Академический Документы
Профессиональный Документы
Культура Документы
If you use a computer regularly, you probably have a lot of information stored on it, such as:
Tax details
Business correspondence
Personal letters
Personal photographs
All information on the computer can be damaged, lost, or viewed without your permission, so
protecting your data is very important.
In this module, you will explore why you need to protect your computer hardware, software, and
electronic data from damage, loss, and theft. You will also learn about solutions and devices that
you can use to protect the data on your computer.
Working with Records in a Database Review
You can import data from Excel, XML, or other external files into Access 2013
You must assign a primary key to any data that you import to a new table
Table columns label your data and table rows hold each data entry point
Use the design view to make changes to the records in your database tables
Database Queries
Queries allow database designers and users to change or retrieve data from a database. Access
2013 allows queries to be built with a graphical interface. There is also support for SQL queries.
Lets look at how we can create a query.
Database Queries Review
Access 2013 quickly calculates your queries and generates a report you can view or share
with others
Microsoft Learning
Please see the Microsoft Learning Web site for other free learning products including
assessments, e-learning, and e-books. Training is available for home and office users, IT
professionals, and developers.
Additional Resources
The Microsoft Office Online Web site hosts additional learning resources for the 2013 Microsoft
Office system, as well as templates, job-aids, special offers, and links to a community of Office
users that you can use to extend your productivity.
No matter how careful you try to be, your computer will need some safeguards for
computer security and privacy.
Anything that has the potential to damage your computer or data is a threat. For
example, dropping your computer or leaving it vulnerable to an accident can harm
it.
Because of an accident or sabotage, your data or important system files could be
deleted, causing your computer to malfunction.
Computer security constitutes the measures you can take to avoid threats and
damage to your computer from physical harm or tampering.
Keeping your personal files and data secret and secure from unauthorized viewing
or tampering is called computer privacy. You should protect your email, personal
information, and financial information like online banking transactions.
You can never be too careful when it comes to computer security and privacy.
Remember to plan for accidents or human error by protecting your computer from
threats of physical damage and internal malfunction.
Fire
Fire can be devastating to your computer. In addition to direct damage from flames, the heat
generated by fire can melt sensitive components in the computer. Smoke can damage the CPU
fan, which can also cause overheating. In case of a fire, always get yourself to a safe place before
trying to rescue your computer.
Extreme temperature
Generally, computers are designed to function within a moderate temperature range. Excessive
heat or cold can cause important components to malfunction or break. In cases of drastic
temperature changes, it is best to allow the computer to return to room temperature before using
it.
Lightning strikes
Lightning strikes are a huge threat to your computer, even if they never actually touch your
hardware. Sometimes a lightning strike creates an electric surge (or spike) that amplifies the
voltage to your computer through the power supply. This sudden surge of electricity can destroy
crucial components of your computer, including your motherboard.
Back up data
Backing up data involves creating multiple copies of your data and saving them either to an
external hard drive or to an online backup site in the cloud. Events like floods and earthquakes
can occur without warning. Regularly backing up your data minimizes the impact of these
threats, because even if your original data is lost, you have copies that you can recover by using
any computer. To provide better recoverability, keep a copy of your important data in a location
that is physically separate from your computer, such as in a different building.
steals your personal information and uses it without your permission to assume your identity. The
hacker then uses your identity to gain access to your finances or perform illegal actions. In this
way, the hacker can damage your reputation.
Another example of virtual theft is software piracy, which is theft of a computer design or
program. Software piracy also refers to the unauthorized distribution and use of a computer
program or confidential documents.
You might come across attractive offers in email messages or through a website or chat room
communication. Although these offers appear legitimate, they are often fake and trick you into
revealing personal or financial information.
Online predators
Online predators are individuals who lure people online into inappropriate and unethical
relationships and habits. An online predator commonly attacks a victim by manipulating that
person so that he or she is unaware of the dangers. Online predators can be found in instant
messaging rooms, chat rooms, and social networking sites.
Bitlocker is compatible with Vista Enterprise, Vista Ultimate, Windows 7, and Windows Server
2008 and Windows Server R2. BitLocker does not encrypt hard drives that have Windows XP,
Windows 2000, or Windows 2003 installed.
BitLocker helps protect you from both online and offline attacks. In an offline attack, a malicious
user takes the hard drive from your computer and connects it to another computer for the purpose
of extracting your data.
network services, and accepts everything else. Windows 8 comes with Windows Firewall, which
blocks unwanted access to your computer.
A firewall does not protect you from all viruses, so it is necessary to also install an antivirus or
antimalware app. Windows Defender can help protect you against viruses that your firewall does
not protect you from.
Back up data
You might lose your data from accidental deletion or destruction. You can back up important
computer data to help restore lost or deleted items. Your windows computer comes with a backup
system.
To back up your data, right-click the Start button, click Control Panel, click System and Security,
and then click File History. Follow the steps in the wizard to choose where you want to back up
the information and what information you want to back up. If you have backed up your
information before, you can wait to back up until the next scheduled maintenance time, or you
can continue with the backup process.
It is good idea to back up your information regularly so that you always have a current copy of
your files and programs in case you need to restore your data. It is best to back up your data to
multiple sources, such as to an external hard drive and to a CD. This ensures you have a second
backup copy of your data if one source is damaged or is stolen.
Keep your computer in a safe environment
Keep the computer in an area that is a moderate temperature, free from dust and vibrations, and
out of the way of possible impact.
A table or shelf housing the computer should be steady and stable to keep the computer from
falling, even if bumped.
Recommended room temperature should range from 65 to 70 F (18 to 21 C) for optimal
system reliability. A room that is too cold can create humidity levels that are too high. High
humidity can cause water condensation to occur, resulting in hardware corrosion and component
failure. When the room is too hot, humidity levels become low. Humidity that is too low can
allow electrostatic discharge, which can affect sensitive components. Hot rooms can also cause
overheating, which can greatly reduce the life of electronics.
To keep your computer at a safe temperature, you can install a fan. Some fans can cool systems
by using liquid circulation systems.
When you want to access your bank accounts, you need to provide your identification. This
identification ensures that no one else has access to your items. Similarly, you can implement
various security measures to minimize access to your computer and the data on it.
This module introduces you to some common best practices that will help you protect your
computer operating system, software, and data.
Guidelines for securing your computer
You need to secure your computer to protect the data and files on it and to protect your identity.
The simulation on this page will introduce you to ways you can protect your computer.
An unsecured computer is an invitation to trouble. Let's look at some steps you
should take to keep your computer safe from ill intent and harm.
You can grant access to any number of people and set various levels of that access.
This allows you to set different restrictions depending on the individual, for
example, a child.
You can set up a username and password to add security to your computer. In an
office environment each employee would have their own unique username and
password.
If you need to leave your computer unattended, lock the computer to prevent
unwanted access and to hide your screen from prying eyes. Only individuals who
have the correct user name and password can unlock it.
You must also protect your computer from dangerous viruses and spyware that can
be picked up from the internet. Some of the nastier ones can do considerable harm.
To prevent this from happening, install antivirus and antispyware software into your
computer.
Data encryption allows you to make your data unreadable unless you authorize
otherwise. It converts readable data into an unreadable code until it is "decrypted".
This prevents data from being visible or copied if your computer is stolen or lost.
So how did your wall come out? If there are any gaps you may want to review this
tutorial again. Remember to always protect your computer and data from strangers,
viruses and user error with the simple and smart steps you've learned here.
12.11.2015
fraud. To minimize your risks, be sure any Internet commerce is conducted on a secured website
and carefully read about how your information will be shared with others. Best practice is to
avoid giving any personal information on the Internet unless you know exactly who you are
giving it to and how it will be used.
Writing email
Playing games
Listening to music
It is important that you and your family understand the threats associated with using computers
and the Internet. In this module, you will learn about the various measures that can help protect
your computer and your family from these threats.
Measures to protect your privacy
Protecting your computer ranges from preventing malicious software from infecting your
computer to hiding private information on websites. Antivirus software, email filters, and privacy
settings are methods for protecting your privacy. Click the button at the right to play a game that
shows you which software to use to protect your privacy.
There are several ways your computer and your data can be compromised. You will
review the three basics of computer safety. Click the computer to continue.
The three main ways to protect your computer are to use antivirus software, email
filters, and privacy settings. Each method is designed to target a specific issue. Click
a safety strategy to learn what it targets.
Antivirus software protects you from malicious programs. These programs can
sneak onto a computer from websites or email attachments
Email filters prevent malicious emails from appearing in your Inbox and move them
to the Junk Email folder. Emails might contain a link to a malicious website, coax a
user to reveal logon information, or have a virus attached.
Privacy settings protect your information on a website. You might want to restrict
who can see your information or prevent automated webbots from extracting your
information.
Online predators
Online predators often target children and the elderly for inappropriate relationships. In this
lesson, you learn some strategies to reduce the risk of being victimized
The Internet is a great way to meet new people. Be careful, thougheven though a
person might seem nice and trustworthy, you don't really know who they are or
what their intentions are.
Some people create false online identities and pretend to be someone else. People
who use false identities to mislead others into inappropriate or dangerous
interactions are known as online predators.
Children are often the target of online predators. They can manipulate young
people's trust and relative inexperience at identifying online threats from stangers.
Adults are also targets, typically for financial exploitation, and can often be just as
nave when it comes to knowing the identity of who they are interacting with online.
Chat rooms, discussion boards, emails and even instant messages are all places
where online predators try and make contact with people. Even if someone looks
like a regular person, remember they may be assuming a false identity to trick you.
There are also programs parents can buy that track and monitor your childs chat room activities.
These programs can instantly flag and call your attention to common issues in chat rooms such
as inappropriate language or images.
Keeping your computer secure and updated
When you connect your computer to the Internet, your computer software and data are accessible
to the rest of the world. Connecting to the Internet increases the threat to your computer from
viruses, spyware, and hackers. However, you can minimize these security threats by configuring
the security settings on your computer and keeping security-related software current.
In this module, you will learn the importance of securing a computer and how to maximize
computer security by configuring the security settings on your operating system. The module
also explains how to configure your computer to automatically update its security software.
Securing a computer
When you are on the Internet, the biggest security risk to your computer comes from viruses and
hackers. Often, threats such as these can be greatly reduced simply by making sure your
computer security settings are correct and that your security software is up to date.
Windows 8 can help keep your computer secure and free of viruses by alerting you to security
and maintenance issues and by offering virus protection, a network firewall, and system backups.
Each of these security settings can further be adjusted depending on your security needs.
The following can all be accessed via Windows 8 to help protect your computer:
Settings to allow your computer to automatically download and install security updates to
protect against the latest viruses.
Privacy and security settings you can set on individual Internet sites that you visit.
Malware protection settings to detect and eliminate dangerous software that could harm
your computer.
Maintenance tools that can perform tasks such as troubleshooting Windows and offering
the latest updates.
Songs
Movies
Software
Pictures
This module explains the meaning of intellectual property in the field of computing, and how
unauthorized use of intellectual property can lead to copyright violation. You will also learn
about the various legal concerns associated with information exchange.
What is intellectual property?
The Internet is the fastest and easiest way to access information, products, and
services. With a simple web search, you can instantly find news, pictures, movies,
and music to download.
Intellectual property is anything that a person or company created that has
commercial value. All information and everything you can hear, see, or interact with
on the Internet is commercial property. This includes music, photos, articles, videos,
and software.
By posting an original work on the Internet, you have created your own intellectual
property. For example, you can upload a song, poem, or painting you created.
As the owner of your content, you may freely copy, distribute, share, or give away
your intellectual property. You may also give permission to others to do the same.]
These same rights apply to the intellectual properties of others. They hold exclusive
rights to copy, distribute, share, or sell their property.
Although it is fine for anyone to listen to, read, or view intellectual properties posted
by their owners for public access, it is not okay to reproduce or otherwise distribute
this material yourself without permission.
The legal restrictions that apply to copying or distributing another person's
intellectual property are called copyright laws. Breaking copyright laws can result in
serious legal issues.
one exists. Sharing copyrighted material without permission on file sharing sites is
also a violation of copyright.
If you use someone else's work and claim it as your own work it is called plagiarism.
Suppose someone copies and pastes a movie review from a website and then posts
it on their own website and claims to be the author of that review: that is plagiarism.
In some countries, even paraphrasing some of the words of the original article is
considered plagiarism.
Additional resources
The Microsoft Office Online website hosts additional learning resources for the
Microsoft Office 2013 system, in addition to templates, job aids, special offers, and
links to a community of Office users that you can use to extend your productivity.
Digital lifestyles
As technology expands, new devices and features are available that enhance our digital
experience. Computers, laptops, tablets, and phones are making difficult tasks simple.
In this lesson, you will learn about many of the benefits of digital technology. You will also learn
about the additional features offered by digital technology for media devices such as cameras,
digital audio devices, and camcorders. When you use digital technology, sharing, organizing, and
editing different media is fast and easy.
Digital devices
Today, the functions of telephones, cameras, video recorders, media players, and Internet devices
are being merged into smaller, more portable devices.
Digital media devices have greatly simplified our access to entertainment, news,
and people. You can use a variety of devices to access your email, text or phone
friends, download media and apps, and play games.
With a smartphone such as Windows Phone 8, you can call, send texts, or email
from just about anywhere. You can access the Internet and download and watch a
movie, or add some music to your playlist.
A tablet can expand your viewing surface and offer a lot of computing power for
more apps, movies, games, books, and business and writing applications.
Your smartphone or tablet probably has a camera that you can use for taking
pictures or videos. You can also use a digital camera to take pictures and videos,
and then transfer the images to another digital device for viewing, editing, or
sharing online.
Video game consoles can offer great digital entertainment. You can not only play
games, but also access a wide variety of movie services, previews, special offers,
and free game demos.
With digital technology, you can view your favorite entertainment and participate in
activities when you are at home or traveling. Because many of these devices work
together, switching from device to device is easy.
Organizing music and creating playlists is easier with the use of technology. In this lesson, you
will learn how to identify the characteristics of digital audio.
There are different types of audio files, and you will learn the concepts of recording, copying,
and converting digital audio. You will be learn to identify the features of speech technology so
that you can work with your computer by speaking.
Characteristics of digital audio
Digital audio has many characteristics that allow you to edit, organize, and share your music.
With audio editing software, you can add sound effects to your audio files. By compressing
audio files, you can save space on your computer and more easily transfer your audio files to the
Internet.
You can stream digital audio files to listen to audio without having to download a large audio
file.
It is important to know the different audio file formats and how they are used.
WAV
WAV is a universal audio file format developed by Microsoft. This format retains decent audio
quality, but the files are uncompressed and are larger than files in other formats.
MP3
MP3 is a common audio file format for streaming music on the Internet because the files are
compressed and smaller but still have a good-quality sound.
WMA
The WMA format is a compressed audio file format that works with Windows Media Player and
other Windows software.
Digital camcorders also offer some big advantages over traditional analog
camcorders that use tape. For example, a digital camcorder records video in a
digital format. Without the need for film, this makes the camcorder smaller and
lighter.
Because digital camcorders record in a digital format, the video can be transferred
to a computer or other device where it can be edited.
With editing you can add sound, titles, and effects to your video.
You can then copy your video to a disk or storage device. You can also share your
video instantly through the Internet, social media sites and email.
Even long digital videos can be easily transferred over the Internet by being
compressed files. Compressing files is a way to make files easier to email and take
up less memory.
Video tape can be transfered to digital, but today's smart devices and digital
camcorders make recording, editing and sharing video easy and fast.
With a digital camera and a photo printer, the process of taking and printing
pictures is fun and easy.
Listen to digital audio and view digital photographs and videos on your computer
explanations to the left describe how to best enjoy video entertainment by using digital
technology.
Online entertainment services
With an Internet connection, your computer can function like a TV. You can download many
website services, or stream thousands of movies and other entertainment, for free or for a fee.
Purchases are automatically accessed by your computer and then can be viewed on any smart
device linked to your account. You usually have the option to buy your own copy or only rent a
copy for a single viewing. Movies you purchase for downloading can also be accessed via the
cloud on your smart devices.
DVD
Your computer can also play a DVD of a movie or show that you purchased from a store. Place
the DVD into the DVD player, and the option to start your movie is offered automatically. Be
sure to check whether your computer is capable of playing a DVD or a Blu-ray Disc before you
make your purchase.
Digital copies
Newer movies purchased on DVD often come with a digital download option that allows you to
view the movie on your computer or smart device via a code that comes with the DVD. You can
watch the movie anytime without having to play the disc in your media player
Use the computer as a TV
You can use your computer to play media such as audio and video files, and to view
photographs. You can also access services for streaming media files from the Internet.
Watching and enjoying movies and television on your computer or smart device is
easier than ever. The choices are almost endless.
You can use the Internet to find websites that stream videos of current TV shows
and the latest films. Some of these sites are free, but others require a fee,
depending on the content you receive.
You can also purchase and download TV shows and movies so that you can view
them even without an Internet connection.
You can watch the latest movie previews, get information on new shows, and check
for any parental warnings or ratings before you watch.
Best of all, you can watch what you want, when you want, by using your computer,
smartphone, or tablet. Getting started is as easy as clicking an icon. You will have to
supply the treats yourself.
Computer graphics are in high demand and require the latest in graphic editing software. Graphic
artists often work to create graphics and animation for video games and movies.
Technical writer
As a technical writer, you create documents to help explain and troubleshoot technical issues.
You might be working for a tech company writing manuals for employees, or you might be a
journalist, writing about the latest devices and digital advances.
Transcriber
Millions of paper documents need to be transferred to digital content. Also known as a typist, a
transcriber focuses on maintaining digital records, reports, and files.
Receptionist
A receptionist constantly uses digital technology, and most receptionist jobs require excellent
computer skills. All tasks that maintain office efficiency, such as organizing employee and
customer files, is greatly facilitated by computers.
Manager
Computers greatly aid managers in all areas of business. For example, computers can track
inventories, employee schedules, and entire customer bases. Integrating computer skills with
management skills is necessary in the workplace today.
Desktop publishers
Using office software and digital editing, desktop publishers create newsletters, blogs, online
magazines, brochures, and much more.
Career opportunities as IT professionals
Information technology is a growing field for people with technical expertise, experience, and
proper qualifications. Click the careers to learn about some opportunities currently in demand.
Network administrator
Companies depend on their computer networks operating correctly and accurately. Network
administrators make sure the network is working at full capacity. They are also in charge of
maintaining the list of authorized users and keeping track of user access.
Database administrator
Databases are maintained by database administrators, who are responsible for storing and
organizing information, and ensuring databases are current and working properly. They are also
in charge of allowing or restricting access to the database.
Web administrator
Web administrators maintain and manage websites on the Internet. They can facilitate a websites
initial creation or manage its functionality. Often a web administrator runs a clients website and
ensures it is secure, legal, and updated.
Career opportunities as a developer
A developer creates or programs software applications. There are many types of development
careers to choose from. Click the careers to the right to learn more about them.
Programmer
Programmers write code that is used to create various software. They often test and maintain
software. Programmers sometimes work alone on small projects, or on teams for big projects.
Software developer
Software developers are in charge of integrating all the different aspects of creating a program,
including coordinating programmers and others on the team to make sure tasks are completed
correctly and on time. They are crucial in streamlining the process of software development.
Website designer
Website designers are in charge of designing and maintaining an organizations website. They are
responsible for coordinating the budget, tracking visitors, and making the website functional,
accurate, and entertaining.
Game designer
Game designers conceive, design, and create video games. They create game design documents
that determine the look and play of a game, which programmers use when developing the game.
They also must have writing and visual arts skills to successfully convey the images and tone of
the game.