ecdl syllabus version 4.0 module 1 concepts of information technology

150
ECDL Syllabus Version 4.0 Module 1 Concepts of Information Technology

Upload: milo-garey

Post on 29-Mar-2015

243 views

Category:

Documents


2 download

TRANSCRIPT

ECDLSyllabus Version 4.0

Module 1

Concepts of Information Technology

1.1 General Concepts

What is a Computer?

General-purpose

Programmable

Calculates

Stores results

A computer is a general-purpose, programmable device A computer is a general-purpose, programmable device that is capable of calculating and storing resultsthat is capable of calculating and storing results

What is a Computer?

Input Processing Output

1.1.1 Hardware/Software Information Technology

1.1.1.1 Understand the Basic Concepts of Hardware, Software and Information Technology (IT).

• Hardware– The term hardware refers to the

physical parts of a computer such as the system unit, mouse, keyboard, monitor etc

• Software– The software is the set of instructions

that make the computer behave in a given way

– Software is held either on your computer’s hard disk, CD-ROM, DVD or on a diskette (floppy disk) and is loaded (i.e. copied) from the disk into the computers RAM (Random Access Memory), as and when required

1.1.1.1 Understand the Basic Concepts of Hardware, Software and Information Technology (IT).

• Information Technology– encompasses all forms of technology

used to create, store, exchange, and use information in its various forms (business data, voice conversations, still images, motion pictures, multimedia presentations, and other forms, including those not yet conceived)

– It's a convenient term for including both telephony and computer technology in the same word. It is the technology that is driving what has often been called "the information revolution"

1.1.2 Types of Computer

1.1.2.1 Distinguish Between Main-frame Computer, Network Computer, PC, Laptop and

Personal Digital Assistant (PDA)

• Make sure you understand the following terms:

– Mainframe computer– Network computer– Personal computer– Laptop computer– Personal Digital Assistant

(PDA)

1.1.2.1 Distinguish Between Computers in Terms of Capacity, Speed, Cost, and Typical Users.

• Mainframe Computers– Very powerful, used by large

organisations such an banks to control the entire business operation. Very expensive!

• Personal Computers– Cheap and easy to use. Often

used as stand-alone computers or in a network. May be connected to large mainframe computers within big companies

1.1.2.1 Distinguish Between Computers in Terms of Capacity, Speed, Cost, and Typical Users.

• Laptop Computer– is a battery- or AC-powered personal

computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, temporary offices and at meetings

– A laptop typically weighs less than 2½kg and is 6cm or less in thickness

1.1.2.1 Distinguish Between Computers in Terms of Capacity, Speed, Cost, and Typical Users.

• Personal Digital Assistant (PDA)– is a small mobile hand-held device that

provides computing and information storage and retrieval for personal or business use

– Most PDAs have a small keyboard– Some PDAs have an electronically

sensitive pad on which handwriting can be received

– Typical uses include schedule and address book storage and retrieval and note-entering

– Increasingly, PDAs are combined with telephones and paging systems

1.1.2.1 Distinguish Between Computers in Terms of Capacity, Speed, Cost, and Typical Users.

• Suggested Task– Draw up a simple table to make a comparison between the main types of

computer

MainframeComputer

NetworkComputer

PersonalComputer

Laptop PDA

Capacity

Speed

Cost

TypicalUsers

1.1.3 Main Parts of a Personal Computer

1.1.3.1 Know the Main Parts of a Personal Computer: The Central Processing Unit (CPU)

• The CPU (Central Processing Unit) is normally an Intel Pentium (or equivalent) and it is one of the most important components within your computer

– It determines how fast your computer will run and is measured by its GHz or MHz speed

– For example, a 2.4 GHz Pentium is much faster than a 400 MHz Pentium CPU

– It is the CPU that performs all the calculations within the computer

1.1.3.1 Know the Main Parts of a Personal Computer:The Hard Disk

• Hard disks are the main, large data storage area within your computer

• They are used to store your operating system, your application programs (i.e. your word processor, games etc) and your data

• They are much faster than CD-ROMs and floppy disks and can also hold much more data

1.1.3.1 Know the Main Parts of a Personal Computer: Common Input/output Devices

Input devices Keyboard Mouse Scanner Digital camera

Output Devices Monitor (VDU) Printer Speakers

1.1.3.1 Know the Main Parts of a Personal Computer: Types of Memory

• RAM– The RAM (Random Access

Memory) is where the operating system is loaded and also where your applications are copied to when you load an application, such as a word processor or database program.

