song

Friday, September 21, 2018

CHAPTER 5: DIGITAL SAFETY AND SECURITY & MICROSOFT EXCEL


DIGITAL SECURITY RISKS
A digital security risk is any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability. However, any illegal act involving the use of a computer or related devices generally is referred to as a computer crime also known as a cybercrime, is an online or internet-based illegal act.
HACKER VS CRACKER
HACKER:
        i.            Break the computer system with ethics to test the weakness of the system
     ii.            Do not damage the system or destroy data
 CRACKER:
          i.            Deliberately breaks the system to bring damage and sabotage elements
        ii.            Unethical
      iii.            Aggressive and dangerous
INTERNET AND NETWORK ATTACKS
        i.            Malware, short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices

How A Virus Can Spread Via An Email Message:
Step 1:
Unscrupulous programmers create a virus program that deletes all files. They hide the virus in a word processing document and attach the document to an email message.
Step 2:
Authors send the email message that contains the infected attachment to thousands of users around the world 
Step 3a:
Some users open the attachment and their computers become infected with the virus
Step 3b:
Other users do not recognize the name of the sender of the email message. These users do not open the email message. Instead they immediately delete the email message  and continue using their computers. These users computers are not infected with the virus.
      ii.            A firewall is hardware and/or software that protects a network’s resources from intrusion
UNAUTHORIZED ACCESS AND USE
1.      Organizations take several measures to help prevent unauthorized access and use
                                i.            Acceptable use policy
                              ii.            Disable file and printer sharing
2.      The computer, device, or network should maintain an audit trail that records in a file both successful and unsuccessful access attempts.
                                i.            User name
                              ii.            Password
                            iii.            Passphrase
                            iv.            CAPTCHA
3.      A possessed object is any item that you must carry to gain access to a computer or computer facility
·         Often are used in combination with a PIN (personal identification number)
4.      A biometric device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer.
5.      Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks
SOFTWARE THEFT
Software theft occurs when someone:
        i.            Steals software media
      ii.            Intentionally erases programs
    iii.            llegally registers and/or activates a program
    iv.            Illegally copies a program
INFORMATION THEFT
1.      Information theft occurs when someone steals personal or confidential information
2.      Encryption is a process of converting data that is readable by humans into encoded characters to prevent unauthorized access

3.      A digital signature is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the sender
·         Often used to ensure that an impostor is not participating in an Internet transaction
4.      A digital certificate is a notice that guarantees a user or a website is legitimate
5.      A website that uses encryption techniques to secure its data is known as a secure site
HARDWARE THEFT, VANDALISM, AND FAILURE

To help reduce the of chances of theft, companies and schools use a variety of security measures
Hardware Theft And Vandalism Safeguards
Hardware Failure Safeguards
Physical access control
Surge protector
Alarm system
Uninterruptible power supply (ups)
Physical security devices
Duplicate components of duplicate computers
Device- tracking app
Fault-tolerant computer

BACKING UP – THE ULTIMATE SAFEGUARD
1.      A backup is a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed
·         To back up a file means to make a copy of it
2.     
Off-site backups are stored in a location separate from the computer or mobile device site

ETHICS AND SOCIETY
1.      Computer ethics are the moral guidelines that govern the use of computers, mobile devices, and information systems
2.      Information accuracy is a concern
·         Not all information on the web is correct
3.      A code of conduct is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed
4.      Green computing involves reducing the electricity and environmental waste while using computers, mobile devices, and related technologies
INFORMATION PRIVACY
1.      Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
2.      Huge databases store data online.
3.      It is important to safeguard your information.
4.      Information about user can be stored in a database when user:
                                i.            Fill out a printed or online form
                              ii.            Create a social networking profile
                            iii.            Register a product warranty
5.      Phishing is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information
6.      With clickjacking, an object that can be clicked on a website contains a malicious program.
7.      Spyware is a program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
8.      Adware is a program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services.
9.      Employee monitoring involves the use of computers, mobile devices, or cameras to observe, record, and review an employee’s use of a technology, including communications such as email messages, keyboard activity (used to measure productivity), and websites visited.
10.  Content filtering is the process of restricting access to certain material on the Web
·         Many businesses use content filtering
11.  Web filtering software restricts access to specified websites

MICROSOFT EXCEL

How To Calculate Letter Grade In Excel?
To assign letter grade for each student based on their scores may be a common task for a teacher, for example, I have a grading scale defined where the score below 60 is an F, 60 to 70 is a D, 70 to 80 is a C, 80 to 90 is a B, and 90 to 100 is an A. In Excel, how could you calculate letter grade based on the numeric score quickly and easily?
  • Calculate letter grade based on numeric score with IF function
  • Calculate letter grade based on numeric score with VLOOKUP function

Calculate Letter Grade Based On Numeric Score With IF Function
The following formula can help you to quickly calculate the letter grade as you need, please do as this:
Enter this formula: =IF(E2>=90,"A",IF(E2>=80,"B",IF(E2>=70,"C",IF(E2>=60,"D","F")))) into a blank cell next to your score data where you want to locate the letter grade, F2, for instance, and then drag the fill handle down to the cells that you want to contain this formula, and the letter grade has been displayed in each cell as follows:
 doc calculate letter grade 1
Note: In the above formula, E2 is the cell which you want to convert the number to letter grade, and the numbers 90, 80, 70, and 60 are the numbers you need to assign the grading scale. You can modify them as you need.
arrow blue right bubble Calculate Letter Grade Based On Numeric Score With VLOOKUP Function
If there are more grading scales, such as following screenshot, I have defined a grade scale table, and now, I want to apply this grade scale to the score list table. In this case, the VLOOKUP function can help you.
 doc calculate letter grade 2
Please enter this formula: =VLOOKUP(B2,$F$1:$G$10,2,TRUE) into a blank cell beside your data, C2, for example, and then drag the fill handle down to the cells that you want to apply this formula, and now, you can see all the letter grades based on the corresponding grade scale table are calculated at once, see screenshot:
doc calculate letter grade 3
Note: In the above formula, B2 is the cell which you want to calculate the letter grade, F1:G10 is the table range you want to look for, the number 2 indicates the lookup table column number which contains the values you want to return.

No comments:

Post a Comment

CHAPTER 8 & 9: DIGITAL STORAGE & OPERATING SYSTEM

STORAGE 1.       A storage medium is the physical material on which a computer keeps data, information, programs, and applications. ...