SlideShare a Scribd company logo
1 of 18
Download to read offline
LEARNING MODULE 2 ICT GROUP 1
Module 2: Information Communication Technology
Computers have become essential business tools. They are used in every aspect of a
company's operations, including product creation, marketing, accounting and administration. It is
critical that business owners take the time to choose the right computers, software and peripherals
for their organization. Given the diversity of modern technology, from smartphones and tablets to
large desktop systems, the choice of the best tech for your business can be daunting.
Learning Outcomes:
1. Familiarize with the rules in using computer, Internet and email for business.
2. Explain the Difficulties of using New Technology
3. Identify appropriate “Netiquette”.
4. Practice Safe and responsible use of computer.
Lesson 1: Importance of Computer, Internet and email in business
Computers speed up the business processes and systems with top quality. Today’s world
computer is important to use to start an online and offline business. A computer is important to use
in business to automate the manufacturing, marketing, and, distribution process.
Computers help in research, production, distribution, marketing, banking, team management,
business automation, data storage, employee management, and very helpful to increase productivity
at a lower cost, less time with high quality. That’s why the use of the computer is important in
business. And the computer is the 1st and main tool in business that generates and manages profits.
Computers help businesses to collect manages, calculate, arrange, and visualize customer
data and information by us computer applications such as Microsoft word, excel, lower PowerPoint,
and tally. A computer helps to communicate faster with the customer by using the internet, online
communication tools, and internet phone system. It’s really important for the administration of the big
or small organization and each field that manages resources and opportunities.
Computer help creates marketing and advertising materials by using adobe photoshop, Corel
draw, online designing tools. The computer is used in business to create websites for business. The
computer is important in business to automate business transactions by using online banking, etc.
A computer is used around the world in almost all the private, government, and homebased
businesses and organizations. Without a computer, it’s impossible to conduct, run, and grow the
business. That’s why the computer is important to use in business organizations and companies.
But let’s understand the importance and uses of computers in business. In the following
explanations, I am including the commonly used computer and internet application that will explore
the importance of computers in business.
LEARNING MODULE 2 ICT GROUP 1
10 Reasons in points what is the role of the computer in Business?
When anyone wants to start the business, they use Computer.
When you think and want to start or search business ideas and facts then you start the
computer, open the Internet browser, and search innovative business ideas on Google. So, even
before starting a business, million people daily search on Google new business ideas, website ideas,
online business ideas, offline business or part-time business ideas, homebased business idea, travel
business ideas, blogging business ideas, computer business ideas, data analytics business ideas
and cloud storage business idea, etc. and thousands another type of quires related to business.
Why? Because of computer search and find the information and data quickly and accurately.
It’s the fastest method to share, get data and information related to business and career. That’s why
billion people running or starting a business by using Computers.
When business owners start executing the business idea and plan, they use Computer.
The role of the computer in business is very productive when anyone starts executing
business ideas and plans. To create a business plan then business owners can use Microsoft Excel
to perform the financial calculation, marketing budget planning, visualization of data for seminars
and meetings, and analysis of data analytics to create innovative and unique valuable products and
services.
Even if they don’t know how to create a business plan, they can download the predefined
and designed excel templates. They can also buy or purchased full business plan templates by using
the internet. They can also consult regarding the execution of their business idea, planning, and
implementation.
For businesses, it’s very tough to get such details and insights into business development
data and information without using computers, Microsoft Excel, and the Internet. That’s why it’s
important to use a computer and related technologies in business
When they want to Print marketing and Advertising Material, they Use Computer.
Marketing and advertising are like blood for business. Especially it’s very important for small
business owners and home-based businesses to survive. They need marketing and advertising
material on a daily basis. But to create marketing and advertising materials they have to use popular
computer applications such as Adobe Photoshop, Microsoft Office, Corel Draw, Adobe Illustrator and
printer, etc. with or on the computer. Without a computer, it’s tough to create such marketing material
(images, videos, slideshows, business cards, letterheads, brochure, etc.) quickly and accurately.
And also using a computer to create online and offline marketing materials it’s really important to use
a computer in Business.
LEARNING MODULE 2 ICT GROUP 1
When companies want to hire employees, they use Computer.
In general, it means using the Internet, but to use the Internet they have to use
Computers/laptops to access and run websites. Yes, they can use Mobile, but mobile is also a small
version of the computer. One more thing is that it’s not convincing so far to hire people using the
mobile phone.
But using a computer accessing the freelancing website and online job portal to hire
employees and remote workers are very convincing and time savings. Time is very important for a
higher level of productivity. So, hiring remote workers on a fixed price, hourly and projectbased
methods it really cut down the cost of conducting the business online and offline.
That’s why using a computer with an Internet connection is more beneficial than an empty
computer and without the existence of productive business applications.
When organizations want to Advertise and Market their products and services, they use Computer
with an internet connection.
Online marketing is the fastest way that is utilized ever to advertise and market products and
services around the world within a few seconds. Every business owner wants quick profit, more
results, and targeted and customer-oriented marketing. Without the computer and the internet, it’s
not possible. Google existed still today is not because you can search for free but they charge for
advertisements. Google Ads is its biggest revenuegenerating machine. Similarly, Facebook also
provides advertisement and marketing services to small and big business companies. Everything
that you see on the Internet is connected directly or indirectly with advertisement and marketing.
Everyone can promote their business online faster by using and creating effective online
marketing strategies. And behind this “computer and internet”. So, the use of a computer with the
internet is more effective.
When Businesses want to sell the products around the World, they use Computer.
As discussed in the 5th point that you not only market your products and services fast, but
also you can sell the products on the Internet by targeting any country, state, and city. Businesses
use e-commerce websites or create their own e-commerce websites where they can sell the products
and services to a wider audience. Even home-based business with 2-3 employees is making big
profits by using technologies in business. That’s why it is with the Internet becomes a more powerful
device to use in business.
Reduce the cost of product and service development.
LEARNING MODULE 2 ICT GROUP 1
Big companies are using Hybrid Computer technologies to speed up the process and reduce
the cost of manufacturing and production. Companies are using robots in more complex and difficult
works by replacing humans from the dangerous environment. You can see Hybrid computers in
transportation very soon.
Even in small businesses, marketing is automated, selling is automated, transactions are
automated and hundreds of other things are automated by the use of Business Intelligence
applications, artificial intelligence, and clouding computing. All that is happening it’s because of the
use of the computer in business.
Increase the demand for product and services.
When the cost of conducting business is low, then the business can spend or will spend more
money on the marketing and distribution process. That will increase demand. Even after some time
if demand goes negative due to negative demand curve or inflation or government policy change or
unbalanced situation between demand and supply, they can modify, reconstruct, and remarket the
products and services by using a computer and Internet.
It’s because they have a customer or client’s data. They collected this data by using business
analytics tracking codes (such as the Google Analytics code on the website) in the process of
marketing and selling. They have feedback and reviews. So, they analyze that data to make a future
decision. As you know decision-based data is like risk management. In which data can help business
consultants or entrepreneurs to take the calculated risk and grow in the market silently.
Help to faster the business transactions and reports.
It’s about Digital economy or cashless transactions in business. In every bank, you see
employees are working on Computers, managing and handling daily cash withdrawal, transfers, cash
deposits, and checks, etc. They are writing those details in the diary and also on computer
applications. Most of the computer application needs internet accesses, some application is banks
own intranet-based applications and others are offline such as Microsoft Office. Even now Microsoft
Office 365 can be used online or cloud-based applications.
Even understanding computers in banking works can explore various things about the
importance of computers in business. But similarly, in businesses computers are used in every step.
You find a computer in front office or reception, you can see employees working on the computer,
you can see managers are working on Laptops, you can see they are using transferring money, and
communicating about net emails, mobile banking, and the payment gateway, etc. Why? Because in
every part of the business, we all have to use the computer directly and indirectly. And sometimes
we use it as a customer and some time as a service provider.
Computer Help thousands of people worldwide to earn money by using Computer.
LEARNING MODULE 2 ICT GROUP 1
If you visited the cyber cafe, then you saw that cybercafé owners are earning money and
running the cybercafe business. They have 2-4-5 or 10 machines. They are creating your documents,
checking results, printing documents, and various other works only by using a computer and his/her
own brain.
Various online and offline IT-related business is earning money by using computer and
technologies. Someone selling computers and earning money, another one teaching computer
earning money, someone selling computer application and earning money, someone is earning
money by repairing the computer. Etc. It’s amazing.
Now I hope you got the main points about the Importance of computers. So, I am concluding
that computers help to earn more profit by reducing the cost of conducting business. Business
management and administration are easy by using a computer such as a live CCTV camera. It is
helpful in the training and development of employees. Communication in business by using email,
video conferencing is very helpful and effective. Business and career degrees are online due to
computers. Anyone can start a business from home by using a computer. Easy for the government
to create policies for well-managed businesses. New innovative business ideas are in the market
due to computers and the internet.
After learning the above uses of computer in business it’s easy to say that Computer is all
about business. Instead of saying Computer is an electronic machine, you can say a Computer is a
business machine, which is used to start the business, used to manage the business, used to collect
and analyze customer data, used to create and produce products and services quickly and
accurately.
Importance of Internet in Business
The invention and popularization of the internet has introduced a massive wave of changes
to business, and in the way the world does business. In fact, the internet made the global marketplace
more accessible via immediate connections and lines of communication.
Although the benefits of internet businesses delivered loads of new advantages for
businesses, the internet also created disadvantages for some business models. Video rental
companies were replaced by streaming services, the compact disc faded with the invention of MP3
files and eventually streaming data, as well. Book stores are still around, but the industry endured
major changes, with the invention of eBooks. Physical retailers, and the content with major online
retailers, as well as the entire supply chain, has changed at the retail level.
The Dot-Com Bubble
The internet experienced an incredible boom, followed by a crash or leveling event of sorts.
This is popularly referred to as the dot-com bubble. The bubble was peeking through the late 1990's,
and then the crash occurred around the millennium. This rapid growth is indicative of the value that
LEARNING MODULE 2 ICT GROUP 1
the internet exerts on the market. Essentially, a massive piece of real estate was created for
business, and a rush to grab that real estate creates a frenzy. Being a new entity, the real value of
internet real estate and processes was not really known; therefore, it exploded as investors and
business people rushed to grab everything available, while prices and values inflated at an incredible
rate. Eventually, this reached a bubble and the market leveled out. Although the initial bubble burst
and leveled the market, the internet has since remained a hugely profitable tool for business owners.
Within the bounds of the internet, innovative means of accessing audiences and of driving business
are being created on a regular basis.
Early Days of the Internet
The early days were pretty basic, and those days had a greater effect on internal rather than
external business processes. Dial-up internet speeds were excessively slow, and businesses
focused on email and the ability to send and receive documents and spreadsheets online. The early
internet was disorganized until major search engines started building algorithms and platforms to
deliver information. The battle against spam and dark websites was prevalent, until these algorithms
matured and learned to filter and deliver the highest value of content. That said, businesses could
send and receive emails and documents instantly without requiring physical mailing services.
Overall, this increased the speed at which business could be accomplished. A business could also
create a basic website to let the world know that this business existed. The major benefit of driving
traffic to a business without requiring a physical location still exists today.
High-Speed Revolution
High-speed internet added several value points for businesses. The ability to publish and
play music, and play video added a new element to online advertising. This also increased the
capabilities of a company website. Suddenly, a real estate agent had the bandwidth to load and
deliver virtual tours; an artist could load large graphic files, and larger media files could transmit
between users. A sales rep could create intensive digital presentations and deliver them online, an
