0% found this document useful (0 votes)
17 views18 pages

Com 1112

Uploaded by

famous ebube
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views18 pages

Com 1112

Uploaded by

famous ebube
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

PROGRAMME: DIPLOMA IN COMMUNTY HEALTH

COURSE TITLE:INTRODUCTION TO COMPUTER CODE:COM 111


SEMESTER: FIRST SEMESTER
DURATION: 45 HOURS UNITS: 2.0
WELCOME
Welcome to your course Introduction to Computer (COM 111) on e-learning Moodle.
This platform is an online learning management system that promote students
centered learning, enables you to access this document and interact efficiently at
distance and at any time.
COURSE DISCRIPTON
The course is design to develop in students, rudimentary skills needed to identify the
components, explain the functions and application of different software. Student will
also learn how to operate computer.
GOALS
This course is designed to enable students acquire the knowledge and skills required
him/her to operate computer and its application.
CONCEPTS OF COMPUTER
The Present world is an information enriched world and it has become paramount for
everyone to know about computers. The core purpose of this course is to introduce
you about computer and its fundamentals.
There is need to introduce computer usage into health sector in the developing
countries, because the development of computers has added more glamour to the
modern world of technology without which all the present-day technology would not
have been possible.
Presently computer applications are in the various fields of operations such as Banks,
Schools, telecommunications, and medical diagnosis, to mention a few.
WHAT IS COMPUTER
All types of computers follow a same basic logical structure and perform the
following five basic operations for converting raw input data into information useful
to their users.
1 Take Input the process of entering data and instructions into the computer system
Page | 1
2 Store Data Saving data and instructions so that they are available for processing as
and when required.
3 Processing data, performing arithmetic and logical operations on data in order to
convert them into useful information
4 Output Information The process of producing useful information or results for the
user, such as a printed report or visual display
5 Control the workflow directs the manner and sequence in which all of the above
operations are performed.
DEFINITION OF COMPUTER
Computer is a programmable machine which is designed to store Data, perform
arithmetic and logical operations, automatically and sequentially on the input given to
it by the user, and gives out a desired output after processing the user input.
OTHER DEFINITION OF COMPUTER
 Computer is an electronic data processing device which accepts and stores data
input, process the data input and generates the output in a required format. Thus
computer is an automatic machine which once received a program it performs a
given task automatically.
 A computer is an electronic device, operating under the control of instructions
stored in its own memory, that can accept data, process the data according to
specified rules, produce results, and stores the results for future use.

Brief History of computers

 One of the earliest machines designed to assist people in calculations was the
abacus which is still being used some 5000 years after its invention

 Abacus: was the first calculating device developed by Egyptian people around
3000 BC. It was later improved by Chinese people. It consists of a wooden
frame divided into two parts – upper and lower. There are two beads in the
upper part and five beads in the lower part. It was used to perform simple
addition and multiplication of numbers.

 In 1642 French scientist and philosopher Blaise Pascal invented the first
practical mechanical calculator, the Pascaline, to help his tax-collector father do
his sums. The machine had a series of interlocking cogs (gear wheels with teeth
around their outer edges) that could add and subtract decimal numbers.

Page | 2
 Blaise Pascal’s Adding Machine was invented in 1642 by a French
Mathematician, scientist and philosopher, Blaise Pascal. It was the first
automatic calculator. It was operated by a series of dials attached to wheels,
gears, and windows for the display of numbers. It was used for performing
additions and subtractions.

 Several decades later, in 1671, German mathematician and philosopher


Gottfried Wilhelm Leibniz (1646–1716) came up with a similar but more
advanced machine. Instead of using cogs, it had a "stepped drum" (a cylinder
with teeth of increasing length around its edge), an innovation that survived in
mechanical calculators for 300 hundred years. The Leibniz machine could do
much more than Pascal's: as well as adding and subtracting, it could multiply,
divide, and work out square roots. Another pioneering feature was the first
memory store or "register."

 Englishman, Charles Babbage, invented in the 1830's a "Difference Engine"


made out of brass and pewter rods and gears, and also designed a further device
which he called an "Analytical Engine". His design contained the five key
characteristics of modern computers: -
a) An input device
b) Storage for numbers waiting to be processed
c) A processor or number calculator
d) A unit to control the task and the sequence of its calculations
e) An output device
 Augusta Ada Byron (later Countess of Lovelace) was an associate of Babbage
who has become known as the first computer programmer.
 Babbage’s Analytical Engine was developed in 1823 by a famous Charles
Babbage, a professor of mathematics. He was also known as father of
computers. It was developed to perform complex mathematical calculations. It
was considered to be first general-purpose programmable computer. The
machine was called ‘difference engine’ and was later developed by Babbage as
‘analytical engine’ with the help of Lady Ada Lovelace. Unfortunately,
Babbage’s analytical engine was never completed, but his proposal for this
device became the basis of the modern computer having basic elements such as
input/output, storage, processor and control unit.

COMPUTER - GENERATIONS
Generation in computer terminology is a change in technology a computer is/was
being used. Initially, the generation term was used to distinguish between varying
hardware technologies. But nowadays, generation includes both hardware and
software, which together make up an entire computer system.

Page | 3
There are totally five computer generations known till date. Each generation has been
discussed in detail along with their time period and characteristics. Here approximate
dates against each generations have been mentioned which are normally accepted.

THE MAIN FIVE GENERATIONS OF COMPUTER


First generation
The period of first generation was 1946-1959. The computers of first generation used
vacuum tubes as the basic components for memory and circuitry for CPU (Central
Processing Unit). These tubes, like electric bulbs, produced a lot of heat and were
prone to frequent fusing of the installations; therefore, they were very expensive and
could be afforded only by very large organizations. In this generation mainly batch
processing operating system were used. Punched cards, paper tape, and magnetic tape
were used as input and output devices. The computers in this generation used machine
code as programming language.

The main features of first generation are:


Vacuum tube technology, Unreliable, supported machine language only, very costly,
Generate a lot of heat, Slow input and output devices, huge size, Need of A.C. Non-
portable, Consumed lot of electricity
Some computers of this generation were:
ENIAC, EDVAC, UNIVAC, IBM-701

Second Generation
The period of second generation was 1959-1965. In this generation transistors were
used that were cheaper, consumed less power, more compact in size, more reliable and
faster than the first generation machines. In this generation, magnetic cores were used
as primary memory and magnetic tape and magnetic disks as secondary storage
devices. In this generation assembly language and high-level programming languages
like FORTRAN, COBOL were used. The computers used batch processing and
multiprogramming operating system.
The main features of second generation are:
Use of transistors, Reliable in comparison to first generation computers, Smaller in
size as compared to first generation computers, Generated less heat as compared to
first generation computers, Consumed less electricity as compared to first generation
computers, Faster than first generation computers, Still very costly, A.C. needed,
Supported machine and assembly languages
Some computers of this generation were:
IBM 1620, IBM 7094, CDC 1604, CDC 3600, UNIVAC 1108

Page | 4
Third Generation
The period of third generation was 1965-1971. The computers of third generation used
integrated circuits (I.C's) in place of transistors. A single IC has many transistors,
resistors and capacitors along with the associated circuitry. The I.C was invented by
Jack Kilby. This development made computers smaller in size, reliable and efficient.
In this generation remote processing, time-sharing, multi-programming operating
system were used. High-level languages (FORTRAN-II TO IV, COBOL, PASCAL
PL/1, BASIC, ALGOL-68 etc.) were used during this generation.
The main features of third generation are:
I.C were used, More reliable in comparison to previous two generations, Smaller in
size, Generated less heat, Faster, Lesser maintenance, Still costly, A.C needed,
Consumed lesser electricity, Supported high-level language
Some computers of this generation were:
IBM-360 series, Honeywell-6000 series, PDP(Personal Data Processor), IBM-
370/168

Fourth Generation
The period of fourth generation was 1971-1980. The computers of fourth generation
used Very Large Scale Integrated (VLSI) circuits. VLSI circuits having about 5000
transistors and other circuit elements and their associated circuits on a single chip
made it possible to have microcomputers of fourth generation. Fourth generation
computers became more powerful, compact, reliable, and affordable. As a result, it
gave rise to personal computer (PC) revolution. In this generation time sharing, real
time, networks, distributed operating system were used. All the high-level languages
like C, C++, DBASE etc., were used in this generation.

The main features of fourth generation are:


VLSI technology used, very cheap, Portable and reliable, Use of PC's, very small size,
Pipeline processing, No A.C. needed, Concept of internet was introduced, Great
developments in the fields of networks, Computers became easily available
Some computers of this generation were:
DEC 10, STAR 1000, PDP 11, CRAY-1(Super Computer), CRAY-X-MP (Super
Computer)
Fifth Generation
The period of fifth generation is 1980-till date. In the fifth generation, the VLSI
technology became ULSI (Ultra Large Scale Integration) technology, resulting in the
production of microprocessor chips having ten million electronic components. This
generation is based on parallel processing hardware and AI (Artificial Intelligence)
software. AI is an emerging branch in computer science, which interprets means and

Page | 5
method of making computers think like human beings. All the high-level languages
like C and C++, Java, .Net etc., are used in this generation.
AI includes:
Robotics, Neural Networks, Game Playing, Development of expert systems to make
decisions in real life situations, Natural language understanding and generation.
The main features of fifth generation are:
ULSI technology, Development of true artificial intelligence, Development of Natural
language processing, Advancement in Parallel Processing, Advancement in
Superconductor technology, more user-friendly interfaces with multimedia features,
Availability of very powerful and compact computers at cheaper rates.
Some computer types of this generation are:
Desktop, Laptop, NoteBook, UltraBook, ChromeBook

CLASSIFICATION/TYPES OF COMPUTER
1.Based on size
a) Super computers
b) Mainframe computer
c) Mini computers
d) Micro computers
a. Super computers
Supercomputers are one of the fastest computers currently available. Supercomputers
are very expensive and are employed for specialized applications that require
immense amount of mathematical calculations. For example, weather forecasting,
scientific simulations, (animated) graphics, fluid dynamic calculations, nuclear energy
research, electronic design, and analysis of geological data (e.g. in petrochemical
prospecting).
b. Mainframe computers
Mainframe is very large in size and is an expensive computer capable of supporting
hundreds or even thousands of users simultaneously. Mainframe executes many
programs concurrently and supports many simultaneous execution of programs
c. Mini computers
Minicomputers have CPUs but are not equipped with processors. These computers are
normally used in multi-user environments and can run some operating systems. These
computers are considered midlevel or mid-range computers.
Mini computers are a class of multi-user computers that lie in the middle range of the
computing spectrum, in between the smallest mainframe computers and the largest
single-user systems (microcomputers or personal computers). The term
superminicomputer or supermini was used to distinguish more powerful
minicomputers that approached mainframes in capability.
d. Micro computers

Page | 6
Microcomputer is the most commonly used computer class; they are called that
because of the microprocessor located inside. Microcomputers are also referred to as
PCs, workstations or personal computers. These computers are used in homes, at
workplaces, in schools and in libraries. Computers in this class include: desktop
computers, in-car computers, tablet PCs, laptops, PDAs, smartphones, gaming
consoles, and programmable calculators.

2. Based on purpose are


a) Special purpose
b) General purpose
a. Special purpose computers are type of computers that are designed to perform
specific operation. That is they are designed and built to serve a particular purpose, for
example computers design for payroll package this type of computer will prompt the
user to enter some details such as id number, working hour, loan if any then the
computer will calculate the payment of the employee. Therefore such a computer
cannot do any work except payroll package. E.g calculator automatic door motor
vehicle (automatic gear)
b. General purpose computers this are type of computers that are designed to
perform wide operation. That is they are designed and built to serve general purpose,
it means that the same computers being used for payroll calculation can be used in
school for research and teaching aid example personal computers (laptops, desktops)

Based on functionality
a) Analog computers
b) Digital computers
c) Hybrid computers: combine the features of (analog+ digital

a. ANALOG COMPUTERS
These are computers in which numbers are represented by a physical quantity that is
proportional to it. The quantity is referred to as analogue. Examples are length,
current, voltage e.t.c.
b. DIGITAL COMPUTERS:
This aspect of computer operates on numbers directly. It handles numbers discretely
and precisely rather than approximately. Examples of digital computers are digital
watch, digital phone and digital radio.
c. HYBRID COMPUTERS
Combine the features of (analog+ digital)
 “A computer that processes both analog and digital data”.
 “Hybrid computer is a digital computer that accepts analog signals, converts
them to digital and processes them in digital form”
Page | 7
 A hybrid computer may use or produce analog data or digital data. It accepts a
continuously varying input, which is then converted into a set of discrete
values for digital computers
EXAMPLES:
 Hybrid computer is the computer used in hospitals to measure the heartbeat of
the patient.
 Devices used in petrol pump.
Hybrid Machines are generally used in scientific applications or in controlling
industrial processes.

COMPUTER BASIC OPERATIONS


All types of computers follow a same basic logical structure and perform the
following five basic operations for converting raw input data into information useful
to their users.
1 Take INPUT the process of entering data and instructions into the computer system
2 STORE DATA: Saving data and instructions so that they are available for
processing as and when required.
3 PROCESSING DATA, performing arithmetic and logical operations on data in
order to convert them into useful information
4 OUTPUT Information The process of producing useful information or results for
the user, such as a printed report or visual display
5 CONTROL the workflow directs the manner and sequence in which all of the
above operations are performed.

COMPONENTS OF COMPUTER
1. Hardware
2. Software
COMPUTER HARDWARE
Hardware represents the physical and tangible components of a computer i.e. the
components that can be seen and touched.
Examples of Hardware are:
1. Input devices
2. Output devices
3. Memory
4. CPU
1. INPUT UNIT/DEVICES
This unit contains devices with the help of which we enter data into computer. This
unit makes link between user and computer.
The input devices translate the information into the form understandable by computer.
Examples include: Keyboard, Mouse, Joystick, Light pen, Scanner, Microphone,
Optical Mark Reader (OMR)
Page | 8
Scanner is an input device which works more like a photocopy machine. It is used
when some information is available on a paper and it is to be transferred to the hard
disc of the computer for further manipulation
Mouse is most popular pointing device. It is a very famous cursor-control device
having a small palm size box with a ground ball at its base which senses the
movement of mouse and sends corresponding signals to CPU when the mouse buttons
are pressed. Generally it has two buttons called left and right button and a wheel is
present between the buttons. Mouse can be used to control the position of cursor on
screen, but it cannot be used to enter text into the computer.
Keyboard is the most common and very popular input device which helps in
inputting data to the computer. The layout of the keyboard is like that of traditional
typewriter, although there are some additional keys provided for performing
additional functions. Keyboards are of two sizes 84 keys or 101/102 keys, but now
keyboards with 104 keys or 108 keys are also available.
2. OUTPUT UNIT/DEVICES
Output unit consists of devices with the help of which we get the information from
computer. This unit is a link between computer and users. Output devices translate the
computer's output into the form understandable by users.
Following are few of the important output devices which are used in a computer.
Examples include: Monitor, Speaker, Printers
3. MEMORY UNIT/DEVICES
A memory is just like a human brain. It is used to store data and instructions.
Computer memory is the storage space in computer where data to be processed and
instructions required for processing are stored
Examples are:
1. Primary memory holds only those data and instructions on which computer is
currently working. It has limited capacity and data is lost when power is
switched off. It is generally made up of semiconductor device. These memories
are not as fast as registers. The data and instruction required to be processed
reside in main memory. It is divided into two subcategories
RAM and ROM
RAM(Random Access Memory) is the internal memory of the CPU for storing data,
program and program result. It is read/write memory which stores data until the
machine is working. As soon as the machine is switched off, data is erased.
ROM stands for (Read Only Memory) The memory from which we can only read but
cannot write on it. This type of memory is non-volatile. The information is stored
permanently in such memories during manufacture. A ROM, stores such instructions
that are required to start a computer. This operation is referred to as bootstrap. ROM
chips are not only used in the computer but also in other electronic items like washing
machine and microwave oven.

Page | 9
2. Secondary Memory This type of memory is also known as external memory or
non-volatile. It is slower than main memory. These are used for storing
data/Information permanently. CPU directly does not access these memories
instead they are accessed via input-output routines. Contents of secondary
memories are first transferred to main memory, and then CPU can access it.
4. CENTRAL PROCESSING UNIT (C P U)
CPU is considered as the brain of the computer. CPU performs all types of data
processing operations. It stores data, intermediate results and instructions (program). It
controls the operation of all parts of computer. CPU itself has following three
components
i. ALU (Arithmetic Logic Unit)
This unit consists of two subsections namely
a. Arithmetic section
b. Logic Section
Function of arithmetic section is to perform arithmetic operations like addition,
subtraction, multiplication and division. All complex operations are done by making
repetitive use of above operations.
Function of logic section is to perform logic operations such as comparing, selecting,
matching and merging of data.
ii. MEMORY UNIT
This unit can store instructions, data and intermediate results. This unit supplies
information to the other units of the computer when needed. It is also known as
internal storage unit.
Functions of memory unit are:
 It stores all the data and the instructions required for processing.
 It stores intermediate results of processing.
 It stores final results of processing before these results are released to an output
device.
iii. CONTROL UNIT
This unit controls the operations of all parts of computer but does not carry out any
actual data processing operations.

Functions of this unit are:


 It is responsible for controlling the transfer of data and instructions among other
units of a computer.
 It manages and coordinates all the units of the computer.
 It obtains the instructions from the memory, interprets them, and directs the
operation of the computer.
 It communicates with Input/ Output devices for transfer of data or results from
storage.
Page | 10
 It does not process or store data.

COMPUTER SOFTWARE
Software represents the set of programs, which are designed to perform a well-defined
function. A program is a sequence of instructions written to solve a particular
problem.
Examples of software are:
1. System Software
2. Application Software
1. System software is collection of programs designed to operate, control, and
extend the processing capabilities of the computer itself. System software are
generally prepared by computer manufactures. These software products
comprise of programs written in low-level languages which interact with the
hardware at a very basic level. System software serves as the interface between
hardware and the end users.
Some examples of system software are Operating System, language Translators,
utility programs, disk defragmenter, backup services
Features of system software are as follows:
Close to system, Fast in speed, Difficult to design, Difficult to understand, Less
interactive, Smaller in size, Difficult to manipulate, Generally written in low-level
language
2. Application software products are designed to satisfy a particular need of a
particular environment. All software applications prepared in the computer lab
can come under the category of Application software. Application software may
consist of a single program, such as a Microsoft's notepad for writing and
editing simple text. It may also consist of a collection of programs, often called
a software package, which work together to accomplish a task, such as a
Microsoft office package.
Examples of Application software are following:
Payroll Software, Student Record Software, Inventory Management Software, Income
Tax Software, Railways Reservation Software, Microsoft Office Suite Software,
Microsoft Word, Social media Software, Microsoft Excel, Microsoft PowerPoint

Features of application software are as follows:


Close to user, Easy to design, more interactive, Slow in speed, generally written in
high-level language, Easy to understand, Easy to manipulate and use, Bigger in size
and requires large storage space

FUNCTION OF HARDWARE AND SOFTWARE

Page | 11
Both of them must work together to make a computer produce a useful output.
Software cannot be utilized without supporting hardware. Hardware without set of
programs (software) to operate upon cannot be utilized and is useless. To get a
particular job done on the computer, relevant software should be loaded into the
hardware. Different software applications can be loaded on a hardware to run different
jobs. A software acts as an interface between the user and the hardware. If hardware is
the 'heart' of a computer system, then software is its 'soul'. Both are complimentary to
each other.

