A license agreement is the right to use software
Encryption
Page 33 of 61
ciphertext. An encryption algorithm, or cypher, is a set of steps that can convert readable
plaintext into unreadable ciphertext. Two basic types of encryption are private key and
public key. With private key encryption, also called symmetric key encryption, both the
originator and the recipient use the same secret key to encrypt and decrypt the data. Public
key encryption, also called asymmetric key encryption, uses two encryption keys: a public
key and a private key .
Mobile users today often access their company networks through a virtual private network.
When a mobile user connects to a main office using a standard Internet connection, a virtual
private network (VPN) provides the mobile user with a secure connection to the company
network server, as if the user has a private line. VPNs help ensure that data is safe from being
intercepted by unauthorized people by encrypting data as it transmits from a laptop,
smartphone, or other mobile device.
Digital signature
Hardware theft is the act of stealing digital equipment. Hardware vandalism involves
defacing or destroying digital equipment. Hardware can fail for a variety of reasons: aging
Page 34 of 61
hardware, natural or man-made disasters, or random events such as electrical power
problems, and even errors in programs or apps.
• Categories of backups:
Full
Differential
Incremental
Selective
Cloud
Page 35 of 61
Read Table 5-3, page 220 of the prescribed book, Various Backup Methods.
Some users or companies implement a three generation backup policy to preserve three
copies of important files
Grandparent
Parent
Child
Grandparent
The Parent
The child
Although wireless access provides many conveniences to users, it also poses additional
security risks. Some perpetrators connect to other’s wireless networks to gain free Internet
access; others may try to access an organization’s confidential data. Others connect to a
network through an unsecured wireless access point (WAP) or combination router/WAP
Page 36 of 61
2.8 ETHICS AND SOCIETY
As with any powerful technology, computers and mobile devices can be used for both good and bad
intentions. The standards that determine whether an action is good or bad are known as ethics.
Computer ethics also known as technology ethics are moral guidelines that govern the use of
computers, mobile devices and information systems. Frequently discussed areas of computer ethics
are unauthorized use of computers, mobile devices, and networks; software theft (piracy);
information accuracy; intellectual property rights; codes of conducts, green computing; and
information privacy.
Information Accuracy
Information accuracy is a concern today because many users access information maintained by other
people or companies, such as on the Internet. Sometimes it is assumed that because the information
is on the Web therefor it is correct of which, that is not true.
Intellectual property (IP) refers to unique and original works, such as ideas, inventions, art, writings,
processes, company and product names, and logos. Intellectual property rights are the rights to which
creators are entitled for their work. A copyright gives authors, artists, and other creators of original
work exclusive rights to duplicate, publish, and sell their materials. A copyright protects any tangible
form of expression. A common infringement of copyright is piracy, where people illegally copy
software, movies, and music.
Code of Conduct
Green Computing
People use, and often waste, resources such as electricity and paper while using technology. Green
computing involves reducing the electricity and environmental waste while using computers, mobile
devices, and related technologies. The United States Department of Energy (DOE) and the United
States Environmental Protection Agency (EPA) developed the ENERGY STAR program to help reduce
the amount of electricity used by computers and related devices. This program encourages
Page 37 of 61
manufacturers to create energy-efficient devices. For example, many devices switch to sleep or power
save mode after a specified number of inactive minutes or hours. Personal computers, displays,
printers, and other devices should comply with guidelines of the ENERGY STAR program.
1. Conserve Energy
Use computers and devices that comply with the ENERGY STAR program.
Do not leave a computer or device running overnight. c. Turn off the monitor, printer,
and other devices when not in use.
Information privacy refers to the right of individuals and companies to deny or restrict the
collection, use, and dissemination of information about them. Organizations often use huge
databases to store records, such as employee records, medical records, financial records, and more.
Much of the data is personal and confidential and should be accessible only to authorized users.
Electronic Profiles
Cookies
Page 38 of 61
A cookie is a small text file that a web server stores on your computer. Cookie files typically contain
data about you, such as your user name, postal code, or viewing preferences. Websites uses cookies
for variety of purposes:
Most websites that allow for personalization use cookies to track user preferences.
Some websites use cookies to store user names and/or passwords, so that users do not need
to enter this information every time they sign in to the website.
Online shopping sites generally use a session cookie to keep track of items in a user’s
shopping cart. This way, users can start an order during one web session and finish it on
another day in another session. Session cookies usually expire after a certain time, such as a
week or a month.
Some websites use cookies to track how often users visit a site and the webpages they visit
while at the website.
Websites may use cookies to target advertisements. These websites store a user’s interests
and browsing habits in the cookie.