amateur makeup artist could build a following on YouTube, and a land surveyor could print detailed
satellite imagery from Google Earth to make his job more efficient. Eventually, more businesses and
users would engage with the high-speed internet model. This started with DSL, which were digital
subscriber lines for high-speed access over a phone line, which enabled speeds to increase, and
then speeds increased again with fiberoptic cable lines.
Mobile Internet Access
Mobile internet added another internet element and business benefit. Business users can
access potential customers from the mobile devices they have on their person nearly 24/7. Mobile
integration with local business listings and map services empowers location-based business models.
The business can use these features to drive customers right to the business owner's doorstep. This
is especially useful when businesses do not have real estate on a busy corner. They can still access
LEARNING MODULE 2 ICT GROUP 1
the audience, make their location easy to find, and can also garner positive reviews through a high
level of performance.
Access to Information
The ability to access information quickly and easily is a major benefit for businesses. The
internet has just about every fact and piece of information immediately available that a business
could need. Are you forming an LLC, a corporation or a new business? Do a general search and you
will find whatever information, paperwork and services you need. You will even find services that will
file the paperwork on your behalf. You can access extensive legal libraries via internet-based
services, which enables you to research competitors, locate contact information about potential
business partners and gain access to critical information, in a matter of mere seconds. Although
some low-quality sources of information do exist online, but savvy business people quickly see the
difference between credible and non-credible websites, and between credible and non-credible
sources of online information.
Internal Communication
The internet improves internal communications through email, connected calendars and chat
services specifically designed to improve business communications. Programs such as Slack, Asana
and Basecamp connect employees, help organize tasks and deliver instant messages efficiently.
The ability to communicate quickly and to collaborate on documents and projects under a single
program renders the internet extremely valuable. This ability creates efficiencies and quickly drives
business forward. This ability also holds individuals accountable for their time and effort, while also
contributing to the connected group environment.
Globalizing Physical Products and the Supply Chain
Traditionally, the supply chain required visiting factories, sourcing products and running
through a detailed process to create and brand a product. The internet has changed that process
significantly. Today, a business can source multiple manufacturers of specific materials or products
from around the world while also negotiating prices, quantities and delivery options without ever
leaving home base. If a product is unique, some of the traditional elements of sourcing materials and
moving to the production sample phase may still apply, but even in this scenario, the internet makes
it easier to communicate by translating languages and delivering messages back and forth, with little
effort.
Marketing and Audience Effects
One of the biggest advantages created by the internet is the ability to access and market to
large audiences. Content marketing is essentially free, and businesses can create content that their
audience desires, as a means of driving qualified traffic to the business. Search traffic is a powerful
method of introducing a business to an audience. If a business does not want to spend the manual
LEARNING MODULE 2 ICT GROUP 1
hours chasing down organic search traffic, they can purchase top locations in the search results, and
essentially buy segments of that specific audience. The audience is using specific search terms
relevant to the business, so that the traffic is extremely qualified. The rate is typically built on bidding
platforms with more competitive keywords garnering higher values. Additionally, a business can
purchase banner advertisements through high traffic websites, purchase viewers on social media
platforms and utilize influencers and public relation tactics to drive website traffic.
Benefits of Social Media
The benefits of social media for businesses are extensive. Some businesses actually build
their entire customer base through social media channels. Social platforms are often centered
around followers. Once you have a loyal base of followers, the business can really work hard to keep
that group engaged while introducing new products and services. Having this audience immediately
accessible is a huge benefit that was not possible before the internet existed.
Building a social media following is also possible without any capital. Putting in the effort to
create and share great content relative to your business and market can garner a following and
increase your customer base.
Additionally, social platforms often offer advertising solutions with very specific audience
targeting abilities. You can advertise to a specific age range, geographic location and against the
things people like and already engage with online. Facebook for example, lets you choose pages the
audience already likes to create a profile of your typical customer. This puts your business in front of
the most relevant and likely group of potential customers. The data and insights gained from
performance in these paid campaigns also tells the business how different product and service
concepts can perform. The ability to test concepts while knowing your advertisement is reaching the
correct audience is a powerful tool for business. Testing before investing full bore on a product that
may fail can save lost time and capital
Review Sites
The internet is loaded with review websites and review options on business listings. These
reviews have a major impact on business as consumers’ research and filter through positive and
negative reviews before making purchase decisions. This works to the advantage of a business with
great reviews and often to the disadvantage of a business with negative reviews. The review ratings
typically have the option for a business owner to respond and it reflects on their ability to engage and
communicate with the customer.
Business Automation
Automation is a major internet driven trend in the business world. The ability to automate
tasks that traditionally required a workforce ultimately saves businesses money and makes their
operations simpler and more efficient. Everything from basic accounting practices to customer
service has some automation abilities depending on the business model and requirements.
LEARNING MODULE 2 ICT GROUP 1
A small business can automate receipt tracking and basic accounting through software
services that connect to accounts and track and classify spending and income. At tax time, everything
is already accounted for and ready to connect to filings for the IRS. Customer service automation is
possible through chat bots with pre-written messages and auto-responders answer emails and
specific questions with common answers.
Even marketing campaigns are built with some automation that save time in the long run. A
business can build campaigns with spending thresholds, specific dates and times to serve the ads
and performance thresholds that will trigger more or less budget allocation based on audience
response. When done manually, this requires a dedicated employee to monitor the campaign.
Entire dashboard software systems exist to utilize the power of the internet while combining
paid and organic marketing data and operations under a single source where tasks and triggers can
work under and automated or semi-automated setting. You can write 10 email marketing campaigns
and set them to deliver on specific dates and times. This can happen in conjunction with a preplanned
Facebook ad spend that triggers around the same content at the same time. Or even a campaign
that re-targets the social advertising click-through on display ads, wherever the user travels in the
internet ecosystem. This means, the consumer shows some initial interest, but then is driven to view
the business offering on other websites. Essentially, it follows them in increasing the brand reach to
an interested audience that is more willing to engage and buy.
Automation through the internet has major reach, and affects everything down to the
manufacturer level. A manufacturer using robotics to make specific items can connect to machines
via the internet, and it can use programs and apps to monitor and control the production abilities on
its machines.
Importance of Email in Business
According to Entrepreneur magazine, every business should evaluate available technology
and determine if there are benefits to using it. Email has helped to create instant global
communication and has opened up the capacity for businesses to send and receive messages.
Whether you do business in your community or around the world, advantages to using email are
plenty.
Saves Money
Email allows your company to reach customers, vendors and business partners all over the
world without spending money on postage. You can send a simple message or send a customer
invoice without having to pay to print the invoice, pay for an envelope to send it, or pay anyone in
your mail room to put the mailing together.
Saves Time
LEARNING MODULE 2 ICT GROUP 1
Email can help you reach anyone, anywhere in the world, instantly. A fax can get stopped by
a busy phone line, a phone call may go to voice mail and a letter sent by standard mail will take days
to reach its destination. Many business people spend their time in front of their computer, or make
time to access their email several times a day.
Email encryption allows you to send email messages safely to any recipient. A piece of
standard mail can be intercepted, or lost, and opened by someone who is not the recipient. As long
as you have confirmed the email address you are using, your email message will arrive safely to
your intended recipient.
Helps Filing
Businesses receive pieces of standard mail every day. Over time, trying to find a place to file
all of those papers can take up office space, create a fire hazard and take up a lot of time. Digitally
filing email messages can make filing important information easier, safer and less expensive. Be
certain to do a backup of your information weekly to avoid losing your messages if something were
to happen to your network or computer.
Provides Convenience
Business owners, managers and employees are busy people. There is not always time to
take phone calls or read pieces of standard mail. An email message will sit and wait until you have
the time to read it. If the message is important, then the sender can mark it urgent to catch your
attention. Email can easily fit around your business schedule and still get you important information.
Email is a way to get important information to a business associate quickly.
Lesson 2: Difficulties of Using New Technology
Cybercrimes are those committed via computer networks for such purposes as fraud, identity
theft, and the hacking of sensitive information.
Forced Entry
The creation and widespread use of new technology brings along with it many benefits.
However, new and previously unaccounted-for dangers arise as well. Cybercrime is one such
danger. It is defined as offenses that are committed against individuals or groups of individuals with
a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm
to the victim, directly or indirectly, using modern telecommunication networks such as the Internet
(chat rooms, emails, notice boards, etc.) and mobile phones (SMS/MMS). Such crimes may threaten
a nation’s or individual’s security and financial health. Issues surrounding this type of crime have
LEARNING MODULE 2 ICT GROUP 1
become high-profile, particularly those surrounding hacking, copyright infringement, and child
abduction. There are also problems of privacy when confidential information is lost or intercepted,
lawfully or otherwise.
Computer crime encompasses a broad range of activities. Generally, however, it may be
divided into two categories: crimes that target computers directly, and crimes facilitated by computer
networks or devices, the primary target of which is independent of the network or device. Crimes that
primarily target computer networks or devices include computer viruses, denial-of- service attacks,
and malware. Crimes that use computer networks or devices to advance other ends include
cyberstalking, fraud and identity theft, information warfare, and phishing scams.
Computer Fraud
Computer fraud is any dishonest misrepresentation of fact intended to get another to do or
refrain from doing something which causes loss. In this context, the fraud will result in obtaining a
benefit by one of a number of means:
 Altering computer input in an unauthorized way. This requires little technical expertise and
is not an uncommon form of theft by employees. Altering data before entry or entering false
data, or entering unauthorized instructions or using unauthorized processes are the most
common examples.
 Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized
transactions. This is difficult to detect.
 Altering or deleting stored data.
 Altering or misusing existing system tools or software packages, or altering or writing code
for fraudulent purposes.
Other forms of fraud may be facilitated using computer systems, including bank fraud, identity
theft, extortion, and theft of classified information.
Identity Theft
Identity theft is a form of stealing a person’s identity in which someone pretends to be
someone else, typically in order to access resources or obtain credit and other benefits in that
person’s name. The victim of identity theft (here meaning the person whose identity has been
assumed by the identity thief) can suffer adverse consequences if he or she is held accountable for
the perpetrator’s actions. Identity theft occurs when someone uses another’s personally identifying
information, like name, Social Security number, or credit card number, without permission, to commit
fraud or other crimes.
Identity fraud is often but not necessarily the consequence of identity theft. Someone can
steal or misappropriate personal information without then committing identity theft using the stolen
information; this can happen when a major data breach occurs and the information of a large number
of people is compromised.
LEARNING MODULE 2 ICT GROUP 1
Documented Cases of Cybercrime
One of the highest profiled banking computer crimes occurred during a course of three years,
beginning in 1970. The chief teller at the Park Avenue branch of New York’s Union Dime Savings
Bank embezzled over $1.5 million from hundreds of accounts. In 1983, a nineteen-year-old UCLA
student used his PC to break into a Defense Department international communications system.
Between 1995 and 1998, the Newscorp satellite pay-to-view encrypted SKY-TV service was
hacked several times during an ongoing technological arms race between a panEuropean hacking
group and Newscorp. The original motivation of the hackers was to watch Star Trek re-runs in
Germany, which was something Newscorp did not have the copyright to allow.
In February 2000, an individual under the alias of Mafia Boy began a series denial-ofservice
attacks against high profile websites, including Yahoo!, Amazon.com, Dell, E*TRADE, eBay, and
CNN. About 50 computers at Stanford University, as well as computers at the University of California
at Santa Barbara, were among the zombie computers sending pings in DDoS attacks. On August 3,
2000, Canadian federal prosecutors charged Mafia Boy with 54 counts of illegal access to computers,
plus a total of 10 counts of mischief to data for his attacks.
On March 2, 2010, Spanish investigators arrested three individuals for the infection of over
13 million computers around the world. The “botnet” of infected computers included PCs inside more
than half of the Fortune 1,000 companies and more than 40 major banks, according to investigators.
In August 2010, the international investigation Operation Delego, operating under the aegis
of the Department of Homeland Security, shut down the international pedophile ring Dreamboard.
The website had approximately 600 members and may have distributed up to 123 terabytes of child
pornography (roughly equivalent to 16,000 DVDs). To date, this is the single largest U.S. prosecution
of an international child pornography ring; 52 arrests were made worldwide.
Malware
Malware, short for malicious (or malevolent) software, is software used or created by
attackers to disrupt computer operation, gather sensitive information, or gain access to private
computer systems. It can appear in the form of code, scripts, active content, and other software.
Malware is a general term used to refer to a variety of forms of hostile or intrusive software.
Malware includes computer viruses, worms, spyware, adware, and trojan horses. Malware is not the
same as defective software, which is software that has a legitimate purpose but contains harmful
bugs that were not corrected before release. However, some malware is disguised as genuine
software, and may come from an official company website. An example of this is software used for
harmless purposes that is packed with additional tracking software that gathers marketing statistics.
Malware has caused the rise in use of protective software types such as anti-virus, anti-malware,
LEARNING MODULE 2 ICT GROUP 1
and firewalls. Each of these are commonly used by personal users and corporate networks to stop
the unauthorized access by other computer users, as well as the automated spread of malicious
scripts and software.
The best-known types of malware, viruses and worms, are known for the manner in which
they spread, rather than any specific types of behavior. The term computer virus is used for a
program that has infected some executable software and, when run, causes the virus to spread to
other executables. On the other hand, a worm is a program that actively transmits itself over a
network to infect other computers. These definitions lead to the observation that a virus requires user
intervention to spread, whereas a worm spreads itself automatically.
Purposes
Malware is sometimes used broadly against government or corporate websites to gather
guarded information, or to disrupt their operation in general. However, malware is often used against
individuals to gain personal information such as social security numbers, bank or credit card
numbers, and so on. Left unguarded, personal and networked computers can be at considerable risk
against these threats. Since the rise of widespread broadband Internet access, malicious software
has more frequently been designed for profit. Since 2003, the majority of widespread viruses and
worms have been designed to take control of users’ computers for black-market exploitation. Infected
“zombie computers” are used to send email spam, to host contraband data such as pornography, or
to engage in distributed denial-ofservice attacks as a form of extortion.
Another strictly for-profit category of malware has emerged, called spyware. These programs
are designed to monitor users’ web browsing, display unsolicited advertisements, or redirect affiliate
marketing revenues to the spyware creator. Spyware programs do not spread like viruses; instead
they are generally installed by exploiting security holes. They can also be packaged together with
user-installed software, such as peer-to-peer applications.
The prevalence of malware as a vehicle for Internet crime, along with the challenge of anti-
malware software to keep up with the continuous stream of new malware, has seen the adoption of
a new mindset for individuals and businesses using the Internet. With the amount of malware
currently being distributed, some percentage of computers will always be infected. For businesses,
especially those that sell mainly over the Internet, this means that they need to find a way to operate
despite security concerns. The result is a greater emphasis on backoffice protection designed to
protect against advanced malware operating on customers’ computers.
Concealment
For a malicious program to accomplish its goals, it must be able to run without being detected,
shut down, or deleted. When a malicious program is disguised as something normal or desirable,
users may willfully install it without realizing it. This is the technique of the Trojan horse or trojan. In
broad terms, a Trojan horse is any program that invites the user to run it, though it conceals harmful
LEARNING MODULE 2 ICT GROUP 1
or malicious code. The code may take effect immediately and can lead to many undesirable effects,
such as deleting the user’s files or installing additional harmful software.
One of the most common ways that spyware is distributed is as a Trojan horse, bundled with
a piece of desirable software that the user downloads from the Internet. When the user installs the
software, the spyware is installed along with it. Spyware authors who attempt to act in a legal fashion
may include an end-user license agreement that states the behavior of the spyware in loose terms,
which users may not read or understand.
Lesson 3: Netiquettes
Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite behavior in
society, netiquette is a code of good behavior on the Internet. This includes several aspects of the
Internet, such as email, social media, online chat, web forums, website comments, multiplayer
gaming, and other types of online communication.
While there is no official list of netiquette rules or guidelines, the general idea is to respect
others online. Below are ten examples of rules to follow for good netiquette:
1. Avoid posting inflammatory or offensive comments online (aka flaming).
2. Respect others' privacy by not sharing personal information, photos, or videos that another
person may not want published online.
3. Never spam others by sending large amounts of unsolicited email.
4. Show good sportsmanship when playing online games, whether you win or lose.
5. Don't troll people in web forums or website comments by repeatedly nagging or annoying
them.
6. Stick to the topic when posting in online forums or when commenting on photos or videos,
such as YouTube or Facebook comments.
7. Don't swear or use offensive language.
8. Avoid replying to negative comments with more negative comments. Instead, break the
cycle with a positive post.
9. If someone asks a question and you know the answer, offer to help.
10. Thank others who help you online.
The Internet provides a sense of anonymity since you often do not see or hear the people
with whom you are communicating online. But that is not an excuse for having poor manners or
posting incendiary comments. While some users may feel like they can hide behind their keyboard
or smartphone when posting online, the fact is they are still the ones publishing the content.
Remember – if you post offensive remarks online and the veil of anonymity is lifted, you will have to
answer for the comments you made.
LEARNING MODULE 2 ICT GROUP 1
In summary, good netiquette benefits both you and others on the Internet. Posting a positive
comment rather than a negative one just might make someone's day.
Lesson 4: Safety Use of Computer
Hackers and cyber-attacks are a constant source of concern when it comes to keeping the
data stored on your computer safe. You know how to protect yourself from viruses and ransomware,
and how to follow internet safety tips, but what about protecting the computer itself? With small
computers and lots stored on the cloud, it's easy to have either your machine or your data stolen, so
make sure you take the following precautions.
1. Keep It Locked
Although this might seem obvious, many people think since they live in a safe town, things
like stolen computers don't happen - until they do. If a thief has trouble getting into your house, they
may move on to an easier target with unlocked doors. Stolen computers can also result from an
argument with a family member, friend, or roommate, so locking the door of the room where you
store the computer when not in use could prevent unexpected loss from a formerly trusted
acquaintance.
 A physical lock can be a great deterrent to a thief who just wants to grab your laptop and
run or doesn't want to take the time to try to break a lock. Cable locks usually consist of a metal cable
with a loop that attaches to an anchor point (something hard to move like a desk, wall, or floor) and
then to a loop on the computer. It works much like a bike lock to secure the computer to something
solid. Some products contain an adhesive anchor, which may not be as strong as a built-in anchor
point but may still deter a thief in a hurry.
 You can also attach a lockdown plate to your computer with bolts and then to something
solid, such as a heavy desk. Lockdown plates may also include a lock with a key you must use to
remove the plate. It is very difficult to take a computer that is bolted down with a lockdown plate.
 Locking enclosures are another option that come in many sizes and can secure anything
from a small PC tower up to a full system that consists of a tower, monitor, keyboard, mouse, and
printer. You can use an enclosure with both a cable and lockdown plate in case someone takes the
entire thing to try and open it later.
2. Always Use a Password
Never let your computer remember passwords or supply one for you. Type in your password
every time you log on to your computer so if someone takes your computer, they will not have
unblocked access. Don't write down your passwords and keep them near the computer and don't
leave your password blank; it is like leaving a key to the house hanging on the locked doorknob. You
can also enable a password on your screen saver to provide double protection.
LEARNING MODULE 2 ICT GROUP 1
 Create a Secure Password - Make it difficult for a thief to discover your password by being
creative.
 Figure out something you will easily remember but that doesn't contain obvious words or
dates, such as family or pet names and birthdays or addresses.
 Make sure it is at least eight characters or longer and uses a combination of upper and
lowercase letters, numbers, and special characters (for example, @#$%).
3. Use a Self-Contained Alarm
A self-contained alarm attaches to a computer with adhesive and to a cord or cable. If
someone tries to take the cable off while the alarm is armed, it sounds a loud alert to everyone in the
vicinity. Some alarms sound for hours and can only be stopped with a special code. Thieves don't
like to call attention to themselves, so they may generally avoid alarms or ditch the computer if it
starts making a loud noise.
4. Engage a Fingerprint Lock
A fingerprint lock plugs into a USB port on your computer, and you place your finger on it to
gain access. You can authorize multiple fingerprints (useful for family computers) and configure some
fingerprint locks to provide passwords for your different online accounts as well.
5. Use Laptop Tracking
Many laptops can send a signal through Wi-Fi so you can track it if it goes missing. You can
also purchase software or apps that alert authorities when your computer has been stolen. This may
not work as well with a desktop, which stops sending Wi-Fi signals when unplugged.
6. Set Up Firewalls
If you connect to the internet, you should always run a firewall. A firewall can block outside
communication if you haven't authorized it and even stop data from entering or leaving the computer
without your permission. There are both hardware and software firewalls, and you can run both at
the same time.
Software firewalls often come as part of an operating system. For example, Windows
includes one, and you should always have it on unless you decide to get your own. As with any
software, you can shop around for a commercial firewall that is configured with the features that are
most important to you.
You can buy a hardware firewall as a stand-alone product, or they are also often included in
broadband routers. A router is good to have as another layer of protection; your computer can sit
behind it and make it even harder for hackers to get to it. Ensure you use a high-quality firewall and
configure it properly by changing all default passwords.
LEARNING MODULE 2 ICT GROUP 1
7. Use Screen Guards
A screen guard lets you view your screen normally while making the screen appear blank
from side angles. This is especially useful when working with sensitive information in public places,
open office workplaces, and while traveling, so onlookers cannot read what is on your screen.
8. Make Backups
Backups may not sound like a way to keep your computer safe, but if something damages
the computer or you have a security problem, you can quickly recover if you have a recent backup
of all your data. Hard drives die, computers are stolen, accounts are compromised but if you have a
backup, you can at least get all of your data back. Back up consistently and often so if you have a
problem, your backup isn't out of date, and you won't lose months’ worth of data. There are many
ways to perform a backup, such as both hardware (USB drives and external hard drives) and
software (archiving and cloud). Keep backed up data in a secure location.
9. Carefully Set Account Privileges
Even though you may be the only one who uses your computer, don't continually log on using
administrator rights. Use these rights only when you need to perform specific administrative tasks,
such as maintenance. If you always run your computer in administrator mode, it may make it
susceptible to security risks.
10. Encrypt Your Sensitive Files
Encryption scrambles the contents of files so only the person with the correct encryption key
can decode it. If someone does manage to access your computer and the files are not encrypted,
they can easily be read. Some USB drives automatically encrypt files during backups, and there are
many encryption services and software available.
11. Shut It Down
Shut down your computer when you leave it unattended. A lot of people continually leave
their computer on and remain logged in at all times. By turning the computer completely off, it cuts
the internet connection, which may stop spyware and anything that uses your computer's resources
to contact other users.
12. Be Careful Around Kids
More and more kids start using computers at earlier ages. Teach children not to use any toys
with magnets around the computer. You may not think it will happen to you until your hard drive is
wiped because of magnets that became attached to the back of the computer.
LEARNING MODULE 2 ICT GROUP 1
13. Use Caution with Food and Drink
Teach both children and adults not to eat or drink around the computer and to keep it clean.
Liquids and crumbs can damage the keyboard and other hardware.
14. Be Discreet in Public
If you must leave your laptop in a car, lock it in your trunk out of sight before you reach your
destination. Try not to set a computer bag on the floor because it is easy to forget but if there is
nowhere else to store it, place it between your feet where you can feel where it is at all times. Use
nondescript bags or briefcases that do not show if there is a laptop inside.
15. Keep Software up to Date
Anti-virus software was created to prevent viruses and malware from entering your computer
system and to detect and remove them from systems that have already been infected. Always keep
any type of software, especially virus protection, up to date. Ransomware and viruses are constantly
changing the way in which they enter and attack your data, so software updates are continually
released to protect against the latest type of threat. Patches, updates, and even upgrades are made
to fix software and protect against new vulnerabilities, so make sure to install the latest to best protect
your data. Anti-virus software is often included when you purchase your computer and there are
many reliable brands, such as Norton and Avast.

More Related Content

What's hot

IT Training In Ambala Cantt! Batra Computer Centre
IT Training In Ambala Cantt! Batra Computer CentreIT Training In Ambala Cantt! Batra Computer Centre
IT Training In Ambala Cantt! Batra Computer Centregroversimrans
 
Build a MobileFirst Agenda - IBM Mobile Enterprise
Build a MobileFirst Agenda - IBM Mobile EnterpriseBuild a MobileFirst Agenda - IBM Mobile Enterprise
Build a MobileFirst Agenda - IBM Mobile EnterpriseEd Brill
 
Aji Issac Mathew CXOs & Digital Marketing - Role CXOs Must Play in First 7 Steps
Aji Issac Mathew CXOs & Digital Marketing - Role CXOs Must Play in First 7 StepsAji Issac Mathew CXOs & Digital Marketing - Role CXOs Must Play in First 7 Steps
Aji Issac Mathew CXOs & Digital Marketing - Role CXOs Must Play in First 7 StepsIndus Net Technologies
 
Management and Economics of e-Business
Management and Economics of e-BusinessManagement and Economics of e-Business
Management and Economics of e-BusinessPauline Wamere
 
Meeting the Exploding Demand for New IT Services
Meeting the Exploding Demand for New IT ServicesMeeting the Exploding Demand for New IT Services
Meeting the Exploding Demand for New IT ServicesBMC Software
 
Mohan Ram Workshop - Growth Levers for Scaling Your Company Lessons from Digi...
Mohan Ram Workshop - Growth Levers for Scaling Your Company Lessons from Digi...Mohan Ram Workshop - Growth Levers for Scaling Your Company Lessons from Digi...
Mohan Ram Workshop - Growth Levers for Scaling Your Company Lessons from Digi...SayantanNag3
 
Full report-2013
Full report-2013Full report-2013
Full report-2013aralikatte
 
Mobile Apps and the Healthcare World
Mobile Apps and the Healthcare WorldMobile Apps and the Healthcare World
Mobile Apps and the Healthcare WorldDesignit
 
Nike from separate digital initiatives to firm-level transformation - capge...
Nike   from separate digital initiatives to firm-level transformation - capge...Nike   from separate digital initiatives to firm-level transformation - capge...
Nike from separate digital initiatives to firm-level transformation - capge...Rick Bouter
 
Enterprise Mobility Market study
Enterprise Mobility Market study Enterprise Mobility Market study
Enterprise Mobility Market study Bhuvanesh K.R.
 
Leading Digital Business Change
Leading Digital Business ChangeLeading Digital Business Change
Leading Digital Business ChangeSonata Software
 
SharePoint Saturday Omaha 2017
SharePoint Saturday Omaha 2017SharePoint Saturday Omaha 2017
SharePoint Saturday Omaha 2017Matthew W. Bowers
 
Report 4 design to disrupt devops eng - D2d Design 2 Disrupt
Report 4 design to disrupt devops eng - D2d Design 2 DisruptReport 4 design to disrupt devops eng - D2d Design 2 Disrupt
Report 4 design to disrupt devops eng - D2d Design 2 DisruptRick Bouter
 
Digital Disruption in the Workplace
Digital Disruption in the WorkplaceDigital Disruption in the Workplace
Digital Disruption in the WorkplaceCushman & Wakefield
 

What's hot (18)

IT Training In Ambala Cantt! Batra Computer Centre
IT Training In Ambala Cantt! Batra Computer CentreIT Training In Ambala Cantt! Batra Computer Centre
IT Training In Ambala Cantt! Batra Computer Centre
 
Unplugged
UnpluggedUnplugged
Unplugged
 
Build a MobileFirst Agenda - IBM Mobile Enterprise
Build a MobileFirst Agenda - IBM Mobile EnterpriseBuild a MobileFirst Agenda - IBM Mobile Enterprise
Build a MobileFirst Agenda - IBM Mobile Enterprise
 
Mgmt230 u1 ip_2011
Mgmt230 u1 ip_2011Mgmt230 u1 ip_2011
Mgmt230 u1 ip_2011
 
Aji Issac Mathew CXOs & Digital Marketing - Role CXOs Must Play in First 7 Steps
Aji Issac Mathew CXOs & Digital Marketing - Role CXOs Must Play in First 7 StepsAji Issac Mathew CXOs & Digital Marketing - Role CXOs Must Play in First 7 Steps
Aji Issac Mathew CXOs & Digital Marketing - Role CXOs Must Play in First 7 Steps
 
Management and Economics of e-Business
Management and Economics of e-BusinessManagement and Economics of e-Business
Management and Economics of e-Business
 
Meeting the Exploding Demand for New IT Services
Meeting the Exploding Demand for New IT ServicesMeeting the Exploding Demand for New IT Services
Meeting the Exploding Demand for New IT Services
 
Mohan Ram Workshop - Growth Levers for Scaling Your Company Lessons from Digi...
Mohan Ram Workshop - Growth Levers for Scaling Your Company Lessons from Digi...Mohan Ram Workshop - Growth Levers for Scaling Your Company Lessons from Digi...
Mohan Ram Workshop - Growth Levers for Scaling Your Company Lessons from Digi...
 
Full report-2013
Full report-2013Full report-2013
Full report-2013
 
Mobile Apps and the Healthcare World
Mobile Apps and the Healthcare WorldMobile Apps and the Healthcare World
Mobile Apps and the Healthcare World
 
Nike from separate digital initiatives to firm-level transformation - capge...
Nike   from separate digital initiatives to firm-level transformation - capge...Nike   from separate digital initiatives to firm-level transformation - capge...
Nike from separate digital initiatives to firm-level transformation - capge...
 
Mutaz muaz
Mutaz muazMutaz muaz
Mutaz muaz
 
Enterprise Mobility Market study
Enterprise Mobility Market study Enterprise Mobility Market study
Enterprise Mobility Market study
 
Leading Digital Business Change
Leading Digital Business ChangeLeading Digital Business Change
Leading Digital Business Change
 
How to Build a Modern Law Firm
How to Build a Modern Law FirmHow to Build a Modern Law Firm
How to Build a Modern Law Firm
 
SharePoint Saturday Omaha 2017
SharePoint Saturday Omaha 2017SharePoint Saturday Omaha 2017
SharePoint Saturday Omaha 2017
 
Report 4 design to disrupt devops eng - D2d Design 2 Disrupt
Report 4 design to disrupt devops eng - D2d Design 2 DisruptReport 4 design to disrupt devops eng - D2d Design 2 Disrupt
Report 4 design to disrupt devops eng - D2d Design 2 Disrupt
 
Digital Disruption in the Workplace
Digital Disruption in the WorkplaceDigital Disruption in the Workplace
Digital Disruption in the Workplace
 

Similar to Epp lm1

Uses of Computers in Business
Uses of Computers in BusinessUses of Computers in Business
Uses of Computers in BusinessMargarita Sison
 
relivance of apps in business
relivance of apps in businessrelivance of apps in business
relivance of apps in businessSagar kumar
 
Artificial Intelligence and Machine Learning In Business
Artificial Intelligence and Machine Learning In BusinessArtificial Intelligence and Machine Learning In Business
Artificial Intelligence and Machine Learning In BusinessSubmissionResearchpa
 
The Rise Of AI Business
The Rise Of AI BusinessThe Rise Of AI Business
The Rise Of AI BusinessMark Bastorous
 
Top Computer Course After 12th.pptx
Top Computer Course After 12th.pptxTop Computer Course After 12th.pptx
Top Computer Course After 12th.pptxPoojaSharma149354
 
Top Computer Course After 12th.pptx
Top Computer Course After 12th.pptxTop Computer Course After 12th.pptx
Top Computer Course After 12th.pptxPoojaSharma149354
 
Computer applications in buiseness
Computer applications in buisenessComputer applications in buiseness
Computer applications in buisenessDewan Md. Faysal
 
How machine learning & artificial intelligence implement in e commerce
How machine learning & artificial intelligence implement in e commerce How machine learning & artificial intelligence implement in e commerce
How machine learning & artificial intelligence implement in e commerce Robert Smith
 
Customize Transformation For A Personalized Experience
Customize Transformation For A Personalized ExperienceCustomize Transformation For A Personalized Experience
Customize Transformation For A Personalized ExperienceLCDF
 
computer application in business
computer application in businesscomputer application in business
computer application in businessAyeshaSiddiqua62
 
When Social Media Poses a Threat to Your Business.Two employe.docx
When Social Media Poses a Threat to Your Business.Two employe.docxWhen Social Media Poses a Threat to Your Business.Two employe.docx
When Social Media Poses a Threat to Your Business.Two employe.docxalanfhall8953
 
Computer on Business
Computer on BusinessComputer on Business
Computer on BusinessMac Mustera
 
Role of e commerce applications in business growth by amritpal singh - jul,...
Role of e commerce applications in business growth   by amritpal singh - jul,...Role of e commerce applications in business growth   by amritpal singh - jul,...
Role of e commerce applications in business growth by amritpal singh - jul,...FugenX
 
Using IT in as a Component of BUSINESS STRATEGY
Using IT in as a Component of  BUSINESS   STRATEGYUsing IT in as a Component of  BUSINESS   STRATEGY
Using IT in as a Component of BUSINESS STRATEGYKUNWAR THAKUR
 
Operations and technology framework for IFA's
Operations and technology framework for IFA'sOperations and technology framework for IFA's
Operations and technology framework for IFA'ssonesh_dedhia
 
Top 50 most innovative companies to watch 2020
Top 50 most innovative companies to watch 2020Top 50 most innovative companies to watch 2020
Top 50 most innovative companies to watch 2020TheCEOViews
 
Web engineering notes unit 5
Web engineering notes unit 5Web engineering notes unit 5
Web engineering notes unit 5inshu1890
 
Let's make money online
Let's make money onlineLet's make money online
Let's make money onlinevictorlebron4
 
Let's make money online
Let's make money onlineLet's make money online
Let's make money onlineArsh Saifi
 

Similar to Epp lm1 (20)

Uses of Computers in Business
Uses of Computers in BusinessUses of Computers in Business
Uses of Computers in Business
 
relivance of apps in business
relivance of apps in businessrelivance of apps in business
relivance of apps in business
 
Artificial Intelligence and Machine Learning In Business
Artificial Intelligence and Machine Learning In BusinessArtificial Intelligence and Machine Learning In Business
Artificial Intelligence and Machine Learning In Business
 
The Rise Of AI Business
The Rise Of AI BusinessThe Rise Of AI Business
The Rise Of AI Business
 
Top Computer Course After 12th.pptx
Top Computer Course After 12th.pptxTop Computer Course After 12th.pptx
Top Computer Course After 12th.pptx
 
Top Computer Course After 12th.pptx
Top Computer Course After 12th.pptxTop Computer Course After 12th.pptx
Top Computer Course After 12th.pptx
 
Computer applications in buiseness
Computer applications in buisenessComputer applications in buiseness
Computer applications in buiseness
 
How machine learning & artificial intelligence implement in e commerce
How machine learning & artificial intelligence implement in e commerce How machine learning & artificial intelligence implement in e commerce
How machine learning & artificial intelligence implement in e commerce
 
Customize Transformation For A Personalized Experience
Customize Transformation For A Personalized ExperienceCustomize Transformation For A Personalized Experience
Customize Transformation For A Personalized Experience
 
computer application in business
computer application in businesscomputer application in business
computer application in business
 
When Social Media Poses a Threat to Your Business.Two employe.docx
When Social Media Poses a Threat to Your Business.Two employe.docxWhen Social Media Poses a Threat to Your Business.Two employe.docx
When Social Media Poses a Threat to Your Business.Two employe.docx
 
Computer on Business
Computer on BusinessComputer on Business
Computer on Business
 
Role of e commerce applications in business growth by amritpal singh - jul,...
Role of e commerce applications in business growth   by amritpal singh - jul,...Role of e commerce applications in business growth   by amritpal singh - jul,...
Role of e commerce applications in business growth by amritpal singh - jul,...
 
Using IT in as a Component of BUSINESS STRATEGY
Using IT in as a Component of  BUSINESS   STRATEGYUsing IT in as a Component of  BUSINESS   STRATEGY
Using IT in as a Component of BUSINESS STRATEGY
 
Operations and technology framework for IFA's
Operations and technology framework for IFA'sOperations and technology framework for IFA's
Operations and technology framework for IFA's
 
Mba project1
Mba project1Mba project1
Mba project1
 
Top 50 most innovative companies to watch 2020
Top 50 most innovative companies to watch 2020Top 50 most innovative companies to watch 2020
Top 50 most innovative companies to watch 2020
 
Web engineering notes unit 5
Web engineering notes unit 5Web engineering notes unit 5
Web engineering notes unit 5
 
Let's make money online
Let's make money onlineLet's make money online
Let's make money online
 
Let's make money online
Let's make money onlineLet's make money online
Let's make money online
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 

Epp lm1

  • 1. LEARNING MODULE 2 ICT GROUP 1 Module 2: Information Communication Technology Computers have become essential business tools. They are used in every aspect of a company's operations, including product creation, marketing, accounting and administration. It is critical that business owners take the time to choose the right computers, software and peripherals for their organization. Given the diversity of modern technology, from smartphones and tablets to large desktop systems, the choice of the best tech for your business can be daunting. Learning Outcomes: 1. Familiarize with the rules in using computer, Internet and email for business. 2. Explain the Difficulties of using New Technology 3. Identify appropriate “Netiquette”. 4. Practice Safe and responsible use of computer. Lesson 1: Importance of Computer, Internet and email in business Computers speed up the business processes and systems with top quality. Today’s world computer is important to use to start an online and offline business. A computer is important to use in business to automate the manufacturing, marketing, and, distribution process. Computers help in research, production, distribution, marketing, banking, team management, business automation, data storage, employee management, and very helpful to increase productivity at a lower cost, less time with high quality. That’s why the use of the computer is important in business. And the computer is the 1st and main tool in business that generates and manages profits. Computers help businesses to collect manages, calculate, arrange, and visualize customer data and information by us computer applications such as Microsoft word, excel, lower PowerPoint, and tally. A computer helps to communicate faster with the customer by using the internet, online communication tools, and internet phone system. It’s really important for the administration of the big or small organization and each field that manages resources and opportunities. Computer help creates marketing and advertising materials by using adobe photoshop, Corel draw, online designing tools. The computer is used in business to create websites for business. The computer is important in business to automate business transactions by using online banking, etc. A computer is used around the world in almost all the private, government, and homebased businesses and organizations. Without a computer, it’s impossible to conduct, run, and grow the business. That’s why the computer is important to use in business organizations and companies. But let’s understand the importance and uses of computers in business. In the following explanations, I am including the commonly used computer and internet application that will explore the importance of computers in business.
  • 2. LEARNING MODULE 2 ICT GROUP 1 10 Reasons in points what is the role of the computer in Business? When anyone wants to start the business, they use Computer. When you think and want to start or search business ideas and facts then you start the computer, open the Internet browser, and search innovative business ideas on Google. So, even before starting a business, million people daily search on Google new business ideas, website ideas, online business ideas, offline business or part-time business ideas, homebased business idea, travel business ideas, blogging business ideas, computer business ideas, data analytics business ideas and cloud storage business idea, etc. and thousands another type of quires related to business. Why? Because of computer search and find the information and data quickly and accurately. It’s the fastest method to share, get data and information related to business and career. That’s why billion people running or starting a business by using Computers. When business owners start executing the business idea and plan, they use Computer. The role of the computer in business is very productive when anyone starts executing business ideas and plans. To create a business plan then business owners can use Microsoft Excel to perform the financial calculation, marketing budget planning, visualization of data for seminars and meetings, and analysis of data analytics to create innovative and unique valuable products and services. Even if they don’t know how to create a business plan, they can download the predefined and designed excel templates. They can also buy or purchased full business plan templates by using the internet. They can also consult regarding the execution of their business idea, planning, and implementation. For businesses, it’s very tough to get such details and insights into business development data and information without using computers, Microsoft Excel, and the Internet. That’s why it’s important to use a computer and related technologies in business When they want to Print marketing and Advertising Material, they Use Computer. Marketing and advertising are like blood for business. Especially it’s very important for small business owners and home-based businesses to survive. They need marketing and advertising material on a daily basis. But to create marketing and advertising materials they have to use popular computer applications such as Adobe Photoshop, Microsoft Office, Corel Draw, Adobe Illustrator and printer, etc. with or on the computer. Without a computer, it’s tough to create such marketing material (images, videos, slideshows, business cards, letterheads, brochure, etc.) quickly and accurately. And also using a computer to create online and offline marketing materials it’s really important to use a computer in Business.
  • 3. LEARNING MODULE 2 ICT GROUP 1 When companies want to hire employees, they use Computer. In general, it means using the Internet, but to use the Internet they have to use Computers/laptops to access and run websites. Yes, they can use Mobile, but mobile is also a small version of the computer. One more thing is that it’s not convincing so far to hire people using the mobile phone. But using a computer accessing the freelancing website and online job portal to hire employees and remote workers are very convincing and time savings. Time is very important for a higher level of productivity. So, hiring remote workers on a fixed price, hourly and projectbased methods it really cut down the cost of conducting the business online and offline. That’s why using a computer with an Internet connection is more beneficial than an empty computer and without the existence of productive business applications. When organizations want to Advertise and Market their products and services, they use Computer with an internet connection. Online marketing is the fastest way that is utilized ever to advertise and market products and services around the world within a few seconds. Every business owner wants quick profit, more results, and targeted and customer-oriented marketing. Without the computer and the internet, it’s not possible. Google existed still today is not because you can search for free but they charge for advertisements. Google Ads is its biggest revenuegenerating machine. Similarly, Facebook also provides advertisement and marketing services to small and big business companies. Everything that you see on the Internet is connected directly or indirectly with advertisement and marketing. Everyone can promote their business online faster by using and creating effective online marketing strategies. And behind this “computer and internet”. So, the use of a computer with the internet is more effective. When Businesses want to sell the products around the World, they use Computer. As discussed in the 5th point that you not only market your products and services fast, but also you can sell the products on the Internet by targeting any country, state, and city. Businesses use e-commerce websites or create their own e-commerce websites where they can sell the products and services to a wider audience. Even home-based business with 2-3 employees is making big profits by using technologies in business. That’s why it is with the Internet becomes a more powerful device to use in business. Reduce the cost of product and service development.
  • 4. LEARNING MODULE 2 ICT GROUP 1 Big companies are using Hybrid Computer technologies to speed up the process and reduce the cost of manufacturing and production. Companies are using robots in more complex and difficult works by replacing humans from the dangerous environment. You can see Hybrid computers in transportation very soon. Even in small businesses, marketing is automated, selling is automated, transactions are automated and hundreds of other things are automated by the use of Business Intelligence applications, artificial intelligence, and clouding computing. All that is happening it’s because of the use of the computer in business. Increase the demand for product and services. When the cost of conducting business is low, then the business can spend or will spend more money on the marketing and distribution process. That will increase demand. Even after some time if demand goes negative due to negative demand curve or inflation or government policy change or unbalanced situation between demand and supply, they can modify, reconstruct, and remarket the products and services by using a computer and Internet. It’s because they have a customer or client’s data. They collected this data by using business analytics tracking codes (such as the Google Analytics code on the website) in the process of marketing and selling. They have feedback and reviews. So, they analyze that data to make a future decision. As you know decision-based data is like risk management. In which data can help business consultants or entrepreneurs to take the calculated risk and grow in the market silently. Help to faster the business transactions and reports. It’s about Digital economy or cashless transactions in business. In every bank, you see employees are working on Computers, managing and handling daily cash withdrawal, transfers, cash deposits, and checks, etc. They are writing those details in the diary and also on computer applications. Most of the computer application needs internet accesses, some application is banks own intranet-based applications and others are offline such as Microsoft Office. Even now Microsoft Office 365 can be used online or cloud-based applications. Even understanding computers in banking works can explore various things about the importance of computers in business. But similarly, in businesses computers are used in every step. You find a computer in front office or reception, you can see employees working on the computer, you can see managers are working on Laptops, you can see they are using transferring money, and communicating about net emails, mobile banking, and the payment gateway, etc. Why? Because in every part of the business, we all have to use the computer directly and indirectly. And sometimes we use it as a customer and some time as a service provider. Computer Help thousands of people worldwide to earn money by using Computer.
  • 5. LEARNING MODULE 2 ICT GROUP 1 If you visited the cyber cafe, then you saw that cybercafé owners are earning money and running the cybercafe business. They have 2-4-5 or 10 machines. They are creating your documents, checking results, printing documents, and various other works only by using a computer and his/her own brain. Various online and offline IT-related business is earning money by using computer and technologies. Someone selling computers and earning money, another one teaching computer earning money, someone selling computer application and earning money, someone is earning money by repairing the computer. Etc. It’s amazing. Now I hope you got the main points about the Importance of computers. So, I am concluding that computers help to earn more profit by reducing the cost of conducting business. Business management and administration are easy by using a computer such as a live CCTV camera. It is helpful in the training and development of employees. Communication in business by using email, video conferencing is very helpful and effective. Business and career degrees are online due to computers. Anyone can start a business from home by using a computer. Easy for the government to create policies for well-managed businesses. New innovative business ideas are in the market due to computers and the internet. After learning the above uses of computer in business it’s easy to say that Computer is all about business. Instead of saying Computer is an electronic machine, you can say a Computer is a business machine, which is used to start the business, used to manage the business, used to collect and analyze customer data, used to create and produce products and services quickly and accurately. Importance of Internet in Business The invention and popularization of the internet has introduced a massive wave of changes to business, and in the way the world does business. In fact, the internet made the global marketplace more accessible via immediate connections and lines of communication. Although the benefits of internet businesses delivered loads of new advantages for businesses, the internet also created disadvantages for some business models. Video rental companies were replaced by streaming services, the compact disc faded with the invention of MP3 files and eventually streaming data, as well. Book stores are still around, but the industry endured major changes, with the invention of eBooks. Physical retailers, and the content with major online retailers, as well as the entire supply chain, has changed at the retail level. The Dot-Com Bubble The internet experienced an incredible boom, followed by a crash or leveling event of sorts. This is popularly referred to as the dot-com bubble. The bubble was peeking through the late 1990's, and then the crash occurred around the millennium. This rapid growth is indicative of the value that
  • 6. LEARNING MODULE 2 ICT GROUP 1 the internet exerts on the market. Essentially, a massive piece of real estate was created for business, and a rush to grab that real estate creates a frenzy. Being a new entity, the real value of internet real estate and processes was not really known; therefore, it exploded as investors and business people rushed to grab everything available, while prices and values inflated at an incredible rate. Eventually, this reached a bubble and the market leveled out. Although the initial bubble burst and leveled the market, the internet has since remained a hugely profitable tool for business owners. Within the bounds of the internet, innovative means of accessing audiences and of driving business are being created on a regular basis. Early Days of the Internet The early days were pretty basic, and those days had a greater effect on internal rather than external business processes. Dial-up internet speeds were excessively slow, and businesses focused on email and the ability to send and receive documents and spreadsheets online. The early internet was disorganized until major search engines started building algorithms and platforms to deliver information. The battle against spam and dark websites was prevalent, until these algorithms matured and learned to filter and deliver the highest value of content. That said, businesses could send and receive emails and documents instantly without requiring physical mailing services. Overall, this increased the speed at which business could be accomplished. A business could also create a basic website to let the world know that this business existed. The major benefit of driving traffic to a business without requiring a physical location still exists today. High-Speed Revolution High-speed internet added several value points for businesses. The ability to publish and play music, and play video added a new element to online advertising. This also increased the capabilities of a company website. Suddenly, a real estate agent had the bandwidth to load and deliver virtual tours; an artist could load large graphic files, and larger media files could transmit between users. A sales rep could create intensive digital presentations and deliver them online, an amateur makeup artist could build a following on YouTube, and a land surveyor could print detailed satellite imagery from Google Earth to make his job more efficient. Eventually, more businesses and users would engage with the high-speed internet model. This started with DSL, which were digital subscriber lines for high-speed access over a phone line, which enabled speeds to increase, and then speeds increased again with fiberoptic cable lines. Mobile Internet Access Mobile internet added another internet element and business benefit. Business users can access potential customers from the mobile devices they have on their person nearly 24/7. Mobile integration with local business listings and map services empowers location-based business models. The business can use these features to drive customers right to the business owner's doorstep. This is especially useful when businesses do not have real estate on a busy corner. They can still access
  • 7. LEARNING MODULE 2 ICT GROUP 1 the audience, make their location easy to find, and can also garner positive reviews through a high level of performance. Access to Information The ability to access information quickly and easily is a major benefit for businesses. The internet has just about every fact and piece of information immediately available that a business could need. Are you forming an LLC, a corporation or a new business? Do a general search and you will find whatever information, paperwork and services you need. You will even find services that will file the paperwork on your behalf. You can access extensive legal libraries via internet-based services, which enables you to research competitors, locate contact information about potential business partners and gain access to critical information, in a matter of mere seconds. Although some low-quality sources of information do exist online, but savvy business people quickly see the difference between credible and non-credible websites, and between credible and non-credible sources of online information. Internal Communication The internet improves internal communications through email, connected calendars and chat services specifically designed to improve business communications. Programs such as Slack, Asana and Basecamp connect employees, help organize tasks and deliver instant messages efficiently. The ability to communicate quickly and to collaborate on documents and projects under a single program renders the internet extremely valuable. This ability creates efficiencies and quickly drives business forward. This ability also holds individuals accountable for their time and effort, while also contributing to the connected group environment. Globalizing Physical Products and the Supply Chain Traditionally, the supply chain required visiting factories, sourcing products and running through a detailed process to create and brand a product. The internet has changed that process significantly. Today, a business can source multiple manufacturers of specific materials or products from around the world while also negotiating prices, quantities and delivery options without ever leaving home base. If a product is unique, some of the traditional elements of sourcing materials and moving to the production sample phase may still apply, but even in this scenario, the internet makes it easier to communicate by translating languages and delivering messages back and forth, with little effort. Marketing and Audience Effects One of the biggest advantages created by the internet is the ability to access and market to large audiences. Content marketing is essentially free, and businesses can create content that their audience desires, as a means of driving qualified traffic to the business. Search traffic is a powerful method of introducing a business to an audience. If a business does not want to spend the manual
  • 8. LEARNING MODULE 2 ICT GROUP 1 hours chasing down organic search traffic, they can purchase top locations in the search results, and essentially buy segments of that specific audience. The audience is using specific search terms relevant to the business, so that the traffic is extremely qualified. The rate is typically built on bidding platforms with more competitive keywords garnering higher values. Additionally, a business can purchase banner advertisements through high traffic websites, purchase viewers on social media platforms and utilize influencers and public relation tactics to drive website traffic. Benefits of Social Media The benefits of social media for businesses are extensive. Some businesses actually build their entire customer base through social media channels. Social platforms are often centered around followers. Once you have a loyal base of followers, the business can really work hard to keep that group engaged while introducing new products and services. Having this audience immediately accessible is a huge benefit that was not possible before the internet existed. Building a social media following is also possible without any capital. Putting in the effort to create and share great content relative to your business and market can garner a following and increase your customer base. Additionally, social platforms often offer advertising solutions with very specific audience targeting abilities. You can advertise to a specific age range, geographic location and against the things people like and already engage with online. Facebook for example, lets you choose pages the audience already likes to create a profile of your typical customer. This puts your business in front of the most relevant and likely group of potential customers. The data and insights gained from performance in these paid campaigns also tells the business how different product and service concepts can perform. The ability to test concepts while knowing your advertisement is reaching the correct audience is a powerful tool for business. Testing before investing full bore on a product that may fail can save lost time and capital Review Sites The internet is loaded with review websites and review options on business listings. These reviews have a major impact on business as consumers’ research and filter through positive and negative reviews before making purchase decisions. This works to the advantage of a business with great reviews and often to the disadvantage of a business with negative reviews. The review ratings typically have the option for a business owner to respond and it reflects on their ability to engage and communicate with the customer. Business Automation Automation is a major internet driven trend in the business world. The ability to automate tasks that traditionally required a workforce ultimately saves businesses money and makes their operations simpler and more efficient. Everything from basic accounting practices to customer service has some automation abilities depending on the business model and requirements.
  • 9. LEARNING MODULE 2 ICT GROUP 1 A small business can automate receipt tracking and basic accounting through software services that connect to accounts and track and classify spending and income. At tax time, everything is already accounted for and ready to connect to filings for the IRS. Customer service automation is possible through chat bots with pre-written messages and auto-responders answer emails and specific questions with common answers. Even marketing campaigns are built with some automation that save time in the long run. A business can build campaigns with spending thresholds, specific dates and times to serve the ads and performance thresholds that will trigger more or less budget allocation based on audience response. When done manually, this requires a dedicated employee to monitor the campaign. Entire dashboard software systems exist to utilize the power of the internet while combining paid and organic marketing data and operations under a single source where tasks and triggers can work under and automated or semi-automated setting. You can write 10 email marketing campaigns and set them to deliver on specific dates and times. This can happen in conjunction with a preplanned Facebook ad spend that triggers around the same content at the same time. Or even a campaign that re-targets the social advertising click-through on display ads, wherever the user travels in the internet ecosystem. This means, the consumer shows some initial interest, but then is driven to view the business offering on other websites. Essentially, it follows them in increasing the brand reach to an interested audience that is more willing to engage and buy. Automation through the internet has major reach, and affects everything down to the manufacturer level. A manufacturer using robotics to make specific items can connect to machines via the internet, and it can use programs and apps to monitor and control the production abilities on its machines. Importance of Email in Business According to Entrepreneur magazine, every business should evaluate available technology and determine if there are benefits to using it. Email has helped to create instant global communication and has opened up the capacity for businesses to send and receive messages. Whether you do business in your community or around the world, advantages to using email are plenty. Saves Money Email allows your company to reach customers, vendors and business partners all over the world without spending money on postage. You can send a simple message or send a customer invoice without having to pay to print the invoice, pay for an envelope to send it, or pay anyone in your mail room to put the mailing together. Saves Time
  • 10. LEARNING MODULE 2 ICT GROUP 1 Email can help you reach anyone, anywhere in the world, instantly. A fax can get stopped by a busy phone line, a phone call may go to voice mail and a letter sent by standard mail will take days to reach its destination. Many business people spend their time in front of their computer, or make time to access their email several times a day. Email encryption allows you to send email messages safely to any recipient. A piece of standard mail can be intercepted, or lost, and opened by someone who is not the recipient. As long as you have confirmed the email address you are using, your email message will arrive safely to your intended recipient. Helps Filing Businesses receive pieces of standard mail every day. Over time, trying to find a place to file all of those papers can take up office space, create a fire hazard and take up a lot of time. Digitally filing email messages can make filing important information easier, safer and less expensive. Be certain to do a backup of your information weekly to avoid losing your messages if something were to happen to your network or computer. Provides Convenience Business owners, managers and employees are busy people. There is not always time to take phone calls or read pieces of standard mail. An email message will sit and wait until you have the time to read it. If the message is important, then the sender can mark it urgent to catch your attention. Email can easily fit around your business schedule and still get you important information. Email is a way to get important information to a business associate quickly. Lesson 2: Difficulties of Using New Technology Cybercrimes are those committed via computer networks for such purposes as fraud, identity theft, and the hacking of sensitive information. Forced Entry The creation and widespread use of new technology brings along with it many benefits. However, new and previously unaccounted-for dangers arise as well. Cybercrime is one such danger. It is defined as offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim, directly or indirectly, using modern telecommunication networks such as the Internet (chat rooms, emails, notice boards, etc.) and mobile phones (SMS/MMS). Such crimes may threaten a nation’s or individual’s security and financial health. Issues surrounding this type of crime have
  • 11. LEARNING MODULE 2 ICT GROUP 1 become high-profile, particularly those surrounding hacking, copyright infringement, and child abduction. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Computer crime encompasses a broad range of activities. Generally, however, it may be divided into two categories: crimes that target computers directly, and crimes facilitated by computer networks or devices, the primary target of which is independent of the network or device. Crimes that primarily target computer networks or devices include computer viruses, denial-of- service attacks, and malware. Crimes that use computer networks or devices to advance other ends include cyberstalking, fraud and identity theft, information warfare, and phishing scams. Computer Fraud Computer fraud is any dishonest misrepresentation of fact intended to get another to do or refrain from doing something which causes loss. In this context, the fraud will result in obtaining a benefit by one of a number of means:  Altering computer input in an unauthorized way. This requires little technical expertise and is not an uncommon form of theft by employees. Altering data before entry or entering false data, or entering unauthorized instructions or using unauthorized processes are the most common examples.  Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions. This is difficult to detect.  Altering or deleting stored data.  Altering or misusing existing system tools or software packages, or altering or writing code for fraudulent purposes. Other forms of fraud may be facilitated using computer systems, including bank fraud, identity theft, extortion, and theft of classified information. Identity Theft Identity theft is a form of stealing a person’s identity in which someone pretends to be someone else, typically in order to access resources or obtain credit and other benefits in that person’s name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if he or she is held accountable for the perpetrator’s actions. Identity theft occurs when someone uses another’s personally identifying information, like name, Social Security number, or credit card number, without permission, to commit fraud or other crimes. Identity fraud is often but not necessarily the consequence of identity theft. Someone can steal or misappropriate personal information without then committing identity theft using the stolen information; this can happen when a major data breach occurs and the information of a large number of people is compromised.
