First Generation: Used vacuum tubes.
Next Generation: Replaced vacuum tubes with transistors.
1960s: Introduction of integrated circuits.
1971: Development of the microprocessor.
1970s-1980s: Rise of the Personal Computer (PC).
Professional Online Presence:
Keep social profiles professional.
Upload and proofread resumes.
Use professional networks (LinkedIn, GitHub, etc.).
Certifications:
Demonstrates expertise in software, hardware, operating systems.
Requires time and financial commitment.
URL (Uniform Resource Locator)
HTTP/HTTPS (Hypertext Transfer Protocol)
Server address
Pathname
File name
Web server
Domain Name & IP Address
Navigate the Web:
Address bar
Cache
Breadcrumbs
Navigation bar
.com: most commercial sites that sell products and services
.edu academic and research sites such as schools and universities
.gov US government organizations
.net network providers, isps, and other internet administrative organizations
.org organizations such as political or not for profit
Pros: Accessibility, automatic updates, cross-platform, collaboration with others, access anywhere, save storage
Cons: Security risks, requires internet access, might not be able to access, can lose files, may move slower
Secure Websites:
Use encryption
Hypertext Transfer Protocol Secure (HTTPS)
Require digital certificates (lock icon).
Login authentication for sensitive info.
Insecure Websites:
Lack of encryption.
Susceptible to data breaches.
B2C (Business to Consumer) / E-Retail
Electronic storefront:
Tracks selected items using cookies
Secure payment methods: TLS, 3D Secure, Online Payment Services.
Complies a database of information about webpages
Uses spiders/crawlers to build an index of terms and their location.
When one enters a query, the search engine refers to its index lists & pages based on how closely they are the query.
Search results ranked by relevance, frequency, and links.
Identify the keywords or phrases that could answer the question
Use a word stem to help broaden results
Refine Web Searches
List the most relevant results, or hits, on the first page
Results labeled as an “Ad” or “Sponsored link” are from advertisers
Use Boolean Operators (AND, OR, NOT).
Refine searches: Use filters, word stems, and specialized search engines.
Copyright photos might violate intellectual property rights
A copyright gives authors & artists the legal right to sell, publish or distribute an original work
Some material is in the public domain and can be used without permission
Intellectual Property: Copyright laws protect online content.
Fair Use: Allows limited use with proper citation.
Creative Commons (CC): Licensing system for sharing content.
A citation is a formal reference to a source
CPU (Central Processing Unit):
Complex integrated circuit consisting of millions of electronic parts and is primarily responsible for converting data into meaningful information
Data travels in and out though a bus
Processes data through the Machine Cycle.
Memory Types:
RAM (Random Access Memory) – Temporary storage, virtual memory, swap file/paging file.
ROM (Read-Only Memory) – Stores firmware.
Storage Options:
Cloud Storage storing electronic files on the internet instead of a local computer
Ex: Google Drive, OneDrive, Dropbox
Installation Steps:
Check for location, components,damage, power connections, turn on and software installation.
Maintenance Tips:
Regularly clean the display, keyboard, and vents.
Use UPS( uninterruptible power supply) & surge protectors for power safety.
Backup important files.
Information Risks (Data theft, malware).
Environmental Risks (Electronic waste, heat damage).
Health Risks (Eye strain, bad posture).
Attackers
Script kittles/kiddies
Hactivists
Cyberterrorisits
Nation state actors
Insiders
Online Risks
Online banking
E-commerce shopping
Fake websites
Data mining
Social media
Protecting Personal Information
Give only necessary information when completing an online form
Malware
Viruses, worms, Trojans,
Ransomware (blocker & encrypting ransomware)
Address spoofing
Social Engineering: Attackers manipulate victims by tricking them into giving valuable information.
Phishing: Fake emails trick users into providing data.
Hoax
Spam
Protecting Personal Information
Use Strong Passwords:
At least 15-20 characters.(combination of letters, numbers & symbols)
A longer password is always more secure than a shorter password, regardless of complexity
Do not repeat characters or use sequences
Avoid dictionary words and personal info.
Use a password manager.
Encryption:
The process of “scrambling” information so it can’t be read unless the user possess the “key” to unlock it
Digital certificate: a technology used to verify a users identity and key that has been “signed” by a trusted third party
Protects data-at-rest(harddrive) and data-in-transit (internet).
Digital certificates verify identities.
Safeguarding information
Shred sensitive documents.
Monitor financial statements.
Check credit reports.
Configure browser settings (disable pop-ups, clear cache).
Avoid logging in through social media credentials.