Phishing
Phishing is a scam in which a perpetrator sends an official looking email message that attempts to
obtain your personal and /or financial information. These messages look legitimate and request that
you update credit card numbers, Social Security numbers, bank account numbers, passwords, or
other private information. Clickjacking is yet another scam. Clickjacking, an object that can be clicked
on a website, such as a button, Image, or link, contains a malicious program. When a user clicks the
disguised object, a variety of nefarious events may occur.
Spyware is a program placed on a computer or mobile device without the user’s knowledge that
secretly collects information about the user and then communicates the information it collects to
some outside source while the user is online. Some vendors or employers use spyware to collect
information about program usage or employees. Internet advertising firms often collect information
about users’ web browsing habits. Adware is a program that displays an online advertisement in a
banner or pop-up window on webpages, email messages, or other Internet services. Adware on
mobile phones is known as madware, for mobile adware.
Page 39 of 61
Social Engineering
Privacy Laws
The concern about privacy has led to the enactment of federal and state laws regarding the storage
and disclosure of personal data.
Employee Monitoring
Employee monitoring involves the use of computers, mobile devices, or cameras to observe, record,
and review an employee’s use of a technology, including communications such as email messages,
keyboard activity (used to measure productivity), and websites visited. Many programs exist that
easily allow employers to monitor employees. Further, it is legal for employers to use these programs
Content Filtering
Content filtering is the process of restricting access to certain material. Many businesses use
content filtering to limit employee’s web access. Web filtering software is a program that restricts
access to specified website.
REVIEW QUESTIONS
The Checkpoint exercises test your knowledge of the chapter concepts. The page number
containing the answer appears in parentheses after each exercise. The Consider this exercises
challenge your understanding of chapter concepts.
Discover More: Visit this chapter’s premium content to complete the Checkpoint exercises
interactively; complete the self-assessment in the Test Prep resource from on your
smartphone, tablet, laptop, or desktop; and then take the Practice Test.
1. _____Any illegal act involving the use of a computer or related devices generally is
referred to as a crime ware.
2. _____A rootkit displays an online advertisement in a banner or pop-up window on
webpages, email, or other Internet services.
3. _____ Viruses, worms, and other malware can be hidden in downloaded game files and
mobile apps.
4. _____An audit trail records in a file both successful and unsuccessful access attempts.
5. _____It is good practice to change your password frequently.
6. _____Intentionally erasing software would be considered software theft.
Page 40 of 61
7. _____A typical license agreement allows you to rent or lease the software.
8. _____ Unencrypted, readable data is called cipher text.
9. _____Private key encryption also is called asymmetric key encryption.
10. _____VPNs encrypt data to help ensure that the data is safe from being intercepted by
unauthorized people.
2. _____ is a program that hides in a computer or mobile device and allows someone from a
remote location to take full control of the computer or device.
a. A rootkit
b. Spyware
c. A Trojan horse
d. Adware
3. A ____ is a program or set of instructions in a program that allows users to bypass security
controls when accessing a program, computer, or network.
a. zombie
b. botnet
c. back door
d. session cookie
Page 41 of 61
5. A _____ is a private combination of words, often up to 100 characters in length and
containing mixed capitalization and punctuation, associated with a user name that allows
access to certain computer resources.
a. passphrase
b. private key
c. passcode
d. encryption algorithm
6. A (n) _____ is a set of characters that the originator of the data uses to encrypt the text
and the recipient of the data uses to decrypt the text.
a. cipher
b. plaintext
c. public key
d. encryption key
7. A (n) _____ backup method is the only real-time back up, providing very fast recovery of
data.
a. selective
b. full
c. incremental
d. continuous data protection
Short Questions
Page 42 of 61
Group Activities
a. If necessary, establish an Internet connection so that you will be able to update the virus
definitions.
b. Run an antivirus program.
c. Tap or click the button to check for updated virus definitions.
d. If new virus definitions are available for the antivirus program, tap or click the link to
download the definitions to the computer or mobile device.
e. When the update is complete, tap or click the button to scan the computer or mobile
device for viruses.
Exercises
Page 43 of 61
1. What antivirus program, if any, currently is installed on your computer? Is it scheduled to
update virus definitions automatically?
2. In addition to downloading and installing virus definitions from within the antivirus
program, are other ways available to obtain the latest virus definitions?
3. In addition to keeping the antivirus program’s virus definitions current, what other ways
can you protect a computer or mobile device from viruses?
Page 44 of 61
TOPIC 3: DIGITAL STORAGE
Learning Outcomes
After reading this Section of the guide, the learner should be able to:
1. Differentiate between storage and Memory
2. Describe the characteristics of internal hard disks
3. Identify uses of external hard disks and RAID
4. Describe the benefits of solid-state drives
5. Differentiate among various types of memory cards and USB flash drives
6. Discus the benefits and uses of cloud storage
7. Describe characteristics of and differentiate among types of optical discs
8. Explain types of enterprise storage: RAID, NAS, SAN and tape
9. Identify uses of magnetic stripe cards, smart cards, RFID tags, and microfilm and
microfiche
3.1 STORAGE
Page 45 of 61
A storage medium, also called secondary storage, is the physical material on which a computer keeps
data, information, programs, and applications. Examples of storage media include hard disks, solid-
state drives (both of which can be internal or external), memory cards, USB flash drives, optical discs,
network attached storage devices, magnetic stripe cards, smart cards, RFID tags, and NFC tags.
Another storage option is cloud storage, which keeps information on servers on the Internet.
In addition to programs and apps, users store a variety of data and information on storage media in
their computers and mobile devices or on cloud storage. For example, many users store digital photos,
appointments, schedules, contacts, email messages, and tax records. A home user also might store
budgets, bank statements, a household inventory, stock purchase records, homework assignments,
recipes, music, and videos. A storage device is the hardware that records and/or retrieves items to
and from storage media. Writing is the process of transferring data, instructions, and information from
memory to a storage medium. Reading is the process of transferring these items from a storage
medium into memory. When storage devices write on storage media, they are creating output.
Similarly, when storage devices read from storage media, they function as a source of input.
Capacity is the number of bytes (characters) a storage medium can hold. Table 8-1 identifies the terms
manufacturers may use to define the capacity of storage media. For example, a storage medium with
a capacity of 750 GB can hold approximately 750 billion bytes.
Items on a storage medium remain intact even when you turn off a computer or mobile device. Thus,
a storage medium is non-volatile. Most memory (i.e., RAM), by contrast, holds data and instructions
temporarily and, thus, is volatile.
Page 46 of 61
3.1.3 Storage Access Times
The speed of storage devices and memory is defined by access time. Access time measures
(1) The amount of time it takes a storage device to locate an item on a storage medium or
(2) The time required to deliver an item from memory to the processor.
The access time of storage devices is slow, compared with the access time of memory. Memory (chips)
accesses items in billionths of a second (nanoseconds). Storage devices, by contrast, access items in
thousandths of a second (milliseconds) or millionths of a second (microseconds). Transfer rate is the
speed with which data, instructions, and information transfer to and from a device. Transfer rates for
storage are stated in KBps (kilobytes per second), MBps (megabytes per second), and GBps (gigabytes
per second).
A hard disk, also called a hard disk drive (HDD), is a storage device that contains one or more inflexible,
circular platters that use magnetic particles to store data, instructions, and information. The term,
hard drive, refers collectively to hard disks and SSDs. Hard drives can be internal or external. That is,
they can reside inside a computer or mobile device, or they can be an external device that connects
to a computer or some mobile devices. A hard disk, also called a hard disk drive (HDD), is a storage
device that contains one or more inflexible, circular platters that use magnetic particles to store data,
instructions, and information. Desktop and laptops often contain at least one hard disk. The entire
hard disk is enclosed in an airtight, sealed case to protect it from contamination.
Page 47 of 61
Hard disks are read/write storage media. Before any data can be read from or written on a hard disk,
however, the disk must be formatted. Formatting is the process of dividing the disk into tracks and
sectors, so that the operating system can store and locate data and information on the disk. A track is
an arrow recording band that forms a full circle on the surface of the disk. The disk’s storage locations
consist of wedge-shaped sections, which break the tracks into small arcs called sectors. On a hard disk,
a sector typically stores up to 512 bytes of data.
The storage capacity of hard disks varies and is determined by the number of platters the hard disk
contains, the composition of the magnetic coating on the platters etc.
A platter is made of aluminium, glass or ceramic and has a thin coating of alloy material that
allows items to be recorded magnetically on its surface
Longitudinal recording aligns the magnetic particles horizontally around the surface of the
disk.
Perpendicular recording, by contrast, hard disks align the magnetic particles vertically or
perpendicular to the disk’s surface , making much greater storage capacities possible
Density is the number of bits in an area on a storage medium. A higher density means more
storage capacity.
Page 48 of 61
SSD
An SSD (solid-state drive) is a flash memory storage device that contains its own processor to
manage its storage. Flash memory chips are a type of solid-state media, which means they consist
entirely of electronic components, such as integrated circuits, and contain no moving parts.
A head crash occurs when a read/write head touches the surface of a platter. Always keep a
backup of your hard disk. An SSD (solid state drive) is a flash memory storage device that contains
its own processor to manage its storage. An SSD (solid state drive) has several advantages over
traditional (magnetic) hard disks:
SSDs have several advantages over traditional (magnetic) hard disks, including the following:
Page 49 of 61
Quieter operation
More durable
Lighter weight
Less power consumption (leads to longer battery life)
Less heat generation
Longer life (more than 10 times longer)
Defragmentation is not required
SSDs may be in the form of flash memory chips installed directly on a motherboard or an adapter card.
They also may be housed in a separate casing that attaches to the motherboard.
An external hard drive is a separate freestanding storage device that connects with a cable to
a USB port or other port on a computer or mobile device. Both hard disks and SSDs are
available as external hard drives. Smaller external hard drives are portable and enable mobile
users to transport photos and other files from one computer to another easily. External hard
drives units can include multiple hard drives that you can use for different purposes, if
desired.
RAID
A group of two or more integrated hard drives is called a RAID (redundant array of
independent disks). RAID is an ideal storage solution in situations where uninterrupted access
to the data is critical.
Page 50 of 61
3.3 PORTABLE FLASH MEMORY STORAGE
In addition to SSDs discussed in the previous section, two other widely used types of flash
memory storage include memory cards and USB flash drives.
Memory cards
Memory cards enable mobile users easily to transport digital photos, music, videos, or other
files to and from mobile devices and computers or other devices. A memory card is a
removable flash memory storage device, usually no bigger than 1.5 inches in height or width
that you insert in and remove from a slot in a computer, mobile device, or card reader/writer.
Common types of memory cards includes the following:
CF (CompactFlash)
SDHC(Secure Digital High Capacity)
SDXC(Secure Digital Expanded Capacity)
miniSD
microSD
microSDHC
microSDXC
xD Picture Card
Memory Stick PRO Duo
M2(Memory Stick Micro)
Page 51 of 61
USB Flash Drives
USB flash drive, sometimes called a thumb drive, is a flash memory storage device that plugs
in a USB port on a computer or mobile device. With a USB flash drive, users easily transfer
documents, photos, music, and videos from one computer to another. Storage capacities of
USB flash drives vary.
Page 52 of 61
3.4 CLOUD STORAGE
Cloud storage is an Internet service that provides storage to computer or mobile device
users. Cloud storage is available for home and business users, with various levels of storage
services available.
Optical Disc
An optical disc consists of a flat, round, portable disc made of metal, plastic, and lacquer
that is written and read by a laser. Optical discs used in computers typically are 4.75 inches
in diameter and less than one-twentieth of an inch thick.
Page 53 of 61
Characteristics of Optical Discs
Optical discs store items by using microscopic pits (indentations) and lands (flats areas) that are in the
middle layer of the disc. Optical discs commonly store items in a single track that spirals from the
center of the disc to the edge of the disc. Track is divided into evenly sized sectors.
CDs
CDs are available in three basic formats: read-only, recordable, and rewritable
CD-ROM
CD-R
CD-RW
DVDs
Page 54 of 61
As with CDs, are available in three basic formats: read-only, recordable, and rewritable.
DVD-ROM
DVD-R and DVD+R
DVD-RW, DVD+RW, DVD+RAM
Enterprise hardware allows large organizations to manage and store data and information using
devices intended for heavy use, maximum efficiency, and maximum availability. The availability of
hardware to users is a measure of how often it is online. Enterprise storage often uses Fibre Channel
(FC) technology as the interface that connects the devices to the network because FC technology has
much faster transmission rates than SCSI and other previously discussed interfaces.
Network attached storage (NAS) is a server that is placed on a network with the sole purpose of
providing storage to users, computers, and devices attached to the network. A network attached
storage server, often called a storage appliance, has its own IP address, usually does not have a
keyboard or display, and contains at least one hard drive, often configured in a RAID. Administrators
can add storage to an existing network quickly by connecting a network attached storage server to a
network.
A storage area network (SAN) is a high-speed network with the sole purpose of providing
storage to other attached servers.
Page 55 of 61
Tape
Tape is a magnetically coated ribbon of plastic capable of storing large amounts of data and
information. Tape no longer is used as a primary method of storage. Instead, businesses use
tape most often for long- term storage and backup.
Comparable to a cassette recorder, a tape drive reads from and writes on a magnetic tape.
Although older computers used reel-to-reel tape drives, today’s tape drives use tape
cartridges.
