Introduction to Information Sciences Introduction to the ...
Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 -...
Transcript of Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 -...
![Page 1: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/1.jpg)
Introduction to Information
Technology and Applications
![Page 2: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/2.jpg)
Computer Maintenance,
Security and Problem Solving
Week 4
![Page 3: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/3.jpg)
Objectives
At the end of this lesson, you will learn:
How to maintain computers
Basic security terminology
How to protect your computer
How to resolve computer related problems
![Page 4: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/4.jpg)
Computer Maintenance
Computer maintenance is set of services or
procedures performed to keep a computer in
good working, robust condition.
A well-maintained computer
Performs faster
Runs more efficiently
Crashes less
Maintaining your computer will save you money,
time, and protect your data.
![Page 5: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/5.jpg)
Why maintenance is important?
![Page 6: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/6.jpg)
Why maintenance is important?
![Page 7: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/7.jpg)
File Security
File Security is a feature of your file system that:
Controls which users can access to which files.
Brings limitations on what users can do with files.
For instance,
A file may be viewed by everyone but only certain
specific people may change it.
A file may be secured so that only the owner may
view it.
You can use password to prevent other people
from opening or modifying your file
![Page 8: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/8.jpg)
![Page 9: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/9.jpg)
![Page 10: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/10.jpg)
![Page 11: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/11.jpg)
![Page 12: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/12.jpg)
![Page 13: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/13.jpg)
![Page 14: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/14.jpg)
Computer Security
![Page 15: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/15.jpg)
Computer Security Computer criminals (hackers or crackers) can
attack Directly, by breaking into your computer through the
Internet and stealing your personal information
Indirectly, by creating malware (MALicioussoftWARE)
Malware is any software designed to cause damage to a single computer, server, or computer network, whether it’s a virus, spyware, Trojan, etc.
Fortunately, you can protect yourself by taking some simple precautions.
![Page 16: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/16.jpg)
![Page 17: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/17.jpg)
Click System and Security, and then click
Action Center, click Security
![Page 18: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/18.jpg)
Security Center checks your computer for these
security essentials:
Firewall
Automatic updating
Malware protection
Other security settings
![Page 19: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/19.jpg)
![Page 20: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/20.jpg)
![Page 21: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/21.jpg)
![Page 22: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/22.jpg)
![Page 23: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/23.jpg)
![Page 24: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/24.jpg)
![Page 25: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/25.jpg)
![Page 26: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/26.jpg)
![Page 27: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/27.jpg)
![Page 28: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/28.jpg)
![Page 29: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/29.jpg)
![Page 30: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/30.jpg)
![Page 31: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/31.jpg)
![Page 32: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/32.jpg)
![Page 33: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/33.jpg)
![Page 34: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/34.jpg)
![Page 35: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/35.jpg)
![Page 36: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/36.jpg)
![Page 37: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/37.jpg)
![Page 38: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/38.jpg)
![Page 39: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/39.jpg)
![Page 40: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/40.jpg)
![Page 41: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/41.jpg)
![Page 42: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/42.jpg)
![Page 43: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/43.jpg)
![Page 44: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/44.jpg)
![Page 45: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/45.jpg)
![Page 46: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/46.jpg)
![Page 47: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.](https://reader033.fdocuments.in/reader033/viewer/2022060609/606026899943cb1f9f60bd76/html5/thumbnails/47.jpg)
Question?