0% found this document useful (0 votes)
16 views13 pages

Reviewer in Tech 1

Uploaded by

jessica sapigao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views13 pages

Reviewer in Tech 1

Uploaded by

jessica sapigao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

REVIEWER IN TECH 1

Lesson 1: Introduction in Technology

Digital Literacy - involves having a current knowledge and understanding of computers, mobile
devices, the Internet and other related technologies.

Types Of Technology

Information Technology (IT) - Includes computer systems, software, networks, and the
Internet. It focuses on data processing, storage, and communication.

Communication Technology-Facilitates the exchange of information.

Biotechnology- Uses biological processes for industrial, agricultural, or medical applications.

Mechanical Technology - Involves machinery and mechanical systems.

Medical Technology- Applies technological innovations to healthcare.

Environmental Technology- Addresses environmental challenges and sustainability.

Positive impact of Technology

● Increased efficiency
● Improved Quality of Life
● Economic growth

Negative impact of Technology

● Job displacement
● Privacy Concerns
● Environment issues

Technology is integrated into almost every aspect of modern life

● Communication
● Work.
● Education
● Entertainment

Lesson 2: Introduction To Computer


What is Computer?

● computer is a fast and accurate electronic machine that is designed to accept and store
input data, process them and produce output results, using the instructions of a stored
program or data.

History of Computer

● The word computer brings from the word ‘ compute ‘, that means to ‘ calculate.’
● Charles Babbage is considered as the father of computer.
● 1822, Charles Babbage conceptualized and began developing the Difference Engine,

Generations of Computer -The term ” generation ” is generally used to characterize the major
developments in the field of computer industry.

● 1st Generation Electronic Numerical Integrator and Calculator (ENICA)


● Time: 1940-1956
● generation of computer of VACUUM TUBES
● 1st generation of computer is developed by Eckert and Mauchly in 1946 in the USA.
● ENICA took about 200 microseconds to add two digits and about 2400 microseconds
to multiple.
● 1946, Professor John V Neumann proposed the concept of stored programming that is
the storage of machine instructions in the memory of the computer in 1949 known
as EDSAC.
● EDSAC is represents Electronic Delay Storage Automatic Calculator.
● 1st commercial production of stored electronic computers was UNIVAC.
● UNIVAC -is stand for Universal Automatic Computer.

● 2nd generation of computers stared around 1959.


● generation of computer TRANSISTOR
● Transistors were made of germanium semi- conductor material.

● 3rd generation started in the year 1964 / 1971.


● generation of computer INTEGRATED CIRCUIT
● The size of main memory reached about 100 megabytes.

● 4th generation was stared in the years 1976 – 1985.


● generation of computer VERY LARGE INTEGRATED CIRCUITS
● generation emerged with the large scale integrated circuits ( LSIC ) and very large
integrated circuits ( VLSIC ).
● Floppy disks served as low cost, high limit reinforcement peripherals.
● 5th generation computer would be highly complex and intelligent electronic device
conceived with an idea of intelligence without going through the various stages of
technical development.
● generation of this computer ULTRA LARGE SCALE INTEGRATION
● This idea of intelligence is called artificial intelligence or AI.

Working of Computer

Input — Process — Output / I-P-O cycle

Key Components of Computer

1.Hardware
● Central Processing Unit
● Memory
● Storage
● Motherboard
● Input device
● Output Device
● Power Supply
● Cooling System

2.Software
● Operating System
● Applications

Functions of Computer

● Data input
● Data processing
● Data Storage
● Data output
● Data management

Importance of Computer

● Productivity
● Communication
● Information Management
● Entertainment
● Innovation

Advantage of Computer
● Speed and Efficiency
● Accuracy and Realability
● Storage and Organization
● Connectivity and Communication
● Productivity and Creativity
● Versatility and Flexibility
● Data Analysis and Decision Making
● Security and Privacy

Disadvantages of Computer

● Health issues
● Security Risks
● Environmental Impact
● Dependency and Overreliance
● Social and Psychological Issues
● Cost of Maintenance and Upgrades
● Potential for Misuse
● Technical Issues

Lesson 3: Digital Security and Safety

What is Digital Security and Safety?

● Refers to as cyber security , is a practice of protecting digital information from


unauthorized access, use disclosure, disruption, modification or destruction.

Malware, short for malicious software, is software that acts without a user’s knowledge and
deliberately alters the computer’s and mobile device’s operations.

Malware (Malicious Software)

Virus – Adware
Worms — Zombie
Trojan Horses, Rootkits, Spyware – Each of these types of malware attacks your computer or
mobile device differently. Some are harmless pranks that temporarily freeze, play sounds, or
display messages on your computer or mobile device

Malware Categories

● Propagation
● Virus: human-assisted propagation (e.g., open email attachment)
● Worm: automatic propagation without human assistance
● Concealment
● Rootkit: modifies operating system to hide its existence
● Trojan: provides desirable functionality but hides malicious operation.

Insider Attacks - insider attack is a security breach that is caused or facilitated by someone
who is a part of the very organization that controls or builds the asset that should be protected.

Backdoors- backdoor, which is also sometimes called a trapdoor, is a hidden feature or


command in a program that allows a user to perform actions he or she would not normally be
allowed to do.

Computer Viruses - computer virus is computer code that can replicate itself by modifying
other files or programs to insert code that is capable of further replication.

Virus Phases

● Dormant phase -During this phase, the virus just exists— the virus is laying low and
avoiding detection.
● Propagation phase- During this phase, the virus is replicating itself, infecting new files
on new systems.
● Triggering phase - In this phase, some logical condition causes the virus to move from
a dormant or propagation phase to perform its intended action.
● Action Phase - In this phase, the virus performs the malicious action that it was
designed to perform, called payload.

Computer worms - computer worm is a malware program that spreads copies of itself without
the need to inject itself in other programs, and usually without human interaction.

Early History

● First Worms built in the Lab of John Shock and Jon Heeps at Xeror PARC in the early
80’s
● The first internet worm was the Morris Worm, written by Cornell student Robert
Tappan Morris and released on November 2, 1988.

Trojan Horses - (or Trojan) is a malware program that appears to perform some useful task, but
which also does something with negative consequences (e.g., launches a keylogger).

Rootkits - malware program that enables cyber criminals to gain access to and infiltrate data
from machines
without being detected.

Malware Zombie - Malware can turn a computer in to a zombie, which is a machine that is
controlled externally to perform malicious attacks, usually as a part of a botnet.
● In February 2006, the Russian Stock Exchange was taken down by a virus.

● I Love You - ILoveYou sometime called as LOVE BUG or Loveletter was a computer
worm that infected over ten million Windows personal computer on and after May 5,
2000.
● Creator - Onel De Guzman – 24 years old Manila, PH.
● laws in the Philippines against making MALWARE at that time of creation, the Philippine
Congress enacted R.A. 8792 otherwise know as the E-Commerce Law, in July 2000

Anti Cybercrime Prevention Act of 2012 - Cybercrime Prevention act of 2012 aims to protect
internet users and uphold cybercrime standards in the Philippines,

Over the past 20 years, several notable computer viruses and worms have made significant
impact on cybersecurity worldwide

1. ILOVEYOU (2000) –Worms


2. Code Red (2001) – Worms
3. Nimda (2001) – Virus
4. Blaster (2003) – Rootkits
5. Sasser (2004) - Virus
6. Conficker (2008) - Virus
7. Stuxnet (2010) – Worms
8. Wannacry (2017) – Ransomware
9. NotPetya (2017) Ransomware
10. Emotet (2014 – Present) Trojan Horse

How to protect yourself from Malware?

● Uses Anti virus Software


● Keep Software Updated
● Enable Firewall Protection
● Be Cautious with Email and Attachments
● Download Software from Trusted Sources
● Use Strong, Unique Passwords
● Back Up Your Data
● Be Wary of Pop-Ups and Suspicious Ads
● Educate Yourself
● Use Browser Extensions Wisely
● Monitor Your System
● Secure Your Network

Lesson 4: Software and Hardware


Hardware - refers to the physical components of a computer system or electronic device. It
encompasses all the tangible parts that you can touch and see.

Categories of Hardware

1. CPU or Central Processing Unit


2. Memory
3. Storage Devices
4. Input Devices
5. Output Devices
6. Mother Board
7. Power Supply Unit
8. Graphics Processing Unit
9. Networking Hardware
10. Peripherals

Software - is a set of instructions or programs that tell a computer or other electronic devices
how to perform specific tasks.