Page 56 of 61
Smart Cards
A smart card, which is an alternative to a magnetic stripe card, stores data on an integrated
circuit embedded in the card.
Two types of smart cards, also called chip cards, are:
contact and
Contactless
When you insert a contact smart card in a specialized card reader, the information on the
smart card is read and, if necessary, updated. Contactless smart cards communicate with a
reader using a radio frequency, which means the user simply places the card near the reader.
RFID Tags
The RFID tag consists of an antenna and a memory chip that contains the information to be
transmitted via radio waves. RFID tags are either active or passive. An active RFID Tag contains
a battery that runs the chip’s circuitry and broadcasts a signal to the RFID reader. A passive
RFID tag does not contain a battery and, thus, cannot send a signal until the reader activates
the tag’s antenna by sending out electromagnetic waves.
Page 57 of 61
NFC is a technology (based on RFID) that uses close-range radio signals to transmit data
between two NFC-enabled devices or an NFC-enabled device and an NFC tag. NFC-enabled
devices include smartphones, digital cameras, computers, televisions, and terminals. An NFC-
enabled
REVIEW QUESTIONS
The Checkpoint exercises test your knowledge of the chapter concepts. The page number
containing the answer appears in parentheses after each exercise. The Consider this
exercises challenge your understanding of chapter concepts.
Discover More: Visit this chapter’s premium content to complete the Checkpoint exercises
interactively; complete the self-assessment in the Test Prep resource from your
smartphone, tablet, laptop, or desktop; and then take the Practice Test.
8. _____While each program may use a different method of encrypting files, they all use the
process of cryptography.
Page 58 of 61
9. _____With serial transfers, data is sent one bit at a time.
10. _____When you are finished using a USB flash drive, simply remove it from the USB port.
2. A (n) _____ is a storage device that contains one or more inflexible, circular platters that
use magnetic particles to store data, instructions, and information.
a. hard disk
b. SSD
c. USB flash drive
d. optical disc
5. The process of copying audio and/or video data from a purchased disc and saving it on
your own media is called _____.
a. ripping
b. burning
c. tearing
d. formatting
Page 59 of 61
7. A selective backup sometimes is called a(n) _____ backup.
a. differential
b. incremental
c. partial
d. archival
8. Enterprise storage often uses _____ technology as the interface that connects the devices
to the network because it has much faster transmission rates than SCSI.
a. SAS
b. serial transfer
c. Fibre Channel (FC)
d. SATA
Short Questions
1. What are the differences among a CD-ROM, a CD-R, and a CD-RW?
2. What does redundancy mean with respect to enterprise storage?
3. What does the term, geofence, mean?
4. How does mirroring differ from striping?
5. How do businesses most often use tape?
6. Which is faster: sequential or direct access? Why?
7. What is contained in an NFC card?
8. What are three types of backup plans?
9. What does Creative Commons provide?
10. How does longitudinal recording differ from perpendicular recording?
11. What is a head crash?
12. What are some disadvantages of SSDs?
13. Why might you opt for a hard disk rather than an SSD?
GROUP ACTIVITIES
Copy Individual Files to Another Storage Device, and Copy Files to Cloud Storage If you save
a file on your computer or mobile device and later will need to access it on another device,
you likely will have to copy the file to another storage device or to the cloud so that you
can access the file on the other device. The following steps guide you through the process
of copying files to another storage device or to the cloud.
a. Navigate to the location containing the file you want to copy. If the file is on an external
storage device or memory card, connect the storage device to your computer or insert the
Page 60 of 61
memory card into your computer’s card reader. Next, navigate to the location containing the
file you want to copy.
b. Navigate to the location to which you want to copy the file. If the location to which you
want to copy the file is on an external storage device or on a memory card, connect the
external storage device to your computer or insert the memory card into your computer’s
card reader. Next, navigate to the location to which you want to copy the file.
c. Drag the file you want to copy to the destination location. After you drag the file, make
sure the file exists both in the source and destination location.
a. If necessary, sign up for an account with an online service that can store your files. Some
online services store only photos and videos, while other services store all types of files, such
as documents and other media files.
b. Sign in to the online service and navigate to the page where you can upload files.
c. Tap or click the button or link to upload a file.
d. Navigate to and then tap or click the file you want to upload.
e. Tap or click the button or link to upload the file.
Exercises
1. What types of files might you want to copy to the cloud? Why would you copy files to
the cloud instead of copying them to an external storage device?
2. What are at least three online services that allow you to store files? Are they free, or do
they charge a fee? How much space do they provide? How do you obtain more storage
space?
3. What steps would you take to copy a file from the cloud to your computer or mobile
device?
Page 61 of 61