0% found this document useful (0 votes)
3 views

Reviewer for IT Midterms

The document provides an overview of computer hardware, including types of computing devices like desktops, laptops, and smartphones, as well as internal components such as motherboards and CPUs. It also discusses various operating systems, productivity software, and network configurations, highlighting the importance of peripherals and file types. Additionally, it covers setting up workstations, SOHO networks, and the differences between local and hosted storage.

Uploaded by

jrcbrunzel12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Reviewer for IT Midterms

The document provides an overview of computer hardware, including types of computing devices like desktops, laptops, and smartphones, as well as internal components such as motherboards and CPUs. It also discusses various operating systems, productivity software, and network configurations, highlighting the importance of peripherals and file types. Additionally, it covers setting up workstations, SOHO networks, and the differences between local and hosted storage.

Uploaded by

jrcbrunzel12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

LESSON 1: Computer Hardware audio, video, and combination audio/video

files.
Computing Device
❖ A computing device is an electronic Internal Computer Components
machine that uses binary data to ❖ The motherboard is the personal
automatically perform calculations. computer component that acts as the
❖ A personal computer - run commercial backbone for the entire computer system.
software applications, access the Internet, Sometimes called the system board or
communicate with other people over email, mainboard.
create new applications in any one of a ❖ The central processing unit (CPU) is a
number of programming languages, play computer chip where most of the
games, do research, and much more. computing calculations take place.
❖ A desktop computer is a computing ❖ A power supply is an internal computer
device designed to be placed on or near a component that converts line voltage AC
user's desk. power from an electrical outlet to the
❖ Peripherals are the computer components low-voltage direct current (DC) power
that can be attached to a computer. needed by system components.
❖ A laptop is a complete computer system ❖ Memory is the component that provides
that is small, compact, lightweight, and the workspace for a processor. Random
portable. access memory (RAM) is volatile memory.
❖ Tablets look like a traditional laptop but Read only memory (ROM) is nonvolatile
have a touchscreen to small memory
notebook-sized mobile devices that operate
similarly to a smartphone but are a bit Common Computer Connector Types
larger and have more computing power. ❖ A port is a hardware interface that you
❖ Smartphones are high-end mobile devices can use to connect devices to a
that provide users with a wide range of computer. The port transfers electronic
functions, such as portable media players, signals between the device and the
video cameras, GPS, high- resolution system unit.
touchscreens ❖ A serial connection is a personal
computer connection that transfers data
Other Computing Devices one bit at a time over a single wire.
❖ A supercomputer is the fastest and the Serial ports are typically called COM1,
most expensive computer among all types COM2, COM3, and COM4, where
of computers. “COM” is short for communications port.
❖ A mainframe is a large computer that ❖ A parallel connection is a computer
might serve a large organization. connection that transfers data eight or
❖ An eBook reader is a device used to read more bits at a time over eight or more
electronic books, or eBooks. Some of these wires. The standard parallel port has
devices do nothing besides allow you to been phased out in favor of USB
download and read eBooks. ❖ A universal serial bus (USB)
❖ A personal digital assistant (PDA) is a connection is a computer connection
mobile hand-held device that provides that enables you to connect multiple
computing, information storage, and peripherals to a single port with high
information retrieval capabilities for performance and minimal device
personal or business use. configuration.
❖ A multimedia player is a handheld device ❖ RJ-45 connector is used on twisted pair
that enables you to play digitally recorded cable.
❖ RJ-11 connector is used with Category A software license is a legal document used to
1 cables in telephone system control the distribution and use of software.
connections and is not suitable for
network connectivity. LICENSE TYPE
❖ Open Source – enable users to access
Common Peripheral Devices source code and gives them the right to
❖ Peripheral is a device that connects to a modify it.
computer to expand the computer's ❖ Freeware – can be downloaded from the
functionality. This includes devices that Internet directly and used without any
enable the user to input, output, store, and restrictions.
share data. ❖ Commercial – sold to users
- Keyboards and pointing devices are the ❖ Copyleft – opposite of copyright, software
standard input devices for personal can be freely used, modified, and copied by
computers these days others.
- A mouse is a small object that runs ❖ Shareware – free for a specific period (trial
across a flat surface and has at least basis)
one, but typically two or three, buttons
that send electronic signals to the Types of Operating Systems for Workstations
graphical user interface (GUI). 1. Microsoft Windows is the single most
- A printer is a device that produces text popular as well as widely deployed
and images from electronic content onto operating system on both desktop
physical media such as paper, photo computers and server systems in the world
paper, and labels. today. The various versions of Windows all
- Speakers can be attached to the device feature a graphical user interface (GUI);
to play the audio out loud, without the support for a wide range of applications and
need for headphones devices; a minimum of 32-bit processing;
- Fax device functionality device that native networking support; and a large suite
sends and receives printed pages or of built-in applications and accessories such
images over telephone lines. as the Internet Explorer® browser.
- A flash drive is portable, with most 2. Mac OS X is the operating system
being about 1/2-inch wide, 1/4- inch developed by Apple Computing, Inc. OS X is
deep, and 3-inches long. a Linux® derivative, and consists of
- Touchscreen monitors enable input by UNIX-based operating systems and GUIs.
touching images on the screen. The This proprietary operating system is
screen also acts as the display for the included on all Macintosh computer
computing device. systems.
3. Linux is an open-standards UNIX derivative
COMPUTER SOFTWARE originally developed and released by a
An operating system (OS) is a software package Finnish computer science student named
that enables a computer to function. Linus Torvalds. The Linux source code was
It performs basic tasks, such as: posted publicly on a computing newsgroup,
➔ recognizing the input from a keyboard, then the code was developed and tested
➔ sending the output to a display screen cooperatively all over the world. Due to the
or monitor, and source code being open, it can be
➔ controlling peripheral devices such as downloaded, modified, and installed freely.
disk drives and printers. 4. Chrome OS - Built on the open source
Chromium OS, the Chrome operating
system was developed by Google as its
commercial OS. With manufacturing 1. Word processing software is used to
partners, the Chrome OS is installed on create and work with typed documents.
laptop computers that are known as Examples include Microsoft Word and Apple
Chromebooks. iWork Pages.
2. Spreadsheet software is used to calculate
Types of Operating Systems for Mobile Devices and analyze tables of numbers. Examples
1. Apple iOS - iOS is the base software that include Microsoft Excel and Apple iWork
allows all other applications to run on an Numbers.
iPhone®, iPod touch®, or iPad®. The iOS 3. Email software is used to communicate with
user interface supports direct touch, others. Examples include Microsoft Outlook
multitouch, and using the accelerometer. and Gmail.
2. Android OS - Android™, on the other hand, 4. Basic database software is used to manage
is a layered environment built on the Linux large volumes of lists and records.
kernel foundation that includes not only the Examples include Microsoft Access and
operating system, but middleware, which FileMaker Pro.
provides additional software for the 5. PDF software is used to view, create, and
operating system and additional built-in work with PDF documents. Examples
applications. The Android OS was include Adobe Acrobat
developed by the Open Handset Alliance 6. Presentation software is used to create and
and is owned by Google. work with slide shows. Examples include
3. Blackberry OS - BlackBerry® phones are Microsoft PowerPoint and Apple iWork
primarily used by professionals to conduct Keynote.
business operations and tasks. The 7. Desktop publishing software is used to
BlackBerry OS directly supports corporate work with page layouts and typography in
business requirements with functions such documents and publications. Examples
as: synchronizing with Microsoft Exchange, include Adobe InDesign and Microsoft
IBM® Lotus® Domino®, or Novell® Publisher.
GroupWise® emails, contacts, and tasks by 8. Personal information managers (PIM) are
maintaining a high level of security. used to manage your contacts and
4. Firefox OS - Developed by Mozilla, the schedules. Examples include Windows
Firefox OS is an open source operating Contacts and Google Calendar.
system based on Linux. 9. Remote desktop software is used to access
5. Windows Phone OS - Windows another desktop to provide troubleshooting
smartphones run on the Windows Phone assistance. Examples include Windows
OS, which is maintained and developed by Remote Desktop Protocol (RDP) and Virtual
Microsoft. Features include a suite of Network Computing (VNC).
Microsoft® Office® applications, Outlook®
Mobile, web browsing, Windows Media®
Player, and other advanced features. Types File Descriptions
of Files Exte
APPLICATION SOFTWARE nsio
Types of productivity Software ns
Productivity software is a broad term that
Docum .txt plain text (Notepad)
describes applications that range from those ents
used to create documents to those used to .rtf Rich Text Format
manage your projects and organize your time. (Wordpad)
Some common examples include:
.doc/ data files (WORD)
.doc .com command file or compiled
x application file

.xls/. data files (EXCEL) .exe executable file


xlsx
.msl Windows Installer package;
.ppt/. data files (POWERPOINT) a file that can specify
pptx installation parameters
for an application
.pdf portable document format
(ADOBE READER) .sce Linux self-extracting
xe executable file
audio .aac advanced audio coding
Compre .gzip free file compression file
.flac free lossless audio codec ssions /.gz format developed for the
Formats GNU Project
.m4a apple lossless audio codec
.jar Java archive file format
.mp3 moving picture experts
group layer 3 .rar developed by Eugene
Roshal, archive file format
Images .bmp bitmap image
.tar compression file created
.gif graphics interchange format with the XZ compression
image format

.jpg/. joint photographic experts .zip file compression format that


jpeg group image has built-in support in most
OS
.png portable network graphic
image
Windows uses the file extension to determine
.tif/.ti tagged image file format how the system will use a file, if you alter a file
ff name extension, you might find that a program
file will not execute properly or that a data file
Video .avl audio video interleaved file will not automatically open in the associated
format
application.
.flv flash video file format

.mp4 moving picture experts


LESSON 2
group layer 4
Setting up a basic workstation
.mpg moving pictures experts To set up a basic workstation, you can follow this
/.mp group process:
eg 1. Gather and connect hardware
components. At a minimum, you will
.wm Windows media video file probably need to plug in cables for a
v format
monitor,keyboard, and mouse. But, if you
Executa .app application program have additional hardware—a printer,
bles executable file format used speakers, and a webcam, for
by Apple example—you should connect them to
the desktop computer, too.
.bat batch file 2. Power on the computer.
3. If necessary, run the operating system connections to link with other computers.
setup utility. Wireless connections transmit data by
4. If necessary, configure the peripherals. In using radio frequency waves.
some cases, this might be accomplished 3. A cellular network, otherwise known as a
during the operating system installation. mobile network, is a radio network.
5. Configure and verify the Internet
connection. In some cases, this might be SOHO Networks
accomplished during the operating Small businesses, whether located in a
system installation. commercial building or in an individual’s home,
6. Install security software. can benefit greatly from being able to share files
7. Identify which applications should be on and other resources.
the workstation and install or uninstall ❖ A SOHO network is a network that provides
applications as necessary. connectivity and resource sharing for a small
8. Update operating system, security, and office or home office. Generally limited to
application software as needed to ensure fewer than 20 computers or nodes.
that all software is up to date. ❖ A SOHO network can contain a combination
9. Configure user accounts as needed. of wired and wireless computer connections,
10. Perform basic cable management to and all the computing devices in a SOHO
reduce clutter and enhance physical network usually share the same physical
safety. location.

Configuring Network Access and Wireless Network Technologies


Device Virtualization allows for one physical device to
Computer Network host multiple logical operating systems.
A computer network is a group of computers that
are connected to communicate and share Cloud Computing Is a computing infrastructure
network resources such as files, applications, in which resources are hosted in a distributed
and devices. fashion by a third party over the internet.

Network Types Web Applications are software applications


1. A local area network (LAN) is a group of that are installed on web servers and delivered
computers and associated devices that to users through the internet.
share the resources of a single processor
or server within a small geographic area. Voice over Internet Protocol (VOIP)
2. A wide area network (WAN) is a network of Is the transmission of voice communication over
computers that are spread across a large Internet Protocol (IP) networks, such as the
geographic area. internet.

Sharing and Storage Methods


Local vs Hosted Storage
Network Connection Methods
- Local storage refers to any storage
Connecting various devices to a network can be
media that is directly attached to the
done in several ways. How devices will
computer that uses it.
communicate with one another is determined by
- Hosted storage, or networked storage,
the connection method:
places data on specialized devices that
1. Wired computer networks use a technology
serve files to clients in a networked
called Ethernet.
based on each client’s need.
2. A wireless computer network is a network
in which computers use wireless
HTTP vs HTTPS ❖ File Types – a folder is a container
- Hyper Transfer Protocol (HTTP) is the object that can store your files in an
TCP/IP service that enables clients, organized manner. A folder within a
such a web browser application, to folder is called a subfolder.
connect and interact with websites. ❖ File Explorer is a Windows utility
- Hyper Transfer Protocol Secure application that offers a single view of all
(HTTPS) is a secure version of the the resources and information that you
HTTP that supports web commerce by can access from a computer.
providing a secure connection between ❖ File Explorer Components the
web browsers and servers. components of File Explorer can help
File Transfer Protocol (FTP) you explore the Windows folder
- Is used to transfer files across a TCP/IP hierarchy and work with data.
network, such as the internet. ❖ Navigation button allows you to move
- FTP is intended to enable file transfers, back and forward through the folder
independent of the operating system. views in the order of their display.
Bluetooth ❖ Refresh button allows you to see the
- A wireless technology that facilitates latest changes in the folder window.
short-range wireless communication
between devices.
COMP DESCRIPTION
Near Field Communication (NFC) ONEN
- A standard of communication for mobile T
devices, such as smartphones and
tablets, that are very close proximity, Addres The Address bar displays the
usually when touching or being only a s Bar address of an object. It is located
few inches apart from each other. below the Ribbon.

Ribbon The ribbon is displayed below the


title bar. It can show a list of
common tasks depending upon the
Lesson 3 selected object or objects. It can be
collapsed to give you more room to
Working with files view files and folder, a useful
File is an object that stores information on a feature on smaller screens.
computer.
❖ File Types - these might include Conten The Contents pane displays a list of
documents, audio files, image files, and ts files and subfolders within a folder. It
Pane consists of column headings that
video files. Any time you open a
help in arranging the contents in
program, you are using an executable various categories such as name,
file. size, and type of file.
❖ File Extensions - indicate a file’s type.
The file extension is the last three or Previe The Preview pane displays a
four characters that appear at the end of w Pane preview of files such as documents,
presentation slides, and images
the name to the right of the period. For
without opening them in an
example, the file extension .docx application. It displays the actual file
identifies “qtr_report.docx” as a Word contents rather than a thumbnail or
document an icon. This pane is not displayed
❖ Shortcuts - is a link or pointer to a by default, but when shown it
program, file, or folder that is appears to the right of the Contents
represented by a small icon. pane.
Expanding and Collapsing the Windows
Details The Details pane displays the file
Pane properties such as file name, file Hierarchical Structure
type, author, last modified, size, and In addition to adjusting the separator bar, you
other properties. Like the Preview can also navigate by expanding and collapsing
pane, the Details pane is not the Windows hierarchical structure.
displayed by default, but when
displayed, it shares the Preview
pane’s location. You can display
How to Create Files
only the Preview pane or the Details You can create and save files in File Explorer
pane, but not both at the same time. and in applications.

Status The Status bar displays the number Create an Empty File In File Explorer
Bar of items in the selected location. If To create an empty file in File Explorer:
you have multiple items selected in
1. From the Windows Start screen, select the
the file list section, the number of
items selected is displayed along Desktop tile, if necessary.
with the total size of the selected 2. Navigate to the folder where the file will be
items. created.
3. Right-click an empty area of the Documents
Naviga Above the Navigation pane are four pane in File Explorer.
tion buttons. The Back button returns 4. Select New and then select the desired file
Button you to the last location you viewed
type.
s or the last search results you
viewed. The Forward buttons 5. Replace the default file name with the
returns you to the next location or desired file name and press Enter.
search results you viewed. The 6. Open the file in the desired application to
Recent locations button shows a list add content to the file.
of the most recent locations you 7. Save the changes to the file by using File
visited. The Up button opens the
Save or the Save icon.
location one level up from the
current folder. 8. Close the application by using the File Exit
command or the Close button in the
search The Search bar enables you to application window.
bar locate documents within the file
structure. You can search from the Create and Save a File in a Windows
current location, including any Application
folders contained in the current
To create and save a file by using a Windows
folder. As you begin to type the
search, any files matching what you application:
type will be displayed in the search 1. Open the desired application.
results list. 2. Enter the data. For example, in a word
processing application, click or tap to place
the insertion point, and then type text. It you
Types of Views in the Address Bar
need to end a paragraph, press Enter to
In the Address bar, the path of a folder or file
move to the next line,
can be displayed in Breadcrumbs view or
3. When you have finished entering text, save
Address Path view.
the document by selecting File-Save As.
4. It you have not previously saved the file, the
Address Path view enables you to type an
Save As dialog box will open. In the Save As
object’s address to access it. You can switch
dialog box, navigate to the location where
from Breadcrumbs view to Address Path view by
you want to save the file,
selecting the Address bar.
5. In the File Name text box, type the name
you would like to give the file,
6. Select Save, operating system with important information
7. If necessary, on the Menu bar, select about the file or folder and how it is intended to
File-Save As to save the file with a different be used by system users.
name.
8. When you are done, close the application
File Description
window.
Attribute
Navigate a file structure Archive (A) Indicates that a file has not
Shortcut keys are keys are sometimes referred
been backed up. Windows
to as hot keys or hot key combinations.
automatically sets the Archive
attribute on any file you create
Common windows shortcut keys or modify. When you back up
Key Used to perform data, you can choose to back
combination up only the files on which the
Archive attribute is set.
Ctrl+C Copy the selected file or folder.
CtrI+XCut the selected file or Hidden (H) Hides a file from view in file
folder. management tools such as
File Explorer, Computer in
Ctrl+V Paste the selected file or folder. Windows 8, or My Computer
In Windows XP.
Ctrl+D Delete and send object to the
Recycle Bin. Read-Only Enables users to read the
(R) contents of a file or execute it
Ctrl+S Save the file from within a (if a program file), but prevents
Windows application. users from changing the
contents of a file.
F1 Display the application's Help
window. System (S) Indicates that a file is used by
the operating system. Some
F2 Rename the selected file or applications use this attribute
folder. to restrict user access to these
files. The System attribute in
Alt+Enter Display properties for the
Windows automatically hides
selected file or folder.
the file or folder.
Ctrl+A Select all of the contents of the
Index (I) This Windows-specific
current folder or all of the text
attribute enables the Windows
within a document.
Indexing Service to create an
index of the file to speed up
Manage files and folders the Search function.
The Recycle Bin is a container object located
on the desktop that temporarily stores deleted
How to manage files and folders
files. It is called the Recycle Bin because you
One of the things you will probably need to do
can restore deleted files and folders from it.
quite frequently is manage files and folders
through File Explorer.
File attributes
File attributes are characteristics that can be
associated with a file or folder that provide the
Create a Folder or File Within File Explorer - In the desired location, press CtrI+V.
To create a folder or file within File Explorer:
1. Open File Explorer and navigate to the Move a Folder or File
container in which you want to create the To move a folder or file:
new folder or file. 1. Locate and select the object you want to
2. Create the object. move.
- Select Home-New→New Item and select 2. Move the object to its new location.
the object type from the submenu. - Drag the object from its old location and
- Select Home-New-New folder. drop it in the new location.
- Right-click in an empty space in the - From the ribbon, select Home
container, select New, and then select the OrganIze→Move To. Select a location
object type from the submenu. where you want to move the object.
3. Type a name for the object. - Select the original object, hold down the
4. Press Enter or click the mouse anywhere in right mouse button, and drag the mouse
the empty space in the File Explorer window pointer over the new location. When you
to confirm the object name release the mouse button, select Move
Here.
Rename a Folder or File - Cut the object by selecting
To rename a folder or file: Home→Clipboard-Cut or pressing CtrI+X,
1. Locate and select the folder or file that you and paste it into the new location by
want to rename. selectin Home-Clipboard→Paste or
2. Select the existing name to be overwritten. pressing CtrI+V.
- Select Home→OrganIze→ Rename. 3. If necessary, rename the object.
- Right-click the object and select Rename.
- Press F2. Use the Recycle Bin
3. Type the new name. To use the Recycle Bin to delete or restore files
4. Press Enter or click the mouse anywhere in or folders:
the empty space in the File Explorer window 1. Locate and seléct the objects) you want to
to confirm the new name. delete.
2. Move the object(s) to the Recycle Bin.
Copy and Paste a Folder or File - Press Delete and select Yes to send the
To copy and paste a folder or file: objects) to the Recycle Bin.
1. Locate and select the object that you want to - Right-click the objects), select Delete, and
copy. select Yes to send the objects) to the
2. Copy the object. Recycle BIn.
- From the ribbon, select Home-Clipboard - Drag the objects) and drop it/them onto
Copy. the Recycle Bin icon.
- From the ribbon, select 3. To restore a deleted object, open the
Home-Organize→Copy To, and then Recycle Bin, select the object, and select
select a location where you want to place Recycle Bin Tools-Manage-Restore→
the copy. Restore the selected items, or right-click the
- Right-click the object and select Copy. object and select Restore. You can also
- Press Ctrl+C drag the object to the desired location. You
3. Paste the object in a new location. can also use the Undo command to restore
- Navigate to the desired location and select deleted objects.
Home-Cilpboard-›Paste. 4. Delete objects from the Recycle Bin
- Navigate to the desired location in the File permanently.
List, right-click an empty location, and - Right-click the Recycle Bin and select
select Paste. Empty Recycle Bin.
- Open the Recycle Bin and select Recycle available in Windows 8/8.1/RT. You can use
Bin Tools Manage-Manage-Empty Recycle it to capture anything on the Desktop. To
Bin. capture Windows 8 apps, it’s
- Open the Recycle Bin, right-click an empty recommended to use Windows + Print
location in the right pane, and from the Screen.
shortcut menu, and select Empty Recycle
BIn. HOW TO CREATE SCREEN CAPTURES
5. Select Yes to confirm the deletion. You can capture screens by using Windows key
Print a File combinations or with the Desktop app, the
1. In File Explorer, select the file that you want Snipping Tool.
to print.
2. Right-click the file and select Print. Capturing the Full Screen by Using Windows
3. Depending on the file that you are printing, Key Combination
the application might open, or you might be To create a full screen capture of a Windows 8
presented with a dialog box in which you store app by using a key combination:
can specify printing options. 1. Open the desired Windows 8 store app or
