Sie sind auf Seite 1von 6

LESSON 1.

INFORMATION & COMMUNICATIONS Standards Institute (ETSI) to describe


TECHNOLOGY the protocols for second-generation
digital cellular networks used by mobile
Information and Communications devices such as tablets.
Technology (ICT) refers to all technology that is  GPRS – packet oriented mobile data
used to handle telecommunication and access standard on the 2G and 3G cellular
information. It also includes broadcast media, communication network's global system
management systems, and network-based for mobile communications (GSM).
control.  Data Services – data networking services
Modern definitions describe ICT as the for mobile phones.
convergence of several technologies including  Dial-up Services – data networking
internet and wireless medium, but primary focus services using modems and telephone
is on the access and sharing of information and lines.
communications.  Virtual Private Networks (VPN) –
It includes the use of computers, radio, extends across a public or shared
television, cellular phones, network hardware network, and acts like a tunnel so you
and software, internet connections, satellite can exchange data securely and
systems, applications needed for video anonymously across the internet as if
conferencing and distance learning in the field you were connected directly to a private
of education. network.

Mobile devices can communicate through the EMERGING TECHNOLOGIES


following communication technologies:  Artificial Intelligence (AI) – an area of
 Wireless Fidelity (WiFi) – technology for computer science that emphasizes the
radio wireless local area networking of creation of intelligent machines that
devices based on the IEEE 802.11 work and react like humans. Some of the
standards. activities computers with artificial
 Bluetooth – a wireless technology intelligence are designed for include:
standard for exchanging data over short o Speech recognition
distances from fixed and mobile o Learning
devices, and building personal area o Planning
networks (PANs). o Problem solving
 Infrared Radiation Wireless (IR) – the  Robotics – the field of computer science
use of wireless technology in devices or and engineering concerned with
systems that convey data through creating devices that can move and
infrared (IR) radiation. react to sensory input. It is a form of
 3G – short for third generation, is the artificial intelligence.
third generation of wireless mobile  Biometrics – the technology used to
telecommunications technology. measure and analyze human body
 4G – the fourth generation of broadband characteristics such as DNA, finger
cellular network technology, succeeding prints, eye retinas and irises, voice
3G. Potential and current applications patterns, facial patterns, and hand
include amended mobile web access, IP measurements, mainly for
telephony, gaming services, high- authentication purposes.
definition mobile TV, video  Quantum Cryptography – the science of
conferencing, and 3D television. encoding and decoding information or
 GSM – a standard developed by the messages which depends on physics, not
European Telecommunications
mathematics. It is used for information  Online Video – a service providing end-
privacy and security. to-end tools used to create, customize,
 Computer-Assisted Translation (CAT) – publish, and manage videos online.
the use of computers to assist in the
translation of one or more natural ONLINE SAFETY AND SECURITY
languages into another or others, and Internet safety or online safety is
vice-versa. trying to be safe on the internet and is the
 3D Imaging and Holography – knowledge of maximizing the user's personal
holography is a photographic technique safety and security risks to private information
that uses light to project objects in a and property associated with using the internet,
way that appears three-dimensional. and the self-protection from computer crime in
 Virtual Reality – the term used to general.
describe a three-dimensional, Sensitive information such as personal
computer-generated environment that information and identity, passwords are often
can be explored and interacted with a associated with personal property (for example,
person. bank accounts) and privacy and may present
security concerns if leaked. Unauthorized access
ONLINE PLATFORMS and usage of private information may result in
A platform is defined as a group of consequence such as identity theft, as well as
technologies that are used as a base upon which theft of property. Common causes of
other applications, processes, or technologies information security breaches include:
are developed. It can be programmed and
therefore customized by outside developers who HACKING
are the users. Hacking is an attempt to exploit a computer
system or a private network inside a computer.
COMMON ONLINE PLATFORMS Simply put, it is the unauthorized access to or
 Social Media – web-based technology control over computer network security systems
that allows the development, for some illicit purpose.
deployment, and management of social
media solutions and services. It PHISHING
provides solutions to creating social Phishing is a type of scam where the scammers
