Sei sulla pagina 1di 28

Technology for Success: Computer Concepts Speech recognition

Module 1 Virtual reality

Impact of Digital Technology Logical reasoning

Creative responses

The Evolution of Reliance on Technology

Outline the history of computers Explore the Impact of Virtual Reality

Explain the impact of the “Internet of Things” and  Virtual Reality (VR) - The use of computers to
embedded computers simulate a real or imagined environment that
appears as a three-dimensional (3-D) space.
Discover uses for artificial intelligence
 Augmented Reality (AR) - A type of VR that
Explore the impact of virtual reality
uses an image of an actual place or things that
adds digital information to it.

Outline the History of Computers

First generation – used vacuum tubes Personal Uses for Technology

Next generation – replaced vacuum tubes with  Use technology in daily life
transistors
 Use technology to enhance productivity and
1960s – integrated circuits learning

1971 – microprocessor  Use technology to assist users with disabilities

1970s and 1980s – the personal computer (pc)  Apply green computing concepts to daily life
gained popularity

Use Technology in Daily Life


“Internet of Things”/Embedded Computers
 Artificial Intelligence
 Internet of Things (IoT)
Virtual assistants, video games, navigation apps,
Processors are embedded in many products (smart security, etc.
devices), which communicate via the Internet or
 Natural language processing – computers
wireless networks
interpret and digitize spoken works and
 Embedded computers commands (digital assistants, for example)

Have a specific purpose

Small and have limited hardware but enhance the Use Technology to Enhance Productivity
capabilities of everyday devices
Robotics

Useful in situations where it is impractical, dangerous,


Discover Uses for Artificial Intelligence or inconvenient to use a human

 Artificial Intelligence (AI) Robotic arms and cameras can assist surgeons

The technological use of logic and prior experience  Enterprise computing—each department of a
to simulate human intelligence large company uses technology specific to its
function
Capabilities
 Explore how you might prepare for a career in
technology
Technology to Assist Users with Disabilities

 Laws

Americans with Disabilities Act (ADA)

Individuals with Disabilities Education Act (IDEA)


Explore Technology Careers
 Technologies
 Software and apps
Screen readers
 Technology equipment
Alternative text (alt text)
 IT departments
Captioning and speech recognition software
 Technology service and repair
Input devices for people with physical disabilities
 Technology sales

 IT consulting
Green Computing Concepts
 Software and apps
 Green Computing
 Technology equipment
Reducing electricity and environmental waste
generated from technology  IT departments

ENERGY STAR program  Technology service and repair

-Recycling products  Technology sales

-Using paperless communications  IT consulting

-Telecommuting

Use Technology in the Workplace

Technology in the Professional World  Working remotely

 Explore technology careers -Telecommuting

 List the ways that professionals might use -Use of smartphones, the Internet, the cloud
technology in the workplace
 Intelligent workplace
 Explain the ways that teachers might use
 Some companies use a BYOD (bring your own
technology in K-12 education
device) policy
 Explain how various transportation services
 Online collaborative productivity software
utilize technology to their advantage

 Explain the ways that technology assists the


world of healthcare Technology in K-12 Education
 Describe the ways that technology has  Social networking
impacted the world of manufacturing
-Promote school events
 Explain the ways that professions might use
technology in higher education -Work cooperatively on group projects

-Teach concepts, such as anti-bullying


 Intelligent classroom – technology is used to -Exchange messages with instructors or other
facilitate learning and communication students

-Take classes and earn degrees online

Technology in Transportation  Ebooks—students can read and access content,


such as videos, from devices
 Package tracking

 Drivers use GPS technology to avoid traffic and


Preparing for a Career in Technology
hazardous conditions
 Professional online presence
 Automated vehicles
-Upload resume

-Proofread everything
Technology in Healthcare
-Professional social networks
 Physicians use computers to monitor patients’
vital signs and research symptoms and  Certifications
diagnoses
-Demonstrates knowledge in a particular area
 Mobile health (mHealth) (software, hardware, operating systems, etc.)