Software various forms

● Operating Systems: These manage the hardware and provide a platform for running
application software.
● Applications: These are programs designed to perform specific tasks for users,
● Utilities: These are programs that help manage and tune computer hardware, operating
system, or application software.
● Development Software: These tools are used to create, test, and debug other software.
● Firmware: This is a specialized type of software that is embedded into hardware devices
to control them.

How software and hardware works?

● Hardware and software work together to perform computing tasks, with hardware
providing the physical infrastructure and software providing the instructions for how to
use that infrastructure.

Application software and System software

● System Software - provides the basic functions that are performed by the computer. It is
necessary for the functioning of a computer.
● is a type of computer program that is designed to run a computer's hardware and
application programs.
● Application Software - is used by the users to perform specific tasks. The user may
choose the appropriate application software, for performing a specific task, which
provides the desired functionality.

Advantage of Application Software

● Enhanced productivity
● Specialization
● Improved creativity
● Convenience
● Scalability
● Collaboration and connectivity

Disadvantages of Application Software

● Cost
● Compatibility issues
● Security risks
● Learning curve
● Maintenance and updates
● Resource intensive

Lesson 5: Computer Network

What is Network?

● A computer network is a collection of interconnected computers and other devices that


communicate with each other to share resources and information.

Functions and Benefits

● Resource Sharing
● Communication
● Data Management
● Scalability

Network Devices - Network devices are hardware components that are used to establish,
manage, and maintain network connections.

Network Interface - network interface is a point of connection that allows a device to


communicate with a network.

Network Media - refers to the physical or logical medium used to transmit data between
network devices.
Network Protocol - network protocol is a set of rules and conventions that governs how data is
transmitted, received, and processed over a network.

1. HTTP – Hypertext transfer protocol


2. HTTP/3
3. HTTPS – hypertext transfer protocol secure
4. Websocket
5. TCP – transmission control protocol
6. UDP – User datagram protocol
7. SMTP – Simple mail transfer protocol
8. FTP – File transfer protocol

Network Services - Network services refer to various functionalities provided by a network to


support communication, resource sharing, and application functionality.

DNS – Domain Name System translate human-readable domain names


(e.g.,www.example.com) into IP addresses that computers use to identify each other on the
network.

DCHP – Dynamic Host Configuration Protocol Automatically assigns IP addresses and other
network configuration details (such as subnet mask, default gateway, and DNS servers) to
devices on a network.

Type of Network

● LAN – Local Area Network


● WAN – Wide Area Network
● MAN – Metropolitan Area Network
● PAN – Personal Area Network
● VPN – Private Area Network

Local Area Network - Local Area Network (LAN) is a network that connects devices within a
limited geographical area, such as a home, office, or campus.

Network Protocols

● Ethernet: A common protocol for wired LANs, defining rules for data transmission over
cables.
● Wi-Fi: A protocol for wireless LANs, enabling devices to connect and communicate over
radio
waves.
Wide Area Network -Wide Area Network (WAN) is a telecommunications network that extends
over a large geographical area, such as cities, countries, or even globally.

Metropolitan Area Network - Metropolitan Area Network (MAN) is a type of network designed
to cover a larger geographical area than a Local Area Network (LAN) but smaller than a Wide
Area Network (WAN).

Personal Area Network - Personal Area Network (PAN) is a small-scale network designed for
the interconnection of personal devices within a close proximity, typically ranging from a few
centimeters to a few meters.

Virtual Private Area Network - Virtual Private Network (VPN) is a technology that creates a
secure, encrypted connection over a less secure network, such as the internet.

Lesson 6: Introduction to Microsoft Office

Microsoft Office 2013 - is the version of Microsoft Office, offering features that provide users
with better functionality and easier ways to work with the various files they create.

Microsoft Office 2013 includes - a wide variety of apps such as Word, PowerPoint, Excel,
Access, Outlook, Publisher, OneNote, InfoPath, SharePoint Workspace, and Lync:

Word -is a full-featured word processing app that allows you to create professional-looking
documents and revise them easily.

PowerPoint - is a complete presentation app that enables you to produce


professional-looking presentations and then deliver them to an audience.

Excel -is a powerful spreadsheet app that allows you to organize data, complete calculations,
make decisions, graph data, develop professional-looking reports, publish organized data to the
web, and access real-time data from websites.

