The document outlines a Computer Studies Scheme of Work for JSS3 Second Term, focusing on spreadsheet packages, worksheets, and basic computer security concepts such as hacking. It details the use of Microsoft Excel for data manipulation, arithmetic operations, and creating charts, along with the importance of proper data entry and editing techniques. Additionally, it introduces the concept of hacking, including types of attacks and methods used by hackers to exploit system vulnerabilities.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
4 views9 pages
Jss3 Computer Science Complete Note
The document outlines a Computer Studies Scheme of Work for JSS3 Second Term, focusing on spreadsheet packages, worksheets, and basic computer security concepts such as hacking. It details the use of Microsoft Excel for data manipulation, arithmetic operations, and creating charts, along with the importance of proper data entry and editing techniques. Additionally, it introduces the concept of hacking, including types of attacks and methods used by hackers to exploit system vulnerabilities.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9
Computer Studies Scheme of Work for JSS3 Second Term 9.
9. It makes calculations much easier than working things out yourself.
SCHEME OF WORK Week Two: Spreadsheet Packages WEEK THREE: SPREADSHEET PACKAGES Week Three: Spreadsheet Packages EXAMPLES OF SPREADSHEET There are various types of spreadsheet software Week Four: Worksheet which include: Week Five: Worksheet • Microsoft excel Week Six: Hacking • Lotus 1-2-3, Week Seven: Hacking Community • Starview, Week Eight: Logic Circuit • SuperCalc, etc. Week Nine: Computer Career Opportunities MICROSOFT-EXCEL Week Ten: Qualities of Good Computer Professional Out of the many examples of spreadsheet packages, Microsoft Excel is the most commonly used because of its friendly features. Microsoft Excel is part of WEEK TWO: SPREADSHEET PACKAGES Microsoft suite. The suite comes in various version such as 2000, 2005, 2007,2010, DEFINITION OF SPREADSHEET: A spreadsheet is a collection of cells 2015 etc. organized into rows and columns where data is stored and manipulated. The Ms-Excel is primarily used for analysis and calculation due to its flexibility. It has spreadsheet is known as a worksheet. A spreadsheet begins with row number one a lot of calculating features and mathematical formulas. Various kinds of and column A. A cell is a space in a worksheet formed by the intersection of a row mathematical calculations can be done using MS excel. Microsoft Excel is a and a column. Each cell can contain a number, text or formula. A cell can also spreadsheet package used mainly for mathematical calculations and numerical reference another cell in the same worksheet, the same workbook or a different analysis. Examples of calculations that can be performed using MS Excel include; workbook. Each cell has an address called Cell Reference e.g. A1, B3, C7 etc. addition, subtraction, multiplication, division, average, etc. combination of more than one sheet is referred to as workbook. The worksheets Formulas are often used to carry out calculations in Ms-Excel. The desired formula can accept thousands of rows of data and columns in the form of fields. Active Cell for any calculation must be preceded with an equal sign (=). is recognized by heavy border surrounding. It is the cell that is currently worked STARTING MS EXCEL upon. Starting Worksheet (Using Microsoft Excel) Content Of Spreadsheet Click the Start button; When you are setting out a spreadsheet, you have to enter values, labels and Click All Programs; formulas. Click Microsoft Office; • VALUES: Values are those numbers you already know before starting the Click Microsoft Office Excel. spreadsheet operation. These values are inserted into cells of the spreadsheet. ARITHMETIC OPERATORS USED IN MS EXCEL • LABELS: Labels are words you enter to explain the values. You would not just + Addition enter a list of numbers without explanation. Putting labels next to each of the – Subtraction numbers makes it easier to check it through. / Division • FORMULA: Formulas are the mathematical equations you insert into the cells. * Multiplication Formulas are commands that instruct the computer on what to do. ^ Exponential Uses Of Spreadsheet When creating a formula, you must know MS Excel’s order of operations. Certain There are various uses of a spreadsheet. It uses varies according to the intended operations are performed before others. The term PEMDAS is the acronym to purpose. Some of its uses are as follows: denote MS Excel’s order of operation. 