0% found this document useful (0 votes)
34 views7 pages

Chapter 4 and 5

The document discusses various types of software programs and applications. It describes operating systems, productivity applications like word processing and spreadsheets, personal finance programs, legal and tax preparation software. It also outlines graphics and media programs, communications applications, and security and system management tools. The key purposes of these software categories are to coordinate activities, increase productivity, manage finances and legal/tax needs, edit multimedia, communicate digitally, and protect devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views7 pages

Chapter 4 and 5

The document discusses various types of software programs and applications. It describes operating systems, productivity applications like word processing and spreadsheets, personal finance programs, legal and tax preparation software. It also outlines graphics and media programs, communications applications, and security and system management tools. The key purposes of these software categories are to coordinate activities, increase productivity, manage finances and legal/tax needs, edit multimedia, communicate digitally, and protect devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Chapter 4 ● Personal finance

Programs and Apps ● Accounting


● Legal
Programs and Apps ● Tax preparation
● Document management
A program, or software, consists of a series of ● Enterprise computing
related instructions, organized for a common
purpose, that tells the computer what tasks to With productivity applications, users often:
perform and how to perform them Create a project
Edit a project
An application, or app, sometimes called application Format a project
software, consists of programs designed to make Save a project
users more productive and/or assist them with Distribute a project
personal tasks
● Word processing software allows users to
An operating system is a set of programs that create and manipulate documents
coordinates all the activities among computer or ● A major advantage of using word processing
mobile device hardware software is that it enables users to change their
- Tools and activities written words easily
- System software ● Presentation software allows users to create
visual aids for presentations to communicate
Software is available in a variety of forms: ideas, messages, and other information to a
● Retail group
● Custom ● Spreadsheet software allows users to organize
● Mobile app data in columns and rows and perform
● Web app calculations on the data
● Mobile web app ● A database is a collection of data organized in a
● Shareware manner that allows access, retrieval, and use of
● Freeware that data
● Open source – Database software allows users to create,
● Public domain access, and manage a database
● Note taking software is an application that
Productivity Applications enables users to enter typed text, handwritten
comments, drawings, sketches, photos, and
Productivity applications can assist you in becoming links anywhere on a page
more effective and efficient while performing daily ● Calendar and contact management software
activities at work, school, and home is an application that helps you organize your
● Presentation calendar, keep track of contacts, and share this
● Spreadsheet information with other users
● Database ● A software suite is a collection of individual
● Note taking related applications available together as a unit
● Word processing ● Project management software is an application
● Calendar and contact management that allows a user to plan, schedule, track, and
● Project management
analyze the events, resources, and costs of a Photo editing and photo management
project software
● Accounting software is an application that Video and audio editing software
helps businesses of all sizes record and report
their financial transactions ● Multimedia authoring software allows users to
● Personal finance software is a simplified combine text, graphics, audio, video, and
accounting application that helps home users animation in an interactive application
and small/home office users balance their ● Website authoring software helps users of all
checkbooks, pay bills, track personal income skill levels create webpages that include
and expenses, verify account balances, transfer graphics, video, audio, animation, and special
funds, track investments, and evaluate financial effects with interactive content
plans ● A media player is a program that allows you to
● Legal software is an application that assists in view images and animations, listen to audio,
the preparation of legal documents and provides and watch video files on your computer or
legal information to individuals, families, and mobile device
small businesses ● Disc burning software writes text, graphics,
● Tax preparation software is an application that audio, and video files on a recordable or
can guide individuals, families, or small rewritable disc
businesses through the process of filing federal
and state taxes Personal Interest Applications
● Document management software is an Lifestyle applications
application that provides a means for sharing, Medical applications
distributing, and searching through documents Entertainment applications
by converting them into a format that can be Convenience applications
viewed by any user Education applications
● A large organization, commonly referred to as an
enterprise, requires special computing solutions Communications Applications
because of its size and geographic distribution Online Discussion
○ Engineering or product development Blog
software Browsing
○ Human resources software Chat
○ Accounting software Instant Messaging
○ Manufacturing software Email
○ Marketing software File Transfer
○ Software for information technology staff Internet Phone
○ Distribution software Mobile Messaging
○ Customer service software Videoconference
○ Sales software Web Feeds