HARDWARE SOFTWARE
Hardware serves as the
delivery system for
To perform the specific
software solutions. The
task you need a software.
hardware of a computer is
Software is generally
infrequently changed, in
Function needed for the hardware to
comparison with software
perform its basic level
and data, which are “soft”
tasks such as turning on
in the sense that they are
and responding to input.
readily created, modified,
or erased on the computer

NETWORKS AND THE INTERNET


A network is a collection of computers and devices connected together, often
wirelessly, via communications devices and transmission media. Networks allow
computers to share resources, such as hardware, software, data, and information.
Sharing resources saves time and money. In many networks, one or more computers
act as a server. The server controls access to the resources on a network. The other
computers on the network, each called a client or workstation, request resources from
the server, The major differences between the server and client computers are that the
server ordinarily has more power, more storage space, and expanded communications
capabilities. Many homes and most businesses and schools network their computers
and devices.
Computer network: is a system in which multiple computers are connected to each
other to share information and resources. When u link computers to share files and
communicate and does all you like to do you therefore create a network. Two
computers are said to form a network if they can able to share resources.
CATEGORIES OF COMPUTER NETWORKS

Page | 12
Generally networks categorized based on either geographical span. A network can be
as small distance between our mobile and its Bluetooth, headphones and as large as
the internet which covers a whole geographical world.
Personal Area Network (PAN): is the smallest network which is very personal to its
user, this may include Bluetooth or infrared enabled devices. PAN may include wires
computer keyboard, and remote controls which the connectivity range is up to 10
meters.
Local Area Network (LAN): this category of network is usually spanned inside a
building and operated under single administration system. LAN is usually privately
owned and links the devices in a single office, building or campus depending on the
need of the organization. A LAN can be as simple as two P.Cs and a printer in
someone whole office or extend throughout a company. LANs contain inexpensive
networking and routing equipment.
Metropolitan Area Network (MAN): is designed to extend over an entire city, it
may be a single network such as cable television network or it may be a means of
connectivity of a number of LANs into network so that resources may be shared LAN
to LAN as well as device to device. The geographical area is large than LAN but
smaller than WAN.
Wide Area Network (WAN): this network occupies a very large area such as an
entire country or entire world. WAN can contain multiple smaller networks such as
LANs or WANs.

Network Topology: Network topology refers to the arrangement of devices (nodes)


and the connections (links) between them in a network. It determines how data flows
and influences factors like performance, scalability, and cost. Here's an overview of
common network topologies:
 Bus Topology
 Ring Topology
 Mesh Topology
 Star Topology
 Hybrid

NETWORK TOPOLOGY:
1. Star:

Page | 13
Description: Central device (switch or hub) connects all other devices in a star-
like pattern.
Pros: Easy to manage, isolate faults, and expand.
Cons: Single point of failure (central device), higher cable usage.
2. Bus:

Description: All devices connect to a single cable (bus) forming a linear structure.
Pros: Simple to set up, low cost.
Cons: Broadcast traffic slows down performance, difficult to troubleshoot faults.
3. Ring:

Description: ** Devices form a closed loop, data passes through each device
sequentially.
Pros: Dedicated bandwidth for each device, fault tolerance (data can loop).
Cons: Single point of failure (cable break), complex setup, difficult to add/remove
devices.
4. Mesh:

Page | 14
Description: ** Devices connect to multiple neighboring devices, creating a
redundant network.
Pros: Highly scalable, fault tolerant, self-healing capabilities.
Cons: Complex setup, higher cost, increased management overhead.

5. Hybrid:

Description: Combines multiple topologies to suit specific needs and network areas.
Pros: Flexible, leverages advantages of different topologies.
Cons: More complex design and management.

The Internet
The Internet is a worldwide collection of networks that connects millions of
businesses, government agencies, educational institutions, and individuals More than
one billion people around the world use the Internet daily for a variety of reasons,
some of which are listed below
 Communicate with and meet other people
 Conduct research and access a wealth of information and news
 Shop for goods and services
 Bank and invest
 Participate in online training
 Engage in entertaining activities, such as planning vacations, playing online
games, listening to music, watching or editing videos, and reading books and
magazines
 Download music and videos

Page | 15
 Share information, photos, and videos
 Access and interact with Web applications

COMPUTER SECURITY
Security has always been an overriding concern of human kind. For many
organizations, information plays a very important role in running business. Therefore,
it becomes necessary to safeguard information from reaching the illegal hands. When
data takes the shapes of digital form, a different security procedure is required. This
branch of security is called computer security.
Information technology also has some loopholes associated with it, like the possibility
of stealing of vital information and intentionally implanting destructive or malicious
programs on the computer system. The motive behind such activities is to show down
the pace of an organization and harm it economically.

INTERNET/COMPUTER SECURITY THREATS


During initial days of internet, its use was limited to military and universities for
research and development purpose. Later when all networks merged together and
formed internet, the data used to travel through public transit network. Common
people may send the data that can be highly sensitive such as their bank credentials,
username and passwords, personal documents, online shopping details, or confidential
documents.
All security threats are intentional i.e. they occur only if intentionally triggered.
Therefore we need to protect our Data (financial records, personal documents),
Resources and Reputation in other to avoid Misrepresentation, Forgery and Negative
publicity
What is a security threat?
A threat in the context of computer security, refers to anything that has the potential to
cause serious harm to a computer system, a threat is something that may or may not
happen, but has the potential to cause serious damage. A computer system threat is
anything that leads to loss or corruption of data or physical damage to hardware
COMMON COMPUTER SECURITY THREATS:
1. Computer virus threats
2. Spyware threats
3. Hackers and Predators
4. Phishing threats
1. COMPUTER VIRUS A computer virus is a small piece of software that can
spread from one infected computer to another, the virus could corrupt, steal or
delete data on your computer, a virus is a software program written to disrupt
computer systems and to destroy data, viruses are the most well-known Internet
security threat. Viruses are serious threats that attack your computer and data,
Page | 16
and generally disrupt your life; but they aren’t used to steal your sensitive
personal information
2. SPYWARE— Spyware is an unwanted program that runs on your computer. It
allows unwanted adverts to pop up, tracks your online activities and can even
scan your computer for private data, such as credit card numbers. It can make
your computer slow and unreliable and make you a target for online criminals.
This “spyware” watches and records everything you do online, leaving your
passwords, private account information, and other personal and sensitive
information vulnerable. Once captured, this information can be sent back to
online criminals for use in accessing your private information, stealing your
identity, and your money. It can also be used to highjack your computer for
illegal purposes.
3. HACKERS—Individuals with computer and Internet skill levels sufficient
enough to break security settings on personal computers and servers over the
Internet some hackers do it for recreation, others for malicious intent
4. PHISHING— A situation where Internet criminals send out false emails in the
name of a legitimate organization in order to trick victims into sending personal
information back to be used in identity theft crimes.
An attempt at identity theft in which criminals lead users to a counterfeit
website in the hope that they will disclose private information such as
usernames or passwords, Originally, phishing was identified as the use of
electronic mail messages, designed to look like messages from a trusted agent,
such as a bank, auction site, or online commerce site. These messages usually
implore the user to take some form of action, such as validating their account
information.

WAYS OF PREVENTING COMPUTER FROM SECURITY THREATS


1. Anti-virus
Install anti-virus software. Without it you are at risk from viruses, which spread from
computer to computer in email attachments and files downloaded from websites. If
your computer is infected by one, it can make it slow or even leave you open to
identity theft
2. Anti-Spyware
Install anti-spyware software,
3. Ensure that your operating system is updated
The operating system is the main software program on your computer that manages
the other entire program on it. The mostly widely used ones are Microsoft Windows,
Android and Mac OS. Generally, the latest version of an operating system is more
secure than previous versions. For example, Windows 10 (released in 2014) is more

Page | 17
secure than Windows 7 (released in 2009). Whichever operating system you have,
keep it updated as this will give you stronger protection
4. Back up your files
The best thing you can do is back up your files all of them, ideally you could save
your data in three separate places, the place where you work on them, on separate
storage device and off site
5. Use multiple strong password
Never use the same password, they are easy to see and steal if you use the same
password for everything, use strong password such as combination of Upper case and
lower case and symbols but keep it easy to remember but difficult to guess
6. Think before you click
Before you click on any website you need to think and ensure that the website is real,
is not the type of website created by criminals, do not open an email attachment from
somebody or company that you don’t know.

Page | 18

You might also like