Reviewer in Tech 1
Reviewer in Tech 1
Digital Literacy - involves having a current knowledge and understanding of computers, mobile
devices, the Internet and other related technologies.
Types Of Technology
Information Technology (IT) - Includes computer systems, software, networks, and the
Internet. It focuses on data processing, storage, and communication.
● Increased efficiency
● Improved Quality of Life
● Economic growth
● Job displacement
● Privacy Concerns
● Environment issues
● Communication
● Work.
● Education
● Entertainment
● computer is a fast and accurate electronic machine that is designed to accept and store
input data, process them and produce output results, using the instructions of a stored
program or data.
History of Computer
● The word computer brings from the word ‘ compute ‘, that means to ‘ calculate.’
● Charles Babbage is considered as the father of computer.
● 1822, Charles Babbage conceptualized and began developing the Difference Engine,
Generations of Computer -The term ” generation ” is generally used to characterize the major
developments in the field of computer industry.
Working of Computer
1.Hardware
● Central Processing Unit
● Memory
● Storage
● Motherboard
● Input device
● Output Device
● Power Supply
● Cooling System
2.Software
● Operating System
● Applications
Functions of Computer
● Data input
● Data processing
● Data Storage
● Data output
● Data management
Importance of Computer
● Productivity
● Communication
● Information Management
● Entertainment
● Innovation
Advantage of Computer
● Speed and Efficiency
● Accuracy and Realability
● Storage and Organization
● Connectivity and Communication
● Productivity and Creativity
● Versatility and Flexibility
● Data Analysis and Decision Making
● Security and Privacy
Disadvantages of Computer
● Health issues
● Security Risks
● Environmental Impact
● Dependency and Overreliance
● Social and Psychological Issues
● Cost of Maintenance and Upgrades
● Potential for Misuse
● Technical Issues
Malware, short for malicious software, is software that acts without a user’s knowledge and
deliberately alters the computer’s and mobile device’s operations.
Virus – Adware
Worms — Zombie
Trojan Horses, Rootkits, Spyware – Each of these types of malware attacks your computer or
mobile device differently. Some are harmless pranks that temporarily freeze, play sounds, or
display messages on your computer or mobile device
Malware Categories
● Propagation
● Virus: human-assisted propagation (e.g., open email attachment)
● Worm: automatic propagation without human assistance
● Concealment
● Rootkit: modifies operating system to hide its existence
● Trojan: provides desirable functionality but hides malicious operation.
Insider Attacks - insider attack is a security breach that is caused or facilitated by someone
who is a part of the very organization that controls or builds the asset that should be protected.
Computer Viruses - computer virus is computer code that can replicate itself by modifying
other files or programs to insert code that is capable of further replication.
Virus Phases
● Dormant phase -During this phase, the virus just exists— the virus is laying low and
avoiding detection.
● Propagation phase- During this phase, the virus is replicating itself, infecting new files
on new systems.
● Triggering phase - In this phase, some logical condition causes the virus to move from
a dormant or propagation phase to perform its intended action.
● Action Phase - In this phase, the virus performs the malicious action that it was
designed to perform, called payload.
Computer worms - computer worm is a malware program that spreads copies of itself without
the need to inject itself in other programs, and usually without human interaction.
Early History
● First Worms built in the Lab of John Shock and Jon Heeps at Xeror PARC in the early
80’s
● The first internet worm was the Morris Worm, written by Cornell student Robert
Tappan Morris and released on November 2, 1988.
Trojan Horses - (or Trojan) is a malware program that appears to perform some useful task, but
which also does something with negative consequences (e.g., launches a keylogger).
Rootkits - malware program that enables cyber criminals to gain access to and infiltrate data
from machines
without being detected.
Malware Zombie - Malware can turn a computer in to a zombie, which is a machine that is
controlled externally to perform malicious attacks, usually as a part of a botnet.
● In February 2006, the Russian Stock Exchange was taken down by a virus.
● I Love You - ILoveYou sometime called as LOVE BUG or Loveletter was a computer
worm that infected over ten million Windows personal computer on and after May 5,
2000.
● Creator - Onel De Guzman – 24 years old Manila, PH.
● laws in the Philippines against making MALWARE at that time of creation, the Philippine
Congress enacted R.A. 8792 otherwise know as the E-Commerce Law, in July 2000
Anti Cybercrime Prevention Act of 2012 - Cybercrime Prevention act of 2012 aims to protect
internet users and uphold cybercrime standards in the Philippines,
Over the past 20 years, several notable computer viruses and worms have made significant
impact on cybersecurity worldwide
Categories of Hardware
Software - is a set of instructions or programs that tell a computer or other electronic devices
how to perform specific tasks.
● Operating Systems: These manage the hardware and provide a platform for running
application software.
● Applications: These are programs designed to perform specific tasks for users,
● Utilities: These are programs that help manage and tune computer hardware, operating
system, or application software.
● Development Software: These tools are used to create, test, and debug other software.
● Firmware: This is a specialized type of software that is embedded into hardware devices
to control them.
● Hardware and software work together to perform computing tasks, with hardware
providing the physical infrastructure and software providing the instructions for how to
use that infrastructure.
● System Software - provides the basic functions that are performed by the computer. It is
necessary for the functioning of a computer.
● is a type of computer program that is designed to run a computer's hardware and
application programs.
● Application Software - is used by the users to perform specific tasks. The user may
choose the appropriate application software, for performing a specific task, which
provides the desired functionality.
● Enhanced productivity
● Specialization
● Improved creativity
● Convenience
● Scalability
● Collaboration and connectivity
● Cost
● Compatibility issues
● Security risks
● Learning curve
● Maintenance and updates
● Resource intensive
What is Network?
● Resource Sharing
● Communication
● Data Management
● Scalability
Network Devices - Network devices are hardware components that are used to establish,
manage, and maintain network connections.
Network Media - refers to the physical or logical medium used to transmit data between
network devices.
Network Protocol - network protocol is a set of rules and conventions that governs how data is
transmitted, received, and processed over a network.
DCHP – Dynamic Host Configuration Protocol Automatically assigns IP addresses and other
network configuration details (such as subnet mask, default gateway, and DNS servers) to
devices on a network.
Type of Network
Local Area Network - Local Area Network (LAN) is a network that connects devices within a
limited geographical area, such as a home, office, or campus.
Network Protocols
● Ethernet: A common protocol for wired LANs, defining rules for data transmission over
cables.
● Wi-Fi: A protocol for wireless LANs, enabling devices to connect and communicate over
radio
waves.
Wide Area Network -Wide Area Network (WAN) is a telecommunications network that extends
over a large geographical area, such as cities, countries, or even globally.
Metropolitan Area Network - Metropolitan Area Network (MAN) is a type of network designed
to cover a larger geographical area than a Local Area Network (LAN) but smaller than a Wide
Area Network (WAN).
Personal Area Network - Personal Area Network (PAN) is a small-scale network designed for
the interconnection of personal devices within a close proximity, typically ranging from a few
centimeters to a few meters.
Virtual Private Area Network - Virtual Private Network (VPN) is a technology that creates a
secure, encrypted connection over a less secure network, such as the internet.
Microsoft Office 2013 - is the version of Microsoft Office, offering features that provide users
with better functionality and easier ways to work with the various files they create.
Microsoft Office 2013 includes - a wide variety of apps such as Word, PowerPoint, Excel,
Access, Outlook, Publisher, OneNote, InfoPath, SharePoint Workspace, and Lync:
Word -is a full-featured word processing app that allows you to create professional-looking
documents and revise them easily.
Excel -is a powerful spreadsheet app that allows you to organize data, complete calculations,
make decisions, graph data, develop professional-looking reports, publish organized data to the
web, and access real-time data from websites.
Access - is a database management system that enables you to create a database; add,
change, and delete data in the database; ask questions concerning the data in the database;
and create forms and reports using the data in the database.
Outlook - is a communications and scheduling app that allows you to manage email
accounts, calendars, contacts, and access to other Internet content.
Publisher - is a desktop publishing app that helps you create professional-quality publications
and marketing materials that can be shared easily.
OneNote - is a note taking app that allows you to store and share information in notebooks with
other people.
Microsoft InfoPath Designer 2013, or InfoPath - is a form development app that helps you
create forms for use on the web and gather data from these forms.
SharePoint - is a collaboration app that allows you to access and revise files stored on your
computer from other locations.
Microsoft Lync 2013 - is a communications app that allows you to use various modes of
communications such as instant messaging, videoconferencing, and sharing files and apps.
● Ribbon is the graphical interface at the top of the window that provides quick access to
various tools and features.
● Tab refers to a section within the Ribbon that organizes related commands and tools.
Each tab—like Home, Insert, Design, and Layout—groups features together for easy
access.
● In addition to the main tabs, the Office apps display tool tabs, also called contextual
tabs,
● Within each tab, commands are organized into groups
● scroll bar is a vertical or horizontal bar that allows you to navigate through your
document.
● Quick Access Toolbar in Microsoft Word is a customizable toolbar located at the top
left corner of the window, above the Ribbon.
● gallery is a set of choices, often graphical, arranged in a grid or in a list.
● document window in Microsoft Word is the main area where you create, edit, and
format your document.
● Ruler: Often displayed at the top and left of the document window, the ruler helps with
alignment and setting margins.
● insertion point is the blinking vertical line (cursor) that indicates where text will be
inserted when you type.
ScreenTip is an on-screen note that provides the name of the command, available keyboard
shortcut(s), a description of the command, and sometimes instructions for how to obtain help
about the command.
Dialog Box Some groups on the ribbon have a small arrow in the lower-right corner, called a
Dialog Box Launcher,
Mini toolbar, which appears automatically based on tasks you perform, contains commands
related to changing the appearance of text in a document.
Basic Shortcut
Document Management
Navigation