  • 12. LEARNING MODULE 2 ICT GROUP 1 Documented Cases of Cybercrime One of the highest profiled banking computer crimes occurred during a course of three years, beginning in 1970. The chief teller at the Park Avenue branch of New York’s Union Dime Savings Bank embezzled over $1.5 million from hundreds of accounts. In 1983, a nineteen-year-old UCLA student used his PC to break into a Defense Department international communications system. Between 1995 and 1998, the Newscorp satellite pay-to-view encrypted SKY-TV service was hacked several times during an ongoing technological arms race between a panEuropean hacking group and Newscorp. The original motivation of the hackers was to watch Star Trek re-runs in Germany, which was something Newscorp did not have the copyright to allow. In February 2000, an individual under the alias of Mafia Boy began a series denial-ofservice attacks against high profile websites, including Yahoo!, Amazon.com, Dell, E*TRADE, eBay, and CNN. About 50 computers at Stanford University, as well as computers at the University of California at Santa Barbara, were among the zombie computers sending pings in DDoS attacks. On August 3, 2000, Canadian federal prosecutors charged Mafia Boy with 54 counts of illegal access to computers, plus a total of 10 counts of mischief to data for his attacks. On March 2, 2010, Spanish investigators arrested three individuals for the infection of over 13 million computers around the world. The “botnet” of infected computers included PCs inside more than half of the Fortune 1,000 companies and more than 40 major banks, according to investigators. In August 2010, the international investigation Operation Delego, operating under the aegis of the Department of Homeland Security, shut down the international pedophile ring Dreamboard. The website had approximately 600 members and may have distributed up to 123 terabytes of child pornography (roughly equivalent to 16,000 DVDs). To date, this is the single largest U.S. prosecution of an international child pornography ring; 52 arrests were made worldwide. Malware Malware, short for malicious (or malevolent) software, is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Malware is a general term used to refer to a variety of forms of hostile or intrusive software. Malware includes computer viruses, worms, spyware, adware, and trojan horses. Malware is not the same as defective software, which is software that has a legitimate purpose but contains harmful bugs that were not corrected before release. However, some malware is disguised as genuine software, and may come from an official company website. An example of this is software used for harmless purposes that is packed with additional tracking software that gathers marketing statistics. Malware has caused the rise in use of protective software types such as anti-virus, anti-malware,
  • 13. LEARNING MODULE 2 ICT GROUP 1 and firewalls. Each of these are commonly used by personal users and corporate networks to stop the unauthorized access by other computer users, as well as the automated spread of malicious scripts and software. The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any specific types of behavior. The term computer virus is used for a program that has infected some executable software and, when run, causes the virus to spread to other executables. On the other hand, a worm is a program that actively transmits itself over a network to infect other computers. These definitions lead to the observation that a virus requires user intervention to spread, whereas a worm spreads itself automatically. Purposes Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general. However, malware is often used against individuals to gain personal information such as social security numbers, bank or credit card numbers, and so on. Left unguarded, personal and networked computers can be at considerable risk against these threats. Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users’ computers for black-market exploitation. Infected “zombie computers” are used to send email spam, to host contraband data such as pornography, or to engage in distributed denial-ofservice attacks as a form of extortion. Another strictly for-profit category of malware has emerged, called spyware. These programs are designed to monitor users’ web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues to the spyware creator. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be packaged together with user-installed software, such as peer-to-peer applications. The prevalence of malware as a vehicle for Internet crime, along with the challenge of anti- malware software to keep up with the continuous stream of new malware, has seen the adoption of a new mindset for individuals and businesses using the Internet. With the amount of malware currently being distributed, some percentage of computers will always be infected. For businesses, especially those that sell mainly over the Internet, this means that they need to find a way to operate despite security concerns. The result is a greater emphasis on backoffice protection designed to protect against advanced malware operating on customers’ computers. Concealment For a malicious program to accomplish its goals, it must be able to run without being detected, shut down, or deleted. When a malicious program is disguised as something normal or desirable, users may willfully install it without realizing it. This is the technique of the Trojan horse or trojan. In broad terms, a Trojan horse is any program that invites the user to run it, though it conceals harmful
  • 14. LEARNING MODULE 2 ICT GROUP 1 or malicious code. The code may take effect immediately and can lead to many undesirable effects, such as deleting the user’s files or installing additional harmful software. One of the most common ways that spyware is distributed is as a Trojan horse, bundled with a piece of desirable software that the user downloads from the Internet. When the user installs the software, the spyware is installed along with it. Spyware authors who attempt to act in a legal fashion may include an end-user license agreement that states the behavior of the spyware in loose terms, which users may not read or understand. Lesson 3: Netiquettes Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite behavior in society, netiquette is a code of good behavior on the Internet. This includes several aspects of the Internet, such as email, social media, online chat, web forums, website comments, multiplayer gaming, and other types of online communication. While there is no official list of netiquette rules or guidelines, the general idea is to respect others online. Below are ten examples of rules to follow for good netiquette: 1. Avoid posting inflammatory or offensive comments online (aka flaming). 2. Respect others' privacy by not sharing personal information, photos, or videos that another person may not want published online. 3. Never spam others by sending large amounts of unsolicited email. 4. Show good sportsmanship when playing online games, whether you win or lose. 5. Don't troll people in web forums or website comments by repeatedly nagging or annoying them. 6. Stick to the topic when posting in online forums or when commenting on photos or videos, such as YouTube or Facebook comments. 7. Don't swear or use offensive language. 8. Avoid replying to negative comments with more negative comments. Instead, break the cycle with a positive post. 9. If someone asks a question and you know the answer, offer to help. 10. Thank others who help you online. The Internet provides a sense of anonymity since you often do not see or hear the people with whom you are communicating online. But that is not an excuse for having poor manners or posting incendiary comments. While some users may feel like they can hide behind their keyboard or smartphone when posting online, the fact is they are still the ones publishing the content. Remember – if you post offensive remarks online and the veil of anonymity is lifted, you will have to answer for the comments you made.
  • 15. LEARNING MODULE 2 ICT GROUP 1 In summary, good netiquette benefits both you and others on the Internet. Posting a positive comment rather than a negative one just might make someone's day. Lesson 4: Safety Use of Computer Hackers and cyber-attacks are a constant source of concern when it comes to keeping the data stored on your computer safe. You know how to protect yourself from viruses and ransomware, and how to follow internet safety tips, but what about protecting the computer itself? With small computers and lots stored on the cloud, it's easy to have either your machine or your data stolen, so make sure you take the following precautions. 1. Keep It Locked Although this might seem obvious, many people think since they live in a safe town, things like stolen computers don't happen - until they do. If a thief has trouble getting into your house, they may move on to an easier target with unlocked doors. Stolen computers can also result from an argument with a family member, friend, or roommate, so locking the door of the room where you store the computer when not in use could prevent unexpected loss from a formerly trusted acquaintance.  A physical lock can be a great deterrent to a thief who just wants to grab your laptop and run or doesn't want to take the time to try to break a lock. Cable locks usually consist of a metal cable with a loop that attaches to an anchor point (something hard to move like a desk, wall, or floor) and then to a loop on the computer. It works much like a bike lock to secure the computer to something solid. Some products contain an adhesive anchor, which may not be as strong as a built-in anchor point but may still deter a thief in a hurry.  You can also attach a lockdown plate to your computer with bolts and then to something solid, such as a heavy desk. Lockdown plates may also include a lock with a key you must use to remove the plate. It is very difficult to take a computer that is bolted down with a lockdown plate.  Locking enclosures are another option that come in many sizes and can secure anything from a small PC tower up to a full system that consists of a tower, monitor, keyboard, mouse, and printer. You can use an enclosure with both a cable and lockdown plate in case someone takes the entire thing to try and open it later. 2. Always Use a Password Never let your computer remember passwords or supply one for you. Type in your password every time you log on to your computer so if someone takes your computer, they will not have unblocked access. Don't write down your passwords and keep them near the computer and don't leave your password blank; it is like leaving a key to the house hanging on the locked doorknob. You can also enable a password on your screen saver to provide double protection.
  • 16. LEARNING MODULE 2 ICT GROUP 1  Create a Secure Password - Make it difficult for a thief to discover your password by being creative.  Figure out something you will easily remember but that doesn't contain obvious words or dates, such as family or pet names and birthdays or addresses.  Make sure it is at least eight characters or longer and uses a combination of upper and lowercase letters, numbers, and special characters (for example, @#$%). 3. Use a Self-Contained Alarm A self-contained alarm attaches to a computer with adhesive and to a cord or cable. If someone tries to take the cable off while the alarm is armed, it sounds a loud alert to everyone in the vicinity. Some alarms sound for hours and can only be stopped with a special code. Thieves don't like to call attention to themselves, so they may generally avoid alarms or ditch the computer if it starts making a loud noise. 4. Engage a Fingerprint Lock A fingerprint lock plugs into a USB port on your computer, and you place your finger on it to gain access. You can authorize multiple fingerprints (useful for family computers) and configure some fingerprint locks to provide passwords for your different online accounts as well. 5. Use Laptop Tracking Many laptops can send a signal through Wi-Fi so you can track it if it goes missing. You can also purchase software or apps that alert authorities when your computer has been stolen. This may not work as well with a desktop, which stops sending Wi-Fi signals when unplugged. 6. Set Up Firewalls If you connect to the internet, you should always run a firewall. A firewall can block outside communication if you haven't authorized it and even stop data from entering or leaving the computer without your permission. There are both hardware and software firewalls, and you can run both at the same time. Software firewalls often come as part of an operating system. For example, Windows includes one, and you should always have it on unless you decide to get your own. As with any software, you can shop around for a commercial firewall that is configured with the features that are most important to you. You can buy a hardware firewall as a stand-alone product, or they are also often included in broadband routers. A router is good to have as another layer of protection; your computer can sit behind it and make it even harder for hackers to get to it. Ensure you use a high-quality firewall and configure it properly by changing all default passwords.
  • 17. LEARNING MODULE 2 ICT GROUP 1 7. Use Screen Guards A screen guard lets you view your screen normally while making the screen appear blank from side angles. This is especially useful when working with sensitive information in public places, open office workplaces, and while traveling, so onlookers cannot read what is on your screen. 8. Make Backups Backups may not sound like a way to keep your computer safe, but if something damages the computer or you have a security problem, you can quickly recover if you have a recent backup of all your data. Hard drives die, computers are stolen, accounts are compromised but if you have a backup, you can at least get all of your data back. Back up consistently and often so if you have a problem, your backup isn't out of date, and you won't lose months’ worth of data. There are many ways to perform a backup, such as both hardware (USB drives and external hard drives) and software (archiving and cloud). Keep backed up data in a secure location. 9. Carefully Set Account Privileges Even though you may be the only one who uses your computer, don't continually log on using administrator rights. Use these rights only when you need to perform specific administrative tasks, such as maintenance. If you always run your computer in administrator mode, it may make it susceptible to security risks. 10. Encrypt Your Sensitive Files Encryption scrambles the contents of files so only the person with the correct encryption key can decode it. If someone does manage to access your computer and the files are not encrypted, they can easily be read. Some USB drives automatically encrypt files during backups, and there are many encryption services and software available. 11. Shut It Down Shut down your computer when you leave it unattended. A lot of people continually leave their computer on and remain logged in at all times. By turning the computer completely off, it cuts the internet connection, which may stop spyware and anything that uses your computer's resources to contact other users. 12. Be Careful Around Kids More and more kids start using computers at earlier ages. Teach children not to use any toys with magnets around the computer. You may not think it will happen to you until your hard drive is wiped because of magnets that became attached to the back of the computer.
  • 18. LEARNING MODULE 2 ICT GROUP 1 13. Use Caution with Food and Drink Teach both children and adults not to eat or drink around the computer and to keep it clean. Liquids and crumbs can damage the keyboard and other hardware. 14. Be Discreet in Public If you must leave your laptop in a car, lock it in your trunk out of sight before you reach your destination. Try not to set a computer bag on the floor because it is easy to forget but if there is nowhere else to store it, place it between your feet where you can feel where it is at all times. Use nondescript bags or briefcases that do not show if there is a laptop inside. 15. Keep Software up to Date Anti-virus software was created to prevent viruses and malware from entering your computer system and to detect and remove them from systems that have already been infected. Always keep any type of software, especially virus protection, up to date. Ransomware and viruses are constantly changing the way in which they enter and attack your data, so software updates are continually released to protect against the latest type of threat. Patches, updates, and even upgrades are made to fix software and protect against new vulnerabilities, so make sure to install the latest to best protect your data. Anti-virus software is often included when you purchase your computer and there are many reliable brands, such as Norton and Avast.