Вы находитесь на странице: 1из 29

Understanding computer security and privacy

If you use a computer regularly, you probably have a lot of information stored on it, such as:

Tax details

Business correspondence

Personal letters

Personal photographs

All information on the computer can be damaged, lost, or viewed without your permission, so
protecting your data is very important.
In this module, you will explore why you need to protect your computer hardware, software, and
electronic data from damage, loss, and theft. You will also learn about solutions and devices that
you can use to protect the data on your computer.
Working with Records in a Database Review

You can import data from Excel, XML, or other external files into Access 2013

You must assign a primary key to any data that you import to a new table

Table columns label your data and table rows hold each data entry point

Use the design view to make changes to the records in your database tables

Database Queries
Queries allow database designers and users to change or retrieve data from a database. Access
2013 allows queries to be built with a graphical interface. There is also support for SQL queries.
Lets look at how we can create a query.
Database Queries Review

Queries allow you retrieve specific information from a database

With a query you can analyze filtered data

Access 2013 quickly calculates your queries and generates a report you can view or share
with others

Working with Reports


Access 2013 allows you to develop reports based on the content of the database. Reports can be
simple such as giving you a summary list of data or they can be complex calculations based on
advanced queries. Lets see how to use the Access Report Wizard.

Microsoft Learning
Please see the Microsoft Learning Web site for other free learning products including
assessments, e-learning, and e-books. Training is available for home and office users, IT
professionals, and developers.
Additional Resources
The Microsoft Office Online Web site hosts additional learning resources for the 2013 Microsoft
Office system, as well as templates, job-aids, special offers, and links to a community of Office
users that you can use to extend your productivity.

Microsoft Office Online

Office Online Training

Office Web Apps

Microsoft Publisher 2013

What is computer security and privacy?


Computer security and privacy are two significant issues today. Computer security pertains to
intrusion into personal accounts. Computer privacy pertains to how companies handle the
information you have given them. In this lesson, you will review various aspects of computer
security and privacy.
Computers are fragile and can be easily damaged, and information stored on them
can be stolen. You probably have many important documents on your computer that
you want to protect from loss or theft, such as personal or financial information.

No matter how careful you try to be, your computer will need some safeguards for
computer security and privacy.
Anything that has the potential to damage your computer or data is a threat. For
example, dropping your computer or leaving it vulnerable to an accident can harm
it.
Because of an accident or sabotage, your data or important system files could be
deleted, causing your computer to malfunction.
Computer security constitutes the measures you can take to avoid threats and
damage to your computer from physical harm or tampering.
Keeping your personal files and data secret and secure from unauthorized viewing
or tampering is called computer privacy. You should protect your email, personal
information, and financial information like online banking transactions.
You can never be too careful when it comes to computer security and privacy.
Remember to plan for accidents or human error by protecting your computer from
threats of physical damage and internal malfunction.

Fire
Fire can be devastating to your computer. In addition to direct damage from flames, the heat
generated by fire can melt sensitive components in the computer. Smoke can damage the CPU
fan, which can also cause overheating. In case of a fire, always get yourself to a safe place before
trying to rescue your computer.
Extreme temperature
Generally, computers are designed to function within a moderate temperature range. Excessive
heat or cold can cause important components to malfunction or break. In cases of drastic
temperature changes, it is best to allow the computer to return to room temperature before using
it.
Lightning strikes
Lightning strikes are a huge threat to your computer, even if they never actually touch your
hardware. Sometimes a lightning strike creates an electric surge (or spike) that amplifies the
voltage to your computer through the power supply. This sudden surge of electricity can destroy
crucial components of your computer, including your motherboard.
Back up data
Backing up data involves creating multiple copies of your data and saving them either to an
external hard drive or to an online backup site in the cloud. Events like floods and earthquakes
can occur without warning. Regularly backing up your data minimizes the impact of these
threats, because even if your original data is lost, you have copies that you can recover by using
any computer. To provide better recoverability, keep a copy of your important data in a location
that is physically separate from your computer, such as in a different building.

Install computers in secure locations


Use your computer in a place where it is not likely to get damaged because of natural factors. For
example, avoid using computers in rooms that are exposed to excessive dust or moisture.
Install protective electrical devices
Install devices such as an uninterruptible power supply (UPS) that can provide battery backup in
case of a power outage. A UPS prevents software damage caused by abrupt shutting down of
your computer. A UPS also provides surge protection and line-conditioning features, which help
protect your computer from spikes and surges on the power line. You can also use separate surge
protectors and line conditioners. However, during a major storm, you should turn off the
computer and unplug it from the power source to protect against a strong surge.
Insulate computers from fire
Insulate your computer from fire by housing it in fire retardant surroundings. In addition, you
can install adequate fire safety equipment and follow procedures for quick damage control.
Maintain appropriate temperature and humidity
You should maintain an optimum temperature and humidity level to ensure the smooth
functioning of your computer. You can do this by installing devices such as air conditioners and
humidity controllers. If you are using a desktop computer (a computer designed to fit
conveniently on top of a typical office desk), you can take additional measures to protect your
computer, such as installing or upgrading a fan that attaches to either the front or back of the
case, or installing a water cooling kit.
Threats from human actions
Human actions are also threats to your computer. Some of these actions are malicious, such as
those carried out by hackers, and others are human errors.
A hacker is a person who intentionally gains access to your computer when you connect it to the
Internet with the intent of doing harm to the system or using the system in an unauthorized
manner. Hackers can sabotage personal information, such as your finances, and also sabotage
your physical computer, other computers, and programs. Hackers can send out personal
information to companies.
In addition to malicious activity, human errors, such as accidentally deleting data or physically
damaging the computer, are also a threat to your computer.
Theft
Anyone who has access to your computer can steal it or its components. With the popularity of
portable computers such as laptops, physical theft of computers has become very common.
You can become a victim of virtual theft when your computer is connected to the Internet. An
example of virtual theft is identity theft. Identity theft happens when someone, usually a hacker,

steals your personal information and uses it without your permission to assume your identity. The
hacker then uses your identity to gain access to your finances or perform illegal actions. In this
way, the hacker can damage your reputation.
Another example of virtual theft is software piracy, which is theft of a computer design or
program. Software piracy also refers to the unauthorized distribution and use of a computer
program or confidential documents.

Viruses, worms, and trojan horses


Viruses, worms, and trojan horses are computer programs that can damage the data or software
on your computer, or steal the information stored on your computer.
A virus is a malicious program (also called malware) that makes copies of itself and then inserts
those copies into other programs or data files on your computer or on your hard drive. Viruses
can reach your computer, without your knowledge, through the Internet or storage devices, such
as disks and CD- ROMs.
A worm is a stand-alone malicious computer program that replicates itself with the goal of
spreading the original code to other computers, usually through computer networks. This can
cause harm by consuming bandwidth or possibly deleting files or sent documents.
A trojan horse is a type of malicious software that appears to be harmless but that contains
hidden code designed to exploit or damage your computer. Unlike worms, trojan horses do not
have the ability to replicate, but after they are installed, they infect additional files on your
system. They can even send information from your computer to the developer of the malware
over the Internet, which allows the developer to control aspects of your system. This can lead to
stolen data, installation of more malware, the recording of your keystrokes (called key logging),
and other illegal actions.
Spyware
Spyware is a program that can be installed on your computer without your knowledge. Spyware
collects private information such as your browsing habits, downloads, and personal data, for
example, your name and address.
There are many different strains of spyware. Some spyware can redirect you to a different site,
install additional software that causes your computer performance to slow down, change your
computers settings, change the home page, or serve you a personal advertisement known as
adware.
Internet scams and phishing

You might come across attractive offers in email messages or through a website or chat room
communication. Although these offers appear legitimate, they are often fake and trick you into
revealing personal or financial information.
Online predators
Online predators are individuals who lure people online into inappropriate and unethical
relationships and habits. An online predator commonly attacks a victim by manipulating that
person so that he or she is unaware of the dangers. Online predators can be found in instant
messaging rooms, chat rooms, and social networking sites.

Accidental deletion of data


Many times, damage to a computer is a result of unintentional human errors. Accidental deletion
of an important file can disrupt the integrity of data or prevent other files or programs from
working.
Accidental damage to hardware
Computer components are extremely delicate, and being delicate makes them vulnerable to
carelessness. For example, accidentally dropping your laptop computer might result in damage to
the hardware components, such as the motherboard or hard drive, which could cause data loss.
Likewise, spilling food and beverages on storage devices can cause physical damage to your
computer and thus to the data stored on it.
Measures for protection against threats from human actions
You can take some simple measures to minimize the risks associated with malicious human
threats and human errors. Click each strategy to the right to learn about how to protect your data
and computer.
Store data safely
To minimize the possibility that your data will be stolen or tampered with, keep it in a safe and
secure location that people have limited access to. An example of a safe and secure location
could be your private home office or a place where people cannot easily access your files. If you
do not have a safe place to store your data, use a strong password on your user account. A strong
password is not simple. A simple password might be the name of your pet or your birthday. A
strong password is longer than eight characters, has numbers and special characters, and has both
upper and lowercase letters.
Encrypt data
Encryption is a way to improve the security of a message or file by scrambling its contents. Only
someone who has the correct encryption key can unscramble and read the contents of those
messages and files. To prevent lost, stolen, or hacked documents and files from being readable,
you can encrypt data by using encryption software such as Microsoft BitLocker (for your hard
drive) and BitLocker To Go (for removable drives such as your USB drive).

Bitlocker is compatible with Vista Enterprise, Vista Ultimate, Windows 7, and Windows Server
2008 and Windows Server R2. BitLocker does not encrypt hard drives that have Windows XP,
Windows 2000, or Windows 2003 installed.
BitLocker helps protect you from both online and offline attacks. In an offline attack, a malicious
user takes the hard drive from your computer and connects it to another computer for the purpose
of extracting your data.

Install antivirus and antispyware programs


When using the Internet, you might be vulnerable to spyware or viruses that can greatly damage
your computer. It is important to download an antivirus and antispyware program that can
prevent and remove the viruses. Antivirus and antispyware programs that are present in the
computers memory can alert you to the presence of a virus in your system and prevent viruses
from entering. You must regularly update these programs on your system, because the programs
are revised when new viruses and spyware are discovered. These updates will further protect
your computer. Most programs offer an automatic update feature that automatically installs the
updated version of the program.
Because the source of many viruses, spyware, and trojan horses are email sources and email
software, Microsoft Outlook has features that allow you to block junk email messages; filter
messages from viruses, Trojan horses, and spyware; and scan your attachments for malware.
Windows 8 has a free, built-in feature called Windows Defender that helps protect your computer
against pop-ups, slow performance, and security threats caused by viruses, spyware, and other
malicious software. Windows Defender runs in the background, meaning it is constantly working
to detect and warn you of suspicious programs or activity, but you can also manually scan your
computer for threats at any time.
Microsoft SmartScreen Filter is another new, built-in safety feature in Windows 8 and Windows
RT (the Windows 8 operating system designed for mobile devices and tablets). SmartScreen
Filter helps protect your computer by warning you if a downloaded file is known to be malware
or has an unknown reputation. SmartScreen Filter features antiphishing protection, download
manager protection, application reputation, and antimalware protection.
Install a firewall
Another effective step you can take to protect against malicious threats is to install a firewall. A
firewall prevents unauthorized access to a private network that is connected to the Internet. It
forms a barrier between trusted and untrusted websites. You can configure your firewall in two
different ways: to use a default-deny policy or to use a default-allow policy. A default-deny
policy allows only the listed network services. A default-allow policy blocks only the listed

network services, and accepts everything else. Windows 8 comes with Windows Firewall, which
blocks unwanted access to your computer.
A firewall does not protect you from all viruses, so it is necessary to also install an antivirus or
antimalware app. Windows Defender can help protect you against viruses that your firewall does
not protect you from.
Back up data
You might lose your data from accidental deletion or destruction. You can back up important
computer data to help restore lost or deleted items. Your windows computer comes with a backup
system.
To back up your data, right-click the Start button, click Control Panel, click System and Security,
and then click File History. Follow the steps in the wizard to choose where you want to back up
the information and what information you want to back up. If you have backed up your
information before, you can wait to back up until the next scheduled maintenance time, or you
can continue with the backup process.
It is good idea to back up your information regularly so that you always have a current copy of
your files and programs in case you need to restore your data. It is best to back up your data to
multiple sources, such as to an external hard drive and to a CD. This ensures you have a second
backup copy of your data if one source is damaged or is stolen.
Keep your computer in a safe environment
Keep the computer in an area that is a moderate temperature, free from dust and vibrations, and
out of the way of possible impact.
A table or shelf housing the computer should be steady and stable to keep the computer from
falling, even if bumped.
Recommended room temperature should range from 65 to 70 F (18 to 21 C) for optimal
system reliability. A room that is too cold can create humidity levels that are too high. High
humidity can cause water condensation to occur, resulting in hardware corrosion and component
failure. When the room is too hot, humidity levels become low. Humidity that is too low can
allow electrostatic discharge, which can affect sensitive components. Hot rooms can also cause
overheating, which can greatly reduce the life of electronics.
To keep your computer at a safe temperature, you can install a fan. Some fans can cool systems
by using liquid circulation systems.

Protecting your computer

When you want to access your bank accounts, you need to provide your identification. This
identification ensures that no one else has access to your items. Similarly, you can implement
various security measures to minimize access to your computer and the data on it.
This module introduces you to some common best practices that will help you protect your
computer operating system, software, and data.
Guidelines for securing your computer
You need to secure your computer to protect the data and files on it and to protect your identity.
The simulation on this page will introduce you to ways you can protect your computer.
An unsecured computer is an invitation to trouble. Let's look at some steps you
should take to keep your computer safe from ill intent and harm.
You can grant access to any number of people and set various levels of that access.
This allows you to set different restrictions depending on the individual, for
example, a child.
You can set up a username and password to add security to your computer. In an
office environment each employee would have their own unique username and
password.
If you need to leave your computer unattended, lock the computer to prevent
unwanted access and to hide your screen from prying eyes. Only individuals who
have the correct user name and password can unlock it.
You must also protect your computer from dangerous viruses and spyware that can
be picked up from the internet. Some of the nastier ones can do considerable harm.
To prevent this from happening, install antivirus and antispyware software into your
computer.
Data encryption allows you to make your data unreadable unless you authorize
otherwise. It converts readable data into an unreadable code until it is "decrypted".
This prevents data from being visible or copied if your computer is stolen or lost.
So how did your wall come out? If there are any gaps you may want to review this
tutorial again. Remember to always protect your computer and data from strangers,
viruses and user error with the simple and smart steps you've learned here.
12.11.2015

Best practices for securing online and network transactions


Having your computer connected to the Internet gives you access to all kinds of activities and
services, but it also introduces risks. Unauthorized people might gain access to your computer, or
you might download files and programs that can harm your computer. Click the topics to the
right to learn about ways to secure your computer.

Use a strong password


A strong password is one that is complex enough to not be guessed or accidentally discovered. A
strong password combines different password elements such as both uppercase and lowercase
letters, numbers, and symbols such as the exclamation point (!) or number sign (#). The best
passwords are not complete words and cannot be guessed by someone who knows you or by a
stranger.
A strong password is crucial to protecting your data on websites, but you can also use a strong
password to limit access to networks, sites with personal or sensitive information on file, and
even data on your own computer.
Use spyware and hacking protection
Spyware programs can be downloaded from the Internet without your knowledge and transmit
personal information about you to a hacker. This illegal attack on your computer could come
from anywhere in the world, regardless of where you are. Hackers try to put spyware on your
computer so that they can steal your confidential data.
You should use all the protection you can get, including Windows built-in antispyware and
online security support from your Internet service provider (ISP). Often this support is in the
form of anti-spyware software recommendations, firewall protections, and email screening and
spam protection.
Clear your browsing history periodically
For your convenience, websites you visit on the Internet while browsing are saved and can be
easily found again in your browser history. Your computer uses temporary memory, called cache
memory, to store your Internet browsing history. Some of this temporarily stored data is personal
information you have given to a site, such as credit card information when purchasing an item.
Hackers can attempt to recover this information, but you can limit this risk by regularly deleting
your browser history and cache memory.
A cookie is another type of file created to make Internet browsing and shopping easier. Cookies
are used to save preferences and other frequently used information you need on sites you visit
often. For example, cookies allow your name and password to be remembered by sites.
But cookies can also become a threat to your computer privacy because hackers can steal this
personal data. Just like deleting your browser history, make deleting cookies a regular practice.
Share personal information carefully
Before you give a website any personal information, make sure you are dealing with a reputable
company and that the information requested is appropriate for the services offered. Making
online purchases often requires credit card information and leaves you vulnerable to hackers and

fraud. To minimize your risks, be sure any Internet commerce is conducted on a secured website
and carefully read about how your information will be shared with others. Best practice is to
avoid giving any personal information on the Internet unless you know exactly who you are
giving it to and how it will be used.

Conduct online transactions only on secured sites


Eventually you will need to use the Internet to make a purchase, and you will need to provide
your credit card number or some other personal data. Before you conduct a transaction, make
sure the website is a secure website. A secure website is identified by the prefix https in its
address. This prefix tells you the website implements the Secure Sockets Layer (SSL) protocol
and uses encrypted communications, and it certifies that the website is legitimate.
Also, always check the security certificate of any website before offering your personal
information or performing an online transaction.
Disable active content
Active content are small programs that install into your computer to enhance your browsing
experience on the Internet. Often the content provides toolbars or video to make interacting on
the Internet easier or more immersive. In some case, however, these programs are used by
malicious persons to attack your computer and steal your data without your knowledge. You can
disable active content on your computer by using your browser settings.
Measures for securing email and instant messaging
The next five course pages are videos that will introduce you to ways to stay safe when using
email and instant messaging software.
Protecting your family from security threats
Computers are widely used in schools, colleges, offices, and homes. Every member of your
family can find some use for the computer, such as:

Managing household accounts

Writing email

Browsing the Internet

Playing games

Listening to music

It is important that you and your family understand the threats associated with using computers
and the Internet. In this module, you will learn about the various measures that can help protect
your computer and your family from these threats.
Measures to protect your privacy
Protecting your computer ranges from preventing malicious software from infecting your
computer to hiding private information on websites. Antivirus software, email filters, and privacy
settings are methods for protecting your privacy. Click the button at the right to play a game that
shows you which software to use to protect your privacy.
There are several ways your computer and your data can be compromised. You will
review the three basics of computer safety. Click the computer to continue.
The three main ways to protect your computer are to use antivirus software, email
filters, and privacy settings. Each method is designed to target a specific issue. Click
a safety strategy to learn what it targets.
Antivirus software protects you from malicious programs. These programs can
sneak onto a computer from websites or email attachments
Email filters prevent malicious emails from appearing in your Inbox and move them
to the Junk Email folder. Emails might contain a link to a malicious website, coax a
user to reveal logon information, or have a virus attached.
Privacy settings protect your information on a website. You might want to restrict
who can see your information or prevent automated webbots from extracting your
information.

Online predators
Online predators often target children and the elderly for inappropriate relationships. In this
lesson, you learn some strategies to reduce the risk of being victimized
The Internet is a great way to meet new people. Be careful, thougheven though a
person might seem nice and trustworthy, you don't really know who they are or
what their intentions are.
Some people create false online identities and pretend to be someone else. People
who use false identities to mislead others into inappropriate or dangerous
interactions are known as online predators.
Children are often the target of online predators. They can manipulate young
people's trust and relative inexperience at identifying online threats from stangers.
Adults are also targets, typically for financial exploitation, and can often be just as
nave when it comes to knowing the identity of who they are interacting with online.

Chat rooms, discussion boards, emails and even instant messages are all places
where online predators try and make contact with people. Even if someone looks
like a regular person, remember they may be assuming a false identity to trick you.

Guidelines for protection from online predators


Do not let you or your family members become victims of online predators. Use the following
guidelines to prevent online predators from harming you and your family
Identify signs of predatory behavior
Online predators can display certain behaviors that will seem odd to the careful observer. Their
goal is to get to know you quickly, and their manner is often overly friendly or familiar early in
the relationship. They are impatient and push for affection, quickly getting frustrated with
rejection. A strong warning sign is an online contact who wants to meet a minor in person.
Be cautious of offers by strangers
Online predators often try to gain trust by offering gifts or tempting offers of kindness. Always
be aware of gifts offered to minors. Adults also need to be careful of offers that seem unearned or
inappropriate. The intentions behind gifts may not be genuine.
Educate friends about online safety
You can take many precautions to create greater online safety for your friends and family.
Instruct loved ones to never use their real names in a chat room. In addition, tell them never to
divulge any personal information about themselves, including their ages or contact information,
such as an address or phone number.
Above all else, never under any circumstances reveal your private user names or passwords to
anyone, even if you know the person.
Monitor your children on the internet
Parents and guardians should always monitor what their children are doing on the Internet.
Children need to be protected from inappropriate websites and potential online predators. It is
always recommended that a parent or guardian be present when a child is visiting online sites.
Know what sites your child visits
It is important to know what sites your child visits. If you cannot be present in person to monitor
their online activities, it is a good idea to track the sites they have visited by viewing their
browser history. You can also buy special software that monitors your childrens computer habits
and website history.
Block access to inappropriate websites
Be sure to block any website you find unsuitable for your child, including adult content sites and
message boards where minors unknowingly interact with adults.
Monitor chat history

There are also programs parents can buy that track and monitor your childs chat room activities.
These programs can instantly flag and call your attention to common issues in chat rooms such
as inappropriate language or images.
Keeping your computer secure and updated

When you connect your computer to the Internet, your computer software and data are accessible
to the rest of the world. Connecting to the Internet increases the threat to your computer from
viruses, spyware, and hackers. However, you can minimize these security threats by configuring
the security settings on your computer and keeping security-related software current.
In this module, you will learn the importance of securing a computer and how to maximize
computer security by configuring the security settings on your operating system. The module
also explains how to configure your computer to automatically update its security software.

Securing a computer
When you are on the Internet, the biggest security risk to your computer comes from viruses and
hackers. Often, threats such as these can be greatly reduced simply by making sure your
computer security settings are correct and that your security software is up to date.
Windows 8 can help keep your computer secure and free of viruses by alerting you to security
and maintenance issues and by offering virus protection, a network firewall, and system backups.
Each of these security settings can further be adjusted depending on your security needs.
The following can all be accessed via Windows 8 to help protect your computer:

Firewall settings to restrict unauthorized access to your computer while online.

Settings to allow your computer to automatically download and install security updates to
protect against the latest viruses.

Privacy and security settings you can set on individual Internet sites that you visit.

Malware protection settings to detect and eliminate dangerous software that could harm
your computer.

Maintenance tools that can perform tasks such as troubleshooting Windows and offering
the latest updates.

Keeping your computer up to date


Making sure your computer is updated with the most current security and system updates not
only keeps your computer secure but also helps with speed and performance.
Even on a brand new computer, software can be outdated. It is important to keep
your computer current by installing the latest security and system updates.
The good news is that updates to Windows 8 are automatic. You are notified each
time an update is available for your computer.
You will be prompted to restart your computer when it is time to install an update.
Restarting automatically initiates installation of the update.
It is always recommended that you install all official updates for Windows 8 to keep
your computer running as fast and efficiently as possible.
Updates are necessary to keep your computer running well and virus-free. They are
automatic and easy to install with a single click. Click the upgrades to the coffee
shop that you noticed to make them permanent.

Practicing computer ethics


Searching the Internet is often the fastest and easiest way to gather information. For example,
you can use the Internet to search for information for your school assignments or an office
presentation. You can also download songs and movies from websites. You do not have to pay to
download information from most of the websites, however, these downloads might not actually
be free. The information in a website is legally owned by the author who created it or by the
website that published it. Therefore, you might need permission from the author or the owner of
the website to use the content. You need to be aware of the rights and required permissions
before downloading any content from a website, including the following types of content:

Songs

Movies

Software

Pictures

This module explains the meaning of intellectual property in the field of computing, and how
unauthorized use of intellectual property can lead to copyright violation. You will also learn
about the various legal concerns associated with information exchange.
What is intellectual property?
The Internet is the fastest and easiest way to access information, products, and
services. With a simple web search, you can instantly find news, pictures, movies,
and music to download.
Intellectual property is anything that a person or company created that has
commercial value. All information and everything you can hear, see, or interact with
on the Internet is commercial property. This includes music, photos, articles, videos,
and software.
By posting an original work on the Internet, you have created your own intellectual
property. For example, you can upload a song, poem, or painting you created.
As the owner of your content, you may freely copy, distribute, share, or give away
your intellectual property. You may also give permission to others to do the same.]
These same rights apply to the intellectual properties of others. They hold exclusive
rights to copy, distribute, share, or sell their property.
Although it is fine for anyone to listen to, read, or view intellectual properties posted
by their owners for public access, it is not okay to reproduce or otherwise distribute
this material yourself without permission.
The legal restrictions that apply to copying or distributing another person's
intellectual property are called copyright laws. Breaking copyright laws can result in
serious legal issues.

Using someone's copyrighted intellectual property without their permission is called


a copyright violation.
For example, when you pay for a song download, you purchase a copy of that song
for your personal enjoyment. You do not have permission to make more copies of
the song and give them to your friends on CDs or through file sharing.
Copyright laws also apply to written material, logos, photographs, art, and even
software. Illegally obtaining a copy of someone's music, photography, art, writing,
or software without permission is called piracy.
All forms of Internet piracy are illegal and unethical.
Misuse of copyright also happens when you download copyrighted material without
the owner's permission or download something without paying the copyright fee, if

one exists. Sharing copyrighted material without permission on file sharing sites is
also a violation of copyright.
If you use someone else's work and claim it as your own work it is called plagiarism.
Suppose someone copies and pastes a movie review from a website and then posts
it on their own website and claims to be the author of that review: that is plagiarism.
In some countries, even paraphrasing some of the words of the original article is
considered plagiarism.

Legal concerns with information exchange


By using the Internet extensively, you have the potential to get involved in illegal and unethical
activities, such as gambling or damaging somebodys reputation. You need to be aware of and
cautious of these illegal and unethical practices. Remember that the way these practices are
defined varies in different countries/regions, and even within parts of a single country/region,
and that the legal system is different in different states and countries/regions.
Defaming someones reputation
When you communicate with others by using email, chat rooms, or online public forums, be
careful not to make any statements about anyone that may result in defamation. Defamation
means making false statements about a person that can negatively affect the persons reputation.
For example, suppose you post a message on an online forum falsely stating that your neighbor
is running an illegal business. This would be considered defamation, because you are spreading
false information that may harm your neighbors credibility.
Libel and slander are two forms of defamation. Libel means written defamation that has been
published, whereas slander means verbal defamation. The legal system of most countries/regions
considers both libel and slander as punishable offenses. You may face criminal or civil penalties
according to the legal system of your country/region. The punishment may range from a
monetary penalty to severe punishment such as jail terms. Sometimes, the severity of the offense
depends on the situation. For example, in some countries/regions, any insult to the President is a
criminal offense. Therefore, be aware of the local laws before making any defamatory
statements.
Note: A false statement can be considered defamatory, even if it is not derogatory. Sometimes,
even true statements can be considered defamatory if the statements harm someones reputation.
Visiting inappropriate web sites
Some websites offer services that carry out activities that are restricted by the legal system of
your state or country/region. It is possible to access these sites over the Internet, because the
Internet has no boundaries or police. For example, you can access a gambling site even if the law
of your country/region bans gambling, however, this may cause legal troubles for you.
The issue of conducting illegal activity on websites also applies to the buying and selling of
products on the Internet. For example, the products that you can legally buy or sell in one

country/region might be considered an illegal purchase or sale in another country/region.


Although a website might not restrict you from buying an item that is illegal in your
country/region, you might face legal charges for buying the item.
Next steps in learning
Thank you for taking this free e-learning course. This Microsoft Office 2013 system content was
developed with guidance from the Microsoft Office product development teams to get you
quickly up to speed with the new features and functionality of the latest products.
Microsoft Learning
Please see the Microsoft Learning website for other free learning products, including
assessments, e-learning, and e-books. Training is available for home and office users, IT
professionals, and developers.

Additional resources
The Microsoft Office Online website hosts additional learning resources for the
Microsoft Office 2013 system, in addition to templates, job aids, special offers, and
links to a community of Office users that you can use to extend your productivity.

Windows Action Center


Windows BitLocker
Windows BitLocker To Go
Know Windows Defender
Online Protection
Genuine Windows and Office

Digital lifestyles

As technology expands, new devices and features are available that enhance our digital
experience. Computers, laptops, tablets, and phones are making difficult tasks simple.
In this lesson, you will learn about many of the benefits of digital technology. You will also learn
about the additional features offered by digital technology for media devices such as cameras,
digital audio devices, and camcorders. When you use digital technology, sharing, organizing, and
editing different media is fast and easy.

Benefits of digital technology


Digital technology has changed the way you manage your work, communicate with others, and
entertain yourself
Digital technology has changed the way we live our lives, integrating what we listen
to, what we watch, and how we communicate.
Now, in addition to being smaller and faster, many devices work together. For
example, using digital technology, you can download music or movies from the
Internet directly to your computer in seconds.
You can even download content directly to your smartphone, tablet, or TV, and
listen to or watch movies and music on many of your devices.
Digital photography is another popular use of digital technology. Because the
images you take with a digital camera can be transferred to a computer in a digital
format, you can edit the images to improve their quality.
You can then easily share the pictures or videos with your friends by using your
smart device, sending them in email, posting them to a personal website, or
providing them through many social media outlets.
Telecommunication is another way to use digital technology and the Internet. Using
telecommunication, you can have meetings, host conferences, or see your friends
any time you want, no matter where in the world they are. This is also called
videoconferencing.

Digital devices
Today, the functions of telephones, cameras, video recorders, media players, and Internet devices
are being merged into smaller, more portable devices.

Digital media devices have greatly simplified our access to entertainment, news,
and people. You can use a variety of devices to access your email, text or phone
friends, download media and apps, and play games.
With a smartphone such as Windows Phone 8, you can call, send texts, or email
from just about anywhere. You can access the Internet and download and watch a
movie, or add some music to your playlist.
A tablet can expand your viewing surface and offer a lot of computing power for
more apps, movies, games, books, and business and writing applications.

Your smartphone or tablet probably has a camera that you can use for taking
pictures or videos. You can also use a digital camera to take pictures and videos,
and then transfer the images to another digital device for viewing, editing, or
sharing online.
Video game consoles can offer great digital entertainment. You can not only play
games, but also access a wide variety of movie services, previews, special offers,
and free game demos.
With digital technology, you can view your favorite entertainment and participate in
activities when you are at home or traveling. Because many of these devices work
together, switching from device to device is easy.

Introduction to Digital Audio

Organizing music and creating playlists is easier with the use of technology. In this lesson, you
will learn how to identify the characteristics of digital audio.
There are different types of audio files, and you will learn the concepts of recording, copying,
and converting digital audio. You will be learn to identify the features of speech technology so
that you can work with your computer by speaking.
Characteristics of digital audio
Digital audio has many characteristics that allow you to edit, organize, and share your music.
With audio editing software, you can add sound effects to your audio files. By compressing
audio files, you can save space on your computer and more easily transfer your audio files to the
Internet.
You can stream digital audio files to listen to audio without having to download a large audio
file.
It is important to know the different audio file formats and how they are used.

WAV
WAV is a universal audio file format developed by Microsoft. This format retains decent audio
quality, but the files are uncompressed and are larger than files in other formats.
MP3
MP3 is a common audio file format for streaming music on the Internet because the files are
compressed and smaller but still have a good-quality sound.

WMA
The WMA format is a compressed audio file format that works with Windows Media Player and
other Windows software.

Speech recognition and synthesis


With digital audio technology, you can interact with computers by just speaking. This can help
improve productivity and expand accessibility options for people with disabilities.
Talking to your computer is not as strange as you may think. In fact, your computer
can even answer back.
Thanks to digital technology you can interact with your computer just by speaking
to it. For example, you can use Windows 8 software that allows words you speak
into a microphone to appear as text on a document. This digital audio technology is
called speech recognition.
Through speech recognition you could write a school paper, a business report or a
book. This technology can also be used to search the Internet, give commands to
your computer and many other useful applications.
Speech synthesis is another type of audio techonology you can use. It allows words
written into a document to be read back to you as a synthesized voice. You will need
speech-to-text software, such as in Windows 8, and any required speakers or sound
cards.

Introduction to Digital Video


Digital videos are used not only by professional movie producers. Anyone can make digital
videos with the use of a camcorder or webcam.
In this lesson, you learn about the characteristics of digital video. Then you learn about what
digital video editing is and the different output formats for digital video. You will also learn
about the features of video editing software.
Characteristics of digital video
One characteristic of digital video is that files can be edited on a computer that has digital video
editing software. You can edit videos to add titles, a sound track, or special effects.
Digital camcorders take great video and make it easy to record, edit and share your
videos with friends

Digital camcorders also offer some big advantages over traditional analog
camcorders that use tape. For example, a digital camcorder records video in a
digital format. Without the need for film, this makes the camcorder smaller and
lighter.
Because digital camcorders record in a digital format, the video can be transferred
to a computer or other device where it can be edited.
With editing you can add sound, titles, and effects to your video.
You can then copy your video to a disk or storage device. You can also share your
video instantly through the Internet, social media sites and email.
Even long digital videos can be easily transferred over the Internet by being
compressed files. Compressing files is a way to make files easier to email and take
up less memory.
Video tape can be transfered to digital, but today's smart devices and digital
camcorders make recording, editing and sharing video easy and fast.

Digital video editing


By using digital video editing software, you can enhance video quality with special effects and
audio.
With a digital camcorder, you can record great-looking videos of almost anything,
such as a friend's birthday party, a family vacation, or an epic movie starring your
dog!
After you record your digital video masterpiece, you can transfer it to your computer
to add some finishing touches. Because you are using a digital camcorder, the
process will be much easier than it would be if you were using traditional analog
camcorders that use tape.
Using digital technology and nonlinear editing software, you can find and edit
frames in any order. You can alter, move, and delete any scenes you want.
With your video editing software, you can also add graphics and sound, play with
special effects, and adjust brightness and color. You can even add movie effects like
fading in and out.
After your video is the way you want it, you can burn it to a CD or DVD and watch it
on a DVD player. You can also capture a still from your video and save it as a picture
file to use as a cover photo for your CD case.
You can also send the video in an email or upload it to a website so that friends can
watch it.

Edit and manage digital images


With a digital camera, you can transfer pictures to a computer, where you can edit the digital
images to enhance their quality.
Digital cameras take great pictures, but they also offer many other unique features.
For example, you can transfer photos you take by using a digital camera to a
computer, where you can edit them and enhance their quality.
Often, pictures have a red-eye effect that makes your subject's eyes look red. With
easy-to-use photo editing software, you can remove the red-eye effect for a more
natural-looking photo.
With photo editing software, you can also change the contrast, color, and brightness
of your picture. Using other tools, you can trim (crop) the background, resize the
image, and print a hard copy for your photo album.
Photo management software and tools are often included with photo editing
software. These tools help you organize and manage your entire photo gallery with
ease.
You can then use advanced editing programs to alter or combine your photos to
further enhance them.
With a digital camera and photo editing software, you can create just about any
image you want. The results will amaze you!

Print digital images


To share pictures and digital images, you can print the pictures by using a personal printer or a
professional photo printer.
After you take pictures by using your digital camera or smart device, you will want
to make prints of your photos.
Photo printing technology has advanced a lot in the past few years. Today you can
print high-quality pictures at home instead of going to a photo-processing center.
Ink-jet printers are very popular for home printing. They spray tiny drops of colored
ink to create a printed image of your photo. Basic models of ink-jet printers are fast,
reliable, and relatively inexpensive to operate.
For even better results, consider upgrading to a more expensive printer or using
high-quality photo printing paper.
Photo printers require a lot of ink to print color pictures. Be sure to use your photo
editing software to edit your photo just the way you want it before printing.

With a digital camera and a photo printer, the process of taking and printing
pictures is fun and easy.

Introduction to digital TV and media on your computer


Computers can be used as TVs. You can watch digital videos that you have make, view your
photos, and listen to recordings or songs. You can also can buy TV movies, subscriptions to
shows, and different sources of media, to view on your own computer. In this lesson, you will
learn how to:

Use your computer as a TV

View digital TV on your computer

Organize digital media on your computer

Listen to digital audio and view digital photographs and videos on your computer

Organize digital media on your computer


You can play digital media, such as music, and view digital media such as photographs, and
videos, on your computer. As your media library grows, it is important to keep your media files
organized
If you are a fan of television or movies, you can build a collection of titles on your
computer that can be saved and enjoyed whenever you choose.
ven with hundreds of movies in your collection, you can easily organize all your
digital entertainment in your video library.
You can find, purchase, and play videos simply by clicking the Windows 8 Video app
icon. Your purchases will automatically organize themselves for efficient browsing
and one-click viewing.
If you have a video that is stored externally (such as on a USB flash drive), you can
copy or move the video to a folder in your video library. The video will then be
detected and played through the Video app.
With all your digital movies and videos organized in one location on your computer,
you will never be far from instantly watching a great movie or TV show.

How to enjoy digital media on your computer


With todays digital technology, you can watch TV shows and movies anytimeeverything from
old classics to cartoons and music videos. Getting started is as easy as clicking an icon. The

explanations to the left describe how to best enjoy video entertainment by using digital
technology.
Online entertainment services
With an Internet connection, your computer can function like a TV. You can download many
website services, or stream thousands of movies and other entertainment, for free or for a fee.
Purchases are automatically accessed by your computer and then can be viewed on any smart
device linked to your account. You usually have the option to buy your own copy or only rent a
copy for a single viewing. Movies you purchase for downloading can also be accessed via the
cloud on your smart devices.
DVD
Your computer can also play a DVD of a movie or show that you purchased from a store. Place
the DVD into the DVD player, and the option to start your movie is offered automatically. Be
sure to check whether your computer is capable of playing a DVD or a Blu-ray Disc before you
make your purchase.
Digital copies
Newer movies purchased on DVD often come with a digital download option that allows you to
view the movie on your computer or smart device via a code that comes with the DVD. You can
watch the movie anytime without having to play the disc in your media player
Use the computer as a TV
You can use your computer to play media such as audio and video files, and to view
photographs. You can also access services for streaming media files from the Internet.
Watching and enjoying movies and television on your computer or smart device is
easier than ever. The choices are almost endless.
You can use the Internet to find websites that stream videos of current TV shows
and the latest films. Some of these sites are free, but others require a fee,
depending on the content you receive.
You can also purchase and download TV shows and movies so that you can view
them even without an Internet connection.
You can watch the latest movie previews, get information on new shows, and check
for any parental warnings or ratings before you watch.
Best of all, you can watch what you want, when you want, by using your computer,
smartphone, or tablet. Getting started is as easy as clicking an icon. You will have to
supply the treats yourself.

Digital technology and career opportunities


Many jobs require employees to use technology, which has helped improve efficiency in the
workplace. The use of advanced technology makes it possible for people to work from locations
that are outside of their company headquarters, called remote locations. Now people can work
from their homes, in different offices, and even in different countries. Technology has inspired
new career opportunities, such as IT professional, developer, and information worker. In this
lesson, you will be able to explain how digital technology helps people work from different
locations. You will also learn about different career opportunities available for information
workers, IT professionals, and developers.
Digital technology and the work place
Digital technology has changed the way people work. Today, work is no longer a place where
you have to go. Advanced digital technology allows people to work from remote locations
Digital technology offers many options that make working from home a possibility
for many occupations in the modern workforce.
For example, with telecommuting, people separated by long distances can use
video conferencing on their computers to meet and talk, just as they would in a
face-to-face meeting.
With videoconferencing, you can not only see and talk to other people but also send
or display graphics, pictures, or other visual information.
Now the home office is a viable place to work and a popular option for both worker
and employer. As long as your home office has a high-speed Internet connection,
you can videoconference, send an instant message, or email your employer
whenever you need.
Telecommunication technology provides the necessary tools to facilitate efficiency
in the workplace. Through the Internet or a company's internal intranet, workers can
videoconference, access company files, and work as if they are all together in the
company headquarters.

Information worker careers


With computer skills and knowledge, you can find a career as an information worker. Many jobs
fall under this job category, which includes gathering and recording information. A few of these
jobs are described on the next several screens.
Graphic artist

Computer graphics are in high demand and require the latest in graphic editing software. Graphic
artists often work to create graphics and animation for video games and movies.
Technical writer
As a technical writer, you create documents to help explain and troubleshoot technical issues.
You might be working for a tech company writing manuals for employees, or you might be a
journalist, writing about the latest devices and digital advances.
Transcriber
Millions of paper documents need to be transferred to digital content. Also known as a typist, a
transcriber focuses on maintaining digital records, reports, and files.
Receptionist
A receptionist constantly uses digital technology, and most receptionist jobs require excellent
computer skills. All tasks that maintain office efficiency, such as organizing employee and
customer files, is greatly facilitated by computers.
Manager
Computers greatly aid managers in all areas of business. For example, computers can track
inventories, employee schedules, and entire customer bases. Integrating computer skills with
management skills is necessary in the workplace today.
Desktop publishers
Using office software and digital editing, desktop publishers create newsletters, blogs, online
magazines, brochures, and much more.
Career opportunities as IT professionals
Information technology is a growing field for people with technical expertise, experience, and
proper qualifications. Click the careers to learn about some opportunities currently in demand.
Network administrator
Companies depend on their computer networks operating correctly and accurately. Network
administrators make sure the network is working at full capacity. They are also in charge of
maintaining the list of authorized users and keeping track of user access.
Database administrator
Databases are maintained by database administrators, who are responsible for storing and
organizing information, and ensuring databases are current and working properly. They are also
in charge of allowing or restricting access to the database.
Web administrator
Web administrators maintain and manage websites on the Internet. They can facilitate a websites
initial creation or manage its functionality. Often a web administrator runs a clients website and
ensures it is secure, legal, and updated.
Career opportunities as a developer

A developer creates or programs software applications. There are many types of development
careers to choose from. Click the careers to the right to learn more about them.
Programmer
Programmers write code that is used to create various software. They often test and maintain
software. Programmers sometimes work alone on small projects, or on teams for big projects.
Software developer
Software developers are in charge of integrating all the different aspects of creating a program,
including coordinating programmers and others on the team to make sure tasks are completed
correctly and on time. They are crucial in streamlining the process of software development.
Website designer
Website designers are in charge of designing and maintaining an organizations website. They are
responsible for coordinating the budget, tracking visitors, and making the website functional,
accurate, and entertaining.
Game designer
Game designers conceive, design, and create video games. They create game design documents
that determine the look and play of a game, which programmers use when developing the game.
They also must have writing and visual arts skills to successfully convey the images and tone of
the game.

Вам также может понравиться