HARDWARE IS THE GENERAL TERM FOR THE PHYSICAL ARTIFACTS OF A TECHNOLOGY THE TECHNICAL DETAILS ABOUT EACH HARDWARE COMPONENT ARE CALLED SPECIFICATIONS. AN IMPORTANT PART OF THE COMPUTER HARDWARE IS THE MOTHERBOARD WHICH IS LOCATED INSIDE THE COMPUTER AND IS THE MAIN ELECTRONIC COMPONENT OF THE COMPUTER. THE MOTHERBOARD IS A CIRCUIT BOARD WHICH IS A RIGID PIECE OF INSULATING MATERIAL WITH CIRCUITS. WITHOUT THE MOTHERBOARD THE COMPUTER WOULDN’T BE ABLE TO FUNCTION AT ALL
SOFTWARE SOFTWARE REFERS TO THE INTANGIBLE COMPONENTS OF A COMPUTER SYSTEM, PARTICULARY THE PROGRAMS, OR LISTS OF INSTRUCTIONS, THAT THE COMPUTER NEEDS TO PERFORM A SPCIFIC TASK AN EXAMPLE OF SOFTWARE IS APPLICATION SOFTWARE WHICH INCLUDES END-USERS APPLICATIONS OF COMPUTERS SUCH AS WORD PROCESSORS OF VIDEO GAMES, AND ERP SOFTWARE FOR GROUPS OF USERS SYSTEM SOFTWARE HELPS THE COMPUTER CARRY OUT ITS BASIC OPERATING TASKS. DOCUMENT PRODUCTION SOFTWARE INCLUDES WORD PROCESSING SOFTWARE, DESKTOP PUBLISHING SOFTWARE, EMAIL EDITORS, AND WEB AUTHORING SOFTWARE GRAPHICS AND PRESENTATION SOFTWARE ALLOW YOU TO CREATE ILLUSTRATIONS, DIAGRAMS, GRAPHS, AND CHARTS THAT CAN BE PROJECTED BEFORE A GROUP, PRINTES OUT FOR QUICK REFERENCE, OR TRANSMITTED TO REMOTE COMPUTERS
COMPUTER SAFETY TIPS Website information - Limit the personal and financial data you send to websites. Do not give out information unless you'll get something worthwhile in return (like an opportunity to win something valuable). Antivirus Software - Use it! Download and install the updates every week or two. Find some great deals on anti-virus software by shopping the COMPUTER DEPARTMENTof Free World Mall. Personal Firewall Software - Another essential piece of software, especially if you are browsing with a permanent internet connection. A firewall will block incoming connections to your computer thus keeping out hackers. Passwords - Use long, random passwords and write them down. Don't store your passwords on your computer, use a notebook or place them in your wallet or file system. E-mail - Delete spam without opening or reading it. Some nasty viruses will attack your computer when you simply open a message or attachment. Never open an attachment unless you are certain you know who sent it and what it contains. Backups - Back up your data regularly. The new high-speed CD recorders are an excellent choice. They are fast, reliable, and may be stored off site. Find excellent deals on CD recorders in Free World Mall. We recommend storing one backup CD on premises and one off premises. Remember to destroy your old backup data. Surfing The Web - Browse the web with cookies disabled. Only allow cookies from web site you will revisit. Consider using a web browser other than Microsoft Internet Explorer. Explorer is a prime target of hackers. Laptop Security - Laptop computers are on many thieves most wanted list. Guard your laptop at all times. Keep it with you whenever possible. Delete unneeded files and data often from your laptop or handheld computer. Encryption - You can protect your data by installing an e-mail and file encryptor. PGP Security makes encryption software that renders your data into unreadable characters unless you enter the proper password. Use encryption for important e-mail, tax information, and bank account numbers. Defrag - Defragmenting your computer will keep it running faster without major problems. Before running defrag, use scan disk to find and correct problems. Access scan disk and defrag from your windows menu, or use Norton Disk Doctor for hard disk maintenance. Shut Down - Be sure to turn off your computer when you are not using it.
COMPUTER ETHICS THE TEN COMMANDMENTS FOR COMPUTER ETHICS 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not use or copy software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you write. 10. Thou shalt use a computer in ways that show consideration and respect.