Demonstrate Digital Literacy Revised

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

Mr.

Biegon

DEMONSTRATE DIGITAL LITERACY


Introduction Digital literacy is an important topic in the modern world. Literacy is
the urge to read and learn. So digital literacy is the process of acquiring knowledge and
skills to effectively use computers and other technology devices. Some of the computer
hardware are, desktop/monitor, printers, scanners, mouse, Keyboard, and storage devices
(hard disk). The computer software includes Windows, Linux, UNIX. These are the
operating system software.
Under the computer software’s we also have application software’s which include: word
processors (e.g. Microsoft word), spreadsheets (e.g. Microsoft Excel), graphic
presentations (e.g. Microsoft PowerPoint), and the database management systems (e.g.
Microsoft access).

Definition of Key Terms Information computer technology: This is an extensional


term to IT that stresses on systems that enable users to access, store, transmit and
manipulate information. ICT is a broad subject and the concepts are evolving. It covers
any product that will store, retrieve, manipulate, transmit, or receive information
electronically or in a digital form (e.g. emails).
Computer software: Computer software is a collection of instructions that enable the user
to interact with a computer, its hardware, or perform tasks. It is used or needed for input,
processing, output, storage and management of activities. Softwares which are used for
inputting data in the system include; word processors, spreadsheets, and presentation
software. Software used for storage include cloud storage where the output is stored or
hosted using resources in data centers and delivered to end users over the internet. Software
for management of activities include database management systems which allow users to
process data into useful information.

Computer hardware: This is any tangible device in the computer environment. Some of
the hardware that maybe encountered in this topic are:
• Monitor: This is the main output device of a computer. It is commonly known as
Visual Display Unit (VDU).
• Printer: is used to print information of paper.
• Storage devices: these include flash disks, hard disks and optical disks (e.g. CDs).
• Input devices: such as the mouse and keyboard.

Internet: This is a global system of interconnected computer networks that use internet
protocol suite (TCP/IP) to link devices worldwide. The internet carries a vast range of
information, resources and services. Picture information is shared via the internet.

Digital literacy: While literacy is defined as the ability to read and write, digital literacy is
the ability to access, process, understand and create information in the digital environment.
Mr. Biegon

Topic 1. Concepts and Functions of ICT


Functions of ICT
• Data capture: Process of compiling information e.g. Amazon uses internet cookies
to capture data about the customers’ purchases via the website. So, it use the data
to suggest items to a user related to the previous orders via the website.
• Data processing: This involves converting, analyzing, computing and producing
all forms of data information. After capturing data, the system must reorganize that
data based on what the organization wants to use the information for.
• Generation of information: Involves organizing information into a useful form.
• Storage of information involves retaining information for future use e.g. Facebook
stores user registration details.
• Retrieval of information: Process by which a computer device is used to find and
copy data for future distribution and processing. A good example is Google or
Yahoo who have data centers which store information which can be used at a later
stage by the end user to search for information online.

Basic concepts of ICT


Information technology encompasses all the technology (hardware, software and computer
networks) that we use to collect, process, protect and store information. Information
computer technology involves transfer and use of all kinds of information. ICT is the
foundation of economy and a driving force of social change in the 21st century. Distance is
no longer an issue when it comes to accessing information, e.g. working from home,
distance learning, and e-banking are now possible from any place with an internet
connection and a computing device.
Hardware: The physical and tangible parts of a computer, that is, electrical, electronic and
mechanical parts e.g. monitor, keyboard, mouse, etc.
Software: These are the intangible parts of computer.

Software types
i. Operating system: This is the program which manages computer hardware e.g.
Linux, Windows, Mac OS X, etc.
ii. Application software (utility programs): These are all programs that users use to
perform different tasks or for problem solving. For example Microsoft word,
Microsoft excel and Microsoft PowerPoint.
iii. Computer networks: A computer network is comprised of at least two
computers, connected by wire or wirelessly that can exchange data.

Types of networks:
• LAN (local Area Network): Covers a relatively small geographical area e.g. a
university campus or office building. Examples include Ethernet and Wi-Fi.
• WLAN (Wireless Local Area Network): Links two or more devices using
wireless communication within a limited area such as a campus or office building.
Some WLANs exist to extend an existing wired network.
• WAN (Wide Area Network): Covers a relatively large geographical area e.g.
Mr. Biegon

cities or states. Connects a greater number of computers and local networks.