media websites. disguise as a trustworthy source in attempt to
 E-Commerce and M-Commerce – e- obtain private information such as passwords,
commerce is a collection of software and credit card information, etc. through the
technologies that allows merchants to internet. Phishing often occurs through emails
create a storefront on the internet while and instant messaging and may contain links to
m-commerce transacts business entirely websites that direct the user to enter their
on mobile technologies. private information. These fake websites are
 Online Learning – an incorporated set of often designed to look identical to their
interactive online services that provides legitimate counterparts to avoid suspicion from
the teachers, learners, parents, and the user.
others involved in education sector with
a wide range of tools and resources to INTERNET SCAMS
support and enhance the delivery and Internet scams are schemes that deceive the
management of education through the user in various ways in attempt to take
internet. advantage of them. Internet scams often aim to
cheat the victim of personal property directly
rather than personal information through false monitoring, making threats, identity theft,
promises, confidence tricks and more. damage to data or equipment, the solicitation of
minors for sex, or gathering information that
MALWARE may be used to harass. According to a study
Malware, particularly spyware, is malicious conducted by Baum et al. (2009), the rate of
software disguised as software designed to assault through electronic means such as e-mail
collect and transmit private information, such as or instant messaging was over one in four out of
passwords, without the user's consent or all stalking victims in the study.
knowledge. They are often distributed through
e-mail, software and files from unofficial CYBERBULLYING
locations. Malware is one of the most prevalent Cyberbullying is the attack upon an individual
security concerns as often it is impossible to or group through the use of electronic means
determine whether a file is infected, despite the such as instant messaging, social media, e-mail
source of the file. and other forms of online communication with
the intent to abuse, intimidate, or overpower.
PERSONAL SAFETY In a 2012 study of over 11,925 students in the
The growth of the internet gave rise to many United States, it was indicated that 23% of
important services accessible to anyone with a adolescents reported being a victim of cyber
connection. One of these important services is bullying, 30% of which reported experiencing
digital communication. While this service suicidal behavior.
allowed communication with others through the
internet, this also allowed the communication ONLINE PREDATION
with malicious users. While malicious users often Online predation is the act of engaging an
use the internet for personal gain, this may not underage minor into inappropriate sexual
be limited to financial/material gain. This is relationships through the internet. Online
especially a concern to parents and children, as predators may attempt to initiate and seduce
children are often targets of these malicious minors into relationships through the use of chat
users. Common threats to personal safety rooms or internet forums.
include: phishing, internet scams, malware,
cyberstalking, cyberbullying, online predictions OBSCENE/OFFENSIVE CONTENT
and sextortion. Various websites on the internet contain
material that some deem offensive, distasteful
PLAGIARISM or explicit, which may often be not of the user's
Plagiarism is the "wrongful appropriation" and liking. Such websites may include internet,
"stealing and publication" of another author's shock sites, hate speech or otherwise
"language, thoughts, ideas, or expressions" and inflammatory content. Such content may
the representation of them as one's own original manifest in many ways, such as pop-up ads and
work. Plagiarism is considered academic unsuspecting links.
dishonesty and a breach of journalistic ethics. It
is subject to sanctions like penalties, SEXTORTION
suspension, and even expulsion. SEXTORTION, especially via the use of
webcams, is a concern, especially for those who
CYBERSTALKING use webcams for flirting and cybersex. Often
Cyberstalking is the use of the Internet or other this involves a cybercriminal posing as someone
electronic means to stalk or harass an individual, else - such as an attractive person - initiating
a group of individuals, or an organization. It may communication of a sexual nature with the
include the making of false accusations or victim. The victim is then persuaded to undress
statements of fact (as in defamation), in front of a webcam, and may also be persuaded
to engage in sexual behavior, such as and provides common services for other
masturbation. The video is recorded by the software.
cybercriminal, who then reveals their true • IOS – used in Apple devices such as IPad
intent and demands money or other services and IPhone.
(such as more explicit images of the victim, in • Android – an open source operating
cases of online predation), threatening to system developed by GOOGLE.
publicly release the video and send it to family • Blackberry OS – used in Blackberry
