INFORMATION & COMMUNICATIONS Standards Institute (ETSI) to describe
TECHNOLOGY the protocols for second-generation digital cellular networks used by mobile Information and Communications devices such as tablets. Technology (ICT) refers to all technology that is GPRS – packet oriented mobile data used to handle telecommunication and access standard on the 2G and 3G cellular information. It also includes broadcast media, communication network's global system management systems, and network-based for mobile communications (GSM). control. Data Services – data networking services Modern definitions describe ICT as the for mobile phones. convergence of several technologies including Dial-up Services – data networking internet and wireless medium, but primary focus services using modems and telephone is on the access and sharing of information and lines. communications. Virtual Private Networks (VPN) – It includes the use of computers, radio, extends across a public or shared television, cellular phones, network hardware network, and acts like a tunnel so you and software, internet connections, satellite can exchange data securely and systems, applications needed for video anonymously across the internet as if conferencing and distance learning in the field you were connected directly to a private of education. network.
Mobile devices can communicate through the EMERGING TECHNOLOGIES
following communication technologies: Artificial Intelligence (AI) – an area of Wireless Fidelity (WiFi) – technology for computer science that emphasizes the radio wireless local area networking of creation of intelligent machines that devices based on the IEEE 802.11 work and react like humans. Some of the standards. activities computers with artificial Bluetooth – a wireless technology intelligence are designed for include: standard for exchanging data over short o Speech recognition distances from fixed and mobile o Learning devices, and building personal area o Planning networks (PANs). o Problem solving Infrared Radiation Wireless (IR) – the Robotics – the field of computer science use of wireless technology in devices or and engineering concerned with systems that convey data through creating devices that can move and infrared (IR) radiation. react to sensory input. It is a form of 3G – short for third generation, is the artificial intelligence. third generation of wireless mobile Biometrics – the technology used to telecommunications technology. measure and analyze human body 4G – the fourth generation of broadband characteristics such as DNA, finger cellular network technology, succeeding prints, eye retinas and irises, voice 3G. Potential and current applications patterns, facial patterns, and hand include amended mobile web access, IP measurements, mainly for telephony, gaming services, high- authentication purposes. definition mobile TV, video Quantum Cryptography – the science of conferencing, and 3D television. encoding and decoding information or GSM – a standard developed by the messages which depends on physics, not European Telecommunications mathematics. It is used for information Online Video – a service providing end- privacy and security. to-end tools used to create, customize, Computer-Assisted Translation (CAT) – publish, and manage videos online. the use of computers to assist in the translation of one or more natural ONLINE SAFETY AND SECURITY languages into another or others, and Internet safety or online safety is vice-versa. trying to be safe on the internet and is the 3D Imaging and Holography – knowledge of maximizing the user's personal holography is a photographic technique safety and security risks to private information that uses light to project objects in a and property associated with using the internet, way that appears three-dimensional. and the self-protection from computer crime in Virtual Reality – the term used to general. describe a three-dimensional, Sensitive information such as personal computer-generated environment that information and identity, passwords are often can be explored and interacted with a associated with personal property (for example, person. bank accounts) and privacy and may present security concerns if leaked. Unauthorized access ONLINE PLATFORMS and usage of private information may result in A platform is defined as a group of consequence such as identity theft, as well as technologies that are used as a base upon which theft of property. Common causes of other applications, processes, or technologies information security breaches include: are developed. It can be programmed and therefore customized by outside developers who HACKING are the users. Hacking is an attempt to exploit a computer system or a private network inside a computer. COMMON ONLINE PLATFORMS Simply put, it is the unauthorized access to or Social Media – web-based technology control over computer network security systems that allows the development, for some illicit purpose. deployment, and management of social media solutions and services. It PHISHING provides solutions to creating social Phishing is a type of scam where the scammers media websites. disguise as a trustworthy source in attempt to E-Commerce and M-Commerce – e- obtain private information such as passwords, commerce is a collection of software and credit card information, etc. through the technologies that allows merchants to internet. Phishing often occurs through emails create a storefront on the internet while and instant messaging and may contain links to m-commerce transacts business entirely websites that direct the user to enter their on mobile technologies. private information. These fake websites are Online Learning – an incorporated set of often designed to look identical to their interactive online services that provides legitimate counterparts to avoid suspicion from the teachers, learners, parents, and the user. others involved in education sector with a wide range of tools and resources to INTERNET SCAMS support and enhance the delivery and Internet scams are schemes that deceive the management of education through the user in various ways in attempt to take internet. advantage of them. Internet scams often aim to cheat the victim of personal property directly rather than personal information through false monitoring, making threats, identity theft, promises, confidence tricks and more. damage to data or equipment, the solicitation of minors for sex, or gathering information that MALWARE may be used to harass. According to a study Malware, particularly spyware, is malicious conducted by Baum et al. (2009), the rate of software disguised as software