Tài liệu miễn phí Chứng chỉ quốc tế

Download Tài liệu học tập miễn phí Chứng chỉ quốc tế

Lecture Computer literacy - Lecture 06: Interfacing with Computer

After studying this chapter you will be able to understand: What is the difference between drives and folders. What is the purpose of file extensions? Give two examples. What is the purpose of windows explorer? Differentiate between cut and copy? What is the purpose of Read-Only file attribute.

3/17/2021 10:36:37 AM +00:00

Lecture Computer literacy - Lecture 05: Interfacing with Computer

After studying this chapter you will be able to understand: Differentiate between icons and shortcuts. Name five icons of control panel and their functions. What is the purpose of start menu? What is help and support center? How can you change a default printer? What are the elements of taskbar?

3/17/2021 10:36:29 AM +00:00

Lecture Computer literacy - 04: Interfacing with Computer

After studying this chapter you will be able to understand: What are the main functions of an operating system? What is the difference between DOS and Windows? What is the difference between toolbar & menu bar? What happens when you minimize a window? What is the purpose of title bar?

3/17/2021 10:36:23 AM +00:00

Lecture Computer literacy - Lecture 03: Computer software

After studying this chapter you will be able to understand: What is an input and different forms of input? What is ergonomics? How can you configure a mouse? What is an output and its different forms? What is refresh rate? What is RAM & ROM? Differentiate between combo and super drive?

3/17/2021 10:36:15 AM +00:00

Lecture Computer literacy - Lecture 02: Learning about parts of computer

After studying this chapter you will be able to understand: Input devices (contd.), interfacing with the computer using mouse & keyboard, output devices, storage devices, understanding of Central Processing Unit (CPU), How do computers work?

3/17/2021 10:36:08 AM +00:00

Lecture Computer literacy - Lecture 01: Introduction to computers

After you have mastered the material in this chapter, you will be able to: What is computer? history and classification of computers, examples of computer, brief history of computers with timeline, introduction to computers - learning about input devices, input devices.

3/17/2021 10:36:01 AM +00:00

Lecture Professional Practices in IT: Lecture 32

Lecture Professional practices in information technology - Lecture 32: Risk management. After studying this chapter you will be able to understand: Introduction, risk management, risk identification, risk assessment, documenting the results of risk assessment.

12/29/2020 5:51:21 AM +00:00

Lecture Professional Practices in IT: Lecture 31

After studying this chapter you will be able to understand: Information security departments are created primarily to manage IT risk; managing risk is one of the key responsibilities of every manager within the organization; in any well-developed risk management program, two formal processes are at work; Risk identification and assessment, risk control.

12/29/2020 5:51:15 AM +00:00

Lecture Professional Practices in IT: Lecture 30

Lecture Professional practices in information technology - Lecture 30: Information security. After studying this chapter you will be able to understand: Organizational structures, roles and responsibilities, information classification, risk management.

12/29/2020 5:51:09 AM +00:00

Lecture Professional Practices in IT: Lecture 29

After studying this chapter you will be able to understand: The CIA; security governance; policies, procedures, etc; organizational structures; roles and responsibilities; information classification; risk management.

12/29/2020 5:51:03 AM +00:00

Lecture Professional Practices in IT: Lecture 28

Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes such things as inventions; computer software; trademarks; literary, artistic, musical, or visual works; and even simply know-how. There are various forms of statutory protection for Intellectual Property, but the two that are most likely to be relevant in the University environment are copyright and patents.

12/29/2020 5:50:57 AM +00:00

Lecture Professional Practices in IT: Lecture 27

Intellectual Property simply defined is any form of knowledge or expression created with one's intellect. It includes such things as inventions; computer software; trademarks; literary, artistic, musical, or visual works; and even simply know-how.

12/29/2020 5:50:51 AM +00:00

Lecture Professional Practices in IT: Lecture 26

After studying this chapter you will be able to understand: Works Cited: Book in a series, article in a journal, article in a newspaper or magazine, an entire web site, a page on a web site, what is the vancouver referencing technique? Referencing, harvard style, vancouver style.

12/29/2020 5:50:45 AM +00:00

Lecture Professional Practices in IT: Lecture 25

Lecture Professional practices in information technology - Lecture 25: Referencing. After studying this chapter you will be able to understand: In-text referencing systems, number-note referencing systems, types of referencing, number-note referencing systems, works cited.

12/29/2020 5:50:39 AM +00:00

Lecture Professional Practices in IT: Lecture 24

Lecture Professional practices in information technology - Lecture 24: Referencing. After studying this chapter you will be able to understand: Introduction of plagiarism, types of plagiarism, implications of plagiarism, referencing, types of referencing, style of referencing.