members and friends of the victim if they do not devices.
comply. • Windows Phone OS – a closed source
and proprietary operating system developed by
INTELLECTUAL PROPERTY RIGHTS AND Microsoft.
COPYRIGHT ISSUES • Symbian – the original smartphone OS
Intellectual property refers to creations of the used by NOKIA devices.
mind: inventions; literary and artistic works; and • Web OS – originally used for
symbols, names and images used in commerce. smartphones now used for smart TVs
Intellectual property is divided into two • Device Drivers – software which operate
categories: and control particular type of devices attached
 Industrial Property includes patents for to the computer.
inventions, trademarks, industrial • Utility Software – computer programs
designs and geographical indications. designed to assist users in the maintenance and
 Copyright covers literary works (such as care of the system.
novels, poems and plays), films, music, • Anti-virus software – scan the computer
artistic works (e.g., drawings, paintings, system for viruses and remove them.
photographs and sculptures) and • Memory testers – check for memory
architectural design. Rights related to failures.
copyright include those of performing • Registry cleaners – clean and optimizes
artists, producers of phonograms and the System Registry by removing old registry
broadcasters in their radio and keys that are no longer in use.
television programs. • Screensavers – software that runs when
the computer is idle, usually displays images and
LESSON 2. APPLICATION SOFTWARE patterns for entertainment or security.
PACKAGES • Disk checkers – scan an operating hard
drive and check for logical or physical error.
SOFTWARE • Disk compression utilities –
Software refers to in to instructional compress/uncompress the contents of a disk.
information that directs the activities of the • Disk defragmenters – detect computer
computer hardware or helps user control the files whose contents are scattered across several
hardware components of the computer. They locations on the hard disk and move the
are collectively known as “programs”. fragments to one location to increase efficiency.
• Disk formatters – prepare a data
TYPES OF SOFTWARE storage, such as hard disk, for initial use.
• System Software – software that • Backup software – makes copies of all
directly operates the computer hardware to information stored on a disk and restores either
provide basic functionality needed by users and the entire disk or selected files.
other software, and to provide a platform for • File managers – provide a convenient
running application software. method of performing routine data
• Operating Systems – essential management.
collections of software that manages resources
• Disk cleaners – find files that are lowest base number system used by us, which is
unnecessary to computer operation. two. This is the binary number system. In the
• Application Software – software Binary number system, 0s and 1s are represented
designed to perform specific tasks. by OFF and ON respectively. This indicates the
• Word Processor – a computer program turning on or off an electrical signal or a base 2
or device that provides for input, editing, exponent. Computers use voltages and since
formatting and output of text. voltages changes often, no specific voltage is set
• Desktop Publisher – a computer for each number in the decimal system. For this
program that generates layouts for documents reason, binary is measured as a two-state system
to produce typographic quality text and images. i.e. on or off. Also, to keep calculations simple
• Electronic Spreadsheet – an interactive and convert into binary online, computers use
computer application for organization, analysis the binary number system.
and storage of data in tabular form.
• Paint Application – software graphics User Interface
program that allows the user to draw or paint User interface (UI) is a conduit between human
bitmapped images on a computer. and computer interaction – the space where a
• Presentation Graphics – is a software user will interact with a computer or machine to
package used to display information in the form complete tasks. The purpose of a UI is to enable
of a slide show. a user to effectively control a computer or
• Sound/Video Editor – software which machine they are interacting with, and for
allows editing and generating video and audio feedback to be received in order to
data. communicate effective completion of tasks. A
• Database Management Systems – successful user interface should be intuitive (not
software application that interacts with end require training to operate), efficient (not
users, other applications, and the database create additional or unnecessary friction) and
itself to capture and analyze data. user-friendly (be enjoyable to use). A Graphical
• Games –electronic games that involves User Interface (GUI) is specifically for software.
interaction with a user-interface to generate It utilizes generated UI elements such as text,
visual feedback on a video device such as a links, buttons and images to construct a design
monitor. system that form the user experience.