1. Spreadsheets are used for administrative functions. P —— Parenthesis (Bracket) 2. Spreadsheets are used for creating reports. E —– Exponential 3. They are used for the preparation of daily sales. M —– Multiplication 4. They are used in computing school results. D —– Division 5. They are used for project budgeting control. A —– Addition 6. They are used for drawing balance sheets. S —— Subtraction 7. Excel can store and calculate the data as directed using existing data. Calculations enclosed in parenthesis are performed first, followed by calculations 8. A spreadsheet can be used for analysis and decision making. involving exponentials. Multiplication and division operations are performed next because they are considered equal in importance. They are performed in the order Creating Excel Document in which they are encountered from left to right. Addition and subtraction are Once Excel is open, you can enter data into a file by clicking on a particular cell, performed last in the order in which they are encountered from left to right. then typing text, numbers, or formulas. Your changes will be entered into the Formulas in MS Excel current cell. Examples: Press the tab to enter your data and move the active cell to the right of the Addition =C3+D3 current one. Subtraction =C3-D3 Press enter key to enter your data and move the active cell to the next row, Division =C3/D3 usually to the beginning of that row. Multiplication =C3*D3 Use the arrow keys to enter your data and move the active cell in the indicated Average =AVERAGE(C4…C9) direction. Press the end key, right-arrow key to move to the last cell in a row. WEEK FOUR: WORKSHEET Entering Data In A Worksheet Worksheet commonly refers to a sheet of paper with questions for students and Locate the cell where you want to enter data on the worksheet and click on the cell. places to record answers. The term may also refer to a single array of data in For example point and click on cell A1. spreadsheet software or an informal piece of paper that an accountant uses to Type in your entry from the keyboard and notice the appearance of the entries in record information. the formula bar with the cell address. A worksheet or sheet is a single page in a file created with an electronic Press ‘Enter’ key. spreadsheet program such as Excel or Google Spreadsheets. A worksheet is used to Editing Data In A Worksheet store, manipulate, and display data. A worksheet is a collection of cells where you Wrong entries may either be entirely re-typed or the particular cell/range of cells keep and manipulate the data. By default, each Excel workbook contains can be corrected. three worksheets. To retype: Each worksheet is composed of a very large number of cells – which are the basic Move the cell pointer to the cell to be corrected or re-type the entry and press storage unit for data in a file or workbook. ‘Enter’ The cells are arranged in a grid pattern using rows and columns. To correct only the mistake: In Excel 2013: Move the cell pointer to the cell and double click on the cell. there are 1,048,576 rows per worksheet; Make the correction by inserting, deleting or retyping. there are 16,384 columns per worksheet; Press ‘Enter’. by default, each new file contains only one worksheet; Saving A Worksheet the number of sheets per file is limited only by the amount of memory Saving for the first time: available on the computer. Click on ‘Home’ button, For Google Spreadsheets: Click ‘Save As’ button and wait for a dialog box to open. there is a maximum of 256 columns per sheet; Type in your desire filename (i.e. the name of the document). the maximum number of cells for all worksheets in a file is 400,000; Click the ‘Save’ button or press enter on the keyboard. the current default number of worksheets for new files is one; Saving while working (after the first saving). there is a maximum of 200 worksheets per spreadsheet file. Click on the ‘save’ icon on the Quick Access toolbar or click on ‘office button’ to Starting A Workbook File open the menu. and click ‘save’ from the options. Workbooks are file that can be created in excel. You can start workbook any time RETRIEVING A SAVED WORKSHEET you want to create a new file for your excel data. Steps are Retrieving a worksheet means to open an already saved worksheet from its location 1. Open a new workbook in Excel in the computer. This is usually done to view, edit or update the worksheet. 2. Point start on the screen of your monitor Load/start Microsoft Excel 3. Click on all programs Click on ‘Office Button’ 4. Point to Microsoft office tab Click the ‘Open’ option from the list and wait for a dialog box to open. 5. Select Microsoft excel (this will take you to the excel environment) Navigate to the file you want to open and double click on it. WEEK FIVE: WORKSHEET Apply special options for each chart type: Special lines (such as high-low lines Topic: Creating And Editing Graphs and trend lines), bars (such as up-down bars and error bars), data markers, and Charts are used to display a series of numeric data in a graphical format to make it other options are available for different chart types. easier to understand large quantities of data and the relationship between different Apply a predefined chart layout and style for a professional look series of data. Instead of manually adding or changing chart elements or formatting the chart, you To create a chart in Excel, you start by entering the numeric data for the chart on a can quickly apply a predefined chart layout and chart style to your chart. Excel worksheet. Then you can plot that data into a chart by selecting the chart type that provides a variety of useful predefined layouts and styles. However, you can fine- you want to use on the Insert tab, in the Charts group. tune a layout or style as needed by making manual changes to the layout and 1. Worksheet data format of individual chart elements, such as the chart area, plot area, data series, or 2. Chart created from worksheet data legend of the chart. Excel supports many types of charts to help you display data in ways that are When you apply a predefined chart layout, a specific set of chart elements (such as meaningful to your audience. When you create a chart or change an existing chart, titles, a legend, a data table, or data labels) are displayed in a specific arrangement you can select from a variety of chart types (such as a column chart or a pie chart) in your chart. You can select from a variety of layouts that are provided for each and their subtypes (such as a stacked column chart or a pie in the 3-D chart). You chart type. When you apply a predefined chart style, the chart is formatted based on can also create a combination chart by using more than one chart type in your the document theme that you have applied, so that your chart matches your chart. organization’s or your own theme colours (a set of colours), theme fonts (a set of Example of a combination chart that uses a column and line chart type. heading and body text fonts), and theme effects (a set of lines and fill effects). Get to know chart elements You cannot create your own chart layouts or styles, but you can create chart A chart has many elements. Some of these elements are displayed by default, templates that include the chart layout and formatting that you want. others can be added as needed. You can change the display of the chart elements by Add eye-catching formatting to a chart moving them to other locations in the chart, resizing them, or by changing the In addition to applying a predefined chart style, you can easily apply formatting to format. You can also remove chart elements that you do not want to display. individual chart elements such as data markers, the chart area, the plot area, and the 1. The chart area of the chart. numbers and text in titles and labels to give your chart a custom, eye-catching look. 2. The plot area of the chart. You can apply specific shape styles and WordArt styles, and you can also format 3. The data points of the data series that are plotted in the chart. the shapes and text of chart elements manually. To add formatting, you can use one 4. The horizontal (category) and vertical (value) axis along which the data is or more of the following: plotted in the chart. Fill chart elements: You can use colours, textures, pictures, and gradient fills to 5. The legend of the chart. help draw attention to specific chart elements. 6. A chart and axis title that you can use in the chart. Change the outline of chart elements: You can use colours, line styles, and line 7. A data label that you can use to identify the details of a data point in a data weights to emphasize chart elements. series. Add special effects to chart elements: You can apply special effects, such as Modify a basic chart to meet your needs shadow, reflection, glow, soft edges, bevel, and 3-D rotation to chart element After you create a chart, you can modify any one of its elements. For example, you shapes, which gives your chart a finished look. might want to change the way that axes are displayed, add a chart title, move or Format text and numbers: You can format text and numbers in titles, labels, and hide the legend, or display additional chart elements. To modify a chart, you can do text boxes on a chart as you would text and numbers on a worksheet. To make text one or more of the following: and numbers stand out, you can even apply Word Art styles. Change the display of chart axes: You can specify the scale of axes and adjust Reuse charts by creating chart templates the interval between the values or categories that are displayed. To make your chart If you want to reuse a chart that you customized to meet your needs, you can save easier to read, you can also add tick marks to an axis, and specify the interval at that chart as a chart template (*.crtx) in the chart templates folder. When you create which they will appear. a chart, you can then apply the chart template just as you would any other built-in Add titles and data labels to a chart: To help clarify the information that appears chart type. In fact, chart templates are custom chart types — you can also use them in your chart, you can add a chart title, axis titles, and data labels. to change the chart type of an existing chart. If you use a specific chart template Add a legend or data table: You can show or hide a legend, change its location, frequently, you can save it as the default chart type. or modify the legend entries. In some charts, you can also show a data table that displays the legend keys and the values that are presented in the chart. WEEK SIX: HACKING someone attempting to break into or compromise a system. There are many IDSs Who is a hacker? available. In the computer security context, a hacker is someone who seeks and exploits Types Of Attacks weaknesses in a computer system or computer network. Hackers may be motivated Attackers can cause various levels of damage, depending on their skill level and/or by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to their motives. There is a common pattern though: they usually follow a similar set evaluate those weaknesses