Healthcare professionals—access health records -Requires a commitment of time and money

Patients—monitor conditions and treatments

 Medical monitoring devices

 3-D printers

Technology in Manufacturing

 Computer-aided manufacturing
(CAM)—streamlines production and and allows
for shipping products more quickly

-Robots perform work that is too dangerous,


detailed, or monotonous for people

 Part ordering through computers

 Monitor assembly lines and and equipment


with machine-to-machine (M2M)
communications

Technology in Higher Education

 Learning Management System


(LMS)—web-based training, allows students to:

-Check progress on a course

-Take practice tests


Keep Track of Webpages

Uniform resource locator

-Protocol (Hypertext Transfer Protocol, HTTP)

-Server address

-Pathname

-File name

Web server

-IP address

-Domain name

Navigate the Web

Address bar

Cache

Technology for Success: Computer Concepts Breadcrumbs

Module 2 Navigation bar

The Web

Explain the Purpose of a Top-Level Domain

The Role of the Web in Daily Life Top-Level Domain (TLD)

 Define web browsing terms

 Explain the purpose of a top-level domain

 Describe Internet standards

Define Web Browsing Terms

Web Browsing Terms

Internet

Webpage

Website

Browser Describe Internet Standards

Navigate Internet Standards

Home/Start page  Internet Engineering Task Force (IETF

Hyperlinks  World Wide Web Consortium (W3C)


 Sidebar

Describe Websites and Webpages  Footer

 Identify the types of websites

 Explain the pros and cons of web apps Identify Secure and Insecure Websites

 Identify the major components of a webpage Secure Websites

 Identify secure and insecure websites  Use encryption to safeguard transmitted


information

 Hypertext Transfer Protocol Secure (HTTPS)

 Use digital certificates to vouch for authenticity


of the website

 Lock icon

 Requires sign-in with username/password before


Identify Types of Websites entering sensitive information

Categories
Use E-Commerce

 Explain the role of e-commerce in daily life

 Use e-commerce in business transactions

 Use e-commerce in personal transactions

 Explain how to find e-commerce deals

Explain the Role of E-Commerce in Daily Life (1 of 2)


Explain the Pros and Cons of Web Apps Types of e-commerce websites

Pros and cons of e-commerce for consumers

Pros
The Major Components of a Webpage
 Variety
Five Major Areas
 Convenience
 Header
 Budget
 Navigation bar
Cons
 Body
 Security  Use search tools and strategies

 Fraud  Refine web searches

 Indirect experience

Define Information Literacy

Use E-Commerce in Business Transactions  Information Literacy

B2B E-Commerce -How one finds, evaluates, uses, and communicates


online information
 Transferring goods, services, or information
between businesses Allows one to:

 Pricing can vary based upon the level of service -Navigate many sources of information, including the
provided, negotiated terms, and other factors Internet, online libraries, and popular media sites.

 A team of people often review and make a -Select the right tool for finding the information you
purchasing decision need.

-Recognize that not all information is created equal.

Use E-Commerce in Personal Transactions -Evaluate whether information is misleading, biased,


or out of date.
B2C/E-Retail
-Manage information to become a knowledgeable
 Electronic storefront
decision maker.
 Tracks your selected items using cookies

 Make secure e-commerce payments Explain How Search Engines Work

-3D Secure General Search Engine

-Transport Layer Security (TLS)  Compiles a database of information about


webpages
-Online payment services
 Uses software programs called spiders or
crawlers to build an index of terms and their
locations
Explain How to Find E-Commerce Deals
 When one enters a query, the search engine
Find Online Deals
refers to its index and lists pages based on how
 Comparison shopping sites closely they answer the query

 Using digital deals  Ranking depends on how often and where a


search term appears on the webpage, how long
-Gift certificates the webpage has been published, and the
-Gift cards number of other webpages that link to it

-Coupons
Use Search Tools and Strategies

Apply Information Literacy to Web Searches Search Tools

 Define information literacy  Find online information based on criteria you


specify or selections you make
 Explain how search engines work
 Search engines
 Search boxes on webpages

 Web directory or subject directory

 Specialized search tools concentrate on


specific resources

Use a Search Strategy

 State what kind of information you are seeking,


as specifically as possible Conduct Online Research
 Phrase the search term as a question  Use specialty search engines
 Identify the keywords or phrases that could  Evaluate online information
answer the question
 Gather content from online sources
 Select an appropriate search tool
 Apply information literacy standards
 Perform the search, and refine the web search
to narrow or broaden the results

 Use a word stem to help broaden results Use Specialty Search Engines

Specialty Search Engines

Refine Web Searches Let one search information sources that general
search engines do not always access
Learning from the Search Engine Results Page
(SERP)

 Subject filters

 Time filters

 Questions other users often ask about the


same subject

 Search terms related to the original term

 Knowledge graph pulled from online sources


Evaluate Online Information
Search Engine Practices
The CARS Checklist
 Lists the most relevant results, or hits, on the
first page.  Credibility: identify the author and check
credentials
 Results labeled as an “Ad” or “Sponsored link”
are from advertisers  Accuracy: verify facts and claims, check for bias
 Each type of filter offers related features  Reasonableness: examine whether the claims
are fair and sensible
 Google displays a “People also search for” list
below a link you visited  Support: look for reputable sources and
authorities
Boolean Operators
Gather Content from Online Sources

Follow Ethical Guidelines

 Copying photos might violate intellectual


property rights

A copyright gives authors and artists the legal right


to sell, publish, or distribute an original work

 Some online resources are protected by digital


rights management (DRM), which limit access
to propriety rights

 Some material is in the public domain and can


be used without permission

 The fair use doctrine allows one to use a


sentence or paragraph of text without
permission with citation to the original source

 Creative Commons (CC): a nonprofit


organization that helps content creators keep
copyright to their materials while allowing
others to use, copy, or distribute their work

Apply Information Literacy Standards

Citing Sources

A citation is a formal reference to a source

Each type of information source uses a different Technology for Success: Computer Concepts
citation style Module 3
Failure to cite sources, even if some of the words are Computer Hardware
changed or paraphrased, is plagiarism

Categorize the Various Types of Computer Hardware

 Define each component of computer hardware

 Visually identify types of computer hardware

 Explain how computers represent data

 Explain the benefits of internal, external, and


cloud-based storage solutions

 Explain the pros and cons of using different


types of computer, including all-in-ones, tablets,
mobile devices, and desktop computers
 Determine which hardware features are  Input device: communicates instructions and
personally necessary to consider when commands to a computer
purchasing a computer
Examples: keyboard, mouse

 Output device: conveys information from the


Define Each Component of Computer Hardware computer to the user

Central Processing Unit (CPU) Examples: speakers, printers

 A complex integrated circuit consisting of


millions of electronic parts and is primarily
Visually Identify Types of Computer Hardware
responsible for converting input (data) into
meaningful output (information) Common Types of RAM
 Data travels in and out of the CPU through a
bus

 Machine cycle

Storage Devices

 Designed to store data for extended periods of


time

 The type and amount of data helps to determine


the most appropriate storage device to use

Computer Memory

Responsible for holding data and programs as they


are being processed by the CPU
Explain How Computers Represent Data
 Random access memory (RAM)
Binary System
-Virtual memory
 Bit
-Swap file/paging file
 Byte
 Read-only memory (ROM)
 Text coding scheme
-BIOS
 ASCII
-Power-on self test (POST)
 Unicode
-Firmware

Storage Solutions
Input and Output Devices
Hard Drives

Internal hard drives

 Magnetic hard disk drives (HDDs)

 Solid State Drive (SDD)

External hard drives

 USB flash drive

 Optical media

Cloud Storage

 Storing electronic files on the Internet instead


of a local computer

 Google Drive, Microsoft OneDrive, Dropbox

Pros and Cons of Different Types of Computers


Demonstrate Familiarity with Input and Output
Desktop Computer Devices
 Typically consists of a system unit, monitor,  Experiment with input devices
keyboard, and mouse
 Experiment with output devices
 More powerful, more storage
 Explain how to install computer hardware
 Hardware components can be easily upgraded

All-in-one Computer
Experiment with Input Devices
 Monitor and system unit are housed together
Input Devices
 Take up less space and easier to transport
 Keyboard
 Typically more difficult to service or upgrade
 Pointing device
 More expensive than desktops
 Mouse
Mobile Device
 Touchpad
 Portable or handheld computing device
 Trackball
 Tablet
 Touchscreen/multitouch screens
 Less powerful
 Pen Input
 Not upgradeable
 Stylus

 Digital Pen
Hardware to Consider When Purchasing a
Computer  Microphone

 Cameras/webcam

 Scanner
 Game controller  Plug-and-play

 Joystick  Device driver

 Gamepad

 Dance pad Maintain Hardware Components

 Wheel  Measure the performance of computer


hardware
 Motion-sensing controller
 Explain how to troubleshoot problems with
hardware and peripherals
Experiment with Output Devices
 Explain the necessary steps to maintain
Output Devices computer hardware

 Speakers  Explain how to restore a device and its


associated hardware and software
 Headphones

 Earbuds
Measure the Performance of Computer Hardware
 Headsets
Computer Performance
 Projectors
 Processor clock speed
 Voice synthesizer
 Bus width/word size
 Printers
 Benchmark
 Ink-jet

 Laser
Troubleshooting Hardware Problems
 Multifunction device (MFD)
Common Hardware Problems
 Mobile
 Device does not turn on
 Plotter
 Battery issues
 3-D
 Computer issues a series of beeps when turned
on
How to Install Computer Hardware  Operating system does not run
Installation  Monitor does not display
 Ideal location  Keyboard/mouse does not work
 Check for all necessary components  Wet keyboard no longer works
 Free from damage  Speakers do not work
 Connect all components and accessories, then  Hard drive makes noise
connect power
 Fan issues
 Turn on computer, follow on-screen steps
 Device is too hot
 Peripherals
 Cannot read from optical disc
 Liquid damage Display issues

 Wireless network issues  Ensure monitor is properly connected

 Bluetooth issues  Try monitor on different system to isolate

 Mobile phone reception  Try different power/video cables

 Printer issues  Video card issues

 Common Hardware Problems  Update drivers

 External drive not recognized  Update feature of operating system

 Program/app does not run  Download drivers from manufacturer


website
 Virus/malware

 Slow performance

 Screen damage

 Touchscreen unresponsive

Steps to Maintain Computer Hardware

Regular Maintenance

 Clean display with damp cloth

 Clean keyboard with compressed air

 Keep air vent free of dust and debris

 Media is clean, free of debris

 Keep environment temperature controlled

 Protect from power fluctuations

 Uninterruptable power supply (UPS)

 Surge suppressor

 Keep free space on hard drive

 Keep away from clutter/dust

 Regularly back up data

 Use protective cases for media

Restoring a Device

Restoring the Operating System

 Backup files

 Follow system steps for restore


Technology for Success: Computer Concepts

Module 4

Operating Systems and File Management

The Pros and Cons of Different Types of Operating


Systems

 Explain the differences between an operating


system and system software

 Explain the differences between the major


operating systems

 Identify the desktop components

Differences Between Operating Systems and System


Software

 System software: The software that runs a


computer, including the operating system and
the utilities

 Operating system (OS): a program that manages


the complete operation of your computer or
mobile device and lets you interact with it.

 Platform

Most operating systems come installed on your


computer or device

Differences Between the Major Operating Systems

Standard Operating System Functions

 Starting and shutting down a computer or device

 Managing programs

 Managing memory
 Coordinating tasks Mobile Operating Systems

 Configuring devices

 Establishing an Internet connection

 Monitoring performance

 Providing file management

 Updating operating system software


Identify Desktop Components
 Monitoring security
Desktop
 Controlling network access
 Window

Operating Systems Features  Menu

 Graphical user interface (GUI)  Dialog boxes

 Utilities  File

 Software as a Service (SaaS)  Data file

 Open/closed source  Executable file

 File format

Desktop Operating Systems  File extension

 Folder

 Library

Explain How an Operating System Works

 Describe the purpose of an operating system

 Describe how an operating system manages


memory
Server Operating Systems
 Outline the steps necessary for the boot process

 Explain how operating systems manage input


and output

The Purpose of an Operating System

 Responsible for coordinating the resources and


activities on a computer

 Manages interactions between hardware and


software

Describe How an Operating System Manages


Memory
Memory  Use administrative tools

 Volatile memory

 Nonvolatile memory Customize System Software

 RAM (random access memory) Customize Settings—change default settings

 Cache  Change screen brightness

 Virtual memory  Add desktop themes

 ROM (read-only memory)  Adjust screen resolution

 Flash memory  Adding a sound scheme

 Pinning frequently used apps to the taskbar

Steps in the Boot Process  Selecting items to appear in the Notification area

Boot Process  Link your smartphone to your computer

1. The computer receives power from the power  Uninstall apps


supply or battery and sends it to the circuitry
 Add accounts
2. The processor runs the bootstrap program
 Manage network connections
3. The bootstrap program executes a series of tests
 Adjust privacy settings
to check the components
 Customize desktop
4. The computer loads the operating system files
into RAM, including the kernel  Move taskbar
5. The computer loads the system configuration  Add shortcuts
information and loads startup programs

Customize Hardware Using System Software


How Operating Systems Manage Input and Output
Customize Hardware
Input and Output
 Pointing device
 Input: any data and instructions entered into
the memory of a device  Switch mouse buttons

 Output: information processed into a useful  Adjust trackpad sensitivity


form
 Keyboard
Output is the goal of input
 Change commands associated with certain
 Buffer/Spooling keys/keyboard shortcuts

 Change language/dialect

Personalize an OS to Increase Productivity  Adjust settings for toggle keys

 Customize system software

 Customize hardware using system software

 Manage desktop windows Manage Desktop Windows


Common Elements of Windows  Control panel

 Center area displays contents  Menus

 Title bar at the top displays the name of the  Shortcut menu
app, file, or folder shown in the window
 Dialog box
 Buttons
-Option/radio buttons
 Maximize
-Check boxes
 Minimize
-List boxes
 Close
Run More than One Operating System
 Restore Down
Virtual machine
 Vertical and horizontal scroll bars
 Requires an app that is specifically designed to
 Multiple windows can be open at once and set up and manage virtual machines
appear side-by-side or stacked
 Installation files for the operating system to run
 The active window is the one currently on the virtual machine are also required
being used
 Runs on a partition
 Windows can be resized and dragged to
Manage User Accounts
new locations
 User accounts identify the resources a user can
 Program window
access when working with the computer
 Folder window
 Protect your computer against unauthorized
access

Use Administrative Tools  Administrator account provides full access

Resources

 Components required to perform work Manage Files and Folders


(processor, RAM, storage space, and connected
 Compress and uncompress files
devices)
 Save files to folders and filing systems
 Windows Task Manager
 Determine file properties
 Interact with a GUI
 Manage file names and file placement
 Tile
 Manage folder names and folder placement
 Icon
 Organize files using file management tools
 Button

Adjust Power Settings


Compress and Uncompress Files
 Shutdown/sleep options
 File size is usually measured in kilobytes (KB)
 Battery usage
(thousands of bytes of data), megabytes (MB)
Customize Windows Operating System (millions of bytes of data), or gigabytes (GB)
(billions of bytes of data)
 Settings app
 Files and folders may need to be compressed  Be as specific as possible when naming files
before they can be shared or transferred
 Copying or moving files: use the Clipboard or
drag between file management window

Save Files to Folders and Filing Systems  To open a saved file, navigate to the file’s
location using the file manager or the Open
 Name the file
dialog box from within a program or app.
 Save to the computer, flash drive, or cloud Double-click it or select it and click the Open
button.
 If creating or editing a file, it should be saved
frequently

 Files you work on using a web app save Manage Folder Names and Folder Placement
changes as you make them
 You can create a new folder in a file manager
 Use the Save As or Save a Copy dialog box to such as File Explorer or Finder
save a file with a new name or in a new
 To create a folder, click the New folder button in
location
your file manager. The folder name by default is
“New folder.” To rename the folder something
meaningful, select the folder and click it again to
Determine File Properties make it editable, then type the name and enter.
 Every file has properties, such as name, type,  Within file manager, you can move, copy, and
location, and size delete folders the same as a file
 Dates: when the file was created, modified, last
accessed
Organize Files Using File Management Tools
 The operating system assigns some properties
to files, such as type or format, and updates File Management
other properties, such as date, size, and
 Windows 10: File Explorer
location
 macOS: the Finder

 File manager functions


Manage File Names and File Placement
 View frequently or recently opened files
File Names
and folders
 When you save a file, you must give it a name
 View the main folders on your computer or
that follows your operating system’s rules for
device
file-naming conventions
 Search by file name, content, date, and
 Most file names contain an extension that tells
more
about its contents, such as the type of platform
or app on which the file can be used

 File name extensions are added automatically


when you save a file, but you can change the
extension in some cases

File Placement

 Each folder can only include one file with the


same name of the same type
 Personal interest apps: give one tools to
pursue interests

 Communications apps: provide tools for


sharing or receiving information

 Device management apps: provide tools


for maintaining a computer or device

Types of Apps

 Local applications: installed on the computer’s


hard drive

 Portable apps: run from removable storage,


such as an external hard drive or from the cloud

 Web apps: programs accessed over the Internet,


in a browser, or on a mobile device

 Mobile apps: apps that you access on a


smartphone or tablet

App Features

 Represented on the desktop by an icon or tile

 Can be run by double-clicking or tapping


Technology for Success: Computer Concepts
 Open in a window
Module 5
 Have menus that give options to access different
Software and Apps features of the program

 Have buttons to click or tap to give commands or


perform actions
How Apps are Used in Daily Computing Life
 Some are available as both a web and a mobile
 Describe the purpose of each key type of app app and can synchronize data
 Explain the differences between native and Mobile Apps
web apps
 Touch the screen to interact with mobile apps
 Summarize current trends in app development
 Use an on-screen keyboard to enter information

 Many mobile devices come preinstalled with


The Purpose of Each Key Type of App apps
 Application software: programs that help you  You can organize apps into groups by category
perform specific tasks when using your
computer or device  Apps are represented by icons on your screen

 Productivity apps: allow one to create  An app store is used to find and download apps
documents for business and personal use

 Graphics and media apps: allow one to


The Differences Between Native and Web Apps
interact with digital media
Native Apps
 An app written for a specific operating system purchases of goods and services
and installed on a computer or mobile device

 Can take advantage of specific features of the Use Common Features of Productivity Apps
devices on which they are installed
 Understand the features of common
 Many require an Internet connection to productivity suites
provide full functionality. Some can run offline
 Use word processing software for basic word
and will store information on your device until
processing functions
they can synchronize with the cloud.
 Use spreadsheet software to manage basic
Web Apps
workbooks
 Accessed by visiting a website in a browser
 Use presentation software to create and share
 A mobile app is a web app that runs on a basic presentations
mobile device
 Use database software to manage basic
 Mobile web apps often have a responsive databases
design
 Use graphics software
 Many developers prefer web apps since they
run on all devices
The Features of Common Productivity Suites
 Some apps are available both as native and
web apps Productivity Suite

 Versions to install on a computer, mobile device,


Pros and Cons of Mobile Apps or run in the cloud in a browser

 Web and mobile versions are often simpler


and contain the most basic and popular features

 Some are free, and some require you to


purchase a license or subscription

 Storing documents in the cloud allows for


collaboration

Current Trends in App Development Popular Productivity Suites

 Mobile first design

 Developers build apps to work on mobile


devices first because they have more
restrictions

 Requires designers to streamline how


people interact with their apps by placing
content first and providing a simplified user
Word Processing Software
experience
Key Features
 Developers use cross-platform development
tools  Create documents, a collection of one or more
pages
 Mobile commerce, or m-commerce, apps let
you use your mobile device to make online  When you open the program, a blank document
appears
 The screen displays an insertion point and  By storing documents in the cloud, you can share
scroll bars documents with several people who can read,
edit, and comment on the same document at the
 Offers a variety of options to create and
same time
format the document
 You can restrict access to a document by
 Document management tools protect and
providing a view-only link or read-only access
organize files

Spreadsheet Software
Personal and Professional Uses
Spreadsheets

 Let you interact with numbers, charts, graphics,


text, and data

 Can perform calculations on data stored in a grid


of cells and recalculate values automatically
when the data changes

 Worksheets are laid out in a grid of rows and


columns; they use letters to identify each
column and consecutive numbers to identify
each row
Formatting
 A cell is the location formed by the intersection
 Format text by changing font type, size, style,
of a column and a row
color, and special effects

 Specify a document’s margins and the page


orientation Key Features
 Specify styles for a document’s title, headings,  Formatting tools to change a worksheet’s
paragraphs, quotes, and more appearance
 Many productivity suites offer built-in  Page layout and view features
templates for creating different kinds of
documents  Printing features

 Web capabilities to share workbooks online, add


hyperlinks, and save worksheets as webpages

 Developer tools to add customized functions

 Tools to analyze data

Formulas and Functions

 Formulas, or computation rules, calculate values


Manage Documents using cell references, numbers, and arithmetic
operators
 Offers tools to edit, share, protect, and save
documents  A function: a predefined calculation

 Copy text and graphics from one document (or  Built-in and custom functions
spreadsheet or database) to another
 Argument: information necessary for a formula  Format text
or function to calculate an answer
 Set a slide’s dimensions, aspect ratio, and
 Absolute reference orientation

 Relative reference  Change text direction and align text

Analyze Data  Resize graphics

 Conditional formatting  Add SmartArt graphics that display text in


predesigned configurations to convey lists,
 Sort and filter data
processes, and other relationships
 Use what-if analysis
 Format charts and worksheets to present
 Use trendlines or sparklines and pivot tables numerical data

 Automate worksheets with macros  Move, align, and group objects

 Create charts  Use transitions and animations

 Use presentation templates and slide masters

Presentation Software  Add headers and footers

Key Features  Display slides on a large monitor or project them


to a screen as a slide show
 Can help organize content and create
professional-looking digital slide shows  Store presentations in the cloud

 Each slide has a specific layout based on  Share by copying the HTML embed code
its content, and each layout has predefined provided by the presentation app’s share option
placeholders for these items and pasting it into a blogpost or webpage

 Display presentations in different views

 Add main points as a bulleted list, graphics, or Design Effective Presentations


images
 Organize with a beginning, middle, and end
 Provide design ideas
 Focus on one topic at a time
 Spelling check, formatting, researching, sharing,
 Choose appropriate backgrounds, colors, and
and publishing online
fonts

 Use graphics wisely

 Use animations and transitions carefully

 Use spelling and grammar checks

Deliver Effective Presentations

 Check equipment in advance

 Speak loudly and clearly

Formatting Features  Don’t read the slides

 Select a presentation design  Try not to stand behind a podium or in one place
 Use technology to enhance your presentation  The software displays commands and work
areas appropriate to the view for your task
 Involve the audience
 Big Data: data collections so large that it is
 Do a dry-run beforehand
difficult to process using relational database
applications

 Each piece of data is entered and stored in a


field
Database Software
 Each field is assigned a field name
 A collection of data organized in a manner that
allows access, retrieval, and reporting of that  Tables are a collection of records for a single
data subject

 Add, update, and delete data  A query extracts data based on specified criteria,
or conditions, for one or more fields
 Filter, sort and retrieve data from the
database  A report is a user-designed layout of database
content
 Create forms and reports
 A form is a screen used to enter data into a
 Database applications database
 Track contacts, schedules, possessions, or  A form is made up of controls
collections

 Process orders, track inventory, maintain


customer lists, or manage employee records Manage Databases

 Store customer relationship management  Control access to the database by regulating


data who can use it and what parts they can see

 Represents a query in SQL (Structured Query  Ensure data integrity and minimize data entry
Language) errors by controlling how data is entered,
formatted, and stored
 Because many users may need to access a
database at the same time and they can be  Prevent users from inadvertently changing or
quite large, enterprise databases generally run deleting important data
on a server
 Control version issues
 Data can be exported into other programs,
 Manage database backup plans regularly
such as a spreadsheet program, where you can
create charts to visualize data that results from  Establish security to protect data from hacker
a query attacks

 Data can be exported to other formats,


including HTML, to publish to the web
Graphics Software
 Relational database management system
 Create, view, manipulate, and print many types
(RDBMS), or relational database: a database
of digital images
that consists of a collection of tables where
items are organized in columns and rows  Digital images are stored either in bitmap,
sometimes called raster, or vector format
 Microsoft Access
 Bitmap images are based on pixels
 Data is organized into tables of records
and stored electronically
 Vector graphics use mathematical graphics
formulas to define their appearance

 Most clip art images are stored as vector


graphics

Key Features

 Use a mouse or stylus to draw on the screen


using a crayon, pencil, paintbrush, or
calligraphy pen

 Use shape tools to create lines, circles,


rectangles, arrows, and callouts

 Use color palettes to specify colors for shapes,


lines, and borders

 Add filters and effects to provide visual interest,


and adjust brightness and contrast

 Add text to graphics

 Crop or resize an image

Types of Apps

 Paint apps draw pictures, shapes, and other


graphics with various on-screen tools

 Photo and image editing apps provide the


capabilities of paint apps and let you enhance
and modify existing photos and images

 Video editing apps allow you to modify a clip


and typically include audio editing capabilities

 Drawing apps let you create simple,


two-dimensional images, typically vector Technology for Success: Computer Concepts
Module 6  Fake websites

Security and Safety  Social media sites

 Data mining

Discuss Computer Safety and Health Risks

 Determine the risks to computer security and Protecting Personal Information


safety
 Give only necessary information when
 Understand the risks to physical, behavioral, completing an online form
and social health
 Review the information that online sites such as
 Describe common cybersecurity attacks Google, Facebook, Microsoft, and others have
stored about you

 Request to be removed from mailing lists


The Risks to Computer Security and Safety
 Create another email account to use when a
 Three main types of hazards from computers
merchant or website requires an address
 Information: data and programs, comes
 Do not use your social media account login
from attackers who want to steal information
information to log in to another site
 Environment: toxic electronic
components of computers and other digital
devices that are exposed when devices are
discarded

 Health: eye strain, poor posture when


using devices, and muscle fatigue from
keyboard typing Environmental Risks

 E-waste
Risk  Sustainable Electronics Management (SEM)
promotes the reduction of e-waste
 The possibility something might occur that
results in an injury or a loss

 Attackers

 Script kitties

 Hactivists

 Cyberterrorists

 Nation state actors Risks to Physical, Behavioral, and Social Health


 Insiders Risks to Physical Health

 Repetitive strain injury (RSI)


Online Risks

 Online banking

 E-commerce shopping
 Address spoofing

Social Engineering

 Attacks that attempts to trick the victim into


Risks to Behavioral Health giving valuable information to the attacker

 Technology addiction  Social engineering principles, Table 6-6

 Sedentary lifestyle  Phishing

 Psychological development  Hoax

 Social interaction  Spam

Risks to Social Health Safeguarding Computers and Data

 Cyberbullying  Explain the steps to protect computer


equipment
 Bullying that takes place on technology
devices using online social media platforms,  Protect mobile devices and your privacy
public online forums, gaming sites, text  Use strong authentication
messaging, or email
 Explain the benefits of encryption
 Considered more harmful than general
bullying  Discuss measures to prevent identity theft and
protect financial information
 Cyberstalking