WHY BINARY NUMBERS ARE USED BY WORD PROCESSORS


COMPUTERS? Word processing software is used to manipulate
a text document, such as a resume or a report.
Modern day computers use binary numbers to You typically enter text by typing, and the
operate—this is a fact well-known to people software provides tools for copying, deleting and
studying computer science or to those using various types of formatting. Some of the
these machines on a more than frequent basis. functions of word processing software include:
When bit is uttered, the person using it is trying • Creating, editing, saving and printing
to define the binary digit contraction—an item documents.
that can only hold a 0 or 1. The bits are • Copying, pasting, moving and deleting
organized into eight groups and these groups are text within a document.
referred to as octets or bytes. • Formatting text, such as font type,
bolding, underlining or italicizing.
To present numerical data in our daily life, we • Creating and editing tables.
use the decimal number systems. Unfortunately, • Inserting elements from other software,
computers can’t do the same. Instead, such as illustrations or photographs.
computers represent numbers by using the • Correcting spelling and grammar.
Word processing includes a number of tools to Text Wrapping
format your pages. For example, you can • Allows you to place your images where
organize your text into columns, add page you want it to be in your document.
numbers, insert illustrations, etc. However, • In Line with Text – default setting for
word processing does not give you complete images that are inserted or integrated in your
control over the look and feel of your document. document. It treats your
When design becomes important, you may need image like a text font with the bottom side
to use desktop publishing software to give you totally aligned with the text line.
more control over the layout of your pages. • Square – This setting allows the image
you inserted to be placed anywhere within the
Word processing software typically also contains paragraph with the text going around the image
features to make it easier for you to perform in a square pattern like a frame
repetitive tasks. For example, let's say you need • Tight – This is almost the same as the
to send a letter to all your customers regarding Square setting, but here the text “hugs” or
a new policy. The letter is the same for all conforms to the general shape of the image. This
customers except for the name and address at allows you to get a more creative effect on your
the top of the letter. A mail merge function document. This setting can mostly be achieved
allows you to produce all the letters using one if you are using an image the supports
template document and a table with customer transparency like a .GIF or .PNG file.
names and addresses in the database. • Through – This setting allows the text on
your document to flow even tighter, taking the
Text editors shouldn't be confused with word contours and shape of the image. Again, this can
processing software. While they do also allow be best used with a .GIF or .PNG type of image.
you to create, edit and save text documents, • Top and bottom – This setting pushes
they only work on plain text. Text editors don't the texts away vertically to the top and/or the
use any formatting, such as underlined text or bottom of the image so that image occupies a
different fonts. Text editors serve a very whole text line on its own.
different purpose from word processing • Behind text – This allows your image to
software. They are used to work with files in dragged and placed on your document but with
plain text format, such as source code of all the texts floating in front of it. It effectively
computer programs or configuration files of an makes your image look like a background.
operating system. An example of a text editor • In front of Text – As it suggests, this
would be Notepad on the Windows platform. setting allows your image to be placed right on
top of the text as if your image was dropped
ADVANCED TECHNIQUES IN MICROSOFT WORD right on it.

Performing Calculation without Tables


• Press CTRL + F9 then type the formula.
Press F9 again or RIGHT-CLICK and select
UPDATE to get the result.
Inserting automatically changing Date, Time,
and Page Number
• Press ALT + SHIFT + D for DATE
• Press ALT + SHIFT + T for TIME
• Press ALT + SHIFT + P for PAGE

Das könnte Ihnen auch gefallen