Introduction to it module guide

Page 1

Spring 2014 Middle East College

Introduction To IT Module Code: FNDC 0001

Computing Department


Unit 1 Computer Organization

Prepare by Aisha Al-Masroori

1|Page


Introduction During the past decade, Information Technology also known as IT has been of great interest to almost everyone. It has given rise to new and efficient means of manufacturing products in industries, innovative and fast ways of communication between people and provided various benefits to every individual such that it is very useful to understand how it works. This chapter will give an overview of what IT is all about as well as describe some common examples where IT is applied in our everyday life.

What is Information Technology all about?

In the Information Age that we live in, it is well known that good information helps an individual in making the right decision at the right time. For instance, getting accurate information about weather forecast helps airport operators to carefully plan the schedules for take-off and landing of airplanes. In fact processing information to take actions or decisions is part of our everyday life. You can yourself imagine the number of times per day this happens to you. Interestingly, human nature seeks to make his life easier by finding new means of actually automating this task of information processing; Information Technology does just that. Ranging from simple calculators to complex mobile phones, IT has proved to facilitate the life of each and every one by automatically processing information and performing predefined tasks. However it is essential to note that the success of IT lies mainly through the use of a common device that has been introduced in almost every household today; that is the computer with the support of communication facilities Click here for more info

Computers at a glance Computers are electronic devices that are very good at processing information. There exist many kinds of computers to serve different purposes.

Some examples include

calculating product prices during checkouts in supermarkets, dispensing money at the ATM and controlling the running of modern cars. However all of them have got the following in common: 1. Hardware 2. Software Prepare by Aisha Al-Masroori

2|Page


Hardware The term hardware describes the physical parts of your computer which you can physically touch or see such as your monitor, case, disk drives, microprocessor and other physical parts.

Input and Output Devices Input devices accept user commands or data and send them to the computer for processing. Typical input devices are keyboard; mouse, scanner and microphone see Figure 1. On the other hand, output devices accept results or information generated by the computer, and presents this to the user in a variety of means (both audio and visual e.g. textual, image, video). Typical output devices are printers, monitors and speakers see Figure 2. Some special devices can be used for both input and output, such as floppy disks and hard drives see Figure3. Computer input and output devices have undergone remarkable development with advances in technology.

Prepare by Aisha Al-Masroori

3|Page


Input devices With all the input devices available today, users may find it difficult to determine which one is best for entering data into their personal computer. The main function of input devices is to convert people-readable form of data into a machine-readable form that the computer can store and process. People readable form of data can be letters, numbers, visual codes and symbols. Machine-readable forms of data consist of electronic signals of 0's and 1's. A personal computer is normally equipped with a mouse and keyboard as standard input devices. Input devices can fall under three categories, namely pointing, scanning and voice. Input can be made by keyboard or direct entry.

Output Devices Output devices have evolved over time. They are not as numerous as input devices but their efficiency is much appreciated in the computer technology world. The basic function of an output device is to get information or any other response out of the computer.

Exercise 1

ď ‰Match column A to column B

1. 2. 3. 4.

Prepare by Aisha Al-Masroori

Processor Output Storage Input device

4|Page


Mother Board The main circuit which is the heart of the computer. The motherboard contains the connectors for attaching additional boards. Typically, the motherboard contains the CPU, BIOS, memory, mass storage interfaces, serial and parallel ports, expansion slots, and all the controllers required to control standard peripheral devices, such as the display screen, keyboard, and disk drive. Collectively, all these chips that reside on the motherboard are known as the motherboard's chipset. Click here for more info

CPU Central Process Unit: which is the brain of the computer, which does all the processing and calculations on data inputs and provides output on screen or printer Click here for more information Prepare by Aisha Al-Masroori

5|Page


Exercise 2

Write the name for each part 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.

Monitor ……………………… ………………………. ……………………….. ………………………. ………………………. ………………………. ………………………. ………………………. ……………………….

Prepare by Aisha Al-Masroori

6|Page


Memory

Whenever software is installed on a computer, the latter is placed on the hard disk of the computer. However, when that software is run (e.g. when you double-click on its icon), the latter has to be transferred to the memory of the computer for the CPU to be able to execute it. Memory in a computer is in the form of RAM (Random Access Memory) modules. RAM can be purchased in the form of RAM sticks and it is normally measured in terms of its size (256 MB, 512MB, 1 GB,...). RAM is said to be volatile, meaning that, information stays here as long as the computer is ON, but as soon as it is turned OFF, the information inside the RAM disappears.

•

RAM: Random Access Memory or RAM as it is popularly known,

is the key

working area of the memory, that is used for our problems and data. The main feature of the RAM is that it can be read from or written onto any location and can be accessed randomly. The contents of RAM are available as long as the computer is not switched OFF. It loses the contents the moment the power is turned OFF. Hence it is called the volatile memory •

ROM: Read Only Memory as the name itself implies, holds permanent data or instruction that can be read from, but not written onto, i.e. information is permanently

Prepare by Aisha Al-Masroori

7|Page


recorded so that it cannot be changed by the programmers. It is non volatile in nature, meaning that the contents of ROM are not lost when the computer is switched off, it remains there. It is merely deactivated. (1)ROM contains the instructions to get the computer started when switched ON. Other uses of ROM include (2) holding the instructions and data that control the various peripheral units of the computer such as graphics display and disk drive etc.

RAM Read and write volatile

ROM Read and cannot write nonvolatile

The data is lost when power of computer The data is not lost even if power of data is is lost lost The key working area of the memory

Prepare by Aisha Al-Masroori

Holds permanent data or instruction

8|Page


Types of Computers In the scope of this course we have five types of computers namely: •

Desktop computer

Laptop

Mainframes

Super computer

PDA (Personal Digital Assistant)

Desktop Computer Desktop is ideal for many situations.

Basically, it has a tower CPU.

It is most

common today we see it here and there. Many companies use desktop computers instead of laptops because it is cheaper and has higher configuration too.

However, there are

disadvantage. The most common is that it is heavy and cannot be easily taken from place to place like laptop. A desktop would weigh three times than laptop.

Desktop Computer

Laptop Now days at home and work we use laptop quite more often than ever. Today it has good enough configuration and cheap. However, it is not as cheap as a desktop. Laptop has huge advantage over desktop machines in its weight. We can take it anywhere and anytime as we wanted it to be. It is much useful in today’s world.

Laptop

Prepare by Aisha Al-Masroori

9|Page


Mainframe This type of computer is used in large companies like PDO, Bank Muscat etc.

It

centralized all the users to one place. It is used in companies where there are five thousand or more computer users. It is a computer which we can never use at home or you will never even find it in small companies because it is quite costly. And it will not serve any purpose for small-medium enterprise like Middle East College.

Mainframe

Supercomputers It is used in for complex calculations and for research.

Supercomputer handles

complex calculations for the humans. Usually supercomputers are size of a room. It costs millions of dollars to purchase the equipment. Supercomputers are the computer that are first to detect any tornados, cyclones or an earthquake. It is commonly used for weather forecast and oil exploration.

PDAs The full form of PDA is Personal Digital Assistant. It is a hand-held computer just like a mobile phone. PDA has one major difference to a common computer that PDA uses touch screen with the help of a pen type device.

Prepare by Aisha Al-Masroori

10 | P a g e


PDA (Personal Digital Assistant)

 Click here for information  Which types of computer size as room size? Supercomputer. Mainframe. PDA. Desktop Computer. Which types of computer is used for many situations? Laptop. Mainframe. PDA. Desktop Computer. It is most common today and has too higher configuration. Desktop Computer. Laptop. PDAs. Super Computer. It is not cheap and has huge advantage over desktop machines______ Mainframe. Laptop. PDAs. Super Computer. It is useful machine today's world________ Desktop Computer. PDAs. Laptop. Super Computer

Prepare by Aisha Al-Masroori

11 | P a g e


Software The term software describes any single program or a group of programs run on your system. This includes your computer operating system and other computer programs which run. Software is written in a computer language (such as Visual Basic, C, Java, or others) by programmers. The computer language is in a text format and can be read by a person although if you do not understand the structure and rules of the language you may not understand it very well. Once a program is written, an operation is performed on it which is called compiling. Compiling is the process of changing the textual written language into a binary language which can be understood by the computer. Types of Applications: Operating System: An Operating System is a software program or set of programs that mediate access between physical devices (such as a keyboard, mouse, monitor, disk drive or network connection) and application programs (such as a word processor, World-Wide Web (WWW) browser or electronic mail client). Example: Unix, Windows XP, Windows 95/98 ,Windows 7,DOS Application Software: The normal application which we are using daily like Office suite application, Real player and other applications. Programming Software: A programming tool or software development tool is a program or application that software developers use to create, debug, maintain, or otherwise support other programs and applications. Example: Borland C++, Visual Basic 6.

Hertz

Hertz equals one cycle per second, measuring the waves or frequencies of electric changes each second. Hertz is commonly used to measure a computer monitor's refresh rate and in computer processors. Prepare by Aisha Al-Masroori

12 | P a g e


1000 Hz = 1 KHz (Kilo Hertz) 1000 KHz = 1 MHz (Mega Hertz) 1000 MHz = 1 GHz (Giga Hertz)

Prepare by Aisha Al-Masroori

13 | P a g e


Data Size

Data size is the most important concept out of all the topics in this book. For every amount of instruction, we have a metric. It is very useful knowledge for managing data and sizes. Smallest data size is Bit which is 1 byte= 8 Bits .There are basically four different levels of sizes we can use: • • •

Byte KB – Kilo Byte MB – Mega Byte

• •

GB – Giga Byte TB – Tera Byte

1024KB = 1MB 1024MB = 1GB 1024GB = 1TB In addition to above, we must also keep in mind that 1024bytes = 1KB.

Suitable Computer for a Student •

Intel core2due 2.0

2 GB RAM

250 GB HDD

128 MB VRAM

Super-Multi DVD±RW

Windows 7 Home premium

Prepare by Aisha Al-Masroori

14 | P a g e


Computer and lab top ergonomics and good computer posture tips Here are a few simple computer ergonomic rules you should follow: •

Get a decent chair!

Make sure your feet are on the floor or up on a footrest.

Your head should be in a neutral position with your screen at about 15 degrees below eye level.

Try and keep your forearms at about 90 degrees and supported on the desk top or a wrist rest.

Don’t work for long periods using a notebook or laptop.

Don't share.

Talk to your workplace occupational health team.

 Click here for watch Movie

Prepare by Aisha Al-Masroori

15 | P a g e


ď †Why is ergonomics recognized as a way to improve the workplace? Good design can help employees to be healthier and more productive Organizational psychology can help employees plan more efficiently Massage therapy can help employees to be less tense and stressful Communications technology can help employees communicate better

Prepare by Aisha Al-Masroori

16 | P a g e


Unit 2 Basic Computer Operation and File Management

Prepare by Aisha Al-Masroori

17 | P a g e


Switching the computer On/Off To Switch ON the Computer: Make sure that the computer is connected to the power cable then press the on button in the computer to turn it on. To Switch off the computer: Save all of your work and close the open files. Then 1. Click the start button

2. Click shut down the computer  click Ok. Don’t turn off the power immediately it will take few minutes for the computer to switch off.

Install/Uninstall applications or new devices: There is many ways install new application 1. Double click on program folder and install follow steps 2.

From star Menuall Program- Control Penal

If you need to change program settings or Remove programs

If you need to Add New Programs, also you can double click at the installation package and follow the steps

Prepare by Aisha Al-Masroori

18 | P a g e


To uninstall a program Go to 

Start

Control Panel Add and Remove program 

chose the program 

Double click it or Click uninstall. Follow the steps:

 What is an appropriate routine when turning off the Computer Switch it off directly from the mains Press the power button until the computer turns off Go via Start menu then shut down

Where can the "add or remove programs" link be found? Control Panel Set program access and defaults My Computer My Network Places

Prepare by Aisha Al-Masroori

19 | P a g e


Connecting devices To connect printer to the computer, you have to connect the cable first (Old printers use parallel port, new printers using USB ports)

Connect the printer cable to the computer and turn the printer on. Install printer driver software according to the manufacturer's instructions. Here some of Computer Drives:

3½ Floppy Drive Local Disk Drive

CD Drive

Documents on Server Removable Disk Drive There is some Icons Represents in Desktop:

Arrow in Icon shows the short cut for Real Player

Prepare by Aisha Al-Masroori

20 | P a g e


1

2

3

4

5

1. Go to back page or forward and we can organize, if it is highlighted then we can go back to previous page we were in. 2. Go to upper folder 3. Search for any file, photo, document, video‌etc 4. To explore the drives and folders 5. List of how you want the files show (list, large icons, detailed)

The (+) means this folder has sub-folders in it

The (-) means this folder is collapsed

Default Printer

Prepare by Aisha Al-Masroori

21 | P a g e


Copyright © The legal protection against copying and the specific rights allowing copying given to original works, which may be in printed or photographically or electronically stored words, music, visual arts, and performing arts such as an artist or author. This includes copying, distributing, altering and displaying creative, literary and other types of work .The purpose of copyright is not just to protect the rights, but to establish the rules under which copies or portions may be made to make a work more widely available. Shareware •

Also called “trial version”

Provides users to try the software –

for a period of time

– And/or with limited features •

Full privilege is given after the purchase

E.g. Office has 90 days trial period

Freeware •

Available for free

Usually available on the web

Can be freely passed around

No limited features or trial period

End-user License Agreement •

Policy for protecting against any breakage of copyright laws

Info comes just before installing software

Prepare by Aisha Al-Masroori

22 | P a g e


What is Backup? Backup involves the storing of files from your computer in another location. In this way, if there is ever any loss of data on your primary machine, you still have your data in backup in order to restore those files. In the world of computers loss of data can be devastating, and while there are possibilities for recovery of data after a disaster, it is far easier to restore your files from backup than to attempt to find your data on a crashed hard drive. Why do I Want to Back up My Data or files? Data backup is easy to do and can save you great amounts of time as well as ensure that your data is secure in the case of disaster. Data recovery is a very difficult, time consuming and expensive process, and it is not even assured that you will be able to recover your data from a system crash

File managements Open and Close files: Using Desktop • Double click any Icon on the Desktop Open files: Using Start Programs •

Go to Start

All Programs

Games Purple Place

Close Program

Press

Shortcut Key Alt + F4

button on the Top Right of the Window

Prepare by Aisha Al-Masroori

23 | P a g e


Save your work on Office suit application •

Go to File tab  Save

Go to Office icon  Save as (to save it with on new Name)

Or •

use Shortcut key “Ctrl + S”

Hierarchical structure In Windows environment the file structures start from the partitions. Normally we have one partition “C”. Under The “C” partition are the main directory folders like “Windows”, “Programs” and others. •

Browse to Windows folder under C:\

First step double click “My Computer”

Then double click C:

Then double click Windows folder

File extensions File extension specify the type of the file. There are thousands of file extensions. Example: •

.exe – Executable files

.doc – Word Document

.xls – Excel Sheet

Also user can control if need to show the file extensions or not by:

Prepare by Aisha Al-Masroori

24 | P a g e


Menu  List of commands presented to user by a program o Commands are actions to do  Usually placed on the top of the program  The list of menu depend to the application we work with Example : Word Document Menu below

Formatting It is the process of erasing all the files and data in a specific storage device. •

Go to My Computer

Right click at the driver icon

Then chose format

Chose the type of file system FAT32 or NTFS

• Start the format

Prepare by Aisha Al-Masroori

25 | P a g e


Write files to CD/DVD To write files to CD or DVD you should have a CD writer or DVD writer. You should use programs to burn files into the CD/DVD like Nero or ashampoo burning studio or other programs. Select the files and chose burn.

Compress / Decompress Compress •

Complaining more than one file in one location and reduce the size of the output file.

It save disk space and saves time copying many files

There are several programs do compress/decompress beside the tool coming by default in windows operating system like Win Zip, Win RAR, 7-zip

Prepare by Aisha Al-Masroori

26 | P a g e


Decompress •

When extract the file, the original file will remain in the compressed zip folder

Windows Search tool Windows come with a built-in search tool. It can be used to search for a file or a folder that is located in the computer or any storage device attached to the computer. Start  Search Box  Write the File or Folder name you want to search

What is a wildcard, and how can I use it? A wildcard is a symbol that takes the place of an unknown character or set of characters. Commonly used wildcards are the asterisk ( * ) and the question mark ( ? ). Depending on the software or the search engine you are using, other wildcard characters may be defined. The asterisk ( * ) The asterisk represents any number of unknown characters. Use it when searching for documents or files for which you have only partial names. For example, if you enter cheese* as your search term, the search might return these items: cheese cheesecake cheesedip.txt

Prepare by Aisha Al-Masroori

27 | P a g e


If you enter *cheese as your search term, the search might return these items: stringcheese swisscheese sliced.cheese For most web search engines, wildcards increase the number of your search results. For example, if you enter running as the search term, the search will return only documents with that one word. If you search using run* , the search results may contain run, runner, and running.

The question mark ( ? ) The question mark represents only one unknown character. Use it when you have a list of files with very similar names, or when you are unsure of a few characters. For example, if you enter take?.txt as your search term, the search might return these files: take1.txt taken.txt take2.txt However, it would not find take12.txt because the question mark only covers one character. To find two unknown characters, enter take??.txt as your search term. Combining * and ? You can use the asterisk ( * ) and the question mark ( ? ) anywhere in a search, and you can also use them together. For example, if you want to find all the files that start with home, followed by one or two characters, and ending with any extension, enter home??.* as your search term. Your search might return home45.bak or homer4.txt, but not homeloan.doc.

Prepare by Aisha Al-Masroori

28 | P a g e


The asterisk (*) wildcard substitutes more than one letter when performing a search. True False

Which of the following is not a wildcard character? ?(question mark) *(asterisk) , (comma)

If you have a wildcard search with 6 question marks (??????.doc) how many characters are being

replaced by wildcard characters? 1 3 12 6

Computer Shortcut Keys (Also you can download more shortcut keys file from Moodle) Prepare by Aisha Al-Masroori

29 | P a g e


Shortcut Keys

Description

Alt + F

File menu options in current program.

Alt + E

Edit options in current program

F1

Universal Help in almost every Windows program.

Ctrl + A

Select all text.

Ctrl + X

Cut selected item.

Shift + Del

Cut selected item.

Ctrl + C

Copy selected item.

Ctrl + V

Paste

Home

Goes to beginning of current line.

Ctrl + Home

Goes to beginning of document.

End

Goes to end of current line.

Ctrl + End

Goes to end of document.

Shift + Home

Highlights from current position to beginning of line.

Shift + End

Highlights from current position to end of line.

Ctrl + Left arrow

Moves one word to the left at a time.

Ctrl + Right arrow Moves one word to the right at a time.

Prepare by Aisha Al-Masroori

30 | P a g e


Unit 3 Using Internet and Email services

Prepare by Aisha Al-Masroori

31 | P a g e


What is Network?

A network is a group of two or more computer systems linked together. There are many types of computer networks, including: Click here for more information •

Local-area networks (LANs) : The computers are geographically close together (that is, in the same building or same area). Example: MECIT, Bank Muscat

•

Wide-area networks (WANs): The computers are farther apart and are connected by telephone lines or radio waves and also for outside the same organization. Example: Omantel Service

Prepare by Aisha Al-Masroori

32 | P a g e


Campus-area networks (CANs): The computers are within a limited geographic area, such as a campus or military base. Example: MECIT phone locally

Metropolitan-Area Networks (MANs): A data network designed for a town or city.

Home-Area Networks (HANs): A network contained within a user’s home that connects a person's digital devices.

Prepare by Aisha Al-Masroori

33 | P a g e


In addition to these types, the following characteristics are also used to categorize different types of networks: •

Topology: The geometric arrangement of a computer system. Common topologies include a bus, star, and ring. See the Network topology diagrams in the Quick Reference section of Webopedia.

•

Protocol: The protocol defines a common set of rules and signals that computers on the network use to communicate. One of the most popular protocols for LANs is called Ethernet.

Another popular LAN protocol for PCs is the IBM token-ring

network. •

Architecture: Networks can be broadly classified as using either a peer-to-peer or client/server architecture.

Prepare by Aisha Al-Masroori

34 | P a g e


Computers on a network are sometimes called nodes or clients. Computers and devices that allocate resources for a network are called servers.

Services and goals of computer network Services •

Email service

File service - Allows users to use and share file space on a computer with a lot of file space.

Print service - Allows printing to printers connected on the network.

Web surfing - Allowing someone to open web pages and see web sites on the internet.

Filtering out undesired sites on the internet.

Allowing someone to access the network from the outside (from home).

Updating virus definitions on workstations.

Allowing someone to log onto the network.

Even giving a workstation an address on the network is a service. If your computer does not have an address, it cannot access the internet or any other resource on the network.