12/29/2020 5:50:33 AM +00:00

Lecture Professional Practices in IT: Lecture 23

Lecture 23: Plagiarism and referencing. After studying this chapter you will be able to understand: What is plagiarism? Examples of plagiarism, terminology: copyright, legal implications, what are the purposes of referencing? What should be referenced?

12/29/2020 5:50:27 AM +00:00

Lecture Professional Practices in IT: Lecture 22

Lecture 22 - Ethical hacking. After studying this chapter you will be able to understand: Ethical hacking, what you can do legally as an ethical hacker, what you cannot do as an ethical hacker.

12/29/2020 5:50:21 AM +00:00

Lecture Professional Practices in IT: Lecture 21

Lecture 21 - Computer security ethics. After studying this chapter you will be able to understand: Hackers’ code of ethics, new(er) hacker ethics, security threats, ethical issues in security courses.

12/29/2020 5:50:14 AM +00:00

Lecture Professional Practices in IT: Lecture 20

After studying this chapter you will be able to understand: Modes of hacker attack, spoofing, IP spoofing – flying-blind attack, IP spoofing – source routing, email spoofing, web spoofing, web spoofing – tracking state, session hijacking, session hijacking, denial of service (DOS) attack,...

12/29/2020 5:50:08 AM +00:00

Lecture Professional Practices in IT: Lecture 16

After studying this chapter you will be able to understand: Modes of hacker attack, spoofing, IP spoofing – flying-blind attack, IP spoofing – source routing, email spoofing, web spoofing, web spoofing – tracking state, session hijacking, session hijacking, denial of service (DOS) attack,...

12/29/2020 5:50:02 AM +00:00

Lecture Professional Practices in IT: Lecture 15

Lecture 15: Ethics and social media. After studying this chapter you will be able to understand: Why ethics? Vacuum of rules, conceptual muddles, social use environment, marketing, relationships in the some era? The political, terror in somes, literature.

12/29/2020 5:49:56 AM +00:00

Lecture Professional Practices in IT: Lecture 14

Lecture 14: Ethics and social media. After studying this chapter you will be able to understand: Privacy questions different to ’traditional’ issues, expectations of on-line privacy, privacy in SoMes, user generated content, property (immaterial).

12/29/2020 5:49:50 AM +00:00

Lecture Professional Practices in IT: Lecture 13

Lecture 13 - Ethics and social media. After studying this chapter you will be able to understand: Why ethics? Motivation; ethics, applied ethics and morals; the aim(s) of ethics; some ethical theories (and their applications); social media: examples of issues in privacy, property, teaching, friendship.

12/29/2020 5:49:44 AM +00:00

Lecture Professional Practices in IT: Lecture 10

Lecture 10 - Social media and its impacts on society. After studying this chapter you will be able to understand: What is social media? social media impact, social media circles, enhance social media with cross links, integrating social media.

12/29/2020 5:49:37 AM +00:00

Lecture Professional Practices in IT: Lecture 9

After studying this chapter you will be able to understand: What ethical, social, and political issues are raised by information systems? What specific principles for conduct can be used to guide ethical decisions? Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? How have information systems affected everyday life?

12/29/2020 5:49:31 AM +00:00

Lecture Professional Practices in IT: Lecture 19

Lecture 19 - Hacking. After studying this chapter you will be able to understand: Security is much larger than just packets, firewalls, and hackers. Security includes: Policies and procedures; liabilities and laws; human behavior patterns; corporate security programs and implementation; technical aspects- firewalls, intrusion detection systems, proxies, encryption, antivirus software, hacks, cracks, and attacks.

12/29/2020 5:49:25 AM +00:00

Lecture Professional Practices in IT: Lecture 8

Lecture 8 - Ethical and social issues in information systems (continued). After studying this chapter you will be able to understand: What ethical, social, and political issues are raised by information systems? What specific principles for conduct can be used to guide ethical decisions? Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? How have information systems affected everyday life?

12/29/2020 5:49:19 AM +00:00

Lecture Professional Practices in IT: Lecture 18

Lecture 18 - Hacking (continued). After studying this chapter you will be able to understand: Why do people hack? The psycology of hackers, types of hacking, password hacking, IP address, port, hacking tools, scanners, telnet, FTP.

12/29/2020 5:49:13 AM +00:00

Lecture Professional Practices in IT: Lecture 7

Lecture 7 - Ethical and social issues in information systems. After studying this chapter you will be able to understand: What ethical, social, and political issues are raised by information systems? What specific principles for conduct can be used to guide ethical decisions? Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? How have information systems affected everyday life?

12/29/2020 5:49:07 AM +00:00

Lecture Professional Practices in IT: Lecture 17

Lecture 17: Introduction to Hacking. After studying this chapter you will be able to understand: What is network security? Hacking, history of hacking, who is hacker? Who is cracker? Why do crackers exist? Difference between hacker & cracker, which operating system hacker use.

12/29/2020 5:49:01 AM +00:00