 Involves the use of technology to stalk another


person through email, text messages, phone Use Common Features of Productivity Apps
calls, and other forms of communication
 Protect yourself while online

 Alter Internet settings to secure against security


Describe Common Cybersecurity Attacks breaches

Malicious Software Programs

 Malware Protect Computer Equipment

 Virus Electrical problems

 Worm  A surge protector can defend computer


equipment from spikes, surges, and noise
 Trojan
 An uninterruptible power supply (UPS) can be
 Ransomware used to protect against blackouts and brownouts
 Blocker ransomware

 Encrypting ransomware Protect Computers from Theft


 To reduce the risk of loss:  Limit the type of activity you do on public
networks to simple web surfing or watching
 Use a cable lock
online videos.
 Keep devices out of sight when in a
 Configure routers for a high level of security
high-risk area

 Avoid being distracted by the device and


maintain awareness of surroundings Protect Your Privacy

 Hold devices with both hands  Shred paperwork that contains personal
information before discarding
 Do not use the device on escalators or
near train doors  Do not carry a Social Security number in a wallet
or write it on a check
 Do not use white or red headphone cords
 Do not provide personal information either over
 Do not give chase if a device is stolen
the phone or through an email message
 Enable device security features
 Keep personal information in a secure location in
a home or apartment

Perform Data Backups  Be cautious about what information is posted


online and who can view your information
 Creating a data backup means copying files
from a computer’s hard drive that are then  Keep only the last 3 months of financial
stored in a remote location statements and shred older documents

 Can protect against hardware malfunctions,  For paper documents that must be retained, use
user error, software corruption, natural a scanner to create a PDF of the document and
disasters, and cyberattacks add a strong password that must be entered
before it can be read
 Options: online or to external hard drive
 Be cautious with a website or app request to
collect data

 Websites that request more personal


information than would normally be expected
should be avoided
Protect Mobile Devices and Your Privacy
Use Strong Authentication
Wireless Network
Use Strong Passwords
 Risks
 A strong password is a longer combination of
 Reading wireless transmissions letters, numbers, symbols

 Viewing or stealing computer data  A longer password is always more secure than a
shorter password, regardless of complexity
 Injecting malware
 Most security experts recommend that a
 Downloading harmful content secure password should be a minimum of 15-20
 Precautions characters in length

 Only connect to an approved wireless network  Other general recommendations:


in public  Do not use passwords that consist of
dictionary words or phonetic words
 Do not repeat characters or use  Identity theft involves using someone’s personal
sequences (abc,123) information to commit financial fraud

 Do not use birthdays, family member  Thieves can make excessive charges in the
names, pet names, addresses, or any personal victim’s name
information
 The victim is charged for the purchases and
 Use a password manager suffers a damaged credit history that can lead to
being denied loans for school, cars, and homes
Authenticating with Biometrics

 Uses the unique characteristics of your face,


hands, or eyes to authenticate you. Some of Safeguarding information:
the different types of biometrics that are used
 Shred paperwork that contains personal
today for authentication include:
information before discarding it
 Retina
 Do not carry a Social Security number in a wallet
 Fingerprint or write it on a check

 Voice  Do not provide personal information over the


phone or through email
 Face
 Keep personal information in a secure location in
 Iris
a home or apartment

 Monitor financial statements and accounts:
Add Two Factor Authentication
 Be alert to unusual activity in an account
 Uses two levels of security: passwords and
 Follow up on calls regarding purchases that
codes
were not made
 After correctly entering your password, a
 Review financial statements each month
4-6 digit code is sent to your cell phone. The
carefully as soon as they arrive
code must then be entered as the second
authentication method.  Request one free credit report annually to
review your credit history

 Have a credit put on your credit


The Benefits of Encryption
information so that it cannot be accessed
 Encryption: the process of “scrambling” without your explicit permission
information so it cannot be read unless the
user possesses the “key” to unlock it
(decryption) Protect Yourself While Online

 Can apply to data-at-rest (hard drive) or Configure Browser Security


data-in-transit (Internet)
 Cookies
 The encryption key must be kept secure
 Scripting
 Digital certificate: a technology used to verify a
 Plug-ins
user’s identity and key that has been “signed”
by a trusted third party  Pop-ups

 Clear browsing data


Preventing Identity Theft  Plug-in validation

Potrebbero piacerti anche