Access - is a database management system that enables you to create a database; add,
change, and delete data in the database; ask questions concerning the data in the database;
and create forms and reports using the data in the database.

Outlook - is a communications and scheduling app that allows you to manage email
accounts, calendars, contacts, and access to other Internet content.

Publisher - is a desktop publishing app that helps you create professional-quality publications
and marketing materials that can be shared easily.

OneNote - is a note taking app that allows you to store and share information in notebooks with
other people.
Microsoft InfoPath Designer 2013, or InfoPath - is a form development app that helps you
create forms for use on the web and gather data from these forms.

SharePoint - is a collaboration app that allows you to access and revise files stored on your
computer from other locations.

Microsoft Lync 2013 - is a communications app that allows you to use various modes of
communications such as instant messaging, videoconferencing, and sharing files and apps.

● Ribbon is the graphical interface at the top of the window that provides quick access to
various tools and features.
● Tab refers to a section within the Ribbon that organizes related commands and tools.
Each tab—like Home, Insert, Design, and Layout—groups features together for easy
access.
● In addition to the main tabs, the Office apps display tool tabs, also called contextual
tabs,
● Within each tab, commands are organized into groups
● scroll bar is a vertical or horizontal bar that allows you to navigate through your
document.
● Quick Access Toolbar in Microsoft Word is a customizable toolbar located at the top
left corner of the window, above the Ribbon.
● gallery is a set of choices, often graphical, arranged in a grid or in a list.
● document window in Microsoft Word is the main area where you create, edit, and
format your document.
● Ruler: Often displayed at the top and left of the document window, the ruler helps with
alignment and setting margins.
● insertion point is the blinking vertical line (cursor) that indicates where text will be
inserted when you type.
ScreenTip is an on-screen note that provides the name of the command, available keyboard
shortcut(s), a description of the command, and sometimes instructions for how to obtain help
about the command.

Dialog Box Some groups on the ribbon have a small arrow in the lower-right corner, called a
Dialog Box Launcher,

Mini toolbar, which appears automatically based on tasks you perform, contains commands
related to changing the appearance of text in a document.

Basic Shortcut

● Ctrl + C: Copy selected text or object.


● Ctrl + V: Paste copied text or object.
● Ctrl + X: Cut selected text or object.
● Ctrl + Z: Undo the last action.
● Ctrl + Y: Redo the last action.

Document Management

● Ctrl + N: Create a new document.


● Ctrl + O: Open an existing document.
● Ctrl + S: Save the current document.
● Ctrl + P: Print the document.

Text and Paragraph Formatting

● Ctrl + B: Bold selected text.


● Ctrl + I: Italicize selected text.
● Ctrl + U: Underline selected text.
● Ctrl + E: Center align the text.
● Ctrl + L: Left align the text.
● Ctrl + J : Justify align the text
● Ctrl + T : Create a hanging indent
● Ctrl + M: Increase indent
● Ctrl + Shift + M: Decrease indent
● Ctrl + Shift + >: Increase Font size
● Ctrl + Shift + < : Decrease Font size

Navigation

● Ctrl + Arrow keys: Move the cursor word by word.


● Home: Move to the beginning of the line.
● End: Move to the end of the line.
● Page Up/Page Down: Scroll up or down a page
● Ctrl + Shift + Right Arrow: Selects text to the right, word by word.
● Ctrl + Shift + Left Arrow: Selects text to the left, word by word.
● Ctrl + Shift + Down Arrow: Selects text downwards, line by line.
● Ctrl + Shift + Up Arrow: Selects text upwards, line by line.

Special and Accented Characters

● Alt + 0151: — (Em Dash)


● Alt + 0150: – (En Dash)
● Alt + 0169: © (Copyright symbol)
● Alt + 0174: ® (Registered trademark)
● Alt + 0162: ¢ (Cent sign)
● Alt + 0133: … (Ellipsis)
● Alt + 130: é
● Alt + 132: ä
● Alt + 136: ê (Circumflex)
● Alt + 164: ñ
● Alt + 165: Ñ
● Ctrl + Shift + =: Superscript (e.g., for squared: x²)
● Ctrl + =: Subscript (e.g., for chemical formulas: H₂O)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy