SlideShare a Scribd company logo
1 of 186
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• About Me
• Contact Info
• Open Syllabus and Schedule from eCampus
• Netiquette
• Important Dates
• How to Succeed in IT 100 Without Really Trying
• Navigating eCampus
• Navigating MyITLab
• Homework
• Monmouth University Adjunct Professor
• High School Business and Computer Teacher
• Current EdD Student [Curriculum and Instruction
with focuses in Instructional Technology and
Distance Learning]
• Entrepreneur [run 4 businesses and a non-profit]
• Ambassador [Edmodo and SimpleK12]
• Financial Blogger [The Street, Seeking Alpha, and
Nasdaq]
• E-mail: mamarino@Monmouth.edu
• E-mail is the best way to get in touch with me.
• I try to respond within 24 hours.
• In case of EMERGENCY call me at 848-333-8637
• OFFICE HOURS:
Where? Howard Hall Room 223
When? To Be Determined
• Class Meeting Time
• Required Course Materials
• Learning Objectives
• Grading Scale
• Attendance
• Academic Honesty
• MyITLab
• Helpful Info
• Please come to class on time
• Be Prepared [Course Schedule Defines
Everything]
• Be Ready to Start as soon as our course time
starts
Exams
40%
Final Exam
10%
Assignme
nts
50%
Grade Breakdown
Exams
Final Exam
Assignments
Symbol Start %
A 93
A- 90
B+ 87
B 83
B- 80
C+ 77
C 73
C- 70
D+ 67
D 63
D- 60
F 0
• Course Attendance Policy:
– Final grade will be reduced by 3 points for 3 absences
– Final grade will be reduced by 1 point for each additional
absence
– This means if you’re absent once or twice there is no penalty
– If you need to be absent obtain documentation to have absence
excused
• My Attendance Policy:
– If I am absent for any reason everyone will receive 1 point
towards their final grade for each of my absences
– In the event someone fills in for me students will need to be
present to receive that credit
• Statement on Academic Honesty on Syllabus
• Consequences of Academic Dishonesty
– You will receive an F for the course
– Further disciplinary action may occur; including
dismissal from the university
– Lowers GPA
– Financial cost to retake course
– Potential loss of scholarships
– Potential loss in eligibility for extracurricular activities
– Need to repeat course for credit
• Help Desk
• IT Lab Assistants
• IT Tutors and Tutoring Lab
• Other Campus Computer Access
• Defines Topics to be covered in class
• Defines all HW Assignments and Due Dates
• Defines PPT Presentation Dates [subject to
change]
• Netiquette is the term used to describe the rules of etiquette
that apply to electronic communications. It is important to
use good netiquette when communicating with me and with
your classmates, so I ask that you abide by the rules of
netiquette in all aspects of this course. These rules are
basically common sense things, but I feel they are important
enough to reiterate here.
• The rules of netiquette you will be expected to follow in this course
are as follows:
• Be clear.
– Use Standard English and do not abbreviate.
– Spell check, revise and edit your messages before sending them.
– Use appropriate subject lines that reflect the content of the message.
• Be polite and careful.
– Do not use ALL UPPERCASE LETTERS!!! or multiple exclamation marks,
as it is sometimes difficult to understand the tone of the message.
– Typing in all capital letters is synonymous to yelling at someone.
– Avoid sarcasm and irony, which can be misinterpreted by the reader.
– Refrain from using inappropriate or offensive language.
– Remember you are not talking to a machine; there is a person on the
other end of your message.
• Demonstrate respect for the opinions of others
when responding to your classmates.
• Remember that you are communicating within a
classroom and behave accordingly.
• Be forgiving of other people's mistakes.
• Always remain calm, even if you believe someone
has insulted you.
• Disagree respectfully and with facts, not gossip.
• Apply the golden rule -- treat others the way you
would like to be treated.
• Late Registration/Add-Drop Period: 1/17 to 1/24
• Spring Break: 3/11 to 3/17
• Withdrawal Deadline: 3/20
• Any additional important dates will be
announced at the start of class
• Be on time to class/Be in class: Being in class will
help you do well on assignments and exams
• “Alright Young Scholars” means class is starting
• Submit all assignments on time
• Study all review materials prior to exams
• Work smart
• Each unit will have its own folder: Word,
Computer Concepts, Access and PowerPoint,
Computer Security, and Excel
• Agendas for class; such as this one, will all be
put into one folder
• MyITLab will feature most of your assignments
for this course [there are other small assignments
on eCampus]
• MyITLab will house all five unit exams and the
final exam
• MyITLab features a digital copy of the course
textbook and Technology in Action for easy usage
• Purchase required course materials if you
haven’t already done so
• Complete About Me Discussion Thread
[Instructions in eCampus]
• Complete Plagiarism Tutorial
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Discuss Homework Due Tonight
• Discuss Homework Due Sunday
• Word Ch 1 Concepts
• Word Ch 1 Grader Project
• Word Ch 3 Concepts
• Word Ch 3 Grader Project
• Welcome Discussion [eCampus]
• Plagiarism Tutorial [eCampus]
• Windows 10 Simulation [MyITLab]
• All due at 9PM tonight
• Word Ch 3 Classwork [eCampus]
• Type Letter Text
• Apply Styles and Set
Grammar and Spelling
Options
• Select and Insert Text
• Copy, Cut, and Paste
Text
• Check Spelling and
Grammar
• Insert Synonyms
• Use Format Painter
• Apply Advanced Font
Settings
• Create Document
Footers
• Save Documents as
PDF Files
• Open “Land” on MyITLab
• Download files
• Complete steps
• Submit file
• Modify as necessary to receive a 100
• Insert Text and
Pictures From Files
• Resize and Align
Pictures
• Apply Pictures Styles
and Artistic Effects
• Set Tab Stops
• Type Tabbed Lists
• Apply Table Styles
• Create Tables
• Delete and Add Table
Rows and Columns
• Format Text in Table
Cells
• Format Tables
• Open “Festival” on MyITLab
• Download files
• Complete steps
• Submit file
• Modify as necessary to receive a 100
• About Me Discussion Thread and Plagiarism
Tutorial [eCampus] due at 9PM
• Windows 10 Simulation [MyITLab] due at 9PM
• Word Ch 3 Classwork [eCampus] due Sunday
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Introduce Research Paper
• Word Integrated Project 1
• Word Exam Review
• Word Ch 1 Simulation
• Word Ch 3 Simulation
• Rubric
• Thesis Topic
• Think about your topic
• Folder on eCampus
• Download file
• Edit file based on Steps 1-27
– Step 11 – if done right all paragraphs will be
indented
– Step 13 – glossed over in video
• Download attached Word file to dropbox and
watch screencast
• Review on MyITLab is
the same 18 questions
from the Ch 1 and Ch
3 Simulations
• Completing the
Review gives you the
best chance to ace the
Exam
• Exam on February 6th
is 17 of those 18
questions
• 3.01 is on the Review,
but not on the Exam
• Open on MyITLab
• If you are unsure use the aids: video or
practice
• Unlimited attempts to get a 100
• Open on MyITLab
• If you are unsure use the aids: video or
practice
• Unlimited attempts to get a 100
• Check eCampus for Wednesday’s online lesson
[video and PPT] discussing conducting
research
• Complete all Word assignments due on
February 6th: Integrated Project 1, Ch 1
Simulation, Ch 3 Simulation, Ch 1 Grader
Project, and Ch 3 Grader Project
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Research Paper Example
• Discuss Research Paper Rough Draft
• Introduce Computer Purchase Assignment
• Computer Concepts Discussion
• Show Research Paper Example to demonstrate
concepts
• Point to location on eCampus
Storage
Output
Process
Input
– Input: Gathers data, allows
entering data
– Process: Manipulates,
calculates, or organizes data
– Output: Displays data and
information
– Storage: Saves data and
information
• Bit: Binary digit 0 or 1
• Byte: Unique combinations of 8 bits of
0s and 1s
• Kilobytes, megabytes, gigabytes,
terabytes, and petabytes
• Computers use binary language
consisting of 0s and 1s.
• Which of the following is the smallest
unit of measure? Megabyte
• Mainframe: Many users
simultaneously
• Supercomputer: Complex
calculations
• Embedded: Self-contained
– Examples: electronic
thermostat, drone
• Embedded computers are
specially designed computer
chips that reside inside other
devices such as a car.
• Which of the following
computers is large, expensive
and supports many
simultaneous users and
manages large amounts of
data? Mainframe computer
• An Apple iPad and a Microsoft
Surface are examples of Tablet
computers.
• Enter data and instructions
• Examples
– Keyboard
– Mouse
– Microphone
– Scanner
– Digital camera
– Stylus
• A(n) Stylus is an input device
that looks like a pen.
• A keyboard and mouse are
examples of input devices.
• Send data out of the computer
in the form of:
– Text
– Pictures
– Sounds
– Video
• Examples
– Monitors
– Printers
– Speakers and earphones
• Monitors: Liquid crystal display
(LCD), Light-emitting diode (LED),
Organic light-emitting diode
(OLED)
• The most common type of
monitor is a(n) liquid crystal
display (LCD).
• The number of pixels displayed on
the screen is known as screen
resolution.
• Inkjet: Affordable, High-
quality color, Quick and
quiet
• Laser: Faster printing
speed, Higher-quality
printouts, More
expensive
• All-in-one printer: Printer,
scanner, copier, and fax
• Plotter: Prints oversize
images
• Thermal printer
• Thermal printers either melt a
wax based ink on regular paper
or by burning dots on specially
coated paper.
• Laser printers are usually faster
at printing in black and white
than inkjet printers. True
• Speaker
– Output device for sound
– Surround-sound speakers
– Wireless speaker system
• Headphones or earbuds
– Keep from distracting others
• Most computers include inexpensive speakers. These
speakers are sufficient to play audio clips from the
Web and enable you to participate in
videoconferencing or phone calls made over the
Internet.
• A surround-sound speaker is a system of speakers
and audio processing that envelops the listener in a
360-degree field of sound.
• Wireless speaker systems are available to help you
avoid cluttering up your rooms with speaker wires.
• Headphones or earbuds plug into the same jack to
which speakers connect. Hearing might be damaged
by excessive volume when using earbuds.
• Motherboard: CPU,
ROM, RAM, and cache,
Slots for expansion
cards, Sound/Video
cards, Network
interface card (NIC)
• The motherboard is located inside the system
unit and contains the central electronic
components of the computer, including the
computer's processor (CPU), and many circuit
boards that help the computer to function.
•A network interface card (NIC)
enables your computer to connect
to other computers or to the
Internet.
•The motherboard contains the
central electronic components of
the computer.
Stores instructions and data
Series of several memory cards
or modules
Temporary (volatile) storage
• RAM is the abbreviation for the
place in the computer where
the programs and data the
computer is currently using are
temporarily stored.
• RAM is a volatile storage
location.
Stores startup instructions
Permanent (nonvolatile)
storage
• The area that holds all the
startup instructions the
computer needs to start is the
ROM.
• Apple's OS X and Microsoft
Windows are examples of
operating system software.
CPU or processor
“Brains” of the computer
Controls all functions of the
computer’s components
Processes all commands and
instructions
Billions of tasks per second
• CPU Performance
Measures: Processor
speed measured in
hertz (Hz), Megahertz
(MHz) or gigahertz
(GHz)
– Number of cores: Single, Dual,
Quad, Ten
• Today's CPUs run at speeds
measured in kilohertz. False
• A(n) dual-core CPU has two
processing paths, allowing it to
process more than one
instruction at a time.
• Primary device for permanent
storage
• Nonvolatile storage devices
• Internal drive is for permanent
storage
• External hard drive
• Solid-state Drive (SSD)
• All of the following are
names for a flash drive
EXCEPT hard drive.
• External hard drives
• Flash Storage
• Compact discs (CDs)
• Digital video discs (DVDs)
– Store more data than CDs
• Blu-ray discs (BDs)
• Which of the following
optical storage media has
the greatest storage
capacity? BD
• Flash drives plug into a(n)
USB port.
• Universal serial bus (USB)
• New USB 3.1 standard port: Transfer speeds of 10 Gbps
• FireWire 800: Transfer speeds up to 800 Mbps
• Thunderbolt: Transfer speeds up to 20 Gbps
• Connectivity port
– Access to networks and the Internet
• Ethernet port
• Audio ports
– Connect headphones, microphones, speakers
• Video ports
– Connect monitors and multimedia devices
– HDMI
• Which port is the most common
port used to connect input and
output devices? Universal serial
bus (USB)
• A(n) port is where a peripheral
device can attach to a computer
so that data can be exchanged
between it and the operating
system.
Position your monitor correctly.
Purchase an adjustable chair.
Assume a proper position while
typing.
Take breaks from computer
tasks.
Ensure that the lighting is
adequate.
• Ergonomics is concerned
with the design and
arrangement of machines
and furniture to avoid
uncomfortable or unsafe
experiences.
• How do you use your computer? Assess needs
• What software do you run? Total your needed space
• Choose 3 computers that meet your requirements
• Find specs of each computer
• Which of the 3 computers did you choose and why?
• 25 Questions
• On MyITLab
• The Blue Text in this PPT are the questions and
answers. The answers are in boldface.
• Study those statements.
• Computer Purchase Assignment
• Work on Research Paper
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Research Paper Rough Draft
• Reminder on Computer Purchase Assignment
• Computer Concepts Review
• The Great Debate
• Dropbox by end of class on February 15th
• Hard copy printed and handed in by end of
class on February 15th
• Rough Drafts scored either 0, 25, or 50 based
on completion of rubric tasks
• These points are extra credit towards the final
submission
• How do you use your computer? Assess needs
• What software do you run? Total your needed space
• Choose 3 computers that meet your requirements
• Find specs of each computer
• Which of the 3 computers did you choose and why?
– Due Wednesday
• Input, Process, Output Storage
• Bits & Bytes [the pizza] – Binary
• Types of computers – mainframe, supercomputer,
embedded, tablets
• Input & Output devices
• Processing, Memory, & Storage
• RAM vs. ROM
• Parts of the computer [internal & external]
• Ergonomics
• Each row will be assigned a part of the
computer
• Each row will work together to create a “sales
pitch” to convince me their part of the
computer is most important
• You can use my notes and any internet
research for your argument
• Elect a speaker to give the “sales pitch”
• Row 1 – Motherboard
• Row 2 – Input Devices [keyboard, etc.]
• Row 3 – Output Devices [printer, etc.]
• Row 4 – CPU/Processor
• Spend twenty minutes putting together your
argument
• Your argument should be explaining why your
part of the computer is better than the other
three
• Speakers will be called up one at a time
• 10 extra credit points on the Computer
Concepts exam to the team with the most
convincing argument
• 25 Questions
• On MyITLab
• The Blue Text in this PPT are the questions and
answers. The answers are in boldface.
• Study those statements.
– On Wednesday
• Computer Purchase Assignment
• Work on Research Paper
• Study for exam
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Wednesday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Hand in Research Paper Rough Draft
• Computer Concepts Exam
• PPT 1 Simulation and Grader Project
• PPT 4 Simulation
• Open, View, and Save Presentations
• Edit and Replace Text
• Format Slide Text
• Check Spelling and Use the Thesaurus
• Insert Slides and Modify Slide Layouts
• Insert and Format Pictures
• Organize Slides in Slide Sorter View
• Apply Slide Transitions and View Slide Shows
• Insert Headers and Footers and Print Handouts
• Add Notes Pages and Use Presenter View
• Insert Tables
• Modify Table Layouts
• Apply Table Styles
• Apply Animation Effects and Change Duration
• Modify Animation Timing and Use Animation
Painter
• Delay or Remove Animation
• Navigate Slide Shows
• Finish PPT 1 Simulation
• Finish PPT 4 Simulation
• Finish PPT 1 Grader Project
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Discuss Effective PPT Presentations
• Give out PPT Rubric and Presentation Rubric
• Access 1 Grader Project
• Access 1 Simulation
• One theme per slide
• Rehearse
• Know your purpose and audience
• Exhibit your Passion
• Build on your content
• Know Your Topic to a Strong Degree
• Keep eye contact
• Use facts
• Use readable font
• Don’t read from your slides
• Think about questions you may be asked
ahead of time
• Use research paper to create PPT
• Follow rubric in creating PPT
• 10 minute presentation of PPT later in the
semester
• Be prepared based on presentation rubric
• Create Databases
• Create Tables in Datasheet View
• Enter Data into Datasheets
• Create Tables in Design View
• Relate Tables
• Enter Data in Related Tables
• Import Data into Tables
• Filter and Sort Datasheets
• Format Datasheets
• Preview and Print Datasheets
• Finish Access 1 Simulation
• Finish Access 1 Grader Project
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Wednesday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Access 2 Simulation
• Access 3 Skill 1
• Access 4 Skill 1
• PPT and Access Exam Review
• Create Queries with the Simple Query Wizard
• Add Text Criteria
• Add Calculated Fields to Tables
• Create Queries in Design View
• Add Comparison Operators
• Add Date and Time Criteria
• Group and Total Queries
• Add Calculated Fields to Queries
• Work with Logical Operators
• Add Wildcards to Query Criteria
• Ch 3 Skill 1 Use the Form Wizard
• Ch 4 Skill 1 Build Queries for Reports
• Study for PPT/Access Exam
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Excel Ch 1 Grader Project
• Excel Ch 1 Simulation
• Create and Save Workbooks
• Enter Data and Merge and Center Titles
• Construct Addition and Subtraction Formulas
• Construct Multiplication and Division Formulas
• Adjust Column Widths and Apply Cell Styles
• Insert the SUM function
• AutoFill Formulas and Data
• Format, Edit, and Check Spelling
• Insert Footers and Adjust Page Settings
• Display Formulas and Print Worksheets
• Submit Research Paper to Dropbox by 9PM
• No lates will be accepted
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday, March 20th; enjoy Spring
Break
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Flow Charts
• Excel Ch 3 Grader Project
• Presentation Schedule
• Organize Worksheet Tabs
• Enter and Format Dates
• Clear Cell Contents and Formats
• Move Cell Contents and Use Paste Options
• Enter Data in Grouped Worksheets
• Insert Multiple Math Operators in Formulas
• Format Grouped Worksheets
• Insert, Hide, Delete, and Move Worksheets
• Create Summary Worksheets
• Create Clustered Bar Charts
• Chloe Barone
• Dena Capparelli
• Matilda D’Orlando
• Mahen Kariyakarawana
• Christine McArdle
• Shane Nolan
• Alexia Raess
• Boyce Vass
• Sarah Algov
• Alyssa Behr
• Daniel Schwarztstein
• Dalton Hamlin
• Michael Lomazzo
• Stephanie Miller
• Elvis Perez
• Andrew Tummino
• Gianna Attardi
• Denise Callaghan-Crespo
• Kyla Cooper
• Emma Ientile
• Yannick Lyons
• Olivia Mingino
• Liana Ploskonka
• Jenna Van Sant
• PowerPoint assignment due Monday
• Make sure to complete Excel Ch 2 Simulation,
Excel Ch 2 Grader Project, and Excel Ch 3
Simulation
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Excel Ch 4 Grader Project
• Excel Exam Review
• Insert the TODAY, NOW, and COUNT Functions
• Insert the IF Function
• Move Functions, Add Borders, and Rotate Text
• Apply Conditional Formatting
• Insert Sparklines
• Use Find and Replace
• Freeze and Unfreeze Panes
• Create and Sort Excel Tables
• Filter Excel Tables
• Convert Tables to Ranges and Adjust Worksheet Print
Settings
• PowerPoint assignment due at 9PM
• Complete all Excel MyITLab assignments
• Study for Excel Exam
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Wednesday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Ethics Overview
• Ethical Issues of Info Tech
• Protect Yourself
• Security Assignment #1
• Associated Concepts
• Security Assignment #2
• Associated Concepts
• Looking Forward
• Areas of concern:
– IP, Privacy, E-Commerce, Abuse
– Ethics differ from Law
• Not clearly defined; like laws
• Ethics may differ by culture, family, religion, and social
experience
• Ethics are complex; different people = different views
• Embedded Computers [from Computer
Concepts unit]
• Artificial Intelligence
• Running joke to some
• Real issue to others
• Identification
• Tracking
• Consent vs. Privacy
• Blocking Certain Websites Vary
– Government
– Work
– School
– Search Engine
– Global interactions; US different than others
• Driving Social Change
• Always Promoting an Agenda
• May or May Not Be Real
• Disobedience or Terrorism?
• Protecting your efforts on the web
• Not limited to computers
• Effects mobile devices
• Ongoing upgrades
• Protecting yourself on your personal computer
and mobile devices is a primary concern
• Your data [whether personal like bank account
or professional like work documents] can be
useful resources to hackers
• Use strategies to prevent issues and continue
to be educated about cybersecurity
• Topic 1 – Secure Passwords
– Check the strength of passwords
– Helps you determine if your passwords are strong or not
• Topic 2 – Secure User Accounts
– Prevents unwarranted access to your data/files
– Logins can deter access from family/friends
Which of the following is formally
defined as any criminal action
perpetrated primarily through the use
of a computer? Cybercrime
White-hat hackers break into systems
for non-malicious reasons such as to
test system security vulnerabilities.
A packet analyzer is a program that
can enable a hacker to do all of the
following EXCEPT launch a denial of
service (DoS) attack on your
computer.
All of the following were top
cybercrimes reported to the IC3
EXCEPT theft of services.
• Cybercrime, Cybercriminals, Common
types of cybercrimes
• Most financially damaging cybercrime for
individuals is identity theft
• Messaging, Malware and Mobile Anti-
Abuse Working Group (M3AAWG) Found
half of e-mail users have opened spam
• Types of hackers: White-hat (ethical
hackers), Black-hat hackers, Grey-hat
hackers
• Packet analyzer (sniffer)
• Keylogger
• Trojan horses—Appear to be useful
• Rootkits
• Zombies
• Denial-of-Service
– Legitimate users are denied access
to a computer system
– System shuts down
• DDoS
• A rootkit allows a hacker to gain access
to your computer and take almost
complete control of it without your
knowledge.
• A DDoS attack floods a computer with
requests until it shuts down and refuses
to answer any requests for information.
• A zombie is another person's computer
controlled by a hacker. True
• This is Microsoft DOS [not Denial of Service attack]
• Not limited to computers
• Widespread cybercrime: Spreading viruses
• Main purpose and Secondary objectives
• Sources of virus infection
• Classified by methods used to avoid
detection: Polymorphic viruses, Multipartite
viruses, Stealth viruses
• Creating and distributing computer
viruses is one of the most
widespread types of cybercrimes.
• All of the following activities may
infect your computer with a virus
EXCEPT printing a document.
• Which of the following classifications
of viruses can change its own code to
avoid detection? Polymorphic
• With regard to computer protection,
quarantining is defined as placing a
found virus in a secure area on the
hard drive.
• A(n) virus signature is the portion of
virus code that is unique to a
particular computer virus.
• Boot-sector viruses are often
transmitted by a flash drive
left in a USB port.
• A time bomb is a virus that is
triggered on a certain date.
• A macro virus is a virus that is
attached to documents such
as Word or Excel files.
• Currently, there are no
antivirus programs for mobile
devices. False
• A worm does NOT require
human interaction to spread
to other computers. True
• Malware has malicious intent
– Adware displays sponsored advertisements
– Spyware is an unwanted piggy-back program
• Transmits information
• Tracking cookies
• Keystroke logger
• Many antispyware packages are available
• Spam—junk e-mail
• Tactics to minimize spam
• Spyware is a program
that gathers
information about your
surfing habits without
your knowledge.
• Type of malware
• Attempts to convince
you something is wrong
… and to pay money to
fix it
• Firewall—hardware or
software
• Windows and OS X
include firewalls
• Security suites include
firewall software
• You can block logical ports from
invaders and make your
computer invisible to others on
the Internet by installing a
firewall.
• Configuring a firewall to
ignore all incoming
packets that request
access to a specific port
is known as logical port
blocking.
• Antivirus software
– Detects viruses and
protects your computer. Like Symantec,
Kaspersky, AVG, McAfee
• Need strong passwords. Password strength tests
• Operating systems have built-in password
protection
• Biometrics: Fingerprint, Iris pattern in eye, Voice
authentication, Face pattern recognition
• Provide a high level of security
• Rules for creating passwords
include all of the following
EXCEPT use a dictionary to find
a lengthy word that is easy to
remember.
• Protect your personal
Information. Backups
are copies of data
• Backup your data from:
Unauthorized access,
Tampering, Destruction
• Power surges
• Surge protector
– Replace every 2–3 years
– Use with all devices that
have solid-state
• Social engineering is any
technique that uses social skills
to generate human interaction
that entices individuals to reveal
sensitive information.
• Four main security concerns with mobile devices:
– Keeping them from being stolen
– Keeping data secure in case they are stolen
– Finding a device if it is stolen
– Remotely recovering and wiping data off a stolen device
• Topic 1 – Information Privacy
– Google yourself; you should be comfortable with the
information that is visible
• Topic 2 – Web Browsers
– Install software to check to see what is going on behind
the scenes when you visit websites
• Topic 3 – Encryption
– Serves as a protection tool when using the web, email, and
more
• Cookies are small text
files received when you
visit a website
• Help companies
determine the
effectiveness of their
marketing
• Do not search drive for
personal information
• May invade your privacy
• Pose no security threat
• Which of the following
statements about cookies is
NOT true? Cookies obtain your
personal information by
searching your hard drive.
• CAPTCHA is the wavy
hard-to-read letter and
number sequence that
you type to prove that
you are human to a
website.
• Phishing
– Luring people into revealing
information
• Pharming
– Malicious code planted on your
computer to gather information
• Guidelines to avoid
schemes
• When malicious code is planted
on your computer and alters
your browser's ability to find
web addresses, it is known as
pharming.
• Read pg. 557 in Tech in Action to answer
questions 1 & 2 within Topic 3 on Security
Assignment 2
• Wi-Fi Encryption
• Data Encryption
• Web Encryption
• A methodology using algorithms to modify data, text,
code, etc. to prevent the opportunity of hacking and
misuse of information
• Courses such as Cryptography devote a substantial
amount of time towards this process
• Encryption can exist as: Wi-Fi Encryption, Data Encryption,
and Web Encryption
• Encryption can be one of the most secure ways to protect
your computer and mobile device
• Wi-Fi Encryption is the encryption method you take to protect
outside access to your network [whether at home or not]
• Three common types are WEP, WPA, WPA2
• Wired Equivalent Privacy can be 64, 128, or 256 bit encryptions;
commonly used, but easily hacked
• Wi-Fi Protected Access is 256 bit encryption; created due to the
vulnerabilities of WEP
• Wi-Fi Protected Access II is an updated version of WPA and the
most secure encryption tool for Wi-Fi
• Focuses heavily on making text or
information sent via email or other online
transmit difficult to decipher [or read]
• Substitution ciphers are the most common
tool for this task
• Look for the “lock” – it means the most
secure websites
• Digital Certificates
– Like cookies; gives access based on
prior approval/visit [can expire]
• SSL Encryption
– Most common web encryption tool
• Twitter says:
– Secure Connection
– The connection to this site is encrypted and authenticated using a strong
protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and a strong
cipher (AES_128_GCM).
• Instagram says:
– Secure Connection
– The connection to this site is encrypted and authenticated using a strong
protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and a strong
cipher (CHACHA20_POLY1305).
• Your results may vary. A similar protocol, key exchange, and cipher are
perfectly fine, but often each site will have its own cipher.
• Hackers go after the Elderly due to their financial stability
and Young adults due to their available credit
• Google Images is a stronger tool than Google Search in
viewing your digital footprint
• Mobile devices are at the same risk as your personal
computers
• Using Wi-Fi is risky; look for Wi-Fi with a password to make
it a little more secure
• Five Ethical/Social Issues
• Security Assignment 1
• Security Assignment 2
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Wednesday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Review
• Best Advice for Security
• Zero Days
• Wi-Fi Group Assignment
• Security Assignment #1 and #2 Review
• Looking Forward
• Ethics vs. Law
• Two groups are Hacker targets
• Create secure passwords
• Secure your devices
• DDoS, DoS, and DOS
• Encryptions – Web, Wi-Fi, and Data
• Looking to steal info or identities
• Keyloggers
• Packet sniffers
• Three types of hackers
• Types of viruses
• Virus methods
• Virus purposes
• How to prevent viruses
• Malware
• Adware
• Spyware
• Scareware
• SPAM
• Firewalls
• Backup data
• Prevent unwanted access
• Preventing theft
• Cookies
• Google Search + Google Images
• Third Party Websites
• Phishing and Pharming Scams
• Learn from the past. Don’t run from it!
• What are Zero Days?
– Vulnerabilities in the code that can be hacked
• What are Bug Bounties?
– Payment for identifying a zero day in the software/code
• You can either fix a Zero Day, pay someone to fix it, or
get hacked
WENDY’s
• Free Wi-Fi
• User Agreement
• Privacy Policy
DUNKIN DONUTS
• Free Wi-Fi
• User Agreement
• Privacy Policy
• Wendy’s and Dunkin Donuts both offer Free Wi-Fi, but
one is a safer Wi-Fi option than the other
• Consider accessing the Wi-Fi in the general public, not on
campus (ie the store in your town)
• Teams will be split among the class with two captains
• Team captains will choose either Wendy’s or Dunkin
Donuts
• Each team will research their company’s Wi-Fi information
to determine: a) If it is a safe bet to use their company’s
Wi-Fi and b) If it is a safe bet to use the other team’s
company’s Wi-Fi
• There is a right answer; for one very important reason
• Hackers go after the Elderly due to their financial stability
and Young adults due to their available credit
• Google Images is a stronger tool than Google Search in
viewing your digital footprint
• Mobile devices are at the same risk as your personal
computers
• Using Wi-Fi is risky; look for Wi-Fi with a password to make
it a little more secure
• Five Ethical/Social Issues
• Security Assignment 1
• Security Assignment 2
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Mobile Security
• Alyssa Presentation
• Issues – occur at multiple layers
• Prevention
• Detection
• Reaction
• https://www.youtube.com/watch?v=zrqnNXsT
H2g
• 3:07 minute video on strategies for protecting
yourself when using a mobile device via
awareness.
• Computing issues already discussed
• Plus
– Data snooping
– Hijack sessions
– Eavesdropping
• Privacy issues
• Security issues
• Mobile Malware
– DroidDream (Android)
• Steals data; sends to hacker
– Ikee (iOS)
• Worm
– Zitmo
• Steals info via SMS
https://www.youtube.com/watch?v=vGJzFnepsv
c
2:08 Minute Video: Top 5 Android Apps for
Security
• Bluetooth
• Wi-Fi
• Remote Wipe
• Activation Lock
• Privacy Controls
https://www.youtube.com/watch?v=WrDkYpVh
0MM
5:23 Minute Video on Apple hacks
Apple often updating based on hacks
• Apple Security Bounty
• 3rd Party websites are accessing your
computer when you access them
• Same is true on a mobile device
• Phones store a lot of data you don’t want to
lose
• Five Ethical/Social Issues
• Security Assignment 1
• Security Assignment 2
• Study for Security Exam
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Wednesday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Security Exam
• Chloe, Dena, Matilda, Mahen, Christine,
Shane, Alexia, Boyce Present
• In the event anyone does not present today
they will present on Monday
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Sarah, Dan, Dalton, Michael, Stephanie, Elvis,
Andrew Present
• In the event anyone does not present today
they will present on Wednesday
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Wednesday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Gianna, Denise, Kyla, Emma, Yannick, Olivia,
Liana, Jenna Present
• In the event anyone has yet to present they
will present on Monday
• Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday
Professor Marino
Mondays and Wednesdays 8:30-9:50AM
Howard Hall 207
• Once you finish the exam you are free to go
• Best of luck in the future!

More Related Content

Similar to 1-18-17 Agenda IT 100-01.pptx

Essentials for a Better ICT Student in Palestine
Essentials for a Better ICT Student in PalestineEssentials for a Better ICT Student in Palestine
Essentials for a Better ICT Student in PalestineJafar Hajeer
 
Samefilename compressed
Samefilename compressed Samefilename compressed
Samefilename compressed misty25
 
Classroom expectations
Classroom expectationsClassroom expectations
Classroom expectationsKella Randolph
 
Workplace Simulated Courses - Course Technology Computing Conference
Workplace Simulated Courses - Course Technology Computing ConferenceWorkplace Simulated Courses - Course Technology Computing Conference
Workplace Simulated Courses - Course Technology Computing ConferenceCengage Learning
 
Killer Online Design and Teaching Techniques
Killer Online Design and Teaching TechniquesKiller Online Design and Teaching Techniques
Killer Online Design and Teaching TechniquesRaymond Rose
 
Intro. to Content Applications
Intro. to Content ApplicationsIntro. to Content Applications
Intro. to Content Applicationsgreengi
 
Pmp capm exam preparation
Pmp capm exam preparationPmp capm exam preparation
Pmp capm exam preparationFreedom Monk
 
Faq onlinestudents fa10
Faq onlinestudents fa10Faq onlinestudents fa10
Faq onlinestudents fa10Henry Simon
 
Using technology to be effective and efficient
Using technology to be effective and efficientUsing technology to be effective and efficient
Using technology to be effective and efficientDr. Adeline Tolliver
 
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...Austin Stroud
 
Digital Skills for Early Teacher Courses
Digital Skills for Early Teacher CoursesDigital Skills for Early Teacher Courses
Digital Skills for Early Teacher CoursesMarisa Constantinides
 
Faq onlinestudents fa10-compressed
Faq onlinestudents fa10-compressedFaq onlinestudents fa10-compressed
Faq onlinestudents fa10-compressedstephenjr
 
Frequently Asked Questions for Online Courses at GCCCD
Frequently Asked Questions for Online Courses at GCCCDFrequently Asked Questions for Online Courses at GCCCD
Frequently Asked Questions for Online Courses at GCCCDorrcstyoga
 
Faq onlinestudents su12
Faq onlinestudents su12Faq onlinestudents su12
Faq onlinestudents su12callibri
 

Similar to 1-18-17 Agenda IT 100-01.pptx (20)

Essentials for a Better ICT Student in Palestine
Essentials for a Better ICT Student in PalestineEssentials for a Better ICT Student in Palestine
Essentials for a Better ICT Student in Palestine
 
Samefilename compressed
Samefilename compressed Samefilename compressed
Samefilename compressed
 
Classroom expectations
Classroom expectationsClassroom expectations
Classroom expectations
 
Workplace Simulated Courses - Course Technology Computing Conference
Workplace Simulated Courses - Course Technology Computing ConferenceWorkplace Simulated Courses - Course Technology Computing Conference
Workplace Simulated Courses - Course Technology Computing Conference
 
lecture1.pdf
lecture1.pdflecture1.pdf
lecture1.pdf
 
Session 6
Session 6Session 6
Session 6
 
Killer Online Design and Teaching Techniques
Killer Online Design and Teaching TechniquesKiller Online Design and Teaching Techniques
Killer Online Design and Teaching Techniques
 
Intro. to Content Applications
Intro. to Content ApplicationsIntro. to Content Applications
Intro. to Content Applications
 
Pmp capm exam preparation
Pmp capm exam preparationPmp capm exam preparation
Pmp capm exam preparation
 
Faq onlinestudents fa10
Faq onlinestudents fa10Faq onlinestudents fa10
Faq onlinestudents fa10
 
Using technology to be effective and efficient
Using technology to be effective and efficientUsing technology to be effective and efficient
Using technology to be effective and efficient
 
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
 
Introduction
IntroductionIntroduction
Introduction
 
Digital Skills for Early Teacher Courses
Digital Skills for Early Teacher CoursesDigital Skills for Early Teacher Courses
Digital Skills for Early Teacher Courses
 
Faq onlinestudents fa10-compressed
Faq onlinestudents fa10-compressedFaq onlinestudents fa10-compressed
Faq onlinestudents fa10-compressed
 
Engineering and Information Sciences | Orientation Day Presentation | Liverpo...
Engineering and Information Sciences | Orientation Day Presentation | Liverpo...Engineering and Information Sciences | Orientation Day Presentation | Liverpo...
Engineering and Information Sciences | Orientation Day Presentation | Liverpo...
 
Wk1 - L1.ppsx
Wk1 - L1.ppsxWk1 - L1.ppsx
Wk1 - L1.ppsx
 
Frequently Asked Questions for Online Courses at GCCCD
Frequently Asked Questions for Online Courses at GCCCDFrequently Asked Questions for Online Courses at GCCCD
Frequently Asked Questions for Online Courses at GCCCD
 
Faq onlinestudents su12
Faq onlinestudents su12Faq onlinestudents su12
Faq onlinestudents su12
 
Introduction
IntroductionIntroduction
Introduction
 

More from MattMarino13

1-22-24 INFO 2106.pptx
1-22-24 INFO 2106.pptx1-22-24 INFO 2106.pptx
1-22-24 INFO 2106.pptxMattMarino13
 
1-24-24 INFO 3205.pptx
1-24-24 INFO 3205.pptx1-24-24 INFO 3205.pptx
1-24-24 INFO 3205.pptxMattMarino13
 
BITM3730 11-14.pptx
BITM3730 11-14.pptxBITM3730 11-14.pptx
BITM3730 11-14.pptxMattMarino13
 
01_Felke-Morris_Lecture_ppt_ch01.pptx
01_Felke-Morris_Lecture_ppt_ch01.pptx01_Felke-Morris_Lecture_ppt_ch01.pptx
01_Felke-Morris_Lecture_ppt_ch01.pptxMattMarino13
 
02slide_accessible.pptx
02slide_accessible.pptx02slide_accessible.pptx
02slide_accessible.pptxMattMarino13
 
Hoisington_Android_4e_PPT_CH01.pptx
Hoisington_Android_4e_PPT_CH01.pptxHoisington_Android_4e_PPT_CH01.pptx
Hoisington_Android_4e_PPT_CH01.pptxMattMarino13
 
AndroidHTP3_AppA.pptx
AndroidHTP3_AppA.pptxAndroidHTP3_AppA.pptx
AndroidHTP3_AppA.pptxMattMarino13
 
9780357132302_Langley11e_ch1_LEAP.pptx
9780357132302_Langley11e_ch1_LEAP.pptx9780357132302_Langley11e_ch1_LEAP.pptx
9780357132302_Langley11e_ch1_LEAP.pptxMattMarino13
 
krajewski_om12 _01.pptx
krajewski_om12 _01.pptxkrajewski_om12 _01.pptx
krajewski_om12 _01.pptxMattMarino13
 
CapsimOpsIntroPPT.Marino.pptx
CapsimOpsIntroPPT.Marino.pptxCapsimOpsIntroPPT.Marino.pptx
CapsimOpsIntroPPT.Marino.pptxMattMarino13
 
Project Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptx
Project Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptxProject Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptx
Project Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptxMattMarino13
 
Project Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptx
Project Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptxProject Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptx
Project Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptxMattMarino13
 
Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...
Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...
Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...MattMarino13
 
Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...
Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...
Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...MattMarino13
 
Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...
Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...
Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...MattMarino13
 
1-23-19 Agenda.pptx
1-23-19 Agenda.pptx1-23-19 Agenda.pptx
1-23-19 Agenda.pptxMattMarino13
 
EDF 8289 Marino PPT.pptx
EDF 8289 Marino PPT.pptxEDF 8289 Marino PPT.pptx
EDF 8289 Marino PPT.pptxMattMarino13
 
Agenda January 20th 2016.pptx
Agenda January 20th 2016.pptxAgenda January 20th 2016.pptx
Agenda January 20th 2016.pptxMattMarino13
 
BITM3730 8-29.pptx
BITM3730 8-29.pptxBITM3730 8-29.pptx
BITM3730 8-29.pptxMattMarino13
 
BITM3730 8-30.pptx
BITM3730 8-30.pptxBITM3730 8-30.pptx
BITM3730 8-30.pptxMattMarino13
 

More from MattMarino13 (20)

1-22-24 INFO 2106.pptx
1-22-24 INFO 2106.pptx1-22-24 INFO 2106.pptx
1-22-24 INFO 2106.pptx
 
1-24-24 INFO 3205.pptx
1-24-24 INFO 3205.pptx1-24-24 INFO 3205.pptx
1-24-24 INFO 3205.pptx
 
BITM3730 11-14.pptx
BITM3730 11-14.pptxBITM3730 11-14.pptx
BITM3730 11-14.pptx
 
01_Felke-Morris_Lecture_ppt_ch01.pptx
01_Felke-Morris_Lecture_ppt_ch01.pptx01_Felke-Morris_Lecture_ppt_ch01.pptx
01_Felke-Morris_Lecture_ppt_ch01.pptx
 
02slide_accessible.pptx
02slide_accessible.pptx02slide_accessible.pptx
02slide_accessible.pptx
 
Hoisington_Android_4e_PPT_CH01.pptx
Hoisington_Android_4e_PPT_CH01.pptxHoisington_Android_4e_PPT_CH01.pptx
Hoisington_Android_4e_PPT_CH01.pptx
 
AndroidHTP3_AppA.pptx
AndroidHTP3_AppA.pptxAndroidHTP3_AppA.pptx
AndroidHTP3_AppA.pptx
 
9780357132302_Langley11e_ch1_LEAP.pptx
9780357132302_Langley11e_ch1_LEAP.pptx9780357132302_Langley11e_ch1_LEAP.pptx
9780357132302_Langley11e_ch1_LEAP.pptx
 
krajewski_om12 _01.pptx
krajewski_om12 _01.pptxkrajewski_om12 _01.pptx
krajewski_om12 _01.pptx
 
CapsimOpsIntroPPT.Marino.pptx
CapsimOpsIntroPPT.Marino.pptxCapsimOpsIntroPPT.Marino.pptx
CapsimOpsIntroPPT.Marino.pptx
 
Project Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptx
Project Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptxProject Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptx
Project Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptx
 
Project Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptx
Project Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptxProject Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptx
Project Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptx
 
Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...
Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...
Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...
 
Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...
Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...
Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...
 
Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...
Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...
Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...
 
1-23-19 Agenda.pptx
1-23-19 Agenda.pptx1-23-19 Agenda.pptx
1-23-19 Agenda.pptx
 
EDF 8289 Marino PPT.pptx
EDF 8289 Marino PPT.pptxEDF 8289 Marino PPT.pptx
EDF 8289 Marino PPT.pptx
 
Agenda January 20th 2016.pptx
Agenda January 20th 2016.pptxAgenda January 20th 2016.pptx
Agenda January 20th 2016.pptx
 
BITM3730 8-29.pptx
BITM3730 8-29.pptxBITM3730 8-29.pptx
BITM3730 8-29.pptx
 
BITM3730 8-30.pptx
BITM3730 8-30.pptxBITM3730 8-30.pptx
BITM3730 8-30.pptx
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 

Recently uploaded (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 

1-18-17 Agenda IT 100-01.pptx

  • 1. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 2. • About Me • Contact Info • Open Syllabus and Schedule from eCampus • Netiquette • Important Dates • How to Succeed in IT 100 Without Really Trying • Navigating eCampus • Navigating MyITLab • Homework
  • 3. • Monmouth University Adjunct Professor • High School Business and Computer Teacher • Current EdD Student [Curriculum and Instruction with focuses in Instructional Technology and Distance Learning] • Entrepreneur [run 4 businesses and a non-profit] • Ambassador [Edmodo and SimpleK12] • Financial Blogger [The Street, Seeking Alpha, and Nasdaq]
  • 4. • E-mail: mamarino@Monmouth.edu • E-mail is the best way to get in touch with me. • I try to respond within 24 hours. • In case of EMERGENCY call me at 848-333-8637 • OFFICE HOURS: Where? Howard Hall Room 223 When? To Be Determined
  • 5. • Class Meeting Time • Required Course Materials • Learning Objectives • Grading Scale • Attendance • Academic Honesty • MyITLab • Helpful Info
  • 6. • Please come to class on time • Be Prepared [Course Schedule Defines Everything] • Be Ready to Start as soon as our course time starts
  • 7. Exams 40% Final Exam 10% Assignme nts 50% Grade Breakdown Exams Final Exam Assignments Symbol Start % A 93 A- 90 B+ 87 B 83 B- 80 C+ 77 C 73 C- 70 D+ 67 D 63 D- 60 F 0
  • 8. • Course Attendance Policy: – Final grade will be reduced by 3 points for 3 absences – Final grade will be reduced by 1 point for each additional absence – This means if you’re absent once or twice there is no penalty – If you need to be absent obtain documentation to have absence excused • My Attendance Policy: – If I am absent for any reason everyone will receive 1 point towards their final grade for each of my absences – In the event someone fills in for me students will need to be present to receive that credit
  • 9. • Statement on Academic Honesty on Syllabus • Consequences of Academic Dishonesty – You will receive an F for the course – Further disciplinary action may occur; including dismissal from the university – Lowers GPA – Financial cost to retake course – Potential loss of scholarships – Potential loss in eligibility for extracurricular activities – Need to repeat course for credit
  • 10. • Help Desk • IT Lab Assistants • IT Tutors and Tutoring Lab • Other Campus Computer Access
  • 11. • Defines Topics to be covered in class • Defines all HW Assignments and Due Dates • Defines PPT Presentation Dates [subject to change]
  • 12. • Netiquette is the term used to describe the rules of etiquette that apply to electronic communications. It is important to use good netiquette when communicating with me and with your classmates, so I ask that you abide by the rules of netiquette in all aspects of this course. These rules are basically common sense things, but I feel they are important enough to reiterate here.
  • 13. • The rules of netiquette you will be expected to follow in this course are as follows: • Be clear. – Use Standard English and do not abbreviate. – Spell check, revise and edit your messages before sending them. – Use appropriate subject lines that reflect the content of the message. • Be polite and careful. – Do not use ALL UPPERCASE LETTERS!!! or multiple exclamation marks, as it is sometimes difficult to understand the tone of the message. – Typing in all capital letters is synonymous to yelling at someone. – Avoid sarcasm and irony, which can be misinterpreted by the reader. – Refrain from using inappropriate or offensive language. – Remember you are not talking to a machine; there is a person on the other end of your message.
  • 14. • Demonstrate respect for the opinions of others when responding to your classmates. • Remember that you are communicating within a classroom and behave accordingly. • Be forgiving of other people's mistakes. • Always remain calm, even if you believe someone has insulted you. • Disagree respectfully and with facts, not gossip. • Apply the golden rule -- treat others the way you would like to be treated.
  • 15. • Late Registration/Add-Drop Period: 1/17 to 1/24 • Spring Break: 3/11 to 3/17 • Withdrawal Deadline: 3/20 • Any additional important dates will be announced at the start of class
  • 16. • Be on time to class/Be in class: Being in class will help you do well on assignments and exams • “Alright Young Scholars” means class is starting • Submit all assignments on time • Study all review materials prior to exams • Work smart
  • 17. • Each unit will have its own folder: Word, Computer Concepts, Access and PowerPoint, Computer Security, and Excel • Agendas for class; such as this one, will all be put into one folder
  • 18. • MyITLab will feature most of your assignments for this course [there are other small assignments on eCampus] • MyITLab will house all five unit exams and the final exam • MyITLab features a digital copy of the course textbook and Technology in Action for easy usage
  • 19. • Purchase required course materials if you haven’t already done so • Complete About Me Discussion Thread [Instructions in eCampus] • Complete Plagiarism Tutorial
  • 20. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Monday
  • 21. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 22. • Discuss Homework Due Tonight • Discuss Homework Due Sunday • Word Ch 1 Concepts • Word Ch 1 Grader Project • Word Ch 3 Concepts • Word Ch 3 Grader Project
  • 23. • Welcome Discussion [eCampus] • Plagiarism Tutorial [eCampus] • Windows 10 Simulation [MyITLab] • All due at 9PM tonight
  • 24. • Word Ch 3 Classwork [eCampus]
  • 25. • Type Letter Text • Apply Styles and Set Grammar and Spelling Options • Select and Insert Text • Copy, Cut, and Paste Text • Check Spelling and Grammar • Insert Synonyms • Use Format Painter • Apply Advanced Font Settings • Create Document Footers • Save Documents as PDF Files
  • 26. • Open “Land” on MyITLab • Download files • Complete steps • Submit file • Modify as necessary to receive a 100
  • 27. • Insert Text and Pictures From Files • Resize and Align Pictures • Apply Pictures Styles and Artistic Effects • Set Tab Stops • Type Tabbed Lists • Apply Table Styles • Create Tables • Delete and Add Table Rows and Columns • Format Text in Table Cells • Format Tables
  • 28. • Open “Festival” on MyITLab • Download files • Complete steps • Submit file • Modify as necessary to receive a 100
  • 29. • About Me Discussion Thread and Plagiarism Tutorial [eCampus] due at 9PM • Windows 10 Simulation [MyITLab] due at 9PM • Word Ch 3 Classwork [eCampus] due Sunday
  • 30. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Monday
  • 31. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 32. • Introduce Research Paper • Word Integrated Project 1 • Word Exam Review • Word Ch 1 Simulation • Word Ch 3 Simulation
  • 33. • Rubric • Thesis Topic • Think about your topic
  • 34. • Folder on eCampus • Download file • Edit file based on Steps 1-27 – Step 11 – if done right all paragraphs will be indented – Step 13 – glossed over in video • Download attached Word file to dropbox and watch screencast
  • 35. • Review on MyITLab is the same 18 questions from the Ch 1 and Ch 3 Simulations • Completing the Review gives you the best chance to ace the Exam • Exam on February 6th is 17 of those 18 questions • 3.01 is on the Review, but not on the Exam
  • 36. • Open on MyITLab • If you are unsure use the aids: video or practice • Unlimited attempts to get a 100
  • 37. • Open on MyITLab • If you are unsure use the aids: video or practice • Unlimited attempts to get a 100
  • 38. • Check eCampus for Wednesday’s online lesson [video and PPT] discussing conducting research • Complete all Word assignments due on February 6th: Integrated Project 1, Ch 1 Simulation, Ch 3 Simulation, Ch 1 Grader Project, and Ch 3 Grader Project
  • 39. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Monday
  • 40. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 41. • Research Paper Example • Discuss Research Paper Rough Draft • Introduce Computer Purchase Assignment • Computer Concepts Discussion
  • 42. • Show Research Paper Example to demonstrate concepts • Point to location on eCampus
  • 43. Storage Output Process Input – Input: Gathers data, allows entering data – Process: Manipulates, calculates, or organizes data – Output: Displays data and information – Storage: Saves data and information
  • 44. • Bit: Binary digit 0 or 1 • Byte: Unique combinations of 8 bits of 0s and 1s • Kilobytes, megabytes, gigabytes, terabytes, and petabytes • Computers use binary language consisting of 0s and 1s. • Which of the following is the smallest unit of measure? Megabyte
  • 45. • Mainframe: Many users simultaneously • Supercomputer: Complex calculations • Embedded: Self-contained – Examples: electronic thermostat, drone • Embedded computers are specially designed computer chips that reside inside other devices such as a car. • Which of the following computers is large, expensive and supports many simultaneous users and manages large amounts of data? Mainframe computer • An Apple iPad and a Microsoft Surface are examples of Tablet computers.
  • 46. • Enter data and instructions • Examples – Keyboard – Mouse – Microphone – Scanner – Digital camera – Stylus • A(n) Stylus is an input device that looks like a pen. • A keyboard and mouse are examples of input devices.
  • 47. • Send data out of the computer in the form of: – Text – Pictures – Sounds – Video • Examples – Monitors – Printers – Speakers and earphones • Monitors: Liquid crystal display (LCD), Light-emitting diode (LED), Organic light-emitting diode (OLED) • The most common type of monitor is a(n) liquid crystal display (LCD). • The number of pixels displayed on the screen is known as screen resolution.
  • 48. • Inkjet: Affordable, High- quality color, Quick and quiet • Laser: Faster printing speed, Higher-quality printouts, More expensive • All-in-one printer: Printer, scanner, copier, and fax • Plotter: Prints oversize images • Thermal printer • Thermal printers either melt a wax based ink on regular paper or by burning dots on specially coated paper. • Laser printers are usually faster at printing in black and white than inkjet printers. True
  • 49. • Speaker – Output device for sound – Surround-sound speakers – Wireless speaker system • Headphones or earbuds – Keep from distracting others • Most computers include inexpensive speakers. These speakers are sufficient to play audio clips from the Web and enable you to participate in videoconferencing or phone calls made over the Internet. • A surround-sound speaker is a system of speakers and audio processing that envelops the listener in a 360-degree field of sound. • Wireless speaker systems are available to help you avoid cluttering up your rooms with speaker wires. • Headphones or earbuds plug into the same jack to which speakers connect. Hearing might be damaged by excessive volume when using earbuds.
  • 50. • Motherboard: CPU, ROM, RAM, and cache, Slots for expansion cards, Sound/Video cards, Network interface card (NIC) • The motherboard is located inside the system unit and contains the central electronic components of the computer, including the computer's processor (CPU), and many circuit boards that help the computer to function. •A network interface card (NIC) enables your computer to connect to other computers or to the Internet. •The motherboard contains the central electronic components of the computer.
  • 51. Stores instructions and data Series of several memory cards or modules Temporary (volatile) storage • RAM is the abbreviation for the place in the computer where the programs and data the computer is currently using are temporarily stored. • RAM is a volatile storage location.
  • 52. Stores startup instructions Permanent (nonvolatile) storage • The area that holds all the startup instructions the computer needs to start is the ROM. • Apple's OS X and Microsoft Windows are examples of operating system software.
  • 53. CPU or processor “Brains” of the computer Controls all functions of the computer’s components Processes all commands and instructions Billions of tasks per second • CPU Performance Measures: Processor speed measured in hertz (Hz), Megahertz (MHz) or gigahertz (GHz) – Number of cores: Single, Dual, Quad, Ten • Today's CPUs run at speeds measured in kilohertz. False • A(n) dual-core CPU has two processing paths, allowing it to process more than one instruction at a time.
  • 54. • Primary device for permanent storage • Nonvolatile storage devices • Internal drive is for permanent storage • External hard drive • Solid-state Drive (SSD) • All of the following are names for a flash drive EXCEPT hard drive.
  • 55. • External hard drives • Flash Storage • Compact discs (CDs) • Digital video discs (DVDs) – Store more data than CDs • Blu-ray discs (BDs) • Which of the following optical storage media has the greatest storage capacity? BD • Flash drives plug into a(n) USB port.
  • 56. • Universal serial bus (USB) • New USB 3.1 standard port: Transfer speeds of 10 Gbps • FireWire 800: Transfer speeds up to 800 Mbps • Thunderbolt: Transfer speeds up to 20 Gbps • Connectivity port – Access to networks and the Internet • Ethernet port • Audio ports – Connect headphones, microphones, speakers • Video ports – Connect monitors and multimedia devices – HDMI • Which port is the most common port used to connect input and output devices? Universal serial bus (USB) • A(n) port is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
  • 57. Position your monitor correctly. Purchase an adjustable chair. Assume a proper position while typing. Take breaks from computer tasks. Ensure that the lighting is adequate. • Ergonomics is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences.
  • 58. • How do you use your computer? Assess needs • What software do you run? Total your needed space • Choose 3 computers that meet your requirements • Find specs of each computer • Which of the 3 computers did you choose and why?
  • 59. • 25 Questions • On MyITLab • The Blue Text in this PPT are the questions and answers. The answers are in boldface. • Study those statements.
  • 60. • Computer Purchase Assignment • Work on Research Paper
  • 61. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Monday
  • 62. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 63. • Research Paper Rough Draft • Reminder on Computer Purchase Assignment • Computer Concepts Review • The Great Debate
  • 64. • Dropbox by end of class on February 15th • Hard copy printed and handed in by end of class on February 15th • Rough Drafts scored either 0, 25, or 50 based on completion of rubric tasks • These points are extra credit towards the final submission
  • 65. • How do you use your computer? Assess needs • What software do you run? Total your needed space • Choose 3 computers that meet your requirements • Find specs of each computer • Which of the 3 computers did you choose and why? – Due Wednesday
  • 66. • Input, Process, Output Storage • Bits & Bytes [the pizza] – Binary • Types of computers – mainframe, supercomputer, embedded, tablets • Input & Output devices • Processing, Memory, & Storage • RAM vs. ROM • Parts of the computer [internal & external] • Ergonomics
  • 67. • Each row will be assigned a part of the computer • Each row will work together to create a “sales pitch” to convince me their part of the computer is most important • You can use my notes and any internet research for your argument • Elect a speaker to give the “sales pitch”
  • 68. • Row 1 – Motherboard • Row 2 – Input Devices [keyboard, etc.] • Row 3 – Output Devices [printer, etc.] • Row 4 – CPU/Processor
  • 69. • Spend twenty minutes putting together your argument • Your argument should be explaining why your part of the computer is better than the other three • Speakers will be called up one at a time • 10 extra credit points on the Computer Concepts exam to the team with the most convincing argument
  • 70. • 25 Questions • On MyITLab • The Blue Text in this PPT are the questions and answers. The answers are in boldface. • Study those statements. – On Wednesday
  • 71. • Computer Purchase Assignment • Work on Research Paper • Study for exam
  • 72. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Wednesday
  • 73. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 74. • Hand in Research Paper Rough Draft • Computer Concepts Exam • PPT 1 Simulation and Grader Project • PPT 4 Simulation
  • 75. • Open, View, and Save Presentations • Edit and Replace Text • Format Slide Text • Check Spelling and Use the Thesaurus • Insert Slides and Modify Slide Layouts • Insert and Format Pictures • Organize Slides in Slide Sorter View • Apply Slide Transitions and View Slide Shows • Insert Headers and Footers and Print Handouts • Add Notes Pages and Use Presenter View
  • 76. • Insert Tables • Modify Table Layouts • Apply Table Styles • Apply Animation Effects and Change Duration • Modify Animation Timing and Use Animation Painter • Delay or Remove Animation • Navigate Slide Shows
  • 77. • Finish PPT 1 Simulation • Finish PPT 4 Simulation • Finish PPT 1 Grader Project
  • 78. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Monday
  • 79. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 80. • Discuss Effective PPT Presentations • Give out PPT Rubric and Presentation Rubric • Access 1 Grader Project • Access 1 Simulation
  • 81. • One theme per slide • Rehearse • Know your purpose and audience • Exhibit your Passion • Build on your content • Know Your Topic to a Strong Degree
  • 82. • Keep eye contact • Use facts • Use readable font • Don’t read from your slides • Think about questions you may be asked ahead of time
  • 83. • Use research paper to create PPT • Follow rubric in creating PPT • 10 minute presentation of PPT later in the semester • Be prepared based on presentation rubric
  • 84. • Create Databases • Create Tables in Datasheet View • Enter Data into Datasheets • Create Tables in Design View • Relate Tables • Enter Data in Related Tables • Import Data into Tables • Filter and Sort Datasheets • Format Datasheets • Preview and Print Datasheets
  • 85. • Finish Access 1 Simulation • Finish Access 1 Grader Project
  • 86. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Wednesday
  • 87. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 88. • Access 2 Simulation • Access 3 Skill 1 • Access 4 Skill 1 • PPT and Access Exam Review
  • 89. • Create Queries with the Simple Query Wizard • Add Text Criteria • Add Calculated Fields to Tables • Create Queries in Design View • Add Comparison Operators • Add Date and Time Criteria • Group and Total Queries • Add Calculated Fields to Queries • Work with Logical Operators • Add Wildcards to Query Criteria
  • 90. • Ch 3 Skill 1 Use the Form Wizard • Ch 4 Skill 1 Build Queries for Reports
  • 91. • Study for PPT/Access Exam
  • 92. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Monday
  • 93. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 94. • Excel Ch 1 Grader Project • Excel Ch 1 Simulation
  • 95. • Create and Save Workbooks • Enter Data and Merge and Center Titles • Construct Addition and Subtraction Formulas • Construct Multiplication and Division Formulas • Adjust Column Widths and Apply Cell Styles • Insert the SUM function • AutoFill Formulas and Data • Format, Edit, and Check Spelling • Insert Footers and Adjust Page Settings • Display Formulas and Print Worksheets
  • 96. • Submit Research Paper to Dropbox by 9PM • No lates will be accepted
  • 97. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Monday, March 20th; enjoy Spring Break
  • 98. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 99. • Flow Charts • Excel Ch 3 Grader Project • Presentation Schedule
  • 100. • Organize Worksheet Tabs • Enter and Format Dates • Clear Cell Contents and Formats • Move Cell Contents and Use Paste Options • Enter Data in Grouped Worksheets • Insert Multiple Math Operators in Formulas • Format Grouped Worksheets • Insert, Hide, Delete, and Move Worksheets • Create Summary Worksheets • Create Clustered Bar Charts
  • 101. • Chloe Barone • Dena Capparelli • Matilda D’Orlando • Mahen Kariyakarawana • Christine McArdle • Shane Nolan • Alexia Raess • Boyce Vass
  • 102. • Sarah Algov • Alyssa Behr • Daniel Schwarztstein • Dalton Hamlin • Michael Lomazzo • Stephanie Miller • Elvis Perez • Andrew Tummino
  • 103. • Gianna Attardi • Denise Callaghan-Crespo • Kyla Cooper • Emma Ientile • Yannick Lyons • Olivia Mingino • Liana Ploskonka • Jenna Van Sant
  • 104. • PowerPoint assignment due Monday • Make sure to complete Excel Ch 2 Simulation, Excel Ch 2 Grader Project, and Excel Ch 3 Simulation
  • 105. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Monday
  • 106. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 107. • Excel Ch 4 Grader Project • Excel Exam Review
  • 108. • Insert the TODAY, NOW, and COUNT Functions • Insert the IF Function • Move Functions, Add Borders, and Rotate Text • Apply Conditional Formatting • Insert Sparklines • Use Find and Replace • Freeze and Unfreeze Panes • Create and Sort Excel Tables • Filter Excel Tables • Convert Tables to Ranges and Adjust Worksheet Print Settings
  • 109. • PowerPoint assignment due at 9PM • Complete all Excel MyITLab assignments • Study for Excel Exam
  • 110. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Wednesday
  • 111. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 112. • Ethics Overview • Ethical Issues of Info Tech • Protect Yourself • Security Assignment #1 • Associated Concepts • Security Assignment #2 • Associated Concepts • Looking Forward
  • 113. • Areas of concern: – IP, Privacy, E-Commerce, Abuse – Ethics differ from Law • Not clearly defined; like laws • Ethics may differ by culture, family, religion, and social experience • Ethics are complex; different people = different views
  • 114. • Embedded Computers [from Computer Concepts unit] • Artificial Intelligence • Running joke to some • Real issue to others
  • 115. • Identification • Tracking • Consent vs. Privacy
  • 116. • Blocking Certain Websites Vary – Government – Work – School – Search Engine – Global interactions; US different than others
  • 117. • Driving Social Change • Always Promoting an Agenda • May or May Not Be Real • Disobedience or Terrorism?
  • 118. • Protecting your efforts on the web • Not limited to computers • Effects mobile devices • Ongoing upgrades
  • 119. • Protecting yourself on your personal computer and mobile devices is a primary concern • Your data [whether personal like bank account or professional like work documents] can be useful resources to hackers • Use strategies to prevent issues and continue to be educated about cybersecurity
  • 120. • Topic 1 – Secure Passwords – Check the strength of passwords – Helps you determine if your passwords are strong or not • Topic 2 – Secure User Accounts – Prevents unwarranted access to your data/files – Logins can deter access from family/friends
  • 121. Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? Cybercrime White-hat hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT launch a denial of service (DoS) attack on your computer. All of the following were top cybercrimes reported to the IC3 EXCEPT theft of services. • Cybercrime, Cybercriminals, Common types of cybercrimes • Most financially damaging cybercrime for individuals is identity theft • Messaging, Malware and Mobile Anti- Abuse Working Group (M3AAWG) Found half of e-mail users have opened spam • Types of hackers: White-hat (ethical hackers), Black-hat hackers, Grey-hat hackers • Packet analyzer (sniffer) • Keylogger
  • 122. • Trojan horses—Appear to be useful • Rootkits • Zombies • Denial-of-Service – Legitimate users are denied access to a computer system – System shuts down • DDoS • A rootkit allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. • A DDoS attack floods a computer with requests until it shuts down and refuses to answer any requests for information. • A zombie is another person's computer controlled by a hacker. True
  • 123. • This is Microsoft DOS [not Denial of Service attack]
  • 124. • Not limited to computers • Widespread cybercrime: Spreading viruses • Main purpose and Secondary objectives • Sources of virus infection • Classified by methods used to avoid detection: Polymorphic viruses, Multipartite viruses, Stealth viruses • Creating and distributing computer viruses is one of the most widespread types of cybercrimes. • All of the following activities may infect your computer with a virus EXCEPT printing a document. • Which of the following classifications of viruses can change its own code to avoid detection? Polymorphic • With regard to computer protection, quarantining is defined as placing a found virus in a secure area on the hard drive. • A(n) virus signature is the portion of virus code that is unique to a particular computer virus.
  • 125. • Boot-sector viruses are often transmitted by a flash drive left in a USB port. • A time bomb is a virus that is triggered on a certain date. • A macro virus is a virus that is attached to documents such as Word or Excel files. • Currently, there are no antivirus programs for mobile devices. False • A worm does NOT require human interaction to spread to other computers. True
  • 126. • Malware has malicious intent – Adware displays sponsored advertisements – Spyware is an unwanted piggy-back program • Transmits information • Tracking cookies • Keystroke logger • Many antispyware packages are available • Spam—junk e-mail • Tactics to minimize spam • Spyware is a program that gathers information about your surfing habits without your knowledge.
  • 127. • Type of malware • Attempts to convince you something is wrong … and to pay money to fix it • Firewall—hardware or software • Windows and OS X include firewalls • Security suites include firewall software • You can block logical ports from invaders and make your computer invisible to others on the Internet by installing a firewall. • Configuring a firewall to ignore all incoming packets that request access to a specific port is known as logical port blocking.
  • 128. • Antivirus software – Detects viruses and protects your computer. Like Symantec, Kaspersky, AVG, McAfee • Need strong passwords. Password strength tests • Operating systems have built-in password protection • Biometrics: Fingerprint, Iris pattern in eye, Voice authentication, Face pattern recognition • Provide a high level of security • Rules for creating passwords include all of the following EXCEPT use a dictionary to find a lengthy word that is easy to remember.
  • 129. • Protect your personal Information. Backups are copies of data • Backup your data from: Unauthorized access, Tampering, Destruction • Power surges • Surge protector – Replace every 2–3 years – Use with all devices that have solid-state • Social engineering is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
  • 130. • Four main security concerns with mobile devices: – Keeping them from being stolen – Keeping data secure in case they are stolen – Finding a device if it is stolen – Remotely recovering and wiping data off a stolen device
  • 131. • Topic 1 – Information Privacy – Google yourself; you should be comfortable with the information that is visible • Topic 2 – Web Browsers – Install software to check to see what is going on behind the scenes when you visit websites • Topic 3 – Encryption – Serves as a protection tool when using the web, email, and more
  • 132. • Cookies are small text files received when you visit a website • Help companies determine the effectiveness of their marketing • Do not search drive for personal information • May invade your privacy • Pose no security threat • Which of the following statements about cookies is NOT true? Cookies obtain your personal information by searching your hard drive. • CAPTCHA is the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website.
  • 133. • Phishing – Luring people into revealing information • Pharming – Malicious code planted on your computer to gather information • Guidelines to avoid schemes • When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as pharming.
  • 134. • Read pg. 557 in Tech in Action to answer questions 1 & 2 within Topic 3 on Security Assignment 2 • Wi-Fi Encryption • Data Encryption • Web Encryption
  • 135. • A methodology using algorithms to modify data, text, code, etc. to prevent the opportunity of hacking and misuse of information • Courses such as Cryptography devote a substantial amount of time towards this process • Encryption can exist as: Wi-Fi Encryption, Data Encryption, and Web Encryption • Encryption can be one of the most secure ways to protect your computer and mobile device
  • 136. • Wi-Fi Encryption is the encryption method you take to protect outside access to your network [whether at home or not] • Three common types are WEP, WPA, WPA2 • Wired Equivalent Privacy can be 64, 128, or 256 bit encryptions; commonly used, but easily hacked • Wi-Fi Protected Access is 256 bit encryption; created due to the vulnerabilities of WEP • Wi-Fi Protected Access II is an updated version of WPA and the most secure encryption tool for Wi-Fi
  • 137. • Focuses heavily on making text or information sent via email or other online transmit difficult to decipher [or read] • Substitution ciphers are the most common tool for this task
  • 138. • Look for the “lock” – it means the most secure websites • Digital Certificates – Like cookies; gives access based on prior approval/visit [can expire] • SSL Encryption – Most common web encryption tool
  • 139. • Twitter says: – Secure Connection – The connection to this site is encrypted and authenticated using a strong protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and a strong cipher (AES_128_GCM). • Instagram says: – Secure Connection – The connection to this site is encrypted and authenticated using a strong protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and a strong cipher (CHACHA20_POLY1305). • Your results may vary. A similar protocol, key exchange, and cipher are perfectly fine, but often each site will have its own cipher.
  • 140. • Hackers go after the Elderly due to their financial stability and Young adults due to their available credit • Google Images is a stronger tool than Google Search in viewing your digital footprint • Mobile devices are at the same risk as your personal computers • Using Wi-Fi is risky; look for Wi-Fi with a password to make it a little more secure
  • 141. • Five Ethical/Social Issues • Security Assignment 1 • Security Assignment 2
  • 142. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Wednesday
  • 143. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 144. • Review • Best Advice for Security • Zero Days • Wi-Fi Group Assignment • Security Assignment #1 and #2 Review • Looking Forward
  • 145. • Ethics vs. Law • Two groups are Hacker targets • Create secure passwords • Secure your devices • DDoS, DoS, and DOS • Encryptions – Web, Wi-Fi, and Data
  • 146. • Looking to steal info or identities • Keyloggers • Packet sniffers • Three types of hackers
  • 147. • Types of viruses • Virus methods • Virus purposes • How to prevent viruses
  • 148. • Malware • Adware • Spyware • Scareware • SPAM
  • 149. • Firewalls • Backup data • Prevent unwanted access • Preventing theft
  • 150. • Cookies • Google Search + Google Images • Third Party Websites • Phishing and Pharming Scams
  • 151. • Learn from the past. Don’t run from it!
  • 152.
  • 153. • What are Zero Days? – Vulnerabilities in the code that can be hacked • What are Bug Bounties? – Payment for identifying a zero day in the software/code • You can either fix a Zero Day, pay someone to fix it, or get hacked
  • 154. WENDY’s • Free Wi-Fi • User Agreement • Privacy Policy DUNKIN DONUTS • Free Wi-Fi • User Agreement • Privacy Policy
  • 155. • Wendy’s and Dunkin Donuts both offer Free Wi-Fi, but one is a safer Wi-Fi option than the other • Consider accessing the Wi-Fi in the general public, not on campus (ie the store in your town) • Teams will be split among the class with two captains • Team captains will choose either Wendy’s or Dunkin Donuts • Each team will research their company’s Wi-Fi information to determine: a) If it is a safe bet to use their company’s Wi-Fi and b) If it is a safe bet to use the other team’s company’s Wi-Fi • There is a right answer; for one very important reason
  • 156. • Hackers go after the Elderly due to their financial stability and Young adults due to their available credit • Google Images is a stronger tool than Google Search in viewing your digital footprint • Mobile devices are at the same risk as your personal computers • Using Wi-Fi is risky; look for Wi-Fi with a password to make it a little more secure
  • 157. • Five Ethical/Social Issues • Security Assignment 1 • Security Assignment 2
  • 158. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Monday
  • 159. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 160. • Mobile Security • Alyssa Presentation
  • 161. • Issues – occur at multiple layers • Prevention • Detection • Reaction
  • 162. • https://www.youtube.com/watch?v=zrqnNXsT H2g • 3:07 minute video on strategies for protecting yourself when using a mobile device via awareness.
  • 163. • Computing issues already discussed • Plus – Data snooping – Hijack sessions – Eavesdropping
  • 164. • Privacy issues • Security issues • Mobile Malware – DroidDream (Android) • Steals data; sends to hacker – Ikee (iOS) • Worm – Zitmo • Steals info via SMS
  • 166. • Bluetooth • Wi-Fi • Remote Wipe • Activation Lock • Privacy Controls
  • 167. https://www.youtube.com/watch?v=WrDkYpVh 0MM 5:23 Minute Video on Apple hacks Apple often updating based on hacks
  • 169. • 3rd Party websites are accessing your computer when you access them • Same is true on a mobile device • Phones store a lot of data you don’t want to lose
  • 170. • Five Ethical/Social Issues • Security Assignment 1 • Security Assignment 2 • Study for Security Exam
  • 171. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Wednesday
  • 172. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 173. • Security Exam • Chloe, Dena, Matilda, Mahen, Christine, Shane, Alexia, Boyce Present • In the event anyone does not present today they will present on Monday
  • 174. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Monday
  • 175. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 176. • Sarah, Dan, Dalton, Michael, Stephanie, Elvis, Andrew Present • In the event anyone does not present today they will present on Wednesday
  • 177. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Wednesday
  • 178. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 179. • Gianna, Denise, Kyla, Emma, Yannick, Olivia, Liana, Jenna Present • In the event anyone has yet to present they will present on Monday
  • 180. • Yes, the old man in front of the room is done talking for today • CLASS DISMISSED • See you on Monday
  • 181. Professor Marino Mondays and Wednesdays 8:30-9:50AM Howard Hall 207
  • 182.
  • 183.
  • 184.
  • 185.
  • 186. • Once you finish the exam you are free to go • Best of luck in the future!

Editor's Notes

  1. Both Students Submit Same Work: If another student submits your work, you will receive an F in the course. This applies to any graded assignment. Both parties will automatically receive an F. There are no exceptions. SAM Cheating: Download your personalized starting file. Make the changes. Upload your file for grading. Uploading another student's file for grading, Copying and pasting from another student's file. Other actions may also be flagged. SAM - reports the name of the student from whom the work was copied. Protect Yourself: Do not show your work to other students. Do not give your work to other students. Do not allow other students to use your account. Do not allow other students to use your computer unless it is under a guest account. It is a responsibility of all students to protect their files from unauthorized access and use. TurnItIn: Turnitin.com – reports the source of the plagiarized material.
  2. Input: Gathers data, allows entering data Process: Manipulates, calculates, or organizes data Output: Displays data and information Storage: Saves data and information
  3. Input: Gathers data, allows entering data Process: Manipulates, calculates, or organizes data Output: Displays data and information Storage: Saves data and information
  4. Input: Gathers data, allows entering data Process: Manipulates, calculates, or organizes data Output: Displays data and information Storage: Saves data and information
  5. Input: Gathers data, allows entering data Process: Manipulates, calculates, or organizes data Output: Displays data and information Storage: Saves data and information
  6. Input: Gathers data, allows entering data Process: Manipulates, calculates, or organizes data Output: Displays data and information Storage: Saves data and information
  7. Input: Gathers data, allows entering data Process: Manipulates, calculates, or organizes data Output: Displays data and information Storage: Saves data and information
  8. Input: Gathers data, allows entering data Process: Manipulates, calculates, or organizes data Output: Displays data and information Storage: Saves data and information
  9. Input: Gathers data, allows entering data Process: Manipulates, calculates, or organizes data Output: Displays data and information Storage: Saves data and information
  10. Input: Gathers data, allows entering data Process: Manipulates, calculates, or organizes data Output: Displays data and information Storage: Saves data and information
  11. Input: Gathers data, allows entering data Process: Manipulates, calculates, or organizes data Output: Displays data and information Storage: Saves data and information
  12. Input: Gathers data, allows entering data Process: Manipulates, calculates, or organizes data Output: Displays data and information Storage: Saves data and information
  13. Input: Gathers data, allows entering data Process: Manipulates, calculates, or organizes data Output: Displays data and information Storage: Saves data and information
  14. Input: Gathers data, allows entering data Process: Manipulates, calculates, or organizes data Output: Displays data and information Storage: Saves data and information
  15. Input: Gathers data, allows entering data Process: Manipulates, calculates, or organizes data Output: Displays data and information Storage: Saves data and information
  16. Input: Gathers data, allows entering data Process: Manipulates, calculates, or organizes data Output: Displays data and information Storage: Saves data and information
  17. Cybercrime is any criminal action perpetrated primarily through the use of a computer. Cybercriminals are individuals who use computers, networks, and the Internet to perpetrate crime. Four common categories of complaints received were FBI-related scams, identity theft, nonauction/non-delivery of merchandise, and advance fee fraud. Although the top four complaints all relate to some type of fraud, other complaints received involved equally serious matters such as computer intrusions—hacking—child pornography, and blackmail. Many victims of identity theft spend months, or even years, trying to repair their credit and eliminate fraudulent debts. Identity theft occurs when a thief steals personal information such as your name, address, Social Security number, birth date, bank account number, and credit card information and runs up debts in your name. The nefarious acts cover a wide range of activities. A survey by the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) found that half of e-mail users in North America and Europe have opened spam. A hacker is most commonly defined as anyone who unlawfully breaks into a computer system. Hackers may be identified as: White-hat hackers break into systems for nonmalicious reasons such as to test system security vulnerabilities or to expose undisclosed weaknesses. Black-hat hackers break into systems to destroy information or for illegal gain. Grey-hat hackers illegally break into systems to flaunt their expertise or to attempt to sell their services in repairing security breaches. A packet analyzer (sniffer) is a program deployed by hackers that looks at (or sniffs) each packet as it travels on the Internet. A keylogger is a program that captures all keystrokes made on a computer.
  18. A Trojan horse is a program that appears to be something useful or desirable, but does something malicious in the background without your knowledge. Backdoor programs and rootkits are programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. A computer that a hacker controls is referred to as a zombie. Zombies are often used to launch denial-of-service attacks on other computers. In a denial-of-service attack, legitimate users are denied access to a system because a hacker is repeatedly making requests of that system through a computer the hacker has taken over as a zombie. A computer can handle only a certain number of requests for information at one time. When it is flooded with requests, it shuts down and refuses to answer any requests for information, even if the requests are from a legitimate user. A distributed denial-of-service (DDoS) attack, launches DoS attacks from more than one zombie at the same time.
  19. Viruses are not limited to computers; smartphones, tablet computers, and other devices can be infected. Creating and disseminating viruses are two of the most widespread types of cybercrimes. A virus’s main purpose is to replicate itself and copy its code into as many other host files as possible. The majority of viruses have secondary objectives or side effects. Downloading and running a file that’s attached to the e-mail are common ways to infect your computer. Viruses can be classified by the methods they take to avoid detection: A polymorphic virus changes its code to avoid detection. Most polymorphic viruses infect a particular type of file. A multipartite virus is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it. Stealth viruses temporarily erase their code from the files where they reside and hide in the active memory of the computer.
  20. Malware is software that has a malicious intent Adware displays unsponsored advertisements Spyware is an unwanted program that downloads with other software from the Internet and runs in the background. Spyware transmits information about you. Many spyware programs use tracking cookies. A keystroke logger program monitors keystrokes. Other anti-spyware programs are easy to install and update. Spam is unwanted or junk e-mail. There are several ways to help avoid spam: Create a free e-mail address Spam filters Buy third-party programs Reclassify e-mails that have been misidentified as spam
  21. Scareware is a type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus or other type of malware. You’re then directed to a website where you can buy fake removal or antivirus tools that provide little or no value. Scareware is a social engineering technique because it uses people’s fear of computer viruses to convince them to part with their money. A firewall is a software program or hardware device designed to protect computers from hackers. Both Windows and OS X include reliable firewalls. The Windows Action Center is a good source of information about the security settings on your computer, including the status of your firewall. Security suites such as Norton Internet Security, McAfee Internet Security, and ZoneAlarm Internet Security Suite also include firewall software.
  22. Antivirus software is specifically designed to detect viruses and protect your computer and files from harm. Symantec, Kaspersky, AVG, and McAfee are among the companies that offer highly rated antivirus software packages. Antivirus protection is also included in comprehensive Internet security packages such as Norton Internet Security, Kaspersky Internet Security, and McAfee Total Protection. These software packages also help protect you from threats other than computer viruses. Strong passwords are difficult for someone to guess. There are many password generators available for free, such as the Strong Password Generator. You can use online password strength testers, such as the Password Meter, to evaluate your passwords. To restrict access to your computer, Windows, OS X, and most other operating systems have built-in password (or passcode) protection for files as well as the entire desktop. A biometric authentication device is a device that reads a unique personal characteristic such as a fingerprint or the iris pattern in your eye and converts it to a digital code. Because no two people have the same biometric characteristics, these devices provide a high level of security. Other biometric devices, including voice authentication and facial recognition systems, are now widely offered in notebook computers, tablets, and smartphones.
  23. The data on your computer faces three major threats: Unauthorized access Tampering Destruction Backups Copies of files that you can use to replace the originals if they’re lost or damaged Power surges occur when an electrical current is supplied in excess of normal voltage. Old or faulty wiring, downed power lines, malfunctions at electric company substations, and lightning strikes can all cause power surges. A surge protector protects your computer. Replace surge protectors every 2–3 years or after a major surge. All electronic devices that have solid-state components, such as TVs, stereos, printers, and cell phones should be connected to a surge protector.
  24. You have four main security concerns with mobile devices: Keeping them from being stolen Keeping data secure in case they are stolen Finding a device if it is stolen Remotely recovering and wiping data off a stolen device
  25. Cookies are small text files that some websites automatically store on your hard drive when you visit them. Companies use this information to determine the traffic flowing through their website and the effectiveness of their marketing strategy. Cookies do not go through your hard drive in search of personal information. The main concern is that advertisers will use this information indiscriminately, thus invading your privacy. Cookies pose no security threat because it is virtually impossible to hide a virus or malicious software program in a cookie.
  26. Phishing lures Internet users to reveal personal information. Pharming occurs when malicious code is planted on your computer. These guidelines help to avoid such schemes: Never reply directly to any e-mail asking for personal information. Don’t click on a link in an e-mail. Check with the company asking for information. Never give personal information over the Internet unless you know the site is secure. Use phishing filters. Use Internet security software that’s constantly being updated.
  27. Ethics = unwritten rules; Law = written rules Two groups are attacked by hackers – young adults [18 to 19 year olds] due to their available credit and elderly people due to their financial stability DoS = denial-of-service attack DDoS = distributed denial-of-service DOS = Microsoft DOS Secure passwords and securing devices; questions on Security Assignment #1 Web encryption secures your web browsing, data encryption prevents unwarranted access to information you send, and Wi-Fi encryption prevents unwarranted access to your system [internet connection]. The lock shows secure websites.
  28. Hackers may be identified as: White-hat hackers break into systems for nonmalicious reasons such as to test system security vulnerabilities or to expose undisclosed weaknesses. Black-hat hackers break into systems to destroy information or for illegal gain. Grey-hat hackers illegally break into systems to flaunt their expertise or to attempt to sell their services in repairing security breaches. A packet analyzer (sniffer) is a program deployed by hackers that looks at (or sniffs) each packet as it travels on the Internet. A keylogger is a program that captures all keystrokes made on a computer.
  29. Viruses are not limited to computers; smartphones, tablet computers, and other devices can be infected. Creating and disseminating viruses are two of the most widespread types of cybercrimes. A virus’s main purpose is to replicate itself and copy its code into as many other host files as possible. The majority of viruses have secondary objectives or side effects. Downloading and running a file that’s attached to the e-mail are common ways to infect your computer. Viruses can be classified by the methods they take to avoid detection: A polymorphic virus changes its code to avoid detection. Most polymorphic viruses infect a particular type of file. A multipartite virus is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it. Stealth viruses temporarily erase their code from the files where they reside and hide in the active memory of the computer. Antivirus software Biometrics
  30. Malware is software that has a malicious intent Adware displays unsponsored advertisements Spyware is an unwanted program that downloads with other software from the Internet and runs in the background. Spyware transmits information about you. Many spyware programs use tracking cookies. A keystroke logger program monitors keystrokes. Scareware is a type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus or other type of malware. You’re then directed to a website where you can buy fake removal or antivirus tools that provide little or no value. Scareware is a social engineering technique because it uses people’s fear of computer viruses to convince them to part with their money.
  31. A firewall is a software program or hardware device designed to protect computers from hackers. The data on your computer faces three major threats: Unauthorized access Tampering Destruction Backups Copies of files that you can use to replace the originals if they’re lost or damaged You have four main security concerns with mobile devices: Keeping them from being stolen Keeping data secure in case they are stolen Finding a device if it is stolen Remotely recovering and wiping data off a stolen device
  32. Cookies are small text files that some websites automatically store on your hard drive when you visit them. Companies use this information to determine the traffic flowing through their website and the effectiveness of their marketing strategy. Cookies do not go through your hard drive in search of personal information. The main concern is that advertisers will use this information indiscriminately, thus invading your privacy. Cookies pose no security threat because it is virtually impossible to hide a virus or malicious software program in a cookie. Phishing lures Internet users to reveal personal information. Pharming occurs when malicious code is planted on your computer. These guidelines help to avoid such schemes: Never reply directly to any e-mail asking for personal information. Don’t click on a link in an e-mail. Check with the company asking for information. Never give personal information over the Internet unless you know the site is secure. Use phishing filters. Use Internet security software that’s constantly being updated.
  33. https://www.youtube.com/watch?v=dZfGTL2PY3E
  34. https://www.youtube.com/watch?v=UPXctbdBth0&t=62s
  35. A mobile device is at the same risk as a stationary device, but has one more opportunity for hackers to hack into your device [Bluetooth]. When using a mobile device you need to have features on your device that can prevent security issues [such as antivirus software], you need to be able to detect any issues that may occur, and react to them in an appropriate manner, such as wiping your device.
  36. Your mobile devices can be accessed through the Wi-Fi, downloading Apps, and via Bluetooth.
  37. Only download from trusted sources and refrain from downloading when on an unsafe network such as a Hotspot or Wi-Fi outside of the home or trusted network.
  38. Yes, Apple products are more secure than other products, but not without issues/flaws.
  39. Apple offers a bug bounty program
  40. Show Lightbeam example
  41. https://www.youtube.com/watch?v=wJlblKmSLIk
  42. https://www.youtube.com/watch?v=WSdAdqRoYSw