Sie sind auf Seite 1von 48

What is a computer?

A device that
accepts information
and manipulates it
for some result.
COMPUTER

HARWARE FIRMWARE SOFTWARE

MAIN PERIPHERAL
CPU SYSTEM APPLICATION
MEMORY DEVICES
HARDWARE
(PHYSICAL PARTS)

CPU MAIN MEMORY PERIPHERALS

ALU CU RAM ROM INPUT OUTPUT


CPU
• MICROPROCESSOR
• MOTHER BOARD
• CASE
• OTHER COMPONENTS
• BUSES
MONITOR

• The computer
monitor is the
physical display for
your computer.
• The terms monitor
and display are
often used
interchangeably
KEYBOARD

• looks like a standard typewriter keyboard.


• Cursor Keys; Function Keys, F1 through
F12; Numerical Keypad …
MOUSE
• input device like the
keyboard, but more
dynamic.
• has a roller ball that is
attached to several
internal sensors ; 2 or 3
buttons
• you can click, highlight,
or drag and drop the
item.
DRIVES
• FLOPPY

• FLOPPY DRIVE
CD-ROM DRIVE
PRINTER
• A printer transfers
graphics and text from
your computer to paper.
• has lights and displays
that tell you when it is out
of paper or toner or ink, or
when it has paper
jammed inside it.
• Printers can differ in the
resolution per inch, color
capability and speed
SOFTWARE
PROVIDES INSTRUCTIONS AND DATA

SYSTEM SOFTWARE APPLICATION


OPERATING SYSTEM & OTHER SOFTWARE
PROGRAMS THAT ALLOW USED BY OPERATOR
COMPUTER TO FUNCTION
FOR SPECIFIC TASKS
THE DESKTOP
Once Windows has been loaded, the desktop will be visible on
the screen
WINDOW
• Title Bar: Located at the top of the window,
tells you what program you are using.
• Tool Bars: Located below the title bar, are
specific to each program.
• Task Bar: Located at the bottom of the window,
tells you what programs are open.
• Scroll Bars: Located on the side and on the
bottom, enables you to scroll up/down or
right/left.
Introduction to Internet
A Brief History of Internet

• Started by the Department of Defense, was


called the ARPANET project in 1969.

• The Internet is the largest computer network


in the world, connecting millions of
computers. A network is a group of two or
more computer systems linked together.
Internet Growth Trends

1977: 111 hosts on Internet

1981: 213 hosts

1983: 562 hosts

1984: 1,000 hosts

1986: 5,000 hosts

1987: 10,000 hosts

1989: 100,000 hosts

1992: 1,000,000 hosts

2001: 150 – 175 million hosts

2002: over 200 million hosts


By 2010, about 80% of the planet will be on the Internet
CONNECTING
TO
INTERNET

EMAIL INTERNET ABUSE

DEFINITIONS
CONNECTING TO INTERNET

NARROW BAND BROAD BAND

An ISP may offer either narrow band or broad band connection (or both).

Band width refers to the amount of data that can be sent via modem or
network connections measured in bits–per-second.

Year Broad band Narrow band


Users Users

March ’06 68% 32%


Jan ‘05 55% 45%
Simple Mail Transfer Protocol ( SMTP ) : It is the protocol used to send
email messages from one server to another.

Post Office Protocol ( POP3 ): It stores the messages for the recipient.
To retrieve the messages, the user must connect to it using email client or
the online email service

IMAP: It enables a user to check email from multiple computers at


different locations.
You need broadband to:
• Watch videos on Net.
• Faster Uploads.
• Voice over IP.
• Video conferencing.
• Send and Receive large files.
• Get Online Faster

File Download Dial-up Broadband


Digital image (.5 MB) 1.5 mins 5 seconds

Video Clip ( 1 MB) 2.5 mins 11 seconds

MP3 file ( 4MB ) 9.9 mins 47 seconds

Upgrade Software ( 25 62.4 mins 5 mins


MB )
DEFINITIONS

• DOMAIN NAME
• DOMAIN NAME SYSTEM ( DNS )
• FILE TRANSFER PROTOCOL (FTP)
• HYPERTEXT TRANSFER PROTOCOL ( HTTP )
• HYPERTEXT MARKUP LANGUAGE ( HTML )
• UNIFORM RESOURCE LOCATOR ( URL )
• SIMPLE MAIL TRANSFER PROTOCOL ( SMTP )
• POST OFFICE PROTOCOL ( POP )
WHAT HAPPENS WHEN WE – EMAIL ?!?!