to assist in removing them. The subculture that has of steps of information gathering before launching the attack. evolved around hackers is often referred to as the computer underground and is Foot Printing: The aim of this activity is to obtain a complete profile of the target now a known community. organization’s network and its security arrangement. The information of interest Hacking is usually a technical activity, although that does not necessarily mean that includes the technology that the organization is using (e.g. Internet, Intranet, attackers are always technically capable. Most of the attackers are script kiddies, Remote Access, and Extranet) and its security policies and procedures. Although who know just about enough in order to use other (more competent) hackers’ work. there are many different methods attackers can use to perform footprinting, there That fact aside, it is necessary to know the technical side of hacking, in order to are four general steps that they are likely to follow: − Determine the scope of the understand the kind of knowledge that some attackers have. This section provides a footprinting activities. brief explanation of how to get into a target system and how to exploit this as a Social Engineering: Social Engineering is the term used to describe cracking full-scale hacking activity. techniques that rely on weaknesses in wetware (i.e. human users attached to the Cracking Computer Systems system – administrators, operators, etc.) rather than software. The aim is to trick There are many ways for attackers to obtain illicit access to computer systems. This people into revealing passwords or other information that compromises a target kind of access is often called “intrusion”, and the first thing an intruder does is system’s security. usually trying to obtain special/administrative privileges (root access) on that Software Bugs: Another way to get into a system is through security system. Having root access is very important for the attackers since this means that vulnerabilities brought by bugs in the software (operating system, server daemons, they can do whatever they want on the system, including covering their tracks, client applications, etc.). It is almost impossible to have bug-free software and the strengthening their hold and doing damage. attackers only need to find one hole in order to break in. As a result, the program In general, there are three main ways to intrude into a system: may crash and very often; this gives the attackers root access and/or allows them to Physical Intrusion: This kind of intrusion happens when an intruder has run any arbitrary code. Attackers can find buffer overflow bugs by: physical access to the target machine. This might allow the intruder to gain full 1. browsing the web for known buffer overflow vulnerabilities on certain control of the system – for example by booting with a special floppy or by programs; taking the system apart physically (e.g. removing the Hard-drive to another 2. Searching for these bugs in the program directly if the source code is available; system owned by the attacker, which then enables him/her to read/write to it). 3. Examining every place the program prompts for input and trying to overflow it System Intrusion: In this case, it is assumed that the intruder has already got with random (massive) data. If the program crashes, there is a chance that by low-level privileges on the system. They then exploit unpatched security carefully constructing the input, access to the system can be obtained. vulnerabilities in order to escalate their privileges to the administrative level. Remote Intrusion: With remote intrusion, an attacker tries to get into the WEEK SEVEN: HACKING COMMUNITY system remotely through the network. They initially do not have any privileges Who are Hackers? to the system, but one way or another – e.g. by finding out some valid account Quoting Steele Denning reports that the word hacker has taken on many different names and cracking their (usually weak) password, or by exploiting common meanings ranging from a person who enjoys learning the details of computer security vulnerabilities (buffer overflow, etc.) – they manage to get in and systems and how to stretch their capabilities to a malicious or inquisitive meddler obtain root access. who tries to discover information by poking around possibly by deceptive or illegal This paper focuses on remote intrusion, as this is the most common type of attack means. Interviewing hackers gave denning a more precise definition. One of them associated with hackers. Nevertheless, there are some cases of system intrusion, for asserted: example, the insider attack, where a legitimate user (could be a disgruntled or ”A hacker is someone that experiments with systems… [Hacking] is playing with former employee) performs an attack due to various reasons (revenge, cyber- systems and making them do what they were never intended to do. Breaking in and espionage, etc.). making free calls are just a small part of that. Hacking is also about freedom of In order to minimize intrusion, many organizations install Intrusion Detection speech and free access to information – being able to find out anything. There is Systems (IDS). Such a system inspects inbound and outbound network activity and also the David and Goliath side of it, the underdog vs. the system, and the ethic of identifies suspicious patterns that may indicate a network or system attack from being a folk hero, albeit a minor one.” The term “hacker” itself has evolved somewhat from its original meaning. Tool Kit/newbie: are people who are new to hacking and who tend to have Rogers breaks down the evolution into four generations: limited computer and programming skills. As a result, they usually rely on First-generation: talented students, programmers and scientists (mostly software (tool kits) already written by other people in order to conduct their from MIT) attack. These people are often called script kiddies. These were academics or professionals interested in the working of computer Cyber-punks: consist of people with better computer skills (than newbies) and code. They enjoyed tweaking the code, in order to produce a more efficient or some might have programming capabilities. It is their intention to engage in elegant program, or just to create a program that can assist them in everyday malicious acts, such as web defacement, credit card number theft, computing life. They were the technically elite group and were often pioneers telecommunication fraud or spamming (sending junk mails). in their field (e.g. Richard Stallman). Internals: is made up of disgruntled employees or ex-employees. It may be Second generation: technological radicals surprising to learn that a lot of attacks were actually carried out by people with They evolved from the technically elite, with forward-thinking to recognize the internal knowledge/connection. potential of a second computer niche from mainframe to personal systems. Coders Their radical nature means that minor criminal activity was not uncommon Old-guard hackers are similar to those of first-generation hackers. They (e.g. phone phreaking). appear to be interested in the intellectual endeavour instead of criminal Third generation: young people who embraced personal computers (PC) intention, but they seem to have little respect for personal property. These people recognized the potential entertainment value of PC and began Professional criminals developing games (or making illegal copies of games and cracking their copy- Cyber-terrorists protection). Fourth generation: the current generation, those embracing criminal WEEK EIGHT: LOGIC CIRCUIT activity as if it is some sort of game or sport. A logic gate is an elementary building block of a digital circuit. Most logic gates Some of these people got arrested and claimed that the motivation was have two inputs and one output. At any given moment, every terminal is in one of curiosity or hunger for knowledge, although the actual motivation seems to be the two binary conditions low (0) or high (1), represented by different voltage greed, power, revenge or other malicious intent. levels. The logic state of a terminal can, and generally does, change often, as the The public perception is that hackers are usually young males who tend to be circuit processes data. In most logic gates, the low state is approximately zero volts working alone. With the proliferation of both the bulletin boards and of tool kits for (0 V), while the high state is approximately five volts positive (+5 V). virus makers, the last characteristic is questionable. On the values side, hackers There are seven basic logic gates: AND, OR, XOR, NOT, NAND, NOR, and share some particularities. For instance, Levy identified some behaviours and XNOR. values in the hacker ethic, some of them having an obsession with “hands-on” use AND GATE of computers, desire that all information should be in the public domain and The AND gate is so named because, if 0 is called “false” and 1 is called “true,” the mistrust of authority. Some more person logical dimensions have been identified gate acts in the same way as the logical “and” operator. The following illustration by Gordon who examined the ethical development of a large number of virus and table show the circuit symbol and logic combinations for an AND gate. (In the writers. According to Gordon’s results, hackers can be divided into the following symbol, the input terminals are at left and the output terminal is at right.) The Categories: output is “true” when both inputs are “true.” Otherwise, the output is “false.” Adolescent, who is not typically concerned by problems caused by their OR GATE viruses; The OR gate gets its name from the fact that it behaves after the fashion of the Adult, ethically abnormal; logical inclusive “or.” The output is “true” if either or both of the inputs are “true.” Ex virus-writer, undecided concerning the legitimacy of virus writing. If both inputs are “false,” then the output is “false.” Hacker’s Ethics XOR GATE Some hackers’ ethics are not that far from more traditional views shared by the The XOR (exclusive-OR ) gate acts in the same way as the logical “either/or.” The public at large. For instance, some hackers are concerned about the increasing output is “true” if either, but not both, of the inputs, are “true.” The output is amount of information about individuals that is stored in large data banks, and the “false” if both inputs are “false” or if both inputs are “true.” Another way of inability of the individual to have much control over the use of that information. looking at this circuit is to observe that the output is 1 if the inputs are different, but Hacker’s Taxonomy 0 if the inputs are the same. Rogers did a study on the hacker community and proposed hackers taxonomy as follows: Inverter or NOT gate Programming and Software Development A logical inverter, sometimes called a NOT gate to differentiate it from other types 1. Systems analyst – Determines an organization’s needs and designs programs to of electronic inverter devices, has only one input. It reverses the logic state. meet them. Acts as a problem solver who specialize in how information flows from NAND GATE information sources to computers. Supervises lower-level programmers. The NAND gate operates as an AND gate followed by a NOT gate. It acts in the 2. Systems consultant – Works under contract to install or configure hardware or manner of the logical operation “and” followed by negation. The output is “false” software, write or customize programs, or otherwise help solve information if both inputs are “true.” Otherwise, the output is “true.” processing problems for an organization. Business-related courses are helpful. NOR GATE 3. Software engineer – Designs and writes complex computer programs as part of The NOR gate is a combination OR gate followed by an inverter. Its output is a software development team. Applies principles of computer science to solve “true” if both inputs are “false.” Otherwise, the output is “false.” practical problems. XNOR Gate 4. Systems programmer – Designs and writes programs that interface with a The XNOR gate is a combination inverter / NOT gate followed by an XOR gate. computer’s low-level operating system, such as device drivers and utilities. Its output is “true” if both inputs are “false.” Otherwise, the output is “false.” 5. Database analyst – Designs and creates programs used to collect, maintain, and Uses of standard Logic Circuit analyze data needed by the business, government, or other institutions. Adapts 1. Logic gates are building blocks of hardware electronic components. programs to changing business needs. 2. It is used in the activation of doorbells. 6. Artificial Intelligence programmer – Applies principles of artificial 3. The AND gates use to combine multiply signals intelligence to design and implement systems that perform complex tasks. 4. The NOT gate is used in building a switch. Applications include expert systems that apply rules to make decisions, such as scheduling freight shipments or diagnosing disease; pattern recognition systems WEEK NINE: COMPUTER CAREER OPPORTUNITIES that give robots the ability to see and understand objects in their environment; Careers in Computer Industry neural network programs that can learn to perform tasks by constantly re- Now a day’s computer industry is the largest industry where jobs are created for evaluating their performance. thousands of people and primary business people and primary businesses which are 7. Scientific applications programmer – Works closely with scientists and computer-related jobs. engineers to write programs that simulate natural phenomena or analyze Computers have become a ubiquitous part of modern life, and new applications are experimental results, or apply scientific or engineering principles to research or introduced every day. The use of computer technologies is also commonplace in all manufacturing. types of organizations, in academia, research, industry, government, private and 8. User interface designer – Designs the menus, icons, and other features that business organizations. As computers become even more pervasive, the potential people will use to interact with a computer program or operating system. Needs to for computer-related careers will continue to grow and the career paths in have empathy with computer users and artistic sense of composition. computer-related fields will become more diverse. 9. Embedded systems application programmer – Designs and develops 1. General business and IT development applications for appliances and entertainment products such as PDA, mobile phone, 2. Computer equipment field mp3 player. 3. Computer software field Information Systems Operation and Management 4. Computer service and repair filed Electronic data processing (EDP) auditor- Closely examines data processing 5. Computer sales operations to guard against loss through mistakes, carelessness, or fraud. Often 6. Computer education and training field work in banks, insurance companies, accounting firms, and other organizations that 7. IT consultation use a large amount of financial data. 8. Programming and Software Development. Database administrator – Takes overall responsibility for the usage, accuracy, 9. Information Systems Operation and Management. efficiency, security, maintenance of an organization’s database systems. 10. Telecommunications and Networking. Coordinates development and use of data resources. 11. Computer Science Research. Systems administrator – Responsible for managing the operation of a multi-user 12. Web and Internet. computer system or network so that it runs reliably and meets user’s needs; updates 13. Graphics and Multimedia. and configures software and hardware; provides assistance to users and managers. 