Goals • Resource Sharing: Here the goal is to make all programs, equipment and data available to anyone on the network, without regard to the physical location of the resource and the user. Example; a user who is 1000 Kms away from his data should not be prevented from using the data.

Prepare by Aisha Al-Masroori

35 | P a g e


• High Reliability: The second goal is to provide high reliability by having alternative sources of supply. Example; All files could be replicated on 2 or more machines so that if one of them is unavailable (due to a hardware Failure) the other copies could be used. In addition the presence of multiple CPU’s means that if one goes down the other may be able to take over its work. • Saving Money: Small computers have a much better Price / Performance ratio than large ones. Mainframes are roughly a factor of 10 times faster than personal computers but they are 1000 times costlier. Hence we have client server model where the client requests for some work to be done and the server then does then work and responds back to the client. • Communication: A computer network can provide a powerful communication medium among widely separated users. Using a network it is easy for 2 or more people who live far apart to write a report together. Users can exchange information through Emails and share documents through FTP. What is The Internet? The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet. Information that travels over the Internet does so via a variety of languages known as protocols. What is The Web (World Wide Web)? The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the HTTP protocol, only one of the languages spoken over the Internet, to transmit data. Web services, which use HTTP to allow applications to communicate in order to exchange business logic, use the Web to share information. The Web also utilizes browsers, such as Internet Explorer or Firefox, to access Web documents called Web pages that are linked to each other via hyperlinks. Web documents also contain graphics, sounds, text and video.

Prepare by Aisha Al-Masroori

36 | P a g e


How to create E mail account: •

First go to main page (which you need to create your account)

Sign up for new user (if you don’t have)

Fill your details need to fill

Submit your information

Wait for acceptance

Sign in with your new account

Enter your name & password

Check your email and do modifications you need (theme, Nike name, Picture...etc)

Enter user name & password

Create new account

Prepare by Aisha Al-Masroori

37 | P a g e


How to create new E mail message :

• Write address of person you want to send him/her email near To box. •

Carbon copy paper made it possible to send the same letter to two (or even more if you need) different people without the onerous task of having to write or type it twice.

BCC (blind carbon copy; also Bcc) is a copy of an email message sent to a recipient whose email address does not appear in the message. This is in contrast to To and CC recipients, whose addresses do appear in the respective header lines. Every recipient of the message can see all the To and CC recipients, but does not know about BCC recipients.

Subject: Write your e mail subject

You can add Attachments (Pictures, documents, music…etc)

Modify Text format (type, size, color)

Prepare by Aisha Al-Masroori

38 | P a g e


Virus: It is small program designed to alter your computer performance  Different Types of Virus  Trojan horse – sits inside your computer and delivers information to hackers  Worms – spreads on the network  Email viruses – automatically forwards emails in your name More than one way you can get a virus on your computer, such as: 1. Running an executable file you receive from an e-mail 2. Opening a document that contain a macro virus 3. Opening an infected file from a removable storage device 4. It continuous to spread through email, internet or storage devices.

Antivirus Antivirus is a program that searches a hard disk and computer for viruses, Trojans, worms and removes any that are found. Most antivirus programs include an autoupdate feature that enables the program to download profiles of new viruses so that it can check for the new viruses as soon as they are discovered. Often you should run a manual virus scan of your hard drive once a week. Example for antivirus programmers’: Norton antivirus, AVIRA, AVG, Kaspersky …etc.

Note:

It is important to update the Antivirus program to keep ahead of the

malicious software writers and to provide you with the latest protection

Prepare by Aisha Al-Masroori

39 | P a g e


Password A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource. It is the key to enter to your account and files. The password should be kept secret from those not allowed access. These are the characteristics of a good password: •

The password should be random.

The Password should not be less than 8 characters.

The Password should contain lower case and upper case letters.

The password should contain numbers and special characters like (@, #. $.%.^.&.*)

Firewall:

Firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications and used to monitor network traffic.

Access rights Access Right is rights given or revoked allowing the user to look, read or write a certain file or directory. If the account does not have the proper access rights, you may be unable to view, read or write to a certain directory or file. When this occurs, you would likely receive the access denied error.

Prepare by Aisha Al-Masroori

40 | P a g e


Prepare by Aisha Al-Masroori

41 | P a g e


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.