Computer Studies Form Two Notes..
Computer Studies Form Two Notes..
TWO NOTES
1. WORD PROCESSORS
Definition
A word processor is an application software that allows users to create, • Page Formatting: Sets margins, page size, orientation
edit, format, store, and print text documents. (portrait/landscape)
• Styles: Predefined formatting that can be applied to text
Common Word Processors consistently
• Microsoft Word Document Enhancement Features
• Google Docs
• LibreOffice Writer • Tables: Organizes data in rows and columns
• Apple Pages • Graphics: Inserts pictures, clip art, shapes, and charts
• WordPad • Headers and Footers: Adds text at the top or bottom of each
page
Features of Word Processors • Page Numbering: Automatically numbers pages
• Footnotes and Endnotes: Creates references
Text Editing Features • Hyperlinks: Links to websites or other documents
Types of Data in Spreadsheets • Pivot Tables: Summarizes and analyzes large datasets
• What-if Analysis: Tests different scenarios
• Numbers: Numerical data for calculations • Goal Seek: Finds input values to achieve a specific result
• Text/Labels: Descriptive information • Solver: Optimizes solutions for complex problems
• Dates and Times: Calendar or clock information
• Formulas: Expressions that calculate values Advantages of Spreadsheets
• Functions: Pre-defined formulas (e.g., SUM, AVERAGE)
1. Automatic recalculation when data changes
Features of Spreadsheets 2. Facilitates complex calculations and analysis
3. Visual representation of data through charts
Data Manipulation 4. Handles large volumes of data efficiently
5. Supports decision-making through scenario analysis
• Sorting: Arranges data in ascending or descending order 6. Templates available for common business needs
• Filtering: Displays only data that meets specified criteria
Disadvantages of Spreadsheets 3. DATABASES
1. Can be complex for beginners
Definition
2. Errors in formulas can lead to incorrect results
3. Large spreadsheets may slow down performance
A database is an organized collection of related data stored and accessed
4. Limited database capabilities compared to dedicated database
electronically. A Database Management System (DBMS) is software
software
that manages databases, providing tools to create, maintain, and use the
5. Security concerns for sensitive data
data.
• Microsoft Access
• MySQL
• Oracle Database
• SQL Server
• PostgreSQL
• SQLite
Database Concepts
Database Components
Database Types
Database Relationships
• One-to-One: One record in a table relates to one record in • Forms: Custom interfaces for data entry and viewing
another table • Reports: Formatted output of data
• One-to-Many: One record in a table relates to multiple records • Queries: Tools for data retrieval and analysis
in another table • Macros/Scripts: Automate tasks
• Many-to-Many: Multiple records in a table relate to multiple
records in another table Advantages of Databases
Data Manipulation
Data Control
Internet Services
Email is a method of exchanging digital messages between people using • Write clear, concise subject lines
electronic devices via a network, particularly the Internet. • Keep messages brief and focused
• Use proper grammar and spelling
Components of an Email • Avoid ALL CAPS (perceived as shouting)
• Be careful with Reply All
• To/From: Sender and recipient addresses • Include a professional signature
• Subject: Brief description of the message content • Respond in a timely manner
• Body: Main content of the message
• Attachments: Files sent with the message Advantages of Internet and Email
• CC (Carbon Copy): Recipients who receive a copy
• BCC (Blind Carbon Copy): Hidden recipients 1. Global communication without geographical barriers
• Signature: Automatic text added to the end of messages 2. Instant information access and sharing
3. Cost-effective communication
Email Protocols 4. Permanent record of correspondence
5. Ability to send various file types as attachments
• SMTP (Simple Mail Transfer Protocol): Sends messages 6. Asynchronous communication (doesn't require both parties to be
• POP3 (Post Office Protocol): Retrieves messages available simultaneously)
• IMAP (Internet Message Access Protocol): Syncs messages
across devices Disadvantages of Internet and Email
Email Access Methods 1. Security concerns (viruses, phishing, hacking)
2. Privacy issues
• Webmail: Browser-based access (Gmail, Yahoo Mail, 3. Information overload
Outlook.com) 4. Dependency on technology and connectivity
• Email Clients: Software applications (Microsoft Outlook, 5. Potential for miscommunication without visual/verbal cues
Thunderbird) 6. Digital divide (unequal access)
• Power Failures: Interruptions causing data loss
6. DATA SECURITY AND CONTROLS
Human Factors
Definition
• Social Engineering: Manipulating people to divulge
Data security refers to protective measures applied to prevent confidential information
unauthorized access to computers, databases, and websites, and to • Insider Threats: Employees misusing access privileges
protect data from corruption, loss, or misuse. • Shoulder Surfing: Observing someone's screen or keyboard
• Dumpster Diving: Retrieving discarded information
Types of Data Security Threats
Data Security Measures
Malware
Authentication
• Viruses: Programs that replicate by attaching to other files
• Worms: Self-replicating programs that spread across networks • Passwords: Secret codes for user verification
• Trojans: Malicious programs disguised as legitimate software • Biometrics: Using physical characteristics (fingerprints, retina
• Ransomware: Encrypts data and demands payment for scans)
decryption • Two-Factor Authentication (2FA): Combining two
• Spyware: Secretly monitors user activity verification methods
• Adware: Displays unwanted advertisements • Security Tokens: Physical devices that generate authentication
codes
Network Attacks
Authorization
• Phishing: Deceptive attempts to steal sensitive information
• Man-in-the-Middle: Intercepting communication between two • Access Control Lists (ACLs): Define who can access what
parties • Role-Based Access Control: Permissions based on job
• Denial of Service (DoS): Overwhelming systems to make them functions
unavailable • Principle of Least Privilege: Providing minimum necessary
• Distributed Denial of Service (DDoS): DoS using multiple access
systems
• Packet Sniffing: Capturing data packets as they travel across a Encryption
network
• Symmetric Encryption: Same key for encryption and
Physical Threats decryption
• Asymmetric Encryption: Public and private key pairs
• Theft: Stealing devices containing data • Data Encryption Standard (DES): Encryption algorithm
• Unauthorized Access: Gaining physical access to systems • Advanced Encryption Standard (AES): Modern encryption
• Natural Disasters: Floods, fires, earthquakes affecting data standard
centers
• End-to-End Encryption: Securing data throughout its journey Best Practices for Data Security
Network Security For Organizations