14. Training and Support. Computer security specialist – Protects computer systems from illegal intrusions, 15. Computer Industry Specialists. viruses, data theft, fraud, or other forms of tampering. Management/IT consultants – Uses problem-solving skills and computer Web and Internet knowledge to solve business and management problems for organizations and Internet applications programmer foster improvement in areas such as organization structure, business Develops programs that add features such as forms and animation to Web sites or communication, and productivity. Defines and analyzes the problem, interviews that provide tools to help users get the most out of the Internet. potential employees, develops possible solutions and presents options to the client. Internet consultant Information systems manager – Oversees all operations in an organization’s Uses some combination of analysis, design, programming, and support skills to information system department, including technical support, training, network, and help clients with the design of Internet sites and configuration of Internet software database operations. Ensures that everyone in the organization has timely, reliable and connections. access to the computer system and its databases and other resources. Webmaster Chief information officer (CIO) – Serves as the highest information services Creates or maintains a Web site. Provides content and programming or supervises executive for a major corporation. Responsible for long-term planning and setting writers and programmers. Monitors the performance and popularity of the site. organization-wide policy and standards relating to all computer- related activities. Provides secure forms and transactions for Internet-based businesses. Telecommunications and Networking Internet advertising designer Network engineer/consultant Creates effective advertising features for Web sites, including animation, sound, Plans for the installation or expansion of local or wide-area computer networks. and text. Performs complex configuration of servers, hubs, routers, and other network Graphics and Multimedia communications equipment. Writes scripts or programs to automate network Animation/Special effects developer operations. Develops software programs for creating sequences of computer images for games Network administrator or movies. Takes overall responsibility for the operation and planning for a local or wide-area Multimedia developer computer network. Plans expansion; selects appropriate network operating system Uses design and programming skills to create interactive multimedia products that and software tools; configures major features; deals with the connection between combine sound, images, and text. local network and Internet; establish procedures for support staff and users. Computer game designer/programmer Computer Science Research Designs or writes computer games or game engines. Develop algorithms that make Computer scientist/researcher the characters realistic and intelligent. Applies theoretical expertise to complex problems and develop innovative ideas Electronic sound producer necessary for the application or creation of new technology. They usually work in Creates music, voice, and sound effects for multimedia or computer games. research labs or academic institutions. Integrates sound into the overall design of the multimedia product. Computer science professor Training and Support He / She teaches college courses in computer science theory, performs research and Technical support representative supervises student research. May serve as a consultant to government or business. Answers questions from computer users and solves problems with the installation Artificial Intelligence researcher or operation of the software. Researches problems using manuals, help files, and Develops programs to imitate the thinking and reasoning processes of the human online knowledge bases. brain; for example, recognize voices and objects, speak in a humanlike voice. Trainer, software applications Data miner Teaches specific courses in computer software or operating systems. May work Analyzes databases in business, government, or scientific applications in order to within a corporation or at a school. extract additional information or find useful patterns. Needs familiarity with major Technical writer database and statistical packages. Writes instructional guides and other materials that explain how to use computer Bioinformatics specialist systems, software, operating systems, or programming tools. Researches and writes Organizes and manipulates information relating to genetic sequences, molecular reviews and feature articles suited to specific reader profiles. structure, and other data relevant to the biological sciences. Should be familiar with CERTIFICATE: This is the process of verifying the technical knowledge of an genetics and biochemistry. individual who has demonstrated competence in a particular area, today there are Medical imaging specialist more than 200 certificates available, such as. Develops image processing and pattern recognition algorithms for analyzing 1. MICROSOFT CERTIFIED APPLICATION SPECIALIST medical images to diagnose disease. 