1.2 History and Classification of Computers


The computer as you know it today had its beginning with a 19th century. English
mathematician called Charles Baggage (1791 – 1871) designed the analytical engine and it
is this design that the basic framework of computers today is based on.
Computers can be classified into three generations. Each generation lasted for a certain
period of time and each gave us either a new and improved computer or an improvement
of the existing computer

i. First generation (1937-1946): The first computer Atanasoh Berry computer (ABC)
was built by Dr. JOHN B. Atanasoh and Clifford Berry. In 1943 an electronic
computer named the colossus was built for the military. Other developments
continued until 1946 when Electronic Numerical Integration and Computer
(ENIAC) was built. There were no operating systems.

ii. Second generation (1947-1962): The computers in this generation used transistors
instead of vacuum tubes, which were more reliable. The Universal Automatic
Computer (UNIVAC1) was introduced for commercial use. In 1953, the
International Business Machine (IBM) 650 and 700 series computers made their
mark in the computer world. Over 100 programming languages were developed.
Computers had memory and operating systems.

iii. Third generation (1963-Present): The invention of integrated circuit brought us


this generation. Computers became smaller, more powerful, and more reliable and
they were able to run many different programs at the same time.

Classification of computers
Computers can be classified in the following basis:
• Basis of size
• Basis of functionality
• Basis of data handling

Classification on basis of size


• Supercomputer: This is the highest performing computer system. It has a high
level of performance compared to general purpose computer. Examples include
PERAM, Jaguar, and roadrunner.
• Mainframe computer: Commonly called big iron. They are used by big
organizations for bulk data processing such as statistics, census data processing and
transaction processing e.g. IBM series, system 29 etc.
• Minicomputers: They came into the market in the mid-1960s and were sold for a
cheaper price than the mainframe. They were designed for control, instrumentation,
human interaction e.g. laptops, PCs etc.
• Microcomputers: It is small, relatively inexpensive with a microprocessor as its
Mr. Biegon

CPU. It includes a microprocessor, memory and minimal input and output circuitry
mounted on a single printed circuit board.

Classification on basis of functionality


• Servers: Dedicated computers set up to offer some services to the client
• Workstations: Computers designed to primarily be used by a single user at a time.
• Information appliances: Portable devices designed to perform a limited set of
tasks like basic circulations, playing multimedia, etc.
• Embedded computers: Computing devices which are used in other machines to
serve limited set of operations

Classification on basis of data handling


• Analogue computer: Form of computer that uses the continuously changeable
aspect of physical facts such as electrical, mechanical quantities to model the
problem being solved.
• Digital computers: They perform circulations and logic operations with quantities
represented as digits usually the binary number system i.e. 0s & 1s.
• Hybrid: A computer that processes both analogue and digital information.

1.3 Components of a Computer System


Computer system
A computer software is simply a collection of data or computer instructions that tell the
computer how to work. They include computer programs, libraries and non-executable data
such as online documentation or digital media.

Types of software
• Application software: Uses the computer system to perform special functions or
provide entertainment functions beyond the basic operation of the computer itself.
• System software: Software for managing computer hardware behavior so as to
provide basic functionalities that are required by users or other software to run
properly. Examples are operating system, device drivers and utility software.
• Malicious software: Software developed to harm and disrupt computer e.g.
malware, viruses.

1.4 Computer Hardware


These are the physical, tangible parts of a computer such as cabins, CPU, monitor,
keyboard, speakers, etc.
Examples
• Input devices and output devices: Input devices enter information into the system
e.g. keyboard, mouse. Output devices display information in human readable mode.
• Storage devices e.g. CDs, flash disk and hard disk

1.5 Operating System Function and Commands


The operating system is a system software that manages computer hardware, software
Mr. Biegon

resources and provides common service for computer programs.


Types of operating systems
• Single and multi-tasking
• Single and multiuser
• Distributed: Manages a group of distinct computers and make them to appear to a
single computer
• Template
• Embedded: Designed to be used in embedded computer systems
• Real time: An OS that guarantees to process events or data by a specific moment
and time
• Library
Functions of an operating system
• Security: It uses password protection to protect user data and similar techniques.
• Job accounting: It keeps track of time and resources used by various tasks and users.
• Memory management: It manages the primary and main memory.
• Processor management: It decides which processes have access to the processor.
• Device management: It manages device communication via their respective
drivers and keeps track to all devices connected to the system.

Commands of an operating system


• APPEND: Sets the path to be searched for data files or displays the current search
path.
• ASSIGN: Command direct request for disk operations from one drive to a different
drive.
• ATTRIBE: This command changes or views the attributes of one or more drives.
• CALL: Starts a batch file from which another batch file and returns when that one
ends
• CHCP: Command either displays or changes the active code page used to display
character glyphs in a console window.

Further Reading
Computer basics by Rajaraman
People.bu.edu/briefcomputerhistory.html
4.1.1.2

4.1.1.3 Self-Assessment questions


Written Assessment
1. WAN stands for?
Mr. Biegon

a) Wide area network


b) Wide access network
c) Wide arithmetic network
2. Program used to control system performance is classified as.
a) Experimental program
b) System program
c) Specialized program
d) Organized program
3. Examples of system programs include
a) Operating system
b) Trace program
c) Compiler
d) All of the above
4. Which of the following is not a computer hardware?
a) Malware
b) Monitor
c) Compact disk
d) Hard disk
5. Which one of the following is an odd one out when looking at the functions of ICT?
a) Generation of information
b) Storage of information
c) Data capture
d) None of the above
6. Which one of the following is not a classification of computers on the basis of size?
a) Analogue computers
b) Minicomputers
c) Mainframe computers
d) Supercomputers
7. Types of computer software are
a) System software
b) Logic software
c) Both A and B
8. Which network covers a relatively small geographical area?
9. WLAN stands for.
10. What is a computer software?
11. What are embedded computers?
12. What is an operating system?
Oral assessment questions
1. What are some functions of an operating system that you understand?
2. Briefly explain the history of computers.

Practical Assessment
Which one of the following is used to store programs installed on a computer?
Mr. Biegon

a) DVD drive
b) Video card
c) CD drive
d) Hard drive

Project
1. Type the following in a word
document Students
Peter
James
John
Teachers
Lewis
Caleb
Melisa

2. I want to create a second copy of an open document under a different name. What
should I do?
i. copy and paste the text in a new document
ii. use ‘save as’
iii. press ctrl s
iv. open the file again
v. Which of the following methods can you not use to zoom in?
vi. holding ctlr key and scrolling the mouse wheel
vii. using the zoom button
viii. ctrl+ shift +z
ix. Using the zoom slider at the bottom right corner.

4.1.1.4 Tools, Equipment, Supplies and Materials


• Desktop computers
• Laptop computers
• Other digital devices
• Printers
• Storage devices
• Internet access
• Computer software

\
Mr. Biegon

Topic 2. Apply security measures to data, hardware, software


in automated environment
Introduction Data security is certainly a hot topic these days. Controlling access to
data helps ensure privacy and is required according to federal agency policies and
regulations. Data security is a process of making sure data are available only to those who
need to use it for a legitimate purpose. We have found that data security is not very
different from other forms of security. The same concepts used to design castles apply to
the construction of servers that offer access to a corporate database. The details are
different, and the technical pieces are quite different, but the same approaches, rules and
lessons apply. Below are some important maxims to keep in mind. Most of them have
stood the test of time for thousands of years:
i. There is no such thing as absolute security: We can raise the attacker’s cost of
breaching our data security to a very high level, but absolute guarantees are not
possible.
ii. Data security is always a question of economics: What is the value of what you are
protecting? How much time, effort, and money are your opponent’s willing to spend
to get through your defenses?
iii. An attacker doesn’t go through security, but around it: Their goal is to find and
exploit the weakest link.
iv. Don’t underestimate the value of your asset: Often common everyday data is
underestimated. Mundane data can be very important.
Mr. Biegon

Definition of key terms


Data security: This is the process of making sure data is available only to those who need
it for legitimate purpose.

Data: This is the information that has been translated into a form that is efficient for
movement or processing.

Data privacy /Information privacy: It is the aspect of information technology that deals
with the ability of an organization or individual to determine what data in a computer
system can be shared with third parties.

Security threats: This is the process of an illegal entity gaining access to a company’s data
or information.

Control measures: This is any measure taken to eliminate or reduce the risk of security
threats.

Cyber criminals: These are illegal users who use many different methods to lure you into
parting with your confidential personal or business information.

Content/Procedures/Methods/Illustrations
2.1 Data Security and Privacy Are Classified in Accordance with the Prevailing
Technology
As discussed earlier, data security is the process of making sure data is available only to
those who need to use it for legitimate use. Data security privacy on the other hand is the
aspect of information technology that deals with the ability of an organization or individual
to determine what data in a computer system can be shared with third parties. As more of
our daily lives go online and the data we share is used in new and innovative ways, privacy
and security have become important trust and reputation issues. The growing volume and
sensitivity of information being shared, stored and used is driving demand for greater
transparency about how such information is being protected (security) and managed
(privacy). As a result, data security and privacy have moved from the backroom to the
boardroom. Data breaches and privacy missteps now regularly make headlines and are a
focal point for discussions and legislation worldwide. Failure to communicate on these
important issues can damage business by eroding trust, tarnishing brand and reputation as
well as undermining competitiveness.
Data security ensures that the data is accurate and reliable, and it is available when those
with authorized access need it. A data security plan includes facets such as collecting only
the required information, keeping it safe, and destroying any information that is no longer
needed.
These steps will help any business meet the legal obligations of possessing sensitive data.
Companies need to enact data security policy for the sole purpose of ensuring data privacy,
or the privacy of their customers’ information. More so, companies must ensure data
Mr. Biegon

privacy because the information is an asset to the company. A data security policy is simply
the means to the desired end which is data privacy. However, no data security policy can
overcome the willing sale or soliciting of the consumer data that was entrusted to an
organization.

Challenges to big data security and privacy


• Securing and protecting data in real time: Due to large amounts of data
generation, most organizations are unable to maintain regular checks. However, it
is most beneficial to perform security checks and observation in real time or
almost in real time.
• Data provenance: To classify data, it is necessary to be aware of its origin in
order to determine the data origin accurately, so that authentication, validation and
access control can be gained.
• Protecting access control method communication and encryption: A secured
data storage device is an intelligent step in protecting the data. Yet, because most
often data storage devices are vulnerable, it is important to encrypt the access
control methods as well.

2.2 Security Threats Are Identified and Control Measures Used


A threat is a possible danger that might exploit a vulnerability to breach security and
therefore cause possible harm. A threat can either be intentional (e.g. hacking by an
individual or criminal organization) or accidental (the possibility of a computer
malfunctioning OR the possibility of natural disasters such as fires or otherwise a
circumstance, capability, action or event).

Classification of security threats


• Classification according to type
• Physical damage: For example, fire, floods
• Natural events: For example, climate, volcanic
• Compromise of information: Via eavesdropping, theft of media
• Technical failures: For example, equipment, software
• Compromise of functions and errors in use, abuse of rights
• Classification according to origin
• Deliberate: Aiming at information asset e.g. spying, illegal processing of data
• Accidental: For example, equipment failure, software failure
• Environmental: For example, natural event, loss of power supply
• Negligence: Known but neglected factors compromising the network safety and
sustainability.
Mr. Biegon

Categories of the risk of security threats


• Damage: How bad would an attack be?
• Reproducibility: How easy it is to reproduce the attack?
• Exploitability: How much work is it to launch the attack?
• Affected users: How many users will be impacted?
• Discoverability: How easy it is to discover the threat?

Counter measures to security threat


A counter measure is an action, device, procedure or technique that reduces a threat, a
vulnerability or an attack by eliminating or preventing it, by minimizing the harm it can
cause or by discovering and reporting it so that corrective action can be taken.

Counter measures against physical attacks


If a potential malicious actor has physical access to a computer system, they have a greater
chance of inflicting harm upon it. We can use the following counter measures:
i. Electronic destruction devices: Devices such as USB killer may be used to
damage or render completely unusable anything with a connection to the
motherboard of a computer. Without paper destruction, these devices may result in
the destruction of ports and anything physically connected to the device attacked
e.g. monitors.
ii. Hard drives and storage: If the data of a storage device is in use and must be
secured, one can use encryption to encrypt the content of a storage device or even
encrypt the whole storage device. The device can be unlocked by a password,
biometric authentication, a network interchange or any combination thereof. The
process of adding physical barriers to the storage device is not to be neglected.
Locked cases or physically hidden drives with a limited number of personnel with
knowledge and access to the keys or locations may prove to be a good first line
against physical theft.

2.3 Computer Threats and Crimes Are Detected


Cyber criminals may use many different ethos to lure you into parting with your
confidential information. Malware (malicious software may be described as a variety of
forms of hostile, intrusive or annoying software or program code. Malware could be
computer viruses, worms, Trojan horses, dishonest spyware and malicious rootkits. Here is
a quick explanation on some of the common computer threats you may come across:
i. Computer viruses: This is a small piece of software that can spread from one
infected computer to another. The virus could corrupt, steal or delete data in your
computer, or even erase everything on your hard drive.
ii. Trojan horse: Users can infect their computers with this software simply by
downloading an application they thought was legitimate but was infect or malicious.
Once in your computer, it can do anything from recording your passwords by
logging keystrokes to hijacking your webcam so as to watch and record you’re
every move.
iii. Malicious spyware: It is used to describe a Trojan application that was created by
cyber criminals to spy on their victims. An example would be a key logger software
Mr. Biegon

that records a victim’s every stroke on his/her keyboard. The recorded information
is periodically sent back to the originating cybercriminal over the internet.
iv. Computer worm: This is a software program that can copy itself from one
computer to another without human interaction. A worm can send copies of itself
to every contact in your email address book and then send itself to all the contacts
in your contact address book.
v. Spam: In the security context, it is primarily used to describe unwanted messages
in your email box. Spam is a nuisance as it can clutter your mailbox as well as taking
up space on your mail server. However, spam messages can contain links that when
clicked could go to a website that installs malicious software on to your computer.
vi. Pursing: Pursing scams are fraudulent attempts by cybercriminals to obtain private
information. Pursing scams often appear in the guise of email messages designed to
appear as though they are from legitimate sources.
vii. Rootkit: This is a collection of tools that are used to obtain administrator-level
access to a computer or a network of computers. A rootkit could be installed on a
computer by a cyber-criminal exploiting a vulnerability or security hole in a
legitimate application on your PC and may contain spyware that monitors and
records keystrokes.
These are perhaps the most common computer threats and crimes you will encounter that
describe methods cyber-criminals use to access data, computer hardware and software.

2.4 Methods to Protect Yourself from Computer Crimes


i. Using strong passwords: Don’t repeat your passwords on different data and
software Change your passwords regularly. Make them complex. That means using
a combination of at least 10 letters, numbers and symbols.
ii. Keep your software updated: This is especially important with your operating
systems and internet security systems. Cyber criminals often use known exploits in
your software to gain access to your system. Patching those exploits and flaws can
make it less likely that you will become a cyber-criminal target.
iii. Strengthen your network: It is a good idea to start with a strong encryption as well
as a virtual private network. A VPN will encrypt all traffic leaving your devices
until it arrives to its destination.
iv. Keep up to date on major security breaches: If your data has been impacted by
a security threat, find out what information the hackers accessed and change your
passwords immediately.
v. Know that identity theft can happen anywhere: It is important to protect your
data for example, by using a VPN when accessing the internet over a public Wi-Fi
network.
Mr. Biegon

Self-Assessment
Written Assessment
1. A computer network consists of two or more computing or other devices connected by
a?
a) Wireless signal
b) Cable
c) Communication media
d) Wire
2. Which is not a method of protecting data from computer threats?
a) Pursuing
b) Rootkit
c) Spam
d) All the above
3. The process of an illegal entity to gain access to a company’s data or information is?
a) Security threat
b) Data privacy
c) Data security
d) Data integrity.
4. Which one of the following is not a computer threat or crime?
a) Computer virus
b) Malware
c) Rootkit
d) None of the above
5. Which one of the following are categories of the risk of security threats?
a) Damage
b) Negligence
c) Affected user
d) Both a and c
6. Security threats can be classified as.
a) Physical damage
b) Technical failures
c) Compromise of functions
d) All the above
7. What does download from the internet mean?
a) Retrieving files from the internet
b) Lowering your game level on the internet
c) Viewing web pages on the internet.
8. What is data?
9. What is a computer virus?
10. What is data privacy?
Mr. Biegon

11. What is data security?


12. What is a security threat?

You might also like