Graphics and Media Software Security Tools


Computer-aided design (CAD) software ● A personal firewall is a security tool that
Desktop publishing software detects and protects a personal computer and
Paint/Image editing software its data from unauthorized intrusions
● An antivirus program protects a computer hard disk so that the operating system accesses
against viruses by identifying and removing any data more quickly and programs run faster
computer viruses found in memory, on storage – Defragmenting
media, or on incoming files
● Spyware is a type of program placed on a ● A screen saver is a tool that causes a display
computer or mobile device without the user’s device’s screen to show a moving image or
knowledge that secretly collects information blank screen if no keyboard or mouse activity
about the user and then communicates the occurs for a specified time
information it collects to some outside source ● A file compression tool shrinks the size of a
while the user is online file(s)
● Adware is a type of program that displays an ● A PC maintenance tool is a program that
online advertisement in a banner or pop-up or identifies and fixes operating system problems,
pop-under window on webpages, email detects and repairs drive problems, and
messages, or other Internet services includes the capability of improving a computer’s
● A spyware remover is a type of program that performance
detects and deletes spyware and similar ● A backup tool allows users to copy, or back
programs up, selected files or the contents of an entire
● An adware remover is a program that detects storage medium to another storage location
and deletes adware ● A restore tool reverses the process and returns
backed up files to their original form
SECURITY TOOLS
Anti-spam programs SUMMARY
Web filtering software ● Programs and apps available for computers
Pop-up and pop-under blockers and mobile devices
Phishing filters ● Role of the operating system and the various
ways software is distributed
File, Disk, and System Management Tools ● Features of a variety of applications
● A file manager is a tool that performs functions ● Security tools and file, disk, and system
related to file management management tools
● A search tool is a program, usually included ● Communications applications
with an operating system, that attempts to
locate a file, contact, calendar event, app, or
any other item stored on your computer or
mobile device based on criteria you specify
● An image viewer is a tool that allows users to
display, copy, and print the contents of a
graphics file, such as a photo
● An uninstaller is a tool that removes a
program, as well as any associated entries in
the system files
● A disk cleanup tool searches for and removes
unnecessary files
● A disk defragmenter is a tool that reorganizes
the files and unused space on a computer’s
Chapter 5 ● A botnet is a group of compromised computers
Digital Security, Ethics, and Privacy or mobile devices connected to a network
-A compromised computer or device is known
● A digital security risk is any event or action as a zombie
that could cause a loss of or damage to a ● A denial of service attack (DoS attack)
computer or mobile device hardware, software, disrupts computer access to an Internet service
data, information, or processing capability -Distributed DoS attack (DDoS attack)
● Any illegal act involving the use of a computer or ● A back door is a program or set of instructions
related devices generally is referred to as a in a program that allow users to bypass security
computer crime controls
● A cybercrime is an online or Internet-based ● Spoofing is a technique intruders use to make
illegal act their network or Internet transmission appear
legitimate
Digital Security Risks ● A firewall is hardware and/or software that
Hacker protects a network’s resources from intrusion
Cracker
Script kiddie
Unethical employees ● Unauthorized access is the use of a computer
Corporate spies or network without permission
Cyberextortionist ● Unauthorized use is the use of a computer or
Cyberterrorist its data for unapproved or possibly illegal
activities
● Information transmitted over networks has a
higher degree of security risk than information ● Organizations take several measures to help
kept on an organization’s premises prevent unauthorized access and use
● Malware, short for malicious software, consists - Acceptable use policy
of programs that act without a user’s knowledge - Disable file and printer sharing
and deliberately alter the operations of ● Access controls define who can access a
computers and mobile devices computer, device, or network; when they can
access it; and what actions they can take while
accessing it
● The computer, device, or network should
maintain an audit trail that records in a file
both successful and unsuccessful access
attempts
- User name
- Password
● A passphrase is a private combination of words,
often containing mixed capitalization and
punctuation, associated with a user name that
allows access to certain computer resources
● A PIN (personal identification number),
sometimes called a passcode, is a numeric
password, either assigned by a company or provide the software product’s identification
selected by a user number to associate the software with the
● A possessed object is any item that you must computer or mobile device on which the
possess, or carry with you, in order to gain software is installed
access to a computer or computer facility ● A license agreement is the right to use software
● A biometric device authenticates a person’s ● Information theft occurs when someone steals
identity by translating a personal characteristic personal or confidential information
into a digital code that is compared with a digital ● Encryption is a process of converting data that
code in a computer or mobile device verifying a is readable by humans into encoded characters
physical or to prevent unauthorized access
● A digital signature is an encrypted code that a
Unauthorized Access and Use person, website, or organization attaches to an
Face recognition system electronic message to verify the identity of the
Fingerprint reader message sender
Hand geometry system – Often used to ensure that an
Voice verification system impostor is not participating in an Internet
Signature verification system transaction
Iris recognition system ● A digital certificate is a notice that guarantees
a user or a website is legitimate
● Two-step verification uses two separate ● A website that uses encryption techniques to
methods, one after the next, to verify the identity secure its data is known as a secure site
of a user
● Digital forensics is the discovery, collection, ● Hardware theft is the act of stealing digital
and analysis of evidence found on computers equipment
and networks ● Hardware vandalism is the act of defacing or
● Many areas use digital forensics destroying digital equipment
Law enforcement
Criminal prosecutors ● A backup is a duplicate of a file, program, or
Military intelligence media that can be used if the original is lost,
Information security departments damaged, or destroyed
Insurance agencies – To back up a file means to make a copy of it
● Off-site backups are stored in a location
● Software theft occurs when someone: separate from the computer or mobile device
Steals software media site
Intentionally erases programs Cloud Storage
Illegally registers and/or activates a program
Illegally copies a program Backing Up – The Ultimate Safeguard
Categories of backups:
● Many manufacturers incorporate an activation Full
process into their programs to ensure the Differential
software is not installed on more computers than Incremental
legally licensed Selective
● During the product activation, which is Continuous data protection
conducted either online or by phone, users Cloud
Three-generation backup policy ● A code of conduct is a written guideline that
Grandparent helps determine whether a specification is
Parent ethical/unethical or allowed/not allowed
Child ● Green computing involves reducing the
electricity and environmental waste while using
computers, mobile devices, and related
technologies