2. MICROSOFT CERTIFIED APPLICATION PROFESSIONAL 3. MICROSOFT CERTIFIED DESKTOP TECHNICIANS and so many more. 7. Attention to Detail The slightest mistake can affect how a web page looks or how a program runs. WEEK TEN: QUALITIES OF GOOD COMPUTER PROFESSIONAL Computer personnel must pay close attention to detail to ensure everything works Computer professionals are information technology experts. The definition has correctly and efficiently. extended to those involved in the internet industry too, those who deal with the 8. Multitasking Ability computer industry to develop something. They may design, build, write or sell People working with computers are often involved in many tasks at once and must software. be able to manage all of their responsibilities simultaneously. Time management A computer professional may be: skills and an ability to prioritize are assets as well. 1. A person working in the field of information technology 9. Solid Problem Solving/Troubleshooting Capabilities 2. A person who has undergone training in a computer-related field college, Computer professionals are called upon to solve problems with networks, software, universities and computer institutes and other programs. They are expected to solve these problems very quickly, and 3. A person who has extensive knowledge in the area of computing. having sharp troubleshooting skills most definitely is a benefit. Some of the qualities needed to be most successful in the computer and IT world 10. Technical Writing Skills include the following: Technical writing skills help a computer-savvy person explain complex concepts to 1. Excellent Analytical Skills those who have limited knowledge of the computer world. Great computer professionals have excellent analytical skills that can be applied to Qualities of a Good Computer Professional solve problems or develop new ideas. Computer Manager 2. Versatility 1. Must have ability to control, coordinate and manage things. A computer professional must be versatile, it is a necessary requirement needed by 2. High level of Computer literacy. a professional who wants to be successful. The most successful computer 3. Versatility in the field of Computer professionals will be the ones who have skills that extend beyond information 4. Good decision-maker when it comes to computer-related issues technology, such as skills in business and finance. Computer Scientist 3. Commitment to Learning 1. Good knowledge of a Computer Technology is constantly changing, and those who keep abreast of the latest 2. Ability to repair and maintain a computer developments in information technology are the ones who will be the most 3. Must be able to identify good computers successful. Knowledge and keeping up with the latest trends is the key to success; Computer Engineer/Hardware Engineer there is no single person who knows everything. 1. Excellent knowledge of Computer repair 4. Good Knowledge of Math 2. Computer parts assemblage Strong mathematical skills are necessary because math is used in many computer 3. Should be able to build at least a circuit board. applications, such as when dealing with circuits or programming. Programmer/Software Engineer 5. The Ability to Learn & Memorize Programming Languages 1. Good computer programmer must be able to give instruction to the computer. Computer professionals must know many programming languages and how to use 2. Use of computer programming language to develop programs. a wide variety of computer software programs. A great memory helps keep work 3. Ability to develop a good and durable program. efficient. There is a wide range of programming languages that are widely used for 4. Must be able to detect or debug a problem in a program. coding and writing programs, so memorizing all of them is what a decent specialist Computer Instructor/Educator should be able to do. 1. Teaches and trains people on the use, misuse and care of computer 6. Good Communication Skills 2. Impacts knowledge into computer illiterates The soft skills of verbal and written communication are increasingly important as 3. Good knowledge of computer and effective operation non-techies rely on technological tools for their everyday business. Understanding Computer Technicians a client’s needs and the ability to meet those needs depend heavily on a steady 1. Good computer technician repairs computer stream of open communication. Those who are not familiar with technology can be 2. Assembles computer parts confused when the computer technology specialist uses a lot of industry register, so 3. Troubles shooting of Computer problems you have to be able to switch between work speech and casual speech quickly. 4. Computer hardware maintenance and repair Computer Analyst/ System Analyst 1. Ability to analyze data 2. Train people on computer usage 3. Solve computer problems. 4. Computer setup in workplaces and schools Networking Engineer 1. Computer networking 2. Troubleshooting of faulty networks 3. Network configuration. 4. Internet networking. 5. Network update knowledge Computer Operator 1. Fast typing skills. 2. Use of graphics package for design 3. Excellent use of computer for documents 4. The effective operation of the Computer