4. Select Print to print the file. the Windows Start screen.
2. Press Windows+Print Screen. On some
COMPRESS AND EXTRACT FILES keyboards, you will need to also press a Fn
Compressing a file is the process of reducing key to access Print Screen. The Print
the size of a file. Screen button might have a different
To Compress Files and Folders abbreviation as well.
1. Select the items you want to compress. 3. Open your Pictures folder and then open the
2. Right-click the selected items and select Screenshots folder. Each screen capture is
Send To →Compressed(zipped) Folder. saved here with (#) appended to the file
3. Type a new name for the compressed file name. The files are saved as PNG files.
and press Enter. Capturing the Active Window by Using
Windows Key Combination
To extract compressed files: To create a screen capture of the active window
1. Double-click the compressed item. by using a key combination:
2. In the Windows Explorer window, on the 1. Open the desired application or the
command bar, select Extract files. Windows Start screen.
3. Select the folder for storing the extracted 2. Press Alt+Print Screen.
files.
3. Open paint or another application in which
4. Select Extract.
you want to paste the image.
4. Paste the image.
Create screen captures 5. Save the file.
1. A screen capture is a picture, or image, of
what is displayed on your computer
monitor. It is also known as a screenshot, Lesson 4 - Common Security Threats
screen grab, or screen dump.
Hackers and attackers
2. Full screen captures taken with the key
- are related terms for individuals who
combination Windows + Print Screen are
have the skills to gain access to
automatically saved to a Screenshots folder
computer systems through unauthorized
in your Pictures folder. The files are saved
or unapproved means.
as PNG files.
3. Snipping Tool desktop application was
introduced in Windows 7 and is still
Hacker was a neutral term for a user who
triggered by a specific event, such
excelled at computer programming and as a specific date. Once the code
computer system administration. is triggered, the logic bomb
Attacker is a term that always represents a detonates, and performs whatever
malicious system intruder. actions it was programed to do.
Often, this includes erasing and
White hat - hacker who discovers and exposes corrupting data on the target
system.
security flaws in applications and operating
systems so that manufacturers can fix them Spyware Surreptitiously installed malicious
before they become widespread problems. It is software that is intended to track
sometimes called an ethical hack. and report the usage of a target
system, or to collect other data the
Black hat - hacker who discovers and exposes author wishes to obtain. Data
collected can include web
security vulnerabilities for financial gain or for
browsing history; personal
some malicious purpose. information; banking and other
financial information; as well as
Malware usernames and passwords.
▪ any unwanted software that has the potential to
damage a system, impede performance, or Adware Software that automatically
create a nuisance condition. displays or downloads
advertisements when it is used.
Although not all adware is
Malware Description malicious, many adware programs
Type have been associated with
spyware and other types of
Virus A piece of code that spreads from malicious software. Also, it can
one computer to another by reduce user productivity by
attaching itself to other files. The slowing down systems and simply
code in a virus executes when the by
file it is attached to is opened. creating annoyances.
Frequently, viruses are intended to
enable further attacks, send data Rootkit Code that is intended to take full or
back to the attacker, or even partial control of a system at the
corrupt or destroy data. lowest levels. Rootkits often
attempt to hide themselves from
Worm A piece of code that spreads from monitoring or detection and modify
one computer to another on its low-level system files when
own, not by attaching itself to integrating themselves into a
another file. Like a virus, a worm system. Rootkits can be used for
can enable further attacks, non-malicious purposes such as
transmit data, corrupt or erase virtualization; however, most
files. rootkit infections install backdoors,
spyware, or other malicious code
Trojan An insidious type of malware that once they have control of the
Horse is itself a software attack and can target system.
pave the way for a number of other
types of attacks. There is a social SPAM Spam is an email-based threat that
engineering component to a Trojan presents various advertising
horse attack since the user has to materials, promotional content, or
be fooled into executing it. get- rich-quick schemes to users.
The messages can quickly fill a
Logic A piece of code that sits dormant user’s inbox and cause storage
Bomb on a target computer until it is issues. Spam can also carry
Protocol [VoIP]) as the communication
malicious code and other types of
malwares. medium. This is also called voice phishing.
7. Whaling - This is a form of phishing that
Ransom Ransomware is malicious software targets individuals who are known to
ware that prevents you from using your possess a good deal of wealth. It is also
computer. It usually displays a known as spear phishing.
message stating that you must pay 8. Spam and Spim - Spam is an email-based
a fee or face some other penalty
threat that presents various advertising
before you can access your files
and computer again. Paying the materials, promotional content, or
ransom doesn’t necessarily mean get-rich-quick schemes to users. Spim is an
that you will regain access to your Internet messaging (IM)-based attack
files or computer. similar to spam that is propagated through
IM instead of through email.
Password cracking
SOCIAL ENGINEERING ATTACKS - Any type of attack in which the attacker
Type of attack that uses deception and trickery attempts to obtain and make use of
to convince unsuspecting users to provide passwords illegitimately.
sensitive data or to violate security
guidelines. It is often a precursor to another type Types of password attacks
of attack. 1. Guessing - simplest type of password
1. Shoulder surfing - This is a human-based attack and involves an individual making
attack where the goal is to look over the repeated attempts to guess a password by
shoulder of an individual as he or she entering different common password
enters password information or a PIN. values, such as the user’s name, a
2. Spoofing - This is a human-based or spouse’s name, or a significant date.
software-based attack where the goal is to 2. Stealing - Passwords can be stolen by
pretend to be someone else for the various means, including sniffing network
purpose of identity concealment. communications, reading handwritten
3. Impersonation - This is a human-based password notes, or observing a user in the
attack where an attacker pretends to be act of entering the password.
someone he is not. 3. Dictionary Attack - automates password
4. Hoax - This is an email-based or guessing by comparing encrypted
web-based attack that is intended to trick passwords against a predetermined list of
the user into performing undesired actions, possible password values.
such as deleting important system files in 4. Brute Force Attack - the attacker uses
an attempt to remove a virus. password-cracking software to attempt
5. Phishing - This is a common type of every possible alphanumeric password
email-based social engineering attack. In a combination.
phishing attack, the attacker sends an 5. Hybrid Password Attack - utilizes multiple
email that seems to come from a respected attack vectors including dictionary,
bank or other financial institution. brute-force, and other attack methodologies
6. Vishing - This is a human-based attack when trying to crack a password.
where the goal is to extract personal,
financial, or confidential information from Physical security issues
the victim by using services such as the 1. Internal - It is important to always consider
telephone system and IP-based voice what is happening inside an organization,
messaging services (Voice over Internet especially when physical security is
concerned.
2. External - It is impossible for any 3. Guest
organization to fully control external
security threats Authentication
3. Natural - Although natural threats are easy User authentication is a network security
to overlook, they can pose a significant risk measure in which a computer user or some
to the physical security of a facility. other network component proves its identity in
4. Man-made - Whether intentional or order to gain access to network resources.
accidental, people can cause a number of There are many possible authentication
physical threats. Man-made threats can be methods; one of the most common is a
internal or external. combination of a username and a password.

Environmental threats and vulnerabilities Password management best practices


1. Fire - it can destroy hardware and therefore A password is your access to your computer,
the data contained in it. and it should be protected so that the
2. Hurricane and Tornadoes - major network information on your computer is safe and
security threats due to the magnitude of the inaccessible to others.
damage they can cause to hardware and
data.
To create a strong password:
3. Flood - another major network security
1. Use at least seven characters.
threat that can cause as much damage as
2. Use a combination of uppercase letters,
fire can.
lowercase letters, numbers, and symbols.
4. Extreme Temperature - Extreme
3. If you are replacing a previously created
temperatures, especially heat, can cause
password, make sure that your new
some sensitive hardware components to
password is significantly different from the
melt and degrade, resulting in data loss.
last one.
5. Extreme Humidity - Extreme humidity can
4. Do not use common words, your name,
cause computer components, data storage
your username, or other words that people
media, and other devices to rust,
might associate with you, such as a pet’s
deteriorate, and degrade, resulting in data
name.
loss.

Wireless networking and security


Theft
Whenever possible, use a secured wireless
You must find a way to prevent theft of both data
network rather than an open wireless network.
and hardware. The items most often stolen are
Open wireless networks are a major security risk
portable devices such as laptops, tablets, and
when accessed directly.
smartphones. These pieces of hardware often
have highly valuable data on them. You can
physically secure laptops and tablets by using a Email best practices
cable but determined thieves will cut through a ● If there are noticeable changes to an email
cable. Another type of theft is theft of software account, such as an excess amount of
and licensing. Most software has a software spam or you find that there have been
license agreement that allows the user to install emails sent from the account that the
and use the software on a single computer. email account owner was unaware of,
then the computer’s security has been
jeopardized.
Apply security best practices
● Avoid selecting links in emails whenever
Types of user accounts
possible. Sometimes an email message
1. Administrator
looks like it came from a legitimate source
2. Standard User
with the correct logos, but look for
misspellings and bad grammar. This is a 5. Avoid selecting suspicious links or banner
good indication that the message is not ads. These are often the preferred method
actually from specified source. of attackers to gain access to your computer
● If you don’t know the sender, do not open and data.
any attachments to the email message. 6. Be aware of spoofed web pages that appear
Even if you do know the sender, be careful to be the web page of another company.
of opening attachments that you weren’t The pages most likely to be spoofed are
expecting to receive. sites such as PayPal or financial institutions.
● If you discover that your email account 7. If your browser has been infected with
has been compromised, the first thing to adware, be sure to clear the cache and
do is change your password and alert the cookies, reset passwords, and use your
network administrator. You should also antivirus software to try to eradicate the
perform a complete scan of your system infection. You might need to download
with antivirus software to locate and additional software to deal with the adware
remove any malware that might have been infection.
introduced onto your system. 8. Be careful to protect your personally
Cloud storage best practices identifiable information including your: Social
1. Cloud storage has become a very popular Security number, driver’s license number,
method for backing up data and for sharing financial account numbers, and log in
data. Many providers offer cloud storage. credentials.
Some of the most popular include 9. If you are using a public workstation be sure
Microsoft’s OneDrive, Google’s to remove all traces of your activity when
GoogleDrive, Apple’s iCloud, and Dropbox. you are done using the workstation.
There are other providers as well.
2. As with any other service that has user
Lesson 5 - Environmental and
names and passwords, make sure not to
share your credentials. safety concepts
Secure web browsing Ergonomics
Many people spend a good portion of their day - The term itself means the "laws of work.“
online. You need to be aware of the risks when - It comes from the Greek word ergon ("work")
browsing the web and use common sense and and nomos ("laws").
available tools to make it as secure as possible. - The basic principle of ergonomics is to make
sure the job environment – including tasks,
To protect your own information and your workstations, tools, and equipment – is
organization’s information, be sure to follow well-matched to the worker, minimizing
these guidelines: stress on that worker's body.
1. Make sure your browser is up to date.
2. Disable cookies and clear the browser Ergonomics
cache and history of saved data whenever - is the study of a person's efficiency at
possible. the workplace as it relates to his or her
3. When installing plug-ins and browser health, safety, and productivity.
extensions, install only the ones required for
your browsing. Disable any plug-ins,
Ergonomic best practice
toolbars, and extensions that you are not
1. Keyboard and Mouse - should be directly
using.
in front of the person and within a
4. If you access a site with an invalid
comfortable reach.
certificate, be sure to close the page unless
you are 100 percent positive that the page
can be trusted.
2. Office Furniture – Adjustable chairs are a mercury from their products, so disposing
must and should also provide lower-back of these batteries in the trash is safe. Keep
support. in mind that this doesn’t necessarily apply
3. Monitor - needs to be at eye level to to older batteries, which you may need to
reduce eye and neck strain. dispose of as you would a scanner or CRT.
4. Ink/ Toner - Different ink and toner
Ergonomic Principles manufacturers may include different
1. Work in a neutral position materials in their product. You should avoid
2. Keep materials within easy reach throwing these cartridges in the trash.
3. Work at the proper height 5. Hard Drive - Functioning hard drives are
4. Leave adequate clearance good candidates for donation or re-selling,
5. Move and stretch throughout the day but you should take care to wipe all data on
6. Keep your environment comfortable the drive before giving it away.
Malfunctioning or obsolete hard drives can
Prevent Eye Strain usually be disposed of in the trash, as they
What's the 20-20-20 rule? do not normally contain toxic materials.
If you find yourself gazing at screens all day,
your eye doctor may have mentioned this rule to Power and energy efficiency
you. Every 20 minutes spent using a screen; you ❖ Liquid crystal display (LCD) flat-panel
should try to look away at something that is 20 displays are a compact, lightweight
feet away from you for a total of 20 seconds. alternative to traditional CRT displays.
LCDs consume much less energy than
Device disposal option CRTs and do not emit nearly as much
1. Donating it to a local school or nonprofit electromagnetic radiation as CRTs do.
organization ❖ A solid state drive (SSD) has no moving
2. Selling it at a garage sale or through an parts. This makes it more energy efficient
online auction site than traditional hard drives. Also,
3. Bringing to Recycling center bring it to a mechanical failures and disk replacements
location authorized in hardware recycling are less likely.
4. Shipping to Vendors Many computer ❖ A network-attached storage (NAS) device
manufacturers and computer hardware is used to supply file-based data storage
manufacturers also have their own services to other computers on the
recycling and/or trade-in programs network. This may increase overall
efficiency because the file serving is done
Disposing of certain devices by the NAS device and not by a file server,
1. CRT Monitor - CRT monitors have a high which is responsible for other processing.
concentration of lead, which could be a ❖ A Bluetooth version 4.0 wireless mouse or
safety hazard if not disposed of properly. keyboard battery can last up to 5 or 10
CRTs should never be thrown into the years before needing to be replaced.
garbage.
2. Scanner - Like CRTs, some scanners Power supply options
contain toxic materials that, if thrown in the ❖ A power strip is a device that attaches to a
trash, may prove an environmental hazard. power outlet in order to provide more
Donate the scanner to a manufacturer or outlets for you to use.
retailer or contact a waste management ❖ A surge protector, on the other hand,
authority. provides the additional outlets of a power
3. Batteries - Manufacturers of alkaline strip with the added benefit of protecting
batteries today have largely eliminated connected devices from surges.
❖ An uninterruptible power supply (UPS) is
able to provide power to connected devices Implement basic support measures
in the event of a general power failure
without interruption. General Troubleshooting Tips
1. Use common sense
Back up and Restore Data 2. Check the physical connections
Data backup is a type of information protection 3. Check external issues
scheme that enables you to store copies of 4. Check the adapter to which the device is
critical files and folders on another medium for connected
safekeeping 5. Check Device Manager
6. Use the Help and Support Center
Back up frequency and schedules 7. Check for a number of causes
1. Should be regularly done
2. Schedule of back up must be set Common Operational Problems
1. No input is sent when keys are pressed on
Back up storage device a keyboard
2. Mouse is not working
1. Locally attached storage
3. Unable to print
2. Offsite/cloud-based
4. No network connectivity
3. Network-attached storage (NAS)
5. Hardware device not working properly

Data restoration
❖ a type of information protection scheme LESSON 6: APPLICATION
that enables you to recover stored copies
of critical files and folders from another
SOFTWARE
medium.
Software

Manage software ❖ Instructions that tell a computer what to do.


