128
Concepts of Information Technology BIS 23 B IT Concept and System Analysis and Design Development

IT General Concept

Embed Size (px)

DESCRIPTION

IT General Concept

Citation preview

  • Concepts of Information Technology

    BIS 23 BIT Concept and System Analysis and Design Development

  • Why Study IT?Make better use of the toolsSelf-help when there a problemsReduce dependency on computer professionalsConceptual challengeStepping stone to more advanced stages of information processing, e.g. programming

  • General Concepts

  • DATAAre raw materials to be processed to produce information. It is a facts or an item considered as the root of information

  • TYPES OF DATAALPHANUMERIC DATANUMERIC DATA

  • ALPHANUMERIC DATACan be used only as text for identification or labeling purposes and cannot be used in a formula.It consists of alphabetic characters LETTERS (A through Z), NUMERALS (0 through 9) and some especial symbols (such as # and $).

  • Can be quantified and represented by the set of numeric digits. It is used in computation.

    NUMERIC DATA

  • INFORMATION Is a collected and processed into a meaningful form. It is the result of manipulation of data and can be used again as data to provide another information.

  • INFORMATION is data processed for some purpose

    Information can only be considered to be 'real' Info if it meets certain criteria i.e. :

  • INFORMATION 1. it must be communicated to the recipient2.it must be in a language that is understood3.it must be in a suitable form 4.it must be relevant for achieving some purpose

  • TECHNOLOGYIs the knowledge and methods used to create a product or an activities that are directed towards the satisfaction of human needs that produce alterations in the material world.

  • INFORMATION TECHNOLOGYIs the merging of computing and high-speed communication links carrying data, sound and video.technology involving the design, development, maintenance, and use of computer systems, software, and networks for the processing and distribution of data.

  • INFORMATION SCIENCEIs the study of how people create, use and communicate information in all forms.Dealing with the efficient collection, storage, and retrieval of information

  • COMPUTER SCIENCEThe study of computers and computing, including computer hardware, software, programming, networking, database systems, information technology, interactive systems, and security.

  • DIFFERENCE BETWEEN IT & CS"Computer Science" is the mixture and application of Applied Mathematics, Electrical Engineering, and Complexity Theory/Algorithms to understand and/or model information. In other words, the "field of computation".

  • DIFFERENCE BETWEEN IT & CS"Information Technology" is the mixture and application of "Programming", "Hardware Administration", "Software Administration", "Networking", "Network Security" and "Technical Support". In otherwords, the "management of computers".

  • SYSTEMIs a collection of related components established to work together to accomplish a common objective through the input, process and output approach.

  • What is a Computer?General-purposeProgrammableCalculatesStores results

    A computer is a general-purpose, programmable device that is capable of calculating and storing results

  • What is a Computer?

  • Hardware/Software Information Technology

  • Understand the Basic Concepts of Hardware and SoftwareHardwareThe term hardware refers to the physical parts of a computer such as the system unit, mouse, keyboard, monitor etcSoftwareThe software is the set of instructions that make the computer behave in a given waySoftware is held either on your computers hard disk, CD-ROM, DVD or on a diskette (floppy disk) and is loaded (i.e. copied) from the disk into the computers RAM (Random Access Memory), as and when required

  • Types of Computer

  • Distinguish Between Main-frame Computer, Network Computer, PC, Laptop and Personal Digital Assistant (PDA)Make sure you understand the following terms:Mainframe computerPersonal computerLaptop computerPersonal Digital Assistant (PDA)

  • Distinguish Between Computers in Terms of Capacity, Speed, Cost, and Typical Users.

    Mainframe ComputersVery powerful, used by large organisations such an banks to control the entire business operation. Very expensive!Personal ComputersCheap and easy to use. Often used as stand-alone computers or in a network. May be connected to large mainframe computers within big companies

  • Distinguish Between Computers in Terms of Capacity, Speed, Cost, and Typical Users.

    Laptop Computeris a battery- personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, temporary offices and at meetings

  • Distinguish Between Computers in Terms of Capacity, Speed, Cost, and Typical Users.

    Personal Digital Assistant (PDA)is a small mobile hand-held device that provides computing and information storage and retrieval for personal or business useMost PDAs have a small keyboardSome PDAs have an electronically sensitive pad on which handwriting can be receivedTypical uses include schedule and address book storage and retrieval and note-entering

  • Main Parts of a Personal Computer

  • Know the Main