designed to assault through electronic means such as e-mail collect and transmit private information, such as or instant messaging was over one in four out of passwords, without the user's consent or all stalking victims in the study. knowledge. They are often distributed through e-mail, software and files from unofficial CYBERBULLYING locations. Malware is one of the most prevalent Cyberbullying is the attack upon an individual security concerns as often it is impossible to or group through the use of electronic means determine whether a file is infected, despite the such as instant messaging, social media, e-mail source of the file. and other forms of online communication with the intent to abuse, intimidate, or overpower. PERSONAL SAFETY In a 2012 study of over 11,925 students in the The growth of the internet gave rise to many United States, it was indicated that 23% of important services accessible to anyone with a adolescents reported being a victim of cyber connection. One of these important services is bullying, 30% of which reported experiencing digital communication. While this service suicidal behavior. allowed communication with others through the internet, this also allowed the communication ONLINE PREDATION with malicious users. While malicious users often Online predation is the act of engaging an use the internet for personal gain, this may not underage minor into inappropriate sexual be limited to financial/material gain. This is relationships through the internet. Online especially a concern to parents and children, as predators may attempt to initiate and seduce children are often targets of these malicious minors into relationships through the use of chat users. Common threats to personal safety rooms or internet forums. include: phishing, internet scams, malware, cyberstalking, cyberbullying, online predictions OBSCENE/OFFENSIVE CONTENT and sextortion. Various websites on the internet contain material that some deem offensive, distasteful PLAGIARISM or explicit, which may often be not of the user's Plagiarism is the "wrongful appropriation" and liking. Such websites may include internet, "stealing and publication" of another author's shock sites, hate speech or otherwise "language, thoughts, ideas, or expressions" and inflammatory content. Such content may the representation of them as one's own original manifest in many ways, such as pop-up ads and work. Plagiarism is considered academic unsuspecting links. dishonesty and a breach of journalistic ethics. It is subject to sanctions like penalties, SEXTORTION suspension, and even expulsion. SEXTORTION, especially via the use of webcams, is a concern, especially for those who CYBERSTALKING use webcams for flirting and cybersex. Often Cyberstalking is the use of the Internet or other this involves a cybercriminal posing as someone electronic means to stalk or harass an individual, else - such as an attractive person - initiating a group of individuals, or an organization. It may communication of a sexual nature with the include the making of false accusations or victim. The victim is then persuaded to undress statements of fact (as in defamation), in front of a webcam, and may also be persuaded to engage in sexual behavior, such as and provides common services for other masturbation. The video is recorded by the software. cybercriminal, who then reveals their true • IOS – used in Apple devices such as IPad intent and demands money or other services and IPhone. (such as more explicit images of the victim, in • Android – an open source operating cases of online predation), threatening to system developed by GOOGLE. publicly release the video and send it to family • Blackberry OS – used in Blackberry members and friends of the victim if they do not devices. comply. • Windows Phone OS – a closed source and proprietary operating system developed by INTELLECTUAL PROPERTY RIGHTS AND Microsoft. COPYRIGHT ISSUES • Symbian – the original smartphone OS Intellectual property refers to creations of the used by NOKIA devices. mind: inventions; literary and artistic works; and • Web OS – originally used for symbols, names and images used in commerce. smartphones now used for smart TVs Intellectual property is divided into two • Device Drivers – software which operate categories: and control particular type of devices attached Industrial Property includes patents for to the computer. inventions, trademarks, industrial • Utility Software – computer programs designs and geographical indications. designed to assist users in the maintenance and Copyright covers literary works (such as care of the system. novels, poems and plays), films, music, • Anti-virus software – scan the computer artistic works (e.g., drawings, paintings, system for viruses and remove them. photographs and sculptures) and • Memory testers – check for memory architectural design. Rights related to failures. copyright include those of performing • Registry cleaners – clean and optimizes artists, producers of phonograms and the System Registry by removing old registry broadcasters in their radio and keys that are no longer in use. television programs. • Screensavers – software that runs when the computer is idle, usually displays images and LESSON 2. APPLICATION SOFTWARE patterns for entertainment or security. PACKAGES • Disk checkers – scan an operating hard drive and check for logical or physical error. SOFTWARE • Disk compression utilities – Software refers to in to instructional compress/uncompress the contents of a disk. information that directs the activities of the • Disk defragmenters – detect computer computer hardware or helps user control the files whose contents are scattered across several hardware components of the computer. They locations on the hard disk and move the are collectively known as “programs”. fragments to one location to increase efficiency. • Disk formatters – prepare a data TYPES OF SOFTWARE storage, such as hard disk, for initial use. • System Software – software that • Backup software – makes copies of all directly operates the computer hardware to information stored on a disk and restores either provide basic functionality needed by users and the entire disk or selected files. other software, and to provide a platform for • File managers – provide a convenient running application software. method of performing routine data • Operating Systems – essential management. collections of software that manages resources • Disk cleaners – find files that are lowest base number system used by us, which is unnecessary to computer operation. two. This is the binary number system. In the • Application