Midterm It Era

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

IT ERA: Hardware and Software  SECONDARY STORAGE- Consists of

equipment designed large volume of


 Information Technology- Computer-
data for long-term storage.
based tool that people use to work with
EXAMPLES:
information and support the
-Hard Drives
information and information-processing
-Optical Drives
needs an organization.
-CD Drive
 Hardware- Consists of the physical
-DVD Drive
devices associated with a computer
-Combo CD/DVD Drive
system.
-Blu-Ray Drive (BD)
 Software- The set of instructions that -Memory Cards
the hardware executes to carry out -SD
specific tasks. -Compact Flash
-Memory Sticks
-USB Drives
HARDWARE COMPONENTS: -Pen Drives
 Central Processing Unit (CPU)- Actual -Flash Drives
hardware that interprets and executes
program instructions and coordinates
how all the other hardware devices  Input Device- Equipment used to
work together. capture information and commands.
 NOTE: EXAMPLES:
 Megahertz (MHz)- Millions -Keyboard
 Gigahertz (GHz)- Billions -Mouse
-Microphone
-Touch Screen
TWO MAIN PARTS OF CPU: -Digital Camera
 Control Unit- Interprets software -Bar Code Scanner
instructions and literally tells the other -Biometric Input Devices
hardware devices what to do, based on (KMMTDBB)
the software instructions.
 Arithmetic Logic Unit (ALU)- Performs
all arithmetic operations and all logic  Output Device- Equipment used to see,
operations (sorting and comparing hear, or accept the results of
numbers). information processing requests.
EXAMPLES:
-Monitors
PRIMARY STORAGE: -Cathode-ray tube (CRT)
 ROM (Read Only Memory)- Programs -Liquid Crystal Display (LCD)
or data recorded in the memory by the -Printers
manufacturer. -Laser Printer
-Ink-jet Printer
NOTE: Data or programs in ROM can be -Plotter
used but not changed. -Speakers
Cyberbully or Cyberstalking - Harassing or
stalking others online.
COMMUNICATION DEVICE:
 Equipment (MODEM) stands for Cybersquatting- Setting up a domain of another
Modulator, Demodulator- Used to send person or company with the sole intentions of
information and receive it from one selling it to them later at a premium price.
location to another.
Creating Malware- Writing, creating, or
EXAMPLES:
distributing malware (e.g., viruses and
-Dial-up Access
spyware.)
-Broadband Access
-Cable Denial of Service attack- Overloading a system
-Fiber-optic Service (FiOS) with so many requests it cannot serve normal
-Digital Subscriber Line (DSL) requests.
-Satellite
Espionage- Spying on a person or business.
-Wireless
Fraud- Manipulating data, e.g., changing
banking records to transfer money to an
COMPUTER WASTE, MISTAKES, AND account or participating in credit card fraud.
CRIME
Harvesting- Collect account or other account
 Computer Crime- An act by a related information on other people.
knowledgeable computer user, Human Trafficking - Participating in the illegal
sometimes referred to as a hacker that act of buying or selling other humans.
illegally browses or steals a company’s
or individual’s private information. Identity Theft - Pretending to be someone you
are not.
Referred As: Illegal Sales - Buying or selling illicit goods
1. Cyber Crime online including drugs, guns, and psychotropic
2. E-Crime substances.
3. Electronic Crime
4. Hi- Tech Crime Intellectual Property Theft - Stealing practical
or conceptual information developed by
another person or company.
EXAMPLES: IPR Violation - An intellectual property rights
Child Pornography - Making or distributing child violation is any infringement of another's
pornography. Copyright, patent, or trademark.
Copyright Violation - Stealing or using another Phishing - Deceiving individuals to gain private
person's Copyrighted material without or personal information about that person.
permission.
Salami Slicing - Stealing tiny amounts of money
Cracking- Breaking or deciphering codes that from each transaction.
are being used to protect data.
Scam- Tricking people into believing something
Cyber Terrorism- Hacking, threats, and that is not true.
blackmailing towards a business or person.
Slander- Posting libel or slander against another life cycle has led to a rapid escalation in
person or company. the generation of solid waste.

Software Piracy - Copying, distributing, or using • Toxic Materials- Because old electronic
software that is Copyrighted that you did not devices contain toxic substances such as
purchase. lead, mercury, cadmium and chromium,
proper processing is essential to ensure
Spamming- Distributed unsolicited e-mail to
that these materials are not released
dozens or hundreds of different addresses.
into the environment. They may also
Spoofing - Deceiving a system into thinking you contain other heavy metals and
are someone you really are not. potentially toxic chemical flame
retardants.
Typo Squatting- Setting up a domain that is a
misspelling of another domain. • International Movement of Hazardous
Waste- The uncontrolled movement of
Unauthorized Access- Gaining access to e-waste to countries where cheap labor
systems you have no permission to access. and primitive approaches to recycling
Wiretapping- Connecting a device to a phone have resulted in health risks to
line to listen to conversations. residents exposed to the release of
toxins continues to an issue of concern.
COMPUTER WASTE/ E-WASTE:

 These EOL(End-Of-Life) electronic • Computer Mistakes- An error is a term


devices, also known as e-waste and e- used to describe any issues that arises
scrap, includes such items as dated unexpectedly that cause a computer to
computer equipment, stereos, not function properly. Computers can
televisions, and mobile phones. Such encounter either software errors and
things can often be refurbished or hardware errors.
recycled, yet a significant amount still
finds its way to the landfill. • 5 Computer Mistakes:
-Not backing up important files
WHY IS ELECTRONICS RECYCLING IMPORTANT? -Clicking next or ok without reading
• Rich Source of Raw Materials- -Not saving work
Internationally, only 10-15 percent of -Turning off the computer improperly
the gold in e-waste is successfully -Chain Mail
recovered while the rest is lost.
Ironically, electronic waste contains
deposits of precious metal estimated to
be between 40 and 50 times richer than
ores mined from the earth, according to
the United Nations.

• Solid Waste Management- Because the


explosion of growth in the electronics
industry, combined with short product

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy