Escolar Documentos
Profissional Documentos
Cultura Documentos
Meeting-1
What is a Computer
The first use of the word "computer" was
recorded in 1613, referring to a person who
carried out calculations, or computations,
and the word continued with the same
meaning until the middle of the 20th
century.
Types of Computers
Mini and Mainframe Computers
Very powerful, used by large organisations
such an banks to control the entire business
operation. Very expensive!
Personal Computers
Cheap and easy to use. Often used as
stand-alone computers or in a network.
May be connected to large mainframe
computers within big companies.
Exercises Meeting-1
1. Do you know the origin of Computer and what it means?
a. An electronic device that stores, retrieves, and processes data, and can be
programmed with instructions.
b. Referring to a person who carried out calculations, or computations
c. General purpose device that can be programmed to carry out a finite set of
arithmetic or logical operations.
d. The answer A,B and C True
e. All answers are false
2. Mention it the type of computer as you know ?
a. Mini Cooper
d. PC-magazine
b. Mainframe
e. Server
c. Compuserve
3. The first use of the word "computer" was recorded in :
a. 1612
d. 1615
b. 1613
e. 1616
c. 1614
Exercises Meeting-1
4. Origin of word Computer is
a. To Compute
d. To Comput
b. To Comp
e. To Com
c. To Pute
5. They are examples of first-generation computing devices :
a. UNIVAC
d. UNIFORM
b. UNIFAC
e. UNION PC
c. UNITED
Exercises Meeting-1
1. What is the meaning Mini Computer ? Give
Example!
2. What is the meaning Mainframe Computer?
Give Example!
3. What is the meaning Personal Computer?
Inside a Computer
Meeting-2
Control unit
The control unit (often called a control system or
central controller) manages the computer's
various components; it reads and interprets
(decodes) the program instructions, transforming
them into a series of control signals which
activate other parts of the computer
Memory
A computer's memory can be viewed as a list of cells into which
numbers can be placed or read. Computer main memory comes
in two principal varieties: random-access memory or RAM and
read-only memory or ROM. RAM can be read and written to
anytime the CPU commands it, but ROM is pre-loaded with data
and software that never changes, therefore the CPU can only
read from it.
Input/Output (I/O)
I/O is the means by which a computer exchanges
information with the outside world. Devices that
provide input or output to the computer are called
peripherals. On a typical personal computer,
peripherals include input devices like the keyboard and
mouse, and output devices such as the display and
printer. Hard disk drives, floppy disk drives and optical
disc drives serve as both input and output devices.
Hardware Components
Input Devices
Input Device is any peripheral (piece of computer hardware
equipment) used to provide data and control signals to an
information processing system such as a computer or other
information appliance. Examples of input devices include
keyboards, mice, scanners, digital cameras and joysticks.
Output Devices
An output device is any piece of computer hardware
equipment used to communicate the results of data
processing carried out by an information processing system
(such as a computer) which converts the electronically
generated information into human-readable form.
Input Devices :
The Mouse
A mouse is a pointing device that functions by
detecting two-dimensional motion relative to its
supporting surface. Physically, a mouse consists of an
object held under one of the user's hands, with one
or more buttons.
The Keyboard
The keyboard is still the commonest way of entering
information into a computer
Tracker Balls
an alternative to the traditional mouse and often
used by graphic designers
Input Devices :
Scanners
A scanner allows you to scan printed material
and convert it into a file format that may be
used within the PC
Touch Pads
A device that lays on the desktop and responds to pressure
Light Pens
Used to allow users to point to areas on a screen
Joysticks
Many games require a joystick for playing of the game
Output Devices :
Monitor/LCD
The computer screen is used for outputting information in an
understandable format
Printers
There are many different types of printers. In large
organizations laser printers are most commonly used due to
the fact that they can print very fast and give a very high
quality output.
Output Devices
Plotters
A plotter is an output device similar to a printer, but
normally allows you to print larger images.
Speakers
Enhances the value of educational and presentation
products.
Speech synthesisers
Gives you the ability to not only to display text on a
monitor but also to read the text to you
Storage Device
Storage Device
Hard Disks
Speed:
Very fast!
The speed of a hard disk is often quoted as "average
access time" speed, measured in milliseconds. The
smaller this number the faster the disk.
Capacity:
Enormous! Often 1000/5000 Gigabytes. A Gigabyte is
equivalent to 1024 Megabytes.
Cost:
Hard disks costs are falling rapidly and normally represent
the cheapest way of storing data.
Bit
All computers work on a binary numbering system, i.e. they
process data in one's or zero's. This 1 or 0 level of storage is
called a bit.
Byte
A byte consists of eight bits.
Kilobyte
A kilobyte (KB) consists of 1024 bytes.
Megabyte
A megabyte (MB) consists of 1024 kilobytes.
Gigabyte
A gigabyte (GB) consists of 1024 megabytes.
Exercises Meeting-2
1. One of the most important components within your computer
a. CPU
d. RPU
b. ALU
e. TPU
c. RLU
2. There the component of inside a computer, except :
a. Harddisk
d. VGA Card
b. RAM
e. Processor
c. REM
3. The brain of the computer :
a. Microprocessors
d. Microdisk
b. Microchip
e. MicroSD
c. MicroRAM
4. Measurement capacity of hard drive :
a. KiloBytes
d. Gygabytes
b. KiloGrams
e. All Answers are True
c. MegaBytes
5. Examples input device :
a. Mouse and Hard Drive
d. Mouse and Printer
b. Keyboard and Memory
e. Printer and Keyboard
c. Scanner and Mouse
Exercises Meeting-2
1.
2.
3.
4.
Meeting-3
Application software
An application program is the type of program that you
use once the operating system has been loaded.
Examples include word-processing programs,
spreadsheets and databases
Example Application
Microsoft Office
Payroll
Presentation tools
Microsoft PowerPoint
Desktop publishing
Adobe Photoshop
Multimedia applications
Microsoft's Encarta CD-ROM based
Encyclopaedias
Example Application
Information worker software
Enterprise resource planning
Accounting software
Data management
Contact management
Spreadsheet
Personal database
Documentation
Document automation/assembly
Word processing
Desktop publishing software
Banking software
Exercises Meeting-3
1. A special type of program that loads automatically when you start your computer
is
a. System
d. System Program
b. Software
e. Application
c. Operating System
2. There are examples of Operating System as you know, except :
a. Windows XP
d. UBUNTU
b. Windows 7
e. Genome
c. Windows Tec
3. There are Open Source Operating System :
a. UBUNTU
d. A and B True
b. RED HAT
e. A and C True
c. Windows NT
4. The type of program that you use once the operating system has been loaded :
a. Operating System
d. Enterprise System
b. System Memory
e. Application Software
c. Word Pad
5. There is the application software for editing image :
a. Power Point
d. Adobe Premier
b. Photoshop
e. Microsoft Excel
c. Acrobat Reader
Exercises Meeting-3
1. The Software is
2. Give 5 examples of Operating System as you
know ..
3. What is the meaning Open Source Operating
System and give examples ..
4. What is Application Software .
5. Give 5 examples of Application Software .
Pascal
C++
Visual Basic
Visual Foxpro
JAVA
Information Network
LAN
A LAN (Local Area Network) is a system whereby
individual PCs are connected together within a
company or organization
WAN
A WAN (Wide Area Network) as the name implies
allows you to connect to other computers over a
wider area (i.e. the whole world).
Use network
If ten people are working together within an office it
makes sense for them all to be connected.
In this way the office can have a single printer and all
ten people can print to it.
In a similar way other devices such as modems or
scanners can be shared.
Even more useful is the ability to share information
when connected to a network.
Accounts
Games
Educational
On-line banking
Smart ID cards
Supermarkets
Working from home (Tele-working)
Internet
Computer Virus
Viruses are small programs that hide themselves on your
disks (both flashdisk and your hard disk).
Unless you use virus
detection software the first
time that you know that you
have a virus is when it activates.
Different viruses are
activated in different ways.
Software Copyright
Software Copyright
If your computer system holds
information about individuals then you
have a moral and legal duty to treat
that information with respect.
In a free society you have a right to
ensure that information held about
you is not abused.
In many countries this right is
enshrined under data protection laws
Exercises Meeting-4
1. An artificial language designed to communicate instructions to a machine,
particularly a computer is
a. Computer Language
d. Typical Language
b. Programming Language
e. Image Language
c. Software Language
2. The example of Programming Language is
a. Safari
d. Fire Fox
b. Java
e. Internet Explore
c. Microsoft Word
3. A system where by individual PCs are connected together within a company or
organization :
a. WAN
d. LAN
b. GAN
e. BAN
c. TAN
Exercises Meeting-4
4. Small programs that hide themselves on your file/disks :
a. Virus
d. Data
b. Worm
e. Anti Virus
c. Word
5. Example for OOP Programming Language, except :
a. JAVA
d. Visual Basic
b. C++
e. C#
c. Pascal
Exercises Meeting-4
1.
2.
3.
4.
5.
6.
Programming Language is .
Give the examples of Programming Language.
What is the meaning Networking ?
Mentioned kind of networking ?
How do viruses infect PCs ?
Give the examples of anti virus as you know ?
a.VIRUS
Virus is a software that can replicate by injecting or infecting its
own code into other file. By its way to infect other file, virus can
be divided into three categories:
1. Overwriting
A type of computer virus that will copy its own code
over the host computer system's file data, which
destroys the original program. After your computer
system has been cleaned using an antivirus
program, users will need to install the original
program again.
2. Appending
A virus that inserts a copy of its malicious
code at the end of the file. The goal of an
appending virus is not to harm the host
program, but to modify it to hold the virus
code and then be able to run itself.
3.Prepending
A virus defines the method it uses of infecting
files by adding their code to the beginning of the
file. By doing this, these viruses ensure that they
are activated when an infected file is used.
b. WORM
Worm is also a kind of malicious software. It is different from
virus which is worm can not inject of infect other files. A worm
is a software which replicates by creating its own copy. And
without infecting other file. Worm actually spreads through a
network or the Internet using email. Below is a sample of worm
called I Love You. Worm I Love You spreads through the
Internet as an email attachment.
c. TROJAN HORSE
Trojan horse is derived from ancient Greek. Trojan Horse is
a program that looks like a good program but actually
contains destructive code or destructive feature. Trojan
horse is different from virus and worm, trojan horse can
not replicate and cannot infect other file.
1.
2.
3.
4.
5.
1.
2.
3.
4.
5.
6.
Meeting 6
INPUT DEVICE
Input device is computer device that is used to
input data into computer system.
Input device can be divided into some
categories:
2. Pointing devices
The most common pointing device is mouse. In
computing, a mouse (plural mice or mouse devices) is a
pointing device that functions by detecting twodimensional motion relative to its supporting surface.
Physically, a mouse consists of an object held under one
of the user's hands, with one or more buttons, other
elements, such as "wheels", or extra buttons.
3. Gaming devices
One example of gaming device is a joystick. A
joystick is a general control device that consists of a
handheld stick that pivots around one end, to
detect angles in two or three dimensions.
a. Software
b. Hardware
c. Program
3. There are input device, except :
a. Mouse
b. Keyboard
c. Microphone
d. Process
e. Instruction
d. HardDrive
e. Scanner
4. Video capturing devices connected to computers or computer networks, often using USB
a. Website
b. Webcam
c. Webnet
d. WebVideo
e. Video Conference
5. A device that provides input by analyzing images, printed text, handwriting, or an object
is :
a. Printer
b. Webcam
c. Plotter
d. Hard Drive
e. Scanner
1. The hardware is .
2. Hardware can be divided into two categories,
COMPUTER NETWORK
Meeting 9
Network Topology
4.router
a device that forwards data packets between computer
networks, creating an overlay internetwork. A router is
connected to two or more data lines from different
networks. When a data packet comes in one of the lines,
the router reads the address information in the packet to
determine its ultimate destination. Then, using information
in its routing table or routing policy, it directs the packet
to the next network on its journey. Routers perform the
"traffic directing" functions on the Internet.
References
REFERENCES
http://en.wikipedia.org/wiki/Computer_networks
http://en.wikipedia.org/wiki/Network_hub
http://en.wikipedia.org/wiki/Repeater
http://www.webopedia.com/TERM/N/network.html
http://www.uaf.edu/toolik/Reports/Report03/CommsSlides-SRI.ppt
http://www.cs.ucr.edu/~weesan/cs6/03_basic_computer_network.ppt
http://en.wikipedia.org/wiki/Router_%28computing%29
Exercises Meeting-9
1. The benefit of a computer network are :
a. Sharing hardware resources easily
d. A and B True
b. Sharing information easily
e. A,B and C True
c. Sharing Input easily
2. There are many many types of Computer Network, except :
a. LAN
d. BAN
b. WAN
e. MAN
c. MAN
3. There are many many types of Network Topology, except :
a. Bus and Ring
d. Star and Bus
b. Star and Mesh
e. Bust and Mesht
c. Ring and Star
4. A piece of computer hardware designed to allow computers to communicate over
a computer network is
a. NIC
d. RAN Card
b. LAN Card
e. A and B True
c. NEC
5. There are the devices to create a computer network, except :
a. NIC
d. VGA
b. Repeater
e. Router
c. Hub
Exercises Meeting-9
1.
2.
3.
4.
5.
Steganography
What is Steganography
Steganography is the art and science of writing
hidden messages in such a way that no-one apart
from the sender and intended recipient even
realizes there is a hidden message, a form of
security through obscurity.
Continued
Generally, a steganographic message will appear to
be something else: a picture, an article, a shopping
list, or some other message. This apparent message
is the covertext. For instance, a message may be
hidden by using invisible ink between the visible
lines of innocuous documents.
History of Steganography
The word steganography is of Greek origins and means
"covered, or hidden writing". Its ancient origins can be traced
back to 440 BC. Herodotus mentions two examples of
steganograph in The Histories of Herodotus. Demaratus sent
a warning about a forthcoming attack to Greece by writing it
on a wooden panel and covering it in wax. Wax tablets were
in common use then as re-usable writing surfaces.
Continued
This method has obvious drawbacks:
a. It is impossible to send a message as quickly as the
slave can travel, because it takes months to grow hair.
b. A slave can only be used once for this purpose. (This is
why slaves were used: they were considered expendable).
Continued
3. A picture of a message in microdots or microfilms.
Continued
4. In computer era, steganography can be done by
inserting a secret document into other document.
Any document can be used as a media, for example
text file, picture file, or multimedia file such as mp3
or video file.
References
References
http://www.dmoz.org/Computers/Security/Products_and_Tools/Cryptography/Steganography//
http://petitcolas.net/fabien/steganography/image_downgrading/index.html
http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/2004_03_research01.htm
http://www.jjtc.com/Steganography
http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf
http://www.spy-hunter.com/stego.html
http://www.datahide.com/BPCSe/Articles/Ref-6.SPIE98.pdf
http://blog.maxant.co.uk/pebble/2007/07/19/1184876280000.html
Exercises Meeting-10
1. The art and science of writing hidden messages in such a way that no-one apart from the
sender and intended recipient even realizes there is a hidden message :
a. Stenography
d. Stagenoghrapy
b. Stegraphy
e. All answer are false
c. Steganomy
2. A steganography message will appear to be something else, the examples
a. A picture
d. A and C true
b. An article
e. All Answers false
c. A message
3. There are some technique steganography, except
a. Writing a secret message using invisible ink
b. Hidden messages on messenger's body
c. A picture of a message in microdots or microfilms
d. A copy file to another file.
e. In computer era, steganography can be done by inserting a secret document into other
document
4. The origin of steganography from .
a. Greek
d. America
b. Russia
e. Germany
c. England
5. The steganography usually use for ..
a. Covered
d. Backup
b. Hidden Writing
e. A and B true
c. Copy
Exercises Meeting-10
1. What is Steganography .
2. A steganography message will appear to be something
else, give examples
3. Mentioned that some techniques of steganography
MEETING 11
CRYPTOGRAPHY
What is Cryptography
The term cryptography is derived from Greek,
kryptos means hidden or secret and graphy
means writing. So, cryptography is the
practice and study of creating a secret
information.
Cryptography works by Cryptography is a part of
mathematics and computer science.
Continued
History of Cryptography
Cryptography is already used since ancient
era. Julius Caesar used cryptography to secure
his message from his enemy. He replaced a
character with its next three character. For
example a character A in alphabet will be
replaced by character D. And so on. See the
list below of Julius Caesar algorithm.
Examples :
Plain text : a b c d e f g h I j k l m n o p q r s t u v w x y z
Cipher Text : d e f g h I j k l m n o p q r s t u v w x y z a b c
Continued History
In the era of World War II, German Nazi was also used
cryptography to secure its message. Nazi used a machine
called Enigma to encrypt and decrypt the messages. In this
way Nazi thought its message would be difficult to break by
US and its allies. Below is a picture of Enigma used by
Nazi. Unfortunately the algorithm of Enigma can be
broken by US army.
Continued History
In computer technology, cryptography is still
used to secure a computer data or document. For
example in ATM machine,computer passwords,
and also in electronic commerce. Using computer
technology someone can use many sophisticated
algorithm for example RSA,DES, and PGP.
Computer Terms
Plain text = a text that can be read by anybody. This
text is not secured yet.
Cipher text = a secret text resulting from encryption
process.
Algorithm = a set of rule to encrypt a document.
Enigma = a machine like typewriter that is used by
Nazi during World War II to secure a document before
transmitted.
Cryptographer = a person who is master in
cryptography.
References
http://en.wikipedia.org/wiki/Cryptography
http://en.wikipedia.org/wiki/Cryptography_Classification
http://en.wikipedia.org/wiki/Encyclopedia_of_Cryptography_and_Security
http://en.wikipedia.org/wiki/Japanese_cryptology_from_the_1500s_to_Meiji
http://en.wikipedia.org/wiki/List_of_important_publications_in_computer_science#Cryptography
http://www.merriam-webster.com/dictionary/cryptology/
http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf
http://www.cesg.gov.uk/site/publications/media/notense.pdf
http://citeseer.ist.psu.edu/cache/papers/cs/22094/http:zSzzSzeprint.iacr.orgzSz2001zSz056.pdf/junod01complexity.pdf
http://www.rsasecurity.com/rsalabs/node.asp?id=2152
http://www.ieee-security.org/Cipher/Newsbriefs/1996/960214.zimmerman.html
http://www.schneier.com/crypto-gram-0006.html#DES
http://scholar.google.com/url?sa=U&q=http://www.springerlink.com/index/K54H077NP8714058.pdf
http://www.cacr.math.uwaterloo.ca/hac/
http://www.cryptool.org/download/CrypToolPresentation-en-1_4_20.pdf
http://www.rsasecurity.com/rsalabs/node.asp?id=2152
http://www.pawlan.com/Monica/crypto/
http://www.nsa.gov/kids/
Exercises Meeting-11
1. What is cryptography .
2. What is the different between cryptography and
steganography .
3. How the cryptography works .
4. Give the example of cryptography
5. Give the example using cryptography in computer
technology
Exercises Meeting-11
1. The practice and study of creating a secret information.
a. Stenography
d. Stagenoghrapy
b. Crytography
e. All answer are false
c. Steganomy
2. A cryptography is used in applications present in technologically advanced societies, the examples
a. Security of ATM cards
d. A,B and C true
b. Computer passwords
e. Hidden Mesagge
c. Electronic commerce A message
3. A machine called Enigma to encrypt and decrypt the messages in worl war II used by
a. German
d. Italy
b. America
e. Russia
c. France
4. The example of cryptography
a. Greek
d. Login
b. Enigma
e. A,B and C true
c. Enogmist
5. The a secret text resulting from encryption process is .
a. Hidden Writing
d. A and B true
b. Chiper text
e. No Answer
c. Hidden text
Meeting 12
The INTERNET
Definition
Internet stands for: Internetworked Networks
The Internet is a worldwide connection of millions
of computers connected to thousands of different
networks. These computers "communicate" that is,
share, exchange, and transmit data to another
computer on the same or another network.
A.
Internet Services
Continued
Continued
4. Email Electronic Mail,
allows people to send and receive electronic
messages.
Continued
6.IRC (Internet Relay Chat)
Allows people connected over the Internet to
participate in discussions. It allows people to
converse in "real time," people may actually see
you type your questions and responses.
Continued
7.search engine
is designed to search for information on the World
Wide Web. The search results are generally
presented in a line of results often referred to as
search engine results pages (SERPs). The
information may be a specialist in web pages,
images, information and other types of files. Some
search engines also mine data available in
databases or open directories. Unlike web
directories, which are maintained only by human
editors, search engines also maintain real-time
information by running an algorithm on a web
crawler.
Continued
Since numbers are easy for a computer to work with
but difficult for humans, most host machines have a
Domain Name Service (DNS) address. For
instance, the domain name service address of the IP
address listed above is:
depts.alverno.edu
C. User
Overall Internet usage has seen tremendous growth. From
2000 to 2009, the number of Internet users globally rose
from 394 million to 1.858 billion. By 2010, 22 percent of
the world's population had access to computers with 1
billion Google searches every day, 300 million Internet
users reading blogs, and 2 billion videos viewed daily on
YouTube.
References
http://en.wikipedia.org/wiki/Internet#Services
http://www.comptechdoc.org/basic/basictut
http://dragon.ep.usm.edu/~it365/module/Internet/Internet.htm
http://depts.alverno.edu/cil/mod1/webtutorial/internet.html
References
Exercises Meeting 12
1. What is the internet .
a.A worldwide connection of millions of computers connected to thousands of different networks
b.Each computer on the Internet
d. Browsing
c.Server
e. All answer are false
2. Many kind of internet services, mentioned that ..
a.Browser
d. B and C True
b.World Wide web
e. Wireless Network
c.FTP
3. There are the examples of search engine .
a.Google Crhome
d. Opera
b.Mozila Firefox
e. All answers true
c.Internet Explore
4. The examples of search engine .
a.IRC
d. A,B and C true
b.Yahoo Messenger
e. All Answers false
c.Google Talk
5. What is the function Internet address domain .
a.The domain name service address
b.Host machine has a special Internet protocol address (IP address) that uniquely identifies that
computer
c.the domain name service address of the IP address
d.A,B and C true
e.All answers false
Exercises Meeting-12
1.
2.
3.
4.
5.
header
It contains information about the sender, the routing
and the time of the message. The header always
contains a subject line. This is a very important part of
the message and you should always include a subject
line. Some folks sort their messages by subject, so it is
rude to not include a subject! The subject line indicates
the purpose or content of the Message
message body,
where you write your message
signature,
which identifies the sender.
This part is optional and must be set
up inside of your email software.
REFERENCES
http://depts.alverno.edu/cil/mod2/whatisemail.html
http://en.wikipedia.org/wiki/E-mail
http://dragon.ep.usm.edu/~it365/module/Basics/Basics.htm
1. Method of creating, transmitting, or storing primarily text-based human communications with digit
communications systems is
a.Server
d. FTP
b.Email
e. WWW
c.Attach File
2. The are several part of Email ..
a.Header
d. A and C True
b.World Wide web
e. Address
c.Message Body
3. There are the examples of Email Address, except .
a.tonny@googles.com
d. budi@basi.ac.id
b.harry@yahoo.co.id
e. All answers true
c.tina@yahoo.com
4. What kinds of document that could attach file to email .
a.Images
d. Music file
b.PDF file
e. All Answers true
c.DOC file
5. What is the meaning of BCc .
a.Bling Carbon Copy
b.Bline Carbon Copy
c.Blink Carbon Copy
d.Blind Carbon Copy
e.All answers false
1.
2.
3.
4.
5.
What is Email .
Explain how email works .
Could you explain several parts of email .
Give the 3 examples email address .
Could you explain how to attach file to email .
a. Website
A website is a site (location) contains a
collection of pages on the World Wide Web.
Each Web site contains a home page, which is
the first document users see when they enter
the site. Home page, as the name suggests, is
the main or opening page of a website. You
will notice that several websites use the word
"Home" or an image of a house to guide surfers
back to the main page.
b. Search engine
Search Engine is a program that searches documents for
specified keywords and returns a list of the documents
where the keywords were found. Although search engine
is really a general class of programs, the term is often
used to specifically describe systems like Google, Alta
Vista and Excite that enable users to search for
documents on the World Wide Web and USENET
newsgroups.
references
http://dragon.ep.usm.edu/~it365/module/Internet/Internet.htm
http://www.webopedia.com/DidYouKnow/internet/2003/HowWebSearchEnginesWork.asp
http://www.webopedia.com/quick_ref/Internet_Search_Engines.asp
1.
2.
3.
4.
5.