1 / 25

BTA Unit 1 Continued

BTA Unit 1 Continued. Information Processing. Obstacles to Managing Information. Data can be hard to organize, easy to lose, easy to alter, hard to locate, and even incorrect. Obstacles: Uncoordinated procedures and files Duplication of information

rendor
Télécharger la présentation

BTA Unit 1 Continued

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BTA Unit 1 Continued Information Processing

  2. Obstacles to Managing Information • Data can be hard to organize, easy to lose, easy to alter, hard to locate, and even incorrect. • Obstacles: • Uncoordinated procedures and files • Duplication of information • Incompatible databases (unable to work together)

  3. Example of Incompatible Databases • Page 71 from Office book

  4. Information Technologies • Can be used to improve communication among the staff and between companies. • Examples • Computers connected to networks, internet • Electronic Imaging- converting paper documents to pictures stored & displayed via computer • Interactive voice response- reducing manual processes for obtaining data and/or providing information • Interactive CD-ROM

  5. Operating System • Controls the operation of the computer and communicates with devices such as printers. • Operating systems must be compatible or they will not work—In other words your software and hardware must be compatible. • Example • Apple products versus IBM, etc.

  6. NETWORKS • A computer network links two or more computers so they can share information. • LAN- Local Area Network-a group of connected computers that are close to each other • WAN-Wide Area Network- links computers that are separated by long distances

  7. Objectives • Student should be able to describe computer preventive maintenance and identify the Fix it 5.

  8. Relevant Vocabulary • Maintenance- to maintain, take care of • Hard drive-The hard drive is what stores all your data. It houses the hard disk, where all your files and folders are physically located. • Virus-malicious software programs that can infect your computer • Anti-Virus-To prevent viruses from attacking • Firewall-prevent unauthorized people from entering your computer • Troubleshoot-to find and solve minor problems

  9. Computer Preventive Maintenance • Prevent– Keep from happening • Computer Preventive Maintenance means you take care of your computer in hopes that you are preventing some of the most common computer problems.

  10. Computer Preventive Maintenance- The Fix it 5 • 1. Keep your hard drive clean and uncluttered. • If you find that your computer is slow—this is where you should start. • -Disk Cleanup Utility- Main function is to eliminate unwanted files from your hard drive.

  11. Fix It 5 • 2. Perform regular Registry Cleanup • 3. Protect your PC (personal computer) from external threats: • Viruses • Spyware • Online criminals/hackers

  12. Fix It 5 • 3 protect your PC from external threats • How? • Anti-Virus-To prevent viruses, worms from attacking • Anti-Spyware-To prevent Spyware and Adware from sabotaging your PC • Firewalls- Prevent unauthorized people from gaining entry into your computer.

  13. Fix It 5 • 4. Updates • Update all your programs every time an update is available ….any program. • This keeps any unwanted intruder out of your system.

  14. Fix It 5 • 5. Backup, Backup, Backup • Backup your data on a portable drive and secure it. These are the most important bits on your computer and can not be replaced!

  15. Troubleshooting • Establish Symptoms • Identify the affected area • Establish what has changed • Select the most probable cause • 5. Implement a Solution • 6. Test the result • 7. Recognize potential effects of the solution • 8. Document the solution.

  16. Troubleshooting Strategies • Trial and error • Make one change at a time • Look at cable connections • More than 70% of all computer problems are related to cabling and connections.

  17. Data Encryption • Seeks to secure transmissions of data • Lots of businesses operate electronically • Information we don’t want other people to see: • Credit-card information • Social Security numbers • Private correspondence • Personal details • Sensitive company information • Bank-account information

  18. There are simple ways to keep information like flash drives, memory drives or external hard drives. But the most popular forms of security all rely on encryption, the process of encoding information in such a way that only the person (or computer) with the key can decode it. Data Encryption

  19. Internet Exercise Look up the word Cryptography What did you find out about it?

  20. Data Encryption Ciphers are also better known today as algorithms, which are the guides for encryption – they provide a way in which to craft a message and give a certain range of possible combinations. A key, on the other hand, helps a person or computer figure out the code.

  21. Data Encryption Computer encryption systems generally belong in one of two categories: 1. Symmetric-key encryption 2. Public-

  22. Data Encryption- Symmetric • each computer has a secret key (code) that it can use to encrypt apacketof information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.

  23. Data Encryption- Public Key • Also known as asymmetric-key encryption, public-keyencryption uses two different keys at once -- a combination of a private key and a public key. The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key.

  24. Compare/Contrast • Draw a Venn Diagram to compare and contrast symmetric data encryption to public data encryption.

  25. QUESTIONS????????????????

More Related