SlideShare a Scribd company logo
1 of 9
Download to read offline
Software, Programming Language, Networking
A programming language is an artificial language designed to
communicate instructions to a machine, particularly a computer.
Programming languages can be used to create programs that
control the behavior of a machine and/or to express algorithms
precisely.
We can find to many programming language :
• Pascal
• C++
• Visual Basic
• Visual Foxpro
• JAVA
Information Network
• LAN
A LAN (Local Area Network) is a system whereby
individual PCs are connected together within a
company or organization
• WAN
A WAN (Wide Area Network) as the name implies
allows you to connect to other computers over a
wider area (i.e. the whole world).
Use network
If ten people are working together within an office it
makes sense for them all to be connected.
• In this way the office can have a single printer and all
ten people can print to it.
• In a similar way other devices such as modems or
scanners can be shared.
• Even more useful is the ability to share information
when connected to a network.
Computers in Daily Life
• Accounts
• Games
• Educational
• On-line banking• On-line banking
• Smart ID cards
• Supermarkets
• Working from home (Tele-working)
• Internet
Computer Virus
Viruses are small programs that hide themselves on your
disks (both flashdisk and your hard disk).
Unless you use virus
detection software the firstdetection software the first
time that you know that you
have a virus is when it activates.
Different viruses are
activated in different ways.
How do viruses infect PCs?
Viruses hide on a disk and when you access the
disk (either a diskette or another hard disk over
a network) the virus program will start and
infect your computer.
The worst thing about a computer virus is that
they can spread from one computer to another,
either via use of infected flashdisk, or over a
computer network, including the Internet.
Software Copyright
• Be aware on software copyright issues
• Freeware
• Shareware
• What about software that you find on the• What about software that you find on the
Internet?
• Software site licenses
Software Copyright
• If your computer system holds
information about individuals then you
have a moral and legal duty to treat
that information with respect.
• In a free society you have a right to
ensure that information held about
you is not abused.
• In many countries this right is
enshrined under data protection laws
Exercises Meeting-4
1. Programming Language is ….
2. Give the examples of Programming Language….
3. What is the meaning Networking ?
4. Mentioned kind of networking ?4. Mentioned kind of networking ?
5. How do viruses infect PC’s ?
6. Give the examples of anti virus as you know ?

More Related Content

What's hot

Ahmed computer
Ahmed computerAhmed computer
Ahmed computerA7medsharaf
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protectionphanleson
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFrederik Questier
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Review for 6 week assessment
Review for 6 week assessmentReview for 6 week assessment
Review for 6 week assessmentheidirobison
 
System failure
System  failureSystem  failure
System failurechrispaul8676
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Rahman_Hussain
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 

What's hot (18)

Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
 
Ahmed computer
Ahmed computerAhmed computer
Ahmed computer
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software Development
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Review for 6 week assessment
Review for 6 week assessmentReview for 6 week assessment
Review for 6 week assessment
 
System failure
System  failureSystem  failure
System failure
 
Cyber crimes 12
Cyber crimes 12Cyber crimes 12
Cyber crimes 12
 
English work
English workEnglish work
English work
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Computer security
Computer securityComputer security
Computer security
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
 

Viewers also liked

Viewers also liked (9)

Silabus bahasa inggris ii ok
Silabus bahasa inggris ii okSilabus bahasa inggris ii ok
Silabus bahasa inggris ii ok
 
948 ltm metode penelitian - 3 sks
948 ltm metode penelitian - 3 sks948 ltm metode penelitian - 3 sks
948 ltm metode penelitian - 3 sks
 
Silabus bahasa inggris ii
Silabus bahasa inggris iiSilabus bahasa inggris ii
Silabus bahasa inggris ii
 
Silabus d3 mi_pbd_september_2013
Silabus d3 mi_pbd_september_2013Silabus d3 mi_pbd_september_2013
Silabus d3 mi_pbd_september_2013
 
02. membuat database
02. membuat database02. membuat database
02. membuat database
 
Soal 2
Soal 2Soal 2
Soal 2
 
Pertemuan 1
Pertemuan 1Pertemuan 1
Pertemuan 1
 
Modul struktur data
Modul struktur dataModul struktur data
Modul struktur data
 
Tutorial Pembuatan Aplikasi Website Beserta Databasenya
Tutorial Pembuatan Aplikasi Website Beserta DatabasenyaTutorial Pembuatan Aplikasi Website Beserta Databasenya
Tutorial Pembuatan Aplikasi Website Beserta Databasenya
 

Similar to Meeting 4 ok

Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentationPranjal Mishra
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)Samiullah Khan
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on societyPratik Gupta
 
Linux
LinuxLinux
Linuxjcklp1
 
ICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computerICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computerSHARMA EDUCATION
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer softwareElike Ikechukwu
 
module_1-_5_computer_software.ppt
module_1-_5_computer_software.pptmodule_1-_5_computer_software.ppt
module_1-_5_computer_software.pptMufarowasheBingeping
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Computer systems
Computer systemsComputer systems
Computer systemsanicolepotonia
 
system Security
system Security system Security
system Security Gaurav Mishra
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and WormsGrittyCC
 

Similar to Meeting 4 ok (20)

Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentation
 
B) Computer Basics
B) Computer BasicsB) Computer Basics
B) Computer Basics
 
Computer virus
Computer virusComputer virus
Computer virus
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
Linux
LinuxLinux
Linux
 
ICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computerICT in teacher education, fundamentals of computer
ICT in teacher education, fundamentals of computer
 
ICT Skills.pdf
ICT Skills.pdfICT Skills.pdf
ICT Skills.pdf
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Introduction to computer software
Introduction to computer softwareIntroduction to computer software
Introduction to computer software
 
module_1-_5_computer_software.ppt
module_1-_5_computer_software.pptmodule_1-_5_computer_software.ppt
module_1-_5_computer_software.ppt
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Computer systems
Computer systemsComputer systems
Computer systems
 
system Security
system Security system Security
system Security
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

More from Bina Sarana Informatika (20)

ANALISA DAN PERANCANGAN SISTEM INFORMASI
ANALISA DAN PERANCANGAN SISTEM INFORMASI ANALISA DAN PERANCANGAN SISTEM INFORMASI
ANALISA DAN PERANCANGAN SISTEM INFORMASI
 
948 p06
948 p06948 p06
948 p06
 
948 p05
948 p05 948 p05
948 p05
 
948 p04
948 p04948 p04
948 p04
 
948 p02
948 p02 948 p02
948 p02
 
948 p01
948 p01 948 p01
948 p01
 
948 p03
948 p03 948 p03
948 p03
 
948 p06
948 p06948 p06
948 p06
 
948 p05
948 p05948 p05
948 p05
 
948 p04
948 p04948 p04
948 p04
 
948 p03
948 p03948 p03
948 p03
 
948 p02
948 p02948 p02
948 p02
 
948 p01
948 p01948 p01
948 p01
 
Kuiz dasar manajemen bisnis pert 9 14
Kuiz dasar manajemen bisnis pert 9 14Kuiz dasar manajemen bisnis pert 9 14
Kuiz dasar manajemen bisnis pert 9 14
 
Meeting 14 ok
Meeting 14 okMeeting 14 ok
Meeting 14 ok
 
Meeting 12 ok
Meeting 12 okMeeting 12 ok
Meeting 12 ok
 
Meeting 10 ok
Meeting 10 okMeeting 10 ok
Meeting 10 ok
 
Meeting 6 ok
Meeting 6 okMeeting 6 ok
Meeting 6 ok
 
Meeting 5 ok
Meeting 5 okMeeting 5 ok
Meeting 5 ok
 
Meeting 3 ok
Meeting 3 okMeeting 3 ok
Meeting 3 ok
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 

Meeting 4 ok

  • 1. Software, Programming Language, Networking A programming language is an artificial language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs that control the behavior of a machine and/or to express algorithms precisely. We can find to many programming language : • Pascal • C++ • Visual Basic • Visual Foxpro • JAVA
  • 2. Information Network • LAN A LAN (Local Area Network) is a system whereby individual PCs are connected together within a company or organization • WAN A WAN (Wide Area Network) as the name implies allows you to connect to other computers over a wider area (i.e. the whole world).
  • 3. Use network If ten people are working together within an office it makes sense for them all to be connected. • In this way the office can have a single printer and all ten people can print to it. • In a similar way other devices such as modems or scanners can be shared. • Even more useful is the ability to share information when connected to a network.
  • 4. Computers in Daily Life • Accounts • Games • Educational • On-line banking• On-line banking • Smart ID cards • Supermarkets • Working from home (Tele-working) • Internet
  • 5. Computer Virus Viruses are small programs that hide themselves on your disks (both flashdisk and your hard disk). Unless you use virus detection software the firstdetection software the first time that you know that you have a virus is when it activates. Different viruses are activated in different ways.
  • 6. How do viruses infect PCs? Viruses hide on a disk and when you access the disk (either a diskette or another hard disk over a network) the virus program will start and infect your computer. The worst thing about a computer virus is that they can spread from one computer to another, either via use of infected flashdisk, or over a computer network, including the Internet.
  • 7. Software Copyright • Be aware on software copyright issues • Freeware • Shareware • What about software that you find on the• What about software that you find on the Internet? • Software site licenses
  • 8. Software Copyright • If your computer system holds information about individuals then you have a moral and legal duty to treat that information with respect. • In a free society you have a right to ensure that information held about you is not abused. • In many countries this right is enshrined under data protection laws
  • 9. Exercises Meeting-4 1. Programming Language is …. 2. Give the examples of Programming Language…. 3. What is the meaning Networking ? 4. Mentioned kind of networking ?4. Mentioned kind of networking ? 5. How do viruses infect PC’s ? 6. Give the examples of anti virus as you know ?