❖ Software management involves installing ❖ Software comprises the entire set of
and updating operating system features, programs, procedures, and routines
applications, and drivers, as well as associated with the operation of a computer
system.
obtaining the appropriate licenses.
❖ Software is usually stored on an external
❖ Versioning provides information about the long-term memory device, such as a hard
iteration of the software you are using. drive.
Software versions are changed every time ❖ When the program is in use, the computer
the software is upgraded, or newer features reads it from the storage device and
have been added to it. temporarily places the instructions in
random access memory (RAM).
❖ The process of storing and then performing
Considerations on installing software the instructions is called “running,” or
1. Hardware Requirements “executing,” a program.
2. Operating System compatibility
TYPES OF SOFTWARE
A software update is the process of replacing a
software application completely with a newer
1. System Software
version. It can be done in two ways: either by - Controls a computer’s internal
replacing a few selected files only, or by functioning, mainly through an
completely overwriting the software. operating system, and also
controls such peripherals as
monitors, printers, and storage - Word, Excel, PowerPoint, OneNote,
devices. Outlook and Publisher.
- System software is pre-installed 2. Google Workspace
into a system and cannot - Google Docs, Google Sheets, Google
usually be altered. Slides and Google Forms.
2. Application Software 3. Apache OpenOffice
- Detailed computer programs - Writer for word processing, Calc for
that perform specific functions. spreadsheets, Impress for
- These functions can range from presentations, Draw for graphics and
educational and professional Base for databases.
needs to entertainment and 4. Apple iWork
travel needs - Pages for word processing, Numbers for
- Also be referred to as spreadsheets and Keynote for
productivity programs or simply presentations
end-user programs.
- Application software is like icing
WORD PROCESSOR
on the cake, the base of which
can be seen in system software.
3. Network Software Word Processor
- Coordinates communication
between the computers linked in ❖ A software program capable of creating,
a network. storing, and printing text documents.
❖ It allows users to write and modify text,
TYPES OF APPLICATION SOFTWARE display it on a screen, save it electronically,
and print it out.
❖ Examples of application software are
1. Web browsers Appleworks, Wordpad, Notepad, Google
2. Presentation software Docs, Microsoft Word Docs, etc
3. Spreadsheet software
4. Graphic software FEATURES OF WORD PROCESSOR
5. Word processors
6. Database software
7. Multimedia software 1. Text Manipulation
8. Education software - The ability to quickly type and edit text,
9. Information software insert, cut, copy, paste, move text and
10. Content access software more advanced capabilities like word
wrapping.
PRODUCTIVITY SOFTWARE 2. Font specifications
- The ability to change the look of fonts
within a document.
Productivity Software - Features: bold, italicize, and underline
text, as well as change the font size and
❖ Help users produce things such as typefaces.
documents, databases, graphs, spreadsheets 3. Page layout
and presentations. - This could include changing the page
❖ Productivity software increases size, margins, and indentations, and
efficiency by facilitating people's tasks. adding columns. It could also include
❖ May include application types like the option to create headers and
collaboration and communication programs. footers, and page numbers.
4. Graphics
- The ability to add simple tables, graphs,
EXAMPLES OF PRODUCTIVITY
or numbered lists.
SOFTWARE PACKAGE - Adding visual elements – illustrations,
graphs and video.
5. Collaboration tools
1. Microsoft Office
- Multiple people can collaborate on the 7. The rectangular box at the intersection
same document. point between rows and columns forms
- Users can track their changes, leave a cell.
comments, tag and assign tasks to 8. The cell address is the name by which is
others, and review previous versions of cell can be addressed.
the document.
6. Spelling and grammar assistance
- Features built-in spell checking as well
as basic grammar checking.
- They may also have a searchable
thesaurus and be able to provide
suggestions for word choice

SPREADSHEET

Spreadsheet

❖ Representation of data in tabular form, it


allows easy calculations through formulas
and functions.
❖ Spreadsheet software that helps analyze,
store, and organize data.
❖ The most used application software in this
field is Microsoft Excel, Google Sheets, and
Apple Numbers.

MS EXCEL

❖ Microsoft Excel is a popular spreadsheet


software program for business.
❖ It is used for data entry and management,
charts and graphs, and project FEATURES OF MICROSOFT EXCEL
management.
❖ The user can format, organize, visualize,
and calculate data with this tool. 1. Home
- Comprises options like font size, font
styles, font colour, background colour,
IMPORTANT DETAILS ABOUT EXCEL
alignment, formatting options and styles,
insertion and deletion of cells and
1. An MS Excel file is saved with an editing options.
extension of .xlsx (dot xlsx) 2. Insert
2. The sheet on which you work is called a - Comprises options like table format and
Worksheet. style, inserting images and figures,
3. By default, there are three sheets in a adding graphs, charts and sparklines,
new workbook in all versions of Excel, header and footer option, equation and
(though users can create as many as symbols.
their computer memory allows). 3. Page Layout
4. Multiple worksheets can be added in a - Themes, orientation and page setup
single Excel file options are available under the page
5. Each worksheet is composed of layout option
1,048,576 rows by 16,384 columns, total 4. Formulas
of 17,179,869,184 cells. - Since tables with a large amount of data
6. A spreadsheet is in the form of a table can be created in MS excel, under this
comprising rows and columns. feature, you can add formulas to your
table and get quicker solutions .
5. Data - From the Home menu, users can add
- Adding external data (from the web), new slides, decide their sequence,
filtering options and data tools are layout, design & other word processing
available under this category functions like font change, size change,
6. Review etc. PowerPoint layout is used to
- Proofreading can be done for an excel change the layout of the current slide.
sheet (like spell check) in the review 2. Insert
category and a reader can add - From the Insert menu, the user can add
comments in this part media like pictures, symbols, audio,
7. View video, header, footer, shapes, etc. to the
- Different views in which we want the slides to enhance the user’s
spreadsheet to be displayed can be presentation.
edited here. Options to zoom in and out 3. Design
and pane arrangement are available - The design menu offers the user with
under this category ready-made templates & background
designs for slides that make the
Microsoft Powerpoint presentation look very attractive.
4. Slideshow
❖ A slideshow presentation software. - From the Slideshow menu, the user can
❖ It is a complete presentation graphics view the final form of the slideshow.
package. - Users can start the slideshow from the
❖ A presentation is made up of slides first slide or the slide that users are
- Users need to add content to them to editing. They can also set display time
make a presentation. for each slide from the ‘Slideshow’
- menu.
5. Animations
TRIVIA ABOUT MS POWERPOINT - Transition & Animation are the unique
functions of PowerPoint.
1. PowerPoint was developed by Dennis - These menus offer different options in
Austin and Thomas Rudkin at Forethought which the text appears on the slides &
Inc. takes transitions from one slide to
2. It was originally named as Presenter but another.
was not approved because of trademark 6. Review tab
issues. - The various tools that one can use
3. It was conceived only for Macintosh under this tab are; Spelling, Research,
computers, but in August 1987, Microsoft Thesaurus, Translate, Language. The
bought Forethought for $14 million. Research button aids in online research
4. PowerPoint became one of the most iconic in books and Internet resources about a
trademarks and the first important subject or topic you are working on.
acquisition of Microsoft. 7. View tab
- In the View tab, a user can have a
Normal View of a presentation. This is
also called the default view. It consists
of slides where one can add content for
the presentation.
- Slide Sorter View where all the slides of
the presentation are displayed in small
form on the screen.
- With the Notes Page tool, the slide is
presented with its notes.