Information privacy
● Information privacy refers to the right of
individuals and companies to deny or restrict the
collection, use, and dissemination of information
about them
● Huge databases store data online
● Websites often collect data about you, so that
they can customize advertisements and send
you personalized email messages
Wireless Security ● Some employers monitor your computer usage
● Wireless access poses additional security risks and email messages
● Some perpetrators connect to other’s wireless
networks to gain free Internet access or ● Information about you can be stored in a
confidential data database when you:
Fill out a printed or online form
Ethics and Society Create a profile on an online social network
● Technology ethics are the moral guidelines Register a product warranty
that govern the use of computers, mobile ● A cookie is a small text file that a web server
devices, information systems, and related stores on your computer
technologies ● Websites use cookies for a variety of reasons:
● Information accuracy is a concern Allow for personalization
– Not all information on the Internet is correct Store user names and/or passwords
Assist with online shopping
● Intellectual property refers to unique and Track how often users visit a site
original works such as ideas, inventions, art, Target advertisements
writings, processes, company and product ● Phishing is a scam in which a perpetrator sends
names, and logos an official looking email message that attempts
● Intellectual property rights are the rights to to obtain your personal and/or financial
which creators are entitled to their work information
● A copyright protects any tangible form of ● With clickjacking, an object that can be tapped
expression or clicked on a website contains a malicious
● Digital rights management (DRM) is a strategy program
designed to prevent illegal distribution of movies, ● Spyware is a program placed on a computer or
music, and other digital content mobile device without the user’s knowledge that
secretly collects information about the user and
then communicates the information it collects to
some outside source while the user is online
● Adware is a program that displays an online
advertisement in a banner or pop-up window on
webpages, email messages, or other Internet
services
● Social engineering is defined as gaining
unauthorized access to or obtaining confidential
information by taking advantage of the trusting
human nature of some victims and the naivety of
others
● The concern about privacy has led to the
enactment of federal and state laws regarding
the storage and disclosure of personal data
● Employee monitoring involves the use of
computers, mobile devices, or cameras to
observe, record, and review an employee’s use
of a technology, including communications such
as email messages, keyboard activity (used to
measure productivity), and websites visited
● Many programs exist that easily allow employers
to monitor employees. Further, it is legal for
employers to use these programs
● Content filtering is the process of restricting
access to certain material
– Many businesses use content filtering
● Web filtering software restricts access to
specified websites

Summary
● Risks and safeguards associated with Internet
and network attacks, unauthorized access and
use, software theft, information theft, and
hardware theft, vandalism, and failure
● Variety of digital security risks
● Cybercrime and cybercriminals
● Various backup strategies and methods of
securing wireless communications
● Ethical issues in society and various ways to
protect the privacy of personal information

You might also like