An email is a text message sent to a recipient using email clients such as


Microsoft outlook, Juno client or online email services such as Yahoo &
Gmail.
DOMAIN NAME SYSTEM (or Service or Server)
• It is the way that internet domain names are located and translated to IP
addresses .
domain name
• Names used in URL's and corresponding to one or more IP addresses.
• The basic purpose of domain name is to provide easily recognizable
names to the numerically addressed internet resources

What is a Fully Qualified Domain Name ?

example: www.maps.google.com

Top Level Domain


Sub Domain

User Specific Domain


Uniform Resource Locator ( URL )
 It specifies the address of a web page.
e.g: http://www.example.net/

File Transfer Protocol (FTP)

• A common protocol that facilitates transferring any type of electronic files over
the Web.

Hypertext Transfer Protocol (HTTP)


 The protocol computers use to transmit Web documents
between computers, identified by the prefix "http://" of the
URL.
Internet Protocol (IP Address )
 The numerical identifier for a computer connected to a TCP/IP
network, such as the Internet.
ABUSE

SPAM SCAM VIRUS


Is your computer spewing SPAM????

Spam or Spamming is the abuse of electronic messaging systems to


indiscriminately send unsolicited messages.

Email Spam is the practice of sending unwanted email messages


frequently with commercial content, in large quantities to an
indiscriminate set of recipients.

EMAIL SPAM

Unsolicited Bulk Email Unsolicited Commercial Email


Examples of SPAM
• Make money Fast Chain Letters Spam.
• A-pound a- day diet Spam.
• Just Read this ! Spam's containing long,
winding messages.
• Fake Anti Spam Sites.

Fight against SPAM

• Coalition Against Unsolicited Commercial


E mail ( CAUCE ).
• National Fraud Information Center (NFIC)
• www.spambusters.org
Scams are emails cleverly disguised as coming from real companies when they
are actually trying to know your private information such as passport number,
bank account, social security number etc. Again, it is one of the most common
problems faced by Internet users.

Phisher scams Lottery scams Nigerian Work-at-home


scams scams
VIRUS: A computer virus is a small piece of software that attaches itself to
a program or a file enabling it to spread from one computer to another

HOW DO I KNOW IF THE COMPUTER HAS VIRUS?!?!

The computer runs slower than usual.


The computer stops responding or locks up frequently
The computer restarts on its own.
Applications on the computer so not work correctly or are inaccessible.
It shows unusual error messages.
It shows distorted menus and dialog boxes
An antivirus program is disabled for no reason, and it cannot be restarted.
A program disappears from your computer.
Strange sounds play from the speaker unexpectedly
New icons appear on the desktop

E.g. of Virus: Melissa. A, Anti EXE, Trj.Reboot, Word Concept.


WORM
• A worm is a self-replicating computer program or software applications designed
to spread via networks. It uses a network to send out copies of itself.

Examples of Worm:

• Nuwar OL Worm- Nuwar OL is delivered to a user's inbox with subjects like


"You Are In My Dreams," "I Love You So Much," "Inside My Heart Is You," etc.
To disguises its activity, the worm redirects you to simple web page with the
theme of a romantic greeting card. Once the computer is infected, the infection
spreads by sending messages to names in the user's contact folder.

•Valentin E Worm- It is also distributed via email. This worm also includes an
attached file called ‘friends4U’. When the user opens the attachment, a copy
of the worm gets downloaded onto their computer
Trojan Horse

• Trojan horse is a destructive program that disguises itself as a real


application.
• This is a type of virus that attempts to make the user think that it is a
beneficial application.

Well-known Trojan horses:


Back Orifice
Back Orifice 2000
Netbus
Subseven
Downloader- EV
What is Email?

• a method of sending
messages electronically
from one computer to
another

• short for electronic mail


How does it work?

• Like a post office

• @ symbol is always
used in email
addresses
Anatomy of a message

• Address line

• Subject line

• Body

• Attachments
Getting an account

• Free web based services


– www.hotmail.com
– www.yahoo.com
– www.gmail.com

• Be sure to write down your


email address or user ID and
Password and keep them in a
safe place
Let’s go to www.gmail.com and get
new email accounts.
Compose a message
• Address: classes@christiancounty.lib.mo.us
• Subject: Practice message
• Text: Intro to email is the BEST!
Netiquette
• Always keep in mind that email can
be intercepted and read by others
• Do not use abusive, obscene, sexist,
or racist language in messages
• Get permission before forwarding
someone else’s message
• Include the subject of your message
in the subject field
• Avoid using all uppercase letters (it
implies shouting)
• Do not send anonymous messages
• Do not send chain letters
A note of caution
• Internet scams and spam
– International Lottery
– Stranded foreign business person
– Large amounts of money with no
cost to you
– Bank and credit card company
requests for personal information
– Anything from someone you don’t
know with an attachment
• Remember! If is sounds too good to
be true then it probably is!

Das könnte Ihnen auch gefallen