Web Browser
FEATURES OF MICROSOFT POWERPOINT
❖ A software application used to access
information on the World Wide Web.
1. Home ❖ When a user requests some information,
the web browser fetches the data from a
web server and then displays the webpage - Incognito mode is provided where
on the user’s screen. private searching is available where no
❖ The World Wide Web cookies or history is saved
- Also known as the web, WWW or W3 - It has the best user interface.
represents all the public websites or 5. Microsoft Edge
pages that users can access on their - Microsoft Edge is the default browser for
local computers and other devices all Windows 10 devices.
through the internet. - Microsoft Edge supports the Cortana
❖ In 1993, the “Mosaic” web browser was personal virtual productivity assistant in
released. Microsoft 365.
- It was the “the world’s first popular
browser”.
- It was created by Marc Andreessen. IMAGE EDITING SOFTWARE
- The second web browser which was
launched.
Image Editing Software
❖ WorldWideWeb (later renamed Nexus to
avoid confusion between the software
❖ Software that allows images to be edited
and the World Wide Web) is the first
and also converted to different graphics
web browser and web page editor.
formats.
❖ This was created by Tim Berners-Lee in
❖ Today's image editing tools aren't just
1990.
simple filters applied to your photos.
❖ The other names of WorldWideWeb(no
❖ They can help bring out the best in your
space) are Erwise, and Viola WWW.
pictures, whether you use a mobile phone
or a digital single-lens reflex (DSLR)
OTHER BROWSER camera.

Adobe Photoshop
1. Netscape Navigator
- It was released in 1994 ❖ Photoshop is an image creation, graphic
- It had an advanced licensing scheme design and photo editing software.
and allowed free usage for ❖ Developed by Adobe for both Windows and
non-commercial purposes. macOS.
2. Internet Explorer ❖ The software provides many image editing
- It was launched in 1995 by Microsoft features for pixel-based images, raster
- By 2003, it has attained almost 95% of graphics and vector graphics.
usage share and had become the most ❖ It was originally created in 1987 by Thomas
popular browsers of all Knoll and John Knoll.
- It was included in the Microsoft - Raster graphics (or bitmap graphics) is
Windows operating system a type of digital image that uses tiny
- In 2015, it was replaced with “Microsoft rectangular pixels, or picture elements,
Edge”, as it became the default browser arranged in a grid formation to
on Windows 10. represent an image.
3. Firefox ❖ Photoshop is essential if you require
- It was introduced in 2002 and was layered image manipulation, typography,
developed by Mozilla Foundation sketching, and a wide range of other
- This browser was also made available effects.
for mobile phones, tablets, etc. ❖ Professionals use Adobe Photoshop to
4. Google Chrome change image colors, eliminate minor
- It was launched in 2008 by Google imperfections, add monochromatic effects,
- Multiple features from old browsers were and deepen or brighten the grayvalues of
combined to form better and newer certain colors to improve image contrast.
features - Free trial and demo versions are
- To save computers from malware, available via Adobe Creative Cloud.
Google developed the ad-blocking
feature to keep the user data safe and FEATURES OF ADOBE PHOTOSHOP
secure
1.Brushes - An interview format which are
- used for various effects, such as discussions between one or more hosts
compositing, repainting, erasing, and and their guests, usually diving deep
retouching photographs. into the guests’ personal history or
2. Clone Stamp expert knowledge on a topic.
- copies pixels from one region of a 2. Conversational
photograph and puts them into another. 3. Solo/Monologue
This is handy for fixing damaged or - A simple narration from one person.
corrupt photos. - It’s ideal for anyone who is an expert on
3.Blur a specific subject.
- softens an image's pixels, making it 4. Narrative nonfiction
less distinguishable. This creates a - A long-form storytelling.
fuzzy, dreamlike effect and can smooth - Narrative nonfiction covers anything that
wrinkles and fine lines. covers a true event or topic in a
4. Sponge tool narrative style.
- absorbs or releases colorfrom a - These are episodes about real-life
picture. Use this when you want to events, such as a series of murders, a
adjust colors that are too bright or too chronicle of an expedition up Mount
dark. Everest, or a historical event.
5. Fictional Storytelling
- These are fictional stories told across
PODCAST multiple episodes, similar to dramatic
television.
Podcast - Other shows use teams of voice actors.
- Subscribers can tune in each week for a
❖ Podcast is a digital audio file you can new installment of anything from
experimental sci-fi fantasies.
download or listen to over the Internet.
6. Repurposed content
❖ The main purpose of Podcast is to entertain - This is when you take existing content
its audience. and translate it into audio form.
❖ Each podcast is a series created by a host - For instance, a church podcast might
and then published episode-by-episode record its weekly sermons and release
online, where subscribers can then them as podcast episodes.
download and listen to each episode when
it’s released.
POPULAR PODCAST DIRECTORY

HISTORY OF PODCAST
If you want to listen to podcasts, you’ll need to
choose a directory first.
❖ Podcasts are a form of media content that
was developed in 2004. 1. Apple Podcasts
❖ Former MTV video jockey Adam Curry and 2. Google Podcasts
software developer Dave Winer coded the 3. Spotify
“iPodder.” 4. Stitcher
❖ The iPodder was a program that let a user 5. Overcast
download internet radio broadcasts to their 6. Podcast Addict
Apple iPod.
❖ This is where the term and meaning
podcast was born, taking its name from a
blend of ‘iPod’ and ‘broadcasts’.
TYPES OF PODCAST

1. Interview
- The most common podcast format

You might also like