Software – software Binary number system, 0s and 1s are represented designed to perform specific tasks. by OFF and ON respectively. This indicates the • Word Processor – a computer program turning on or off an electrical signal or a base 2 or device that provides for input, editing, exponent. Computers use voltages and since formatting and output of text. voltages changes often, no specific voltage is set • Desktop Publisher – a computer for each number in the decimal system. For this program that generates layouts for documents reason, binary is measured as a two-state system to produce typographic quality text and images. i.e. on or off. Also, to keep calculations simple • Electronic Spreadsheet – an interactive and convert into binary online, computers use computer application for organization, analysis the binary number system. and storage of data in tabular form. • Paint Application – software graphics User Interface program that allows the user to draw or paint User interface (UI) is a conduit between human bitmapped images on a computer. and computer interaction – the space where a • Presentation Graphics – is a software user will interact with a computer or machine to package used to display information in the form complete tasks. The purpose of a UI is to enable of a slide show. a user to effectively control a computer or • Sound/Video Editor – software which machine they are interacting with, and for allows editing and generating video and audio feedback to be received in order to data. communicate effective completion of tasks. A • Database Management Systems – successful user interface should be intuitive (not software application that interacts with end require training to operate), efficient (not users, other applications, and the database create additional or unnecessary friction) and itself to capture and analyze data. user-friendly (be enjoyable to use). A Graphical • Games –electronic games that involves User Interface (GUI) is specifically for software. interaction with a user-interface to generate It utilizes generated UI elements such as text, visual feedback on a video device such as a links, buttons and images to construct a design monitor. system that form the user experience.
WHY BINARY NUMBERS ARE USED BY WORD PROCESSORS
COMPUTERS? Word processing software is used to manipulate a text document, such as a resume or a report. Modern day computers use binary numbers to You typically enter text by typing, and the operate—this is a fact well-known to people software provides tools for copying, deleting and studying computer science or to those using various types of formatting. Some of the these machines on a more than frequent basis. functions of word processing software include: When bit is uttered, the person using it is trying • Creating, editing, saving and printing to define the binary digit contraction—an item documents. that can only hold a 0 or 1. The bits are • Copying, pasting, moving and deleting organized into eight groups and these groups are text within a document. referred to as octets or bytes. • Formatting text, such as font type, bolding, underlining or italicizing. To present numerical data in our daily life, we • Creating and editing tables. use the decimal number systems. Unfortunately, • Inserting elements from other software, computers can’t do the same. Instead, such as illustrations or photographs. computers represent numbers by using the • Correcting spelling and grammar. Word processing includes a number of tools to Text Wrapping format your pages. For example, you can • Allows you to place your images where organize your text into columns, add page you want it to be in your document. numbers, insert illustrations, etc. However, • In Line with Text – default setting for word processing does not give you complete images that are inserted or integrated in your control over the look and feel of your document. document. It treats your When design becomes important, you may need image like a text font with the bottom side to use desktop publishing software to give you totally aligned with the text line. more control over the layout of your pages. • Square – This setting allows the image you inserted to be placed anywhere within the Word processing software typically also contains paragraph with the text going around the image features to make it easier for you to perform in a square pattern like a frame repetitive tasks. For example, let's say you need • Tight – This is almost the same as the to send a letter to all your customers regarding Square setting, but here the text “hugs” or a new policy. The letter is the same for all conforms to the general shape of the image. This customers except for the name and address at allows you to get a more creative effect on your the top of the letter. A mail merge function document. This setting can mostly be achieved allows you to produce all the letters using one if you are using an image the supports template document and a table with customer transparency like a .GIF or .PNG file. names and addresses in the database. • Through – This setting allows the text on your document to flow even tighter, taking the Text editors shouldn't be confused with word contours and shape of the image. Again, this can processing software. While they do also allow be best used with a .GIF or .PNG type of image. you to create, edit and save text documents, • Top and bottom – This setting pushes they only work on plain text. Text editors don't the texts away vertically to the top and/or the use any formatting, such as underlined text or bottom of the image so that image occupies a different fonts. Text editors serve a very whole text line on its own. different purpose from word processing • Behind text – This allows your image to software. They are used to work with files in dragged and placed on your document but with plain text format, such as source code of all the texts floating in front of it. It effectively computer programs or configuration files of an makes your image look like a background. operating system. An example of a text editor • In front of Text – As it suggests, this would be Notepad on the Windows platform. setting allows your image to be placed right on top of the text as if your image was dropped ADVANCED TECHNIQUES IN MICROSOFT WORD right on it.
Performing Calculation without Tables
• Press CTRL + F9 then type the formula. Press F9 again or RIGHT-CLICK and select UPDATE to get the result. Inserting automatically changing Date, Time, and Page Number • Press ALT + SHIFT + D for DATE • Press ALT + SHIFT + T for TIME • Press ALT + SHIFT + P for PAGE