• ROM– The ROM-BIOS (Read Only

Memory - Basic Input Output System) chip is a special chip held on your computer's system (mother) board.

– It contains software that is required to make your computer work with your operating system

1.1.3.1 Know the Main Parts of a Personal Computer: Understand the Term ‘Peripheral Device’

• A peripheral device is any device that you can attach to your computer

– You can attach a scanner, printer, data projector, speakers etc. to your system unit

1.1.4 Computer Performance

1.1.4.1 Know Some of the Factors That Impact on a Computer's Performance

CPU speed RAM size Hard disk speed and

capacity Number of

applications running

1.2 Hardware

1.2.1 Central Processing Unit

1.2.1.1 Understand the Term Central Processing Unit (CPU) and Know What the CPU Does

• The CPU is the brains within your computer– It is responsible for logic control and carries

out most of the calculations within the computer

– It ensures the smooth running of the operating system (e.g. Windows) as well as applications, such as word-processors, spreadsheets and databases

– The CPU speed largely determines the speed of the computer and is measured in megahertz (MHz) or gigahertz (GHz)

1.2.2 Memory

1.2.2.1 Understand Different Types of Computer Memory

• RAM - Random Access Memory

– The main 'working' memory used by the computer

– When the operating system loads from disk when you first switch on the computer, it is copied into RAM

– As a rough rule, a Microsoft Windows based computer will operate faster if you install more RAM. Data and programs stored in RAM are volatile (i.e. the information is lost when you switch off the computer)

1.2.2.1 Understand Different Types of Computer Memory

• ROM – Read Only Memory– Read Only Memory (ROM) as

the name suggests is a special type of memory chip that holds software that can be read but not written to

– A good example is the ROM-BIOS chip, which contains read-only software

– Often network cards and video cards also contain ROM chips

1.2.2.2 Know How Computer Memory Is Measured

• Bit– All computers work on a binary numbering system, i.e. they

process data in ones or zeros. This 1 or 0 level of storage is called a bit

• Byte– A byte consists of eight bits

1.2.2.2 Know How Computer Memory Is Measured

• Byte– A byte consists of eight bits

• Kilobyte– A kilobyte (KB) consists of 1024 bytes

• Megabyte– A megabyte (MB) consists of 1024 kilobytes

• Gigabyte– A gigabyte (GB) consists of 1024 megabytes

• Terabyte– A terabyte (TB) consists of 1024 gigabytes

1.2.2.2 Relate computer memory measurementsto characters, files and directories/folders

• File size– Each byte represents a different character such as letters of

the alphabet, numbers, punctuation marks and blank space

– A document such as a letter containing 250 of the above characters would have a file size of 250 bytes

– A floppy disk of capacity 1.4MB could hold1 400 000 characters – say, 200 000 words – a whole book!

– The size of a directory (or folder ) would be found by adding up the sizes of the files contained within it

– Sizes of files and folders are easily found in Windows by using a right mouse click on the icon and examining Properties

1.2.2.2 Relate computer memory measurementsto characters, files and directories/folders

• Byte– A byte consists of eight bits

– Each bit can be ‘on’ or ‘off’ (1 or 0)

– This gives rise to a total of 256 possible combinations( 2 x 2 x 2 x 2 x 2 x 2 x 2 x 2 = 256 )

– Each byte represents a different character such as letters of the alphabet, numbers, punctuation marks and blank space

– These make up the Character Set

– A selection of the 256 characters in the set is displayed on the keyboard, depending on the particular language being used

1.2.3 Input Devices

1.2.3.1 Devices for Inputting Data

• The Mouse– Used to ‘drive’ Windows

• The Keyboard– The keyboard is still the

commonest way of entering information into a computer

• Trackball– an alternative to the

traditional mouse and often used by graphic designers

1.2.3.1 Devices for Inputting Data

• Scanner– A scanner allows you to scan printed

material and convert it into a file format that may be used within the PC

• Touchpad– A device that lays on the desktop and

responds to pressure

• Light Pen– Used to allow users to point to areas

on a screen

• Joystick– Many games require a joystick for the

proper playing of the game

1.2.3.1 Devices for Inputting Data

• Digital camera– This produces a digital

picture file that can be printed, sent via e-mail or posted to a web page

– A webcam enables moving images to be viewed in real time via the internet

• Microphone– A device that allows sound

signals to be converted into digital files that may be stored on the computer

– It enables voice-recognition software to be used

– It also allows telephony via the internet

1.2.4 Output Devices

1.2.4.1 Common Output Devices

• Monitor (VDU)– The computer screen is used

for outputting information in an understandable format for humans

– Flat-screen LCD monitors are rapidly becoming commonplace

• Printers– There are many different types

of printers– In large organizations laser

printers are most commonly used due to the fact that they can print very fast and give a very high quality output

1.2.4.1 Common Output Devices

• Plotters– A plotter is an output device

similar to a printer, but normally allows you to print larger images

• Speakers– Enhances the value of

educational and presentation products

• Speech synthesisers– Gives you the ability to not

only to display text on a monitor but also to read the text to you

1.2.5.1 Input/Output Devices

• Touchscreens– These are both input and output devices– Contact with the screen by means of a

digit provides the input by making a selection

– The result is then displayed on the screen in the form of information or gives a menu from which further choices may be made

– Touchscreens are commonly used in interactive kiosks

Try the exercise on input and output devices!

1.2.6 Storage Devices

1.2.6.1 Compare Memory Storage Devices

• Hard Disk

• Speed: – Very fast! – The speed of a hard disk is often quoted as "average access time"

speed, measured in milliseconds. The smaller this number the faster the disk.

• Capacity: – Enormous! Often in excess of 80 Gigabytes. A Gigabyte is equivalent

to 1024 Megabytes.

• Cost: – Hard disks costs are falling rapidly and normally represent the

cheapest way of storing data.

1.2.6.1 Compare Memory Storage Devices

• Diskette (Floppy Disk)

• Speed: – Very slow!

• Capacity: – Normally 1.44 Mbytes

• Cost: – Very cheap

1.2.6.1 Compare Memory Storage Devices

• CD-ROM• Speed:

– Much slower than hard disks. The original CD-ROM specification is now given a value of 1x speed, and later, faster CD-ROMs are quoted as a multiple of this value

• Capacity: – Around 650 Mbytes

• Cost: – Below 50p each

CD-R disks can be written to only once

CD-RW disks can be written to more than once

1.2.6.1 Compare Memory Storage Devices

• DVD Drives

• Speed: – Much faster than CD-ROM drives but not as fast as hard disks

• Capacity: – Up to 17 GB

• Cost: – Slightly higher than CD-ROM drives

1.2.6.1 Compare Memory Storage Devices

• Zip Disk

• Speed: – Slower than normal hard disks but ideal for backups.

• Capacity: – 100 or 250 Megabytes.

• Cost: – You have to consider both the cost of the drive, plus the cost

of each disk that you wish to use in the drive. Often suppliers will sell the drive plus a pack of 5 disks at a bundled discount price.

1.2.6.2 Understand the Purpose of Formatting a Disk

• When Windows formats a diskette it: – Erases all previous data – Sets up a system for recording what is stored

where on the disk – Checks the disk for physical and magnetic errors– Makes the disk compatible with any computer

running Windows

1.3 Software

1.3.1 Types of Software

1.3.1.1 Distinguish between Operating Systems Software & Applications Software

• Operating systems software– The operating system is a special type of program that loads

automatically when you start your computer

– The operating system allows you to use the advanced features of a modern computer without having to learn all the details of how the hardware works

• Applications software– An application program is the type of program that you use

once the operating system has been loaded

– Examples include word-processing programs, spreadsheets and databases

1.3.1.1 Understand the Reasons for Software Versions

• New versions of software may:– Fix ‘bugs that were present in the previous version

– Address and fix security issues from an earlier version

– Introduce enhanced or additional features

– Take advantage of advances in software and computer technology

– Provide updated compatibility with new peripheral devices e.g. new models of digital cameras

1.3.2 Operating System Software

1.3.2.1 Describe the Main Functions of an Operating System

• The link between the hardware and you, the user• Makes the computer easy to use without having

to understand bits and bytes!

1.3.2.1 Name Some Common Operating Systems

• Windows 95• Windows 98• Windows ME • Windows XP• Linux• Unix

1.3.3 Applications Software

1.3.3.1 List Some Common Software Applications Together With Their Uses.

• Word processing applications– Microsoft Word

– Lotus Word Pro

– WordPerfect

• Spreadsheets– Microsoft Excel

– Lotus 123

• Database– Microsoft Access

– Lotus Approach

1.3.3.1 List Some Common Software Applications Together With Their Uses.

• Payroll– Sage software

• Presentation tools– Microsoft PowerPoint

– Lotus Freelance

• Desktop publishing– Microsoft Publisher

– Abode Photoshop

• Multimedia applications– Microsoft's Encarta CD-ROM based encyclopaedias

1.3.4 Graphical User Interface

1.3.4.1 Understand the Term Graphical User Interface (GUI)

• A Graphical User Interface (GUI) is simply an additional part of the operating system that displays windows and drop down menus, and also enables you to drive your computer using a mouse

• Examples of operating system that use a GUI include Windows 3.1, Windows 95/98/2000, Windows Me/XP, Windows NT and IBM's OS/2

1.3.4.1 The Main Advantages of Using a GUI Interface.

• All programs look similar• When you switch from a program supplied by one

manufacturer to one from a different manufacturer, you will find the transition very easy

• Application programs work in the same way as the underlying operating system

• The GUI also allows programmers to easily write consistent looking programs

1.3.5 Systems Development

1.3.5.1 Understand How Computer-based Systems Are Developed

• Analysis• Design• Programming• Testing

1.4 Information Networks

1.4.1 LAN and WAN

1.4.1.1 Understand the Terms Local Area Networks (LAN) and Wide Area Networks (WAN)

• LAN– A LAN (Local Area Network) is a system whereby individual

PCs are connected together within a company or organization

• WAN– A WAN (Wide Area Network) as the name implies allows you to

connect to other computers over a wider area (i.e. the whole world)

1.4.1.1 Understand the Term Client/Server

• A server is a computer program that provides services to other computer programs in the same or other computers

• The computer that a server program runs in is also frequently referred to as a server (though it may contain a number of server and client programs)

1.4.1.1 Understand the Term Client/Server

• A client is the requesting program or user in a client/server relationship

• For example, the user of a Web browser is effectively making client requests for pages from servers all over the Web

• The browser itself is a client in its relationship with the computer that is getting and returning the requested HTML file

• The computer handling the request and sending back the HTML file is a server

1.4.1.2 List Some of the Advantages Associated with Group Working

• Enables hardware such as a single printer, scanner or modem to be shared

• File-sharing can allow access to files stored on other people’s computers. Information needed by all users is normally stored on a single, powerful computer called a file server

• E-mail messages can be exchanged with the network• Data Exchange enables users to collaborate on projects.

Such co-operative work is known as Workgroup Computing or Groupwork

1.4.2 Intranet/Extranet

1.4.2.1 Understand What an Intranet Is

• An intranet is a private network that is contained within an enterprise

• It may consist of many interlinked local area networks and also use leased lines in the Wide Area Network

• Typically, an intranet includes connections through one or more gateway computers to the outside Internet

• The main purpose of an intranet is to share company information and computing resources among employees

• An intranet can also be used to facilitate working in groups and for teleconferences

1.4.2.1 Understand What an Intranet Is

• Typically, larger enterprises allow users within their intranet to access the public Internet through firewall servers that have the ability to screen messages in both directions so that company security is maintained

• When part of an intranet is made accessible to others outside the company, that part becomes part of an extranet

1.4.2.1 Understand What an Extranet Is

• An extranet is a private network that uses the Internet protocol and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses

• An extranet can be viewed as part of a company's intranet that is extended to users outside the company

• An extranet requires security and privacy. These require firewall server management, the issuance and use of digital certificates or similar means of user authentication, encryption of messages, and the use of virtual private networks (VPN) that tunnel through the public network

1.4.2.1 Understand What an Extranet Is

Companies can use an extranet to:

• Exchange large volumes of data using Electronic Data Interchange (EDI)

• Share product catalogues exclusively with wholesalers or those "in the trade"

• Collaborate with other companies on joint development efforts • Jointly develop and use training programs with other companies • Provide or access services provided by one company to a group

of other companies, such as an online banking application managed by one company on behalf of affiliated banks

• Share news of common interest exclusively with partner companies

1.4.3 The Internet

1.4.3.1 Understand What the Internet Is

• The Internet is a global network of interconnected networks

• It is designed so that there is no single point of failure

• The unique thing about the Internet is the sheer amount of information that you can access from it

• Whatever your interest you can search for and find information on the most obscure topics

1.4.3.1 Understand what the Internet is used for

• Used by governments, universities, companies, retailers, voluntary organisations and private individuals

• Any used can send a message to any other user and can access files on other computers

• The Internet can be used for research, news, entertainment, education, information, sports, current affairs, shopping and art

1.4.3.2 Understand what the World Wide Web (WWW) is

• The term World Wide Web is used to describe documents made available over the Internet in HTML format

• Documents can be linked together and users can follow these hyperlinks from document to document

1.4.3.2 Understand what the World Wide Web (WWW) is

• Pages are displayed using an Internet browser (e.g. Microsoft Internet Explorer)

• To search the Internet you use what are called Internet search engines

• Within the search engine you enter a word or phrase and it will retrieve documents from the Internet based on the information you typed in

1.4.4 The Telephone Network in Computing

1.4.4.1 Understand the Use of the Telephone Network in Computing

• PSTN– Public Switched Telephone Network is simply the technical

name for the telephone system in use today

• ISDN– Stands for "Integrated Services Digital Network." ISDN dates

back to 1984, and allows much faster transfer rates than when using modems. Using ISDN, you can transfer 64K or 128K of data per second

1.4.4.1 Understand the Use of the Telephone Network in Computing

• ADSL– Asymmetric Digital Subscriber Line is a technology for

transmitting digital information at a high bandwidth on existing phone lines to homes and businesses

– ADSL provides continuously-available, "always on" connection

– ADSL is asymmetric in that it uses most of the channel to transmit downstream to the user and only a small part to receive information from the user

– ADSL simultaneously accommodates analogue (voice) information on the same line

1.4.4.2 Understand the Use of the Telephone Network in Computing and Understand the Terminology

• Digital vs. Analogue– A digital system uses 1 or 0 to transmit data or to represent

data. Thus a digital clock will display whole seconds, whole minutes and whole hours

– An analogue system, such as a traditional clock, does not use multiples of 1 or 0, but rather uses the full range of numbers, including fractions. In this way an analogue clock can display fractions of a second

• Baud rate– The baud rate tells you how fast a modem can send/receive

data. Most modern modems have a maximum baud rate of 56 Kilobits per second (Kb/sec)

1.4.4.2 Understand the Use of the Telephone Network in Computing and Understand the Terminology

• Modem– Short for “MODulate/DEModulate”. The modem sends

information from your computer across the telephone system

– The modem at the other end of the phone line, converts the signal back into a format that can be used by the receiving computer

1.4.4.2 Understand the Use of the Telephone Network in Computing and Understand the Terminology

• Transfer rate– In data communications, bits per second (bps) is a common

measure of data speed for computer modems and transmission carriers

– The speed in bps is equal to the number of bits transmitted or received each second

– One kilobit per second (abbreviated to kbps) is equal to 1,000 bps

– Computer (dial-up) modems usually operate at 57.6 kbps

– ADSL services offer 256 or 512 Kbps (or faster)

1.5 The Use of ICT in Everyday Life

1.5.1 Computers at Work

1.5.1.1 Identify situations where a computer might be more appropriate than a person

• Repetitive tasks• Easily automated tasks• Mathematical calculations• Dangerous situations

1.5.1.2 Know Some Of The Uses Of Large-scale Computer Applications In Business

• Business administration• Airline booking systems• Insurance claims processing• Online banking

1.5.1.3 Know Some Of The Uses Of Large-scale Computer Applications In Government

• Public records systems– Census

– Vehicle registration

• Revenue collection• Electronic voting

1.5.1.4 Know Some Of The Uses Of Large-scale Computer Applications In Hospitals/Healthcare

• Patients’ records• Ambulance control systems• Diagnostic controls and instruments• Specialist surgical equipment

1.5.1.5 Know Some Of The Uses Of Large-scale Computer Applications In Education

• Student registration• Timetabling systems• Computer-based training (CBT)• Distance learning• Homework using the Internet

1.5.1.5 Know Some Of The Uses Of Large-scale Computer Applications In Education

CBT (Computer Based Training)– Computer Based Training (CBT) offers a low cost solution to

training needs where you need to train a large amount of people on a single subject

– These programs are normally supplied on CD-ROM and combine text, graphics and sound

– Packages range from general encyclopaedias right through to learning a foreign language

1.5.1.5 Know Some Of The Uses Of Large-scale Computer Applications In Education

• Advantages

– Can work at own pace

– Can be used wherever there is a computer

– Up-to-date versions obtainable on CD-ROM or via the Internet

• Disadvantages

– Need to provide own motivation

– May lack regular contact with other students

– Interactive help may not be available

CBT (Computer Based Training)

1.5.1.6 Understand the Term Teleworking

• The use of telecommunication to work outside the traditional office or workplace, usually at home or in a mobile situation

• New forms of telecommunication such as voice and picture communication and groupware are likely to make telecommuting more social in the future

1.5.1.6 Understand the Term Teleworking

• Groupware refers to programs that help people work together collectively while located remotely from each other

• Groupware services can include– sharing of calendars– collective writing– e-mail handling– shared database access– electronic meetings with each person able to see and display

information to others, and other activities.

• Examples of groupware include Lotus Notes and Microsoft Exchange

• Electronic "face-to-face" meetings are facilitated by CU-SeeMe and Microsoft NetMeeting

1.5.1.6 Understand the Term Teleworking

Advantages• Reduced or no commuting

time• Greater ability to focus on

one task• Flexible schedules• Reduced company space

requirements

Disadvantages• Lack of human contact• Less emphasis on

teamwork• Distractions at home

1.5.2 Electronic World

1.5.2.1 Understand the term Electronic Mail (E-mail)

• E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication

• E-mail messages are usually encoded in ASCII text but can also be in HTML

• You can also send non-text files, such as graphic images and sound files, as attachments

• A large percentage of the total traffic over the Internet is e-mail

• E-mail can be distributed to lists of people as well as to individuals

1.5.2.1 Understand the term Electronic Mail (E-mail)

• If you are sending a traditional letter to many people, then you have to pay a fixed price for each person that you are sending the letter to– The great thing about email is that when you have the correct

software you can send to one person or many people for almost the same price and that price will be a fraction of the cost of using traditional posted letters.

• The other great thing about email is that transmission of the email is almost instantaneous– Whether the recipient is in the next room or on the other side

of the world

1.5.2.1 Understand the term Electronic Mail (E-mail)

• When you send an email its transmission is often almost instantaneous– This is especially useful when sending a message to someone

in a different country

• This can be very useful in a business environment, however this facility can be abused and it is now possible for people to send email via the Internet to millions of people– This rather stupid habit is known as Spamming by the Internet

community and is very strongly disapproved of!

1.5.2.1 Understand the term Electronic Mail (E-mail)

• To send and receive email you require a computer, plus the necessary hardware and software

– Internal company emails are sent and received via your company’s LAN (Local Area Network)

• Computer• Modem or router• Telephone line or cable• E-mail client software e.g.

Outlook Express or web browser

• An account with an Internet Service Provider (ISP) e.g. FreeServe

1.5.3.2 Understand the term e-Commerce

The phrase e-commerce is a buzz word that relates to buying or selling via the Internet

1.5.3.2 Understand the term e-Commerce

• E-commerce can be divided into:

– E-tailing or "virtual storefronts" on websites with online catalogues, sometimes gathered into a "virtual mall"

– The gathering and use of demographic data through Web contacts

– Electronic Data Interchange (EDI), the business-to-business exchange of data

– e-mail and fax and their use as media for reaching prospective and established customers (for example, with newsletters)

– Business-to-business buying and selling

– The security of business transactions

1.5.3.2 Understand the term e-Commerce

• Advantages

– Consumer’s basic right to return unsatisfactory goods is maintained

– Service is available 24 hours a day

– Opportunity to view a wide range of products and make comparisons

– Very competitive prices as a result of low overheads

• Disadvantages

– Choosing from a virtual, so cannot physically examine the goods

– There is no human contact– Risk of insecure payment

methods– Personal details may be

passed on to third parties

1.6 Health and Safety, The Environment

1.6.1 Ergonomics

1.7.2.1 Understand What Elements and Practices Can Help Create a Good Working Environment

• Appropriate positioning of monitors, keyboards and adjustable chairs

• Use of a mouse mat• Use of a monitor filter• Provision of adequate

lighting and ventilation• Frequent breaks away

from the computer

1.6.2 Health Issues

1.6.2.1 List some common health problems associated with using a computer

• Injuries to wrists caused by prolonged typing (RSI)

• Eye strain caused by screen glare• Back problems associated with poor seating or

bad posture

1.6.3 Precautions

1.6.3.1 List some safety precautions when using a computer

• Make sure cables are safely secured• Ensure power points are not overloaded

1.6.4 The Environment

1.6.4.1/2 Recycling and Power-saving

• Printed output can be recycled in paper banks• Printer inkjet and toner cartridges can be

remanufactured• Enabling power-saving options for when the

computer is idle will lead to lower power station emissions

• Using electronic documents can help reduce the need for printed materials, saving paper and energy, and reducing pollution

1.7 Security

1.7.1 Information Security

1.7.1.1 Understand the term ‘Information Security’

• Organisations need to be proactive in dealing with security risks such as:

– A policy for handling sensitive data

– Procedures for reporting security incidents

– Making staff aware of their responsibilities with respect to information security

1.7.1.1 Understand the term ‘Information Security’

A company's security policy may include: • an Acceptable Use Policy (AUP)• a description of how the company plans to

educate its employees about protecting the company's assets

• an explanation of how security measurements will be carried out and enforced

• a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made

1.7.1.1 Understand the term ‘Information Security’

An Acceptable Use Policy (AUP)• A user must agree to follow this in order to be

provided with access to a network or to the Internet

• It is common practice for many businesses and educational facilities to require that employees or students sign an acceptable use policy before being granted a network ID

1.7.1.1 Understand the term ‘Information Security’

An Acceptable Use Policy (AUP) might include:• Not using the service as part of violating any law • Not attempting to break the security of any computer

network or user • Not posting commercial messages to Usenet groups

without prior permission • Not attempting to send junk e-mail or spam to anyone who

doesn't want to receive it • Not attempting to mail bomb a site with mass amounts of e-

mail in order to flood their server • Users also typically agree to report any attempt to break

into their accounts

1.7.1.2 Know about privacy issues associated with computers

• A password is an un-spaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user

• Typically, users of a multi-user or securely protected single-user system claim a unique name (often called a User ID) that can be generally known

• In order to verify that someone entering that user ID really is that person, a second identification, the password, known only to that person and to the system itself, is entered by the user

1.7.1.2 Know about privacy issues associated with computers

• A password is typically somewhere between four and 16 characters, depending on how the computer system is set up

• Passwords are case-specific• When a password is entered, the computer

system is careful not to display the characters on the display screen, in case others might see it

1.7.1.2 Know about privacy issues associated with computers

• Good criteria when choosing a password or setting up password guidelines include the following:

– Don't pick a password that someone can easily guess if they know who you are (for example, not your National Insurance number, birthday, or maiden name)

– Don't pick a word that can be found in the dictionary (since there are programs that can rapidly try every word in the dictionary!)

– Don't pick a word that is currently newsworthy – Don't pick a password that is similar to your previous password – Do pick a mixture of letters and at least one number – Do pick a word that you can easily remember – Many networks require that you change your password on some

periodic basis

1.7.1.2 Know about privacy issues associated with computers

• An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a folder or individual file– The list has an entry for each system user with access

privileges

– The most common privileges include the ability to read a file (or all the files in a folder), to write to the file or files, and to run a program

– Each ACL has one or more access control entries (ACEs) consisting of the name of a user or group of users

– The user can also be a role name, such as Student or Tutor

1.7.1.3 Know About the Purpose and Value of Backing Store of Computer Files

• The most important thing that you store on your computer is information

• Often the contents of a hard disk can represent years of work

• If the hard disk stops working one day you could lose all those years of work

• For this reason it is VITAL that you take regular backups of the information that is stored on the computer

1.7.1.3 Know About the Purpose and Value of Backing Store of Computer Files

• Organize your computer for more efficient backups

• Complete vs. incremental backups• Back up to removable medium

e.g. CD-ROM, tape, ZIP disk• Use 'off-site' storage• Beware of 'open files‘ that

will not be backed up

1.7.1.4 Be aware of implications of theft of a laptop, PDA or mobile phone

• Misuse of confidential files• Loss of files• Loss of important contact details• Possible misuse of telephone numbers

1.7.2 Computer Viruses

1.7.2.1 Understand the term virus when used in computing

• A virus is a piece of programming code usually disguised as something else that causes some unexpected and usually undesirable event

• A virus is often designed so that it is automatically spread to other computer users

• Some viruses wreak their effect as soon as their code is executed

• other viruses lie dormant until circumstances cause their code to be executed by the computer

• Some viruses are playful in intent and effect and some can be harmful, erasing data or causing your hard disk to require reformatting

1.7.2.1 Understand that there are different types of virus

• Generally, there are three main classes of viruses:

1. File infectors• Some file infector viruses attach themselves to

program files• Some can infect any program for which

execution is requested• Other file infector viruses arrive as wholly-

contained programs or scripts sent as an attachment to an e-mail note

1.7.2.1 Understand that there are different types of virus

• Generally, there are three main classes of viruses:

2. System or boot-record infectors• These viruses infect executable code found in

certain system areas on a disk• They attach to the DOS boot sector on diskettes

or the Master Boot Record on hard disks

1.7.2.1 Understand that there are different types of virus

• Generally, there are three main classes of viruses:

3. Macro viruses• These are among the most common viruses, and

they tend to do the least damage• Macro viruses infect your Microsoft Word

application and typically insert unwanted words or phrases

1.7.2.1 Understand that there are different types of virus

• Generally, there are three main classes of viruses:

3. Macro viruses• These are among the most common viruses, and

they tend to do the least damage• Macro viruses infect your Microsoft Word

application and typically insert unwanted words or phrases

1.7.2.1 Understand that there are different types of virus

• A Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk

• A Trojan horse may be widely redistributed as part of a computer virus

1.7.2.1 Understand that there are different types of virus

• A worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself

• Worms use parts of an operating system that are automatic and usually invisible to the user

• It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks

1.7.2.1 Be aware when and how viruses can enter a computer system

• As a file attached to an e-mail message• Via instant messengers such as AOL, Yahoo!,

MSN and Windows Messenger• On an infected diskette• As a download via the internet• By hackers gaining access to your computer via

a communications port

1.7.2.2 Know about anti-virus measures

• Do not open e-mail attachments unless they are from a trusted source

• Install a firewall program such as ZoneAlarm (free from www.zonelabs.com)

• Buy anti-virus software that can screen e-mail attachments• Keep anti-virus software up to date on a weekly basis• Schedule regular virus scans of hard drives• Install all the critical Windows updates from Microsoft• Be aware of hoax e-mail warnings

1.7.2.2 Know what to do when a virus infects a computer

• Viruses should be detected by up to date anti-virus software

• The software will normally attempt to repair (or disinfect) the file, delete it or quarantine it

• Virus removal tools can be downloaded via the internet (e.g. from www.symantec.com)

1.8 Copyright and the Law

1.8.1 Copyright

1.8.3.1 Understand software copyright

Copyright issues apply to:• Computer software• Graphics• Text• Audio• Video• Facts themselves are not

copyrighted, but how they are presented on a website is

1.8.3.2 Understand copyright issues relating to removable media

• Copyright applies to files and programs stored on:

• CDs• DVDs• Zip disks• Diskettes

1.8.1.3 Know how to check the Product ID number

• A product ID number needs to be keyed in when the software is first installed and is to be found on the CD case/sleeve

• For installed software, the product ID number may be found from:Help > About [name of program]

• For Microsoft products, this is usually a different number to that used for installation

1.8.1.3 Understand the terms Shareware, Freeware, End-user Licence agreement

• Shareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later

• Some software developers offer a shareware version of their program with a built-in expiration date (after 30 days, the user can no longer get access to the program)

• Other shareware (sometimes called liteware) is offered with certain capabilities disabled as an enticement to buy the complete version of the program

1.8.1.3 Understand the terms Shareware, Freeware, End-user Licence agreement

• Freeware is software that is offered at no cost• However, it is copyrighted so that you can't

incorporate its programming into anything you may be developing

• The least restrictive "no-cost" programs are uncopyrighted programs in the public domain software

1.8.1.3 Understand the terms Shareware, Freeware, End-user Licence agreement

• An End User Licence Agreement (EULA) is a legal contract between a software application author or publisher and the user of that application

• The EULA, often referred to as the "software licence," is similar to a rental agreement; the user agrees to pay for the privilege of using the software, and promises the software author or publisher to comply with all restrictions stated in the EULA

• The user is asked to indicate they that "accept" the terms of the EULA by opening the shrink wrap on the application package, breaking the seal on the CD case, sending a card back to the software publisher, installing the application, executing a downloadable file, or by simply using the application

• The user can refuse to enter into the agreement by returning the software product for a refund or clicking "I do not accept" when prompted to accept the EULA during an install.

1.8.2 Data Protection Legislation

1.8.4.1 Know data protection legislation in your country

• If your computer system holds information about individuals then you have a moral and legal duty to treat that information with respect

• In a free society you have a right to ensure that information held about you is not abused

• In many countries this right is enshrined under data protection laws

1.8.4.1 Know data protection legislation in your country

The European Data Protection Directive requires that all computer-based data be:

• Processed fairly and lawfully• Collected for specified and explicit purposes• Adequate, relevant and not excessive• Accurate and up-to-date where necessary• Maintained in in a form that means that the data subject

cannot be identified once their identification is no longer necessary

1.8.4.1 Know data protection legislation in your country

The European Data Protection Directive requires that all computer-based data be:

• Processed fairly and lawfully• Collected for specified and explicit purposes• Adequate, relevant and not excessive• Accurate and up-to-date where necessary• Maintained in in a form that means that the data

subject cannot be identified once their identification is no longer necessary

1.8.4.1 Understand the implications of data protection legislation

1.8.4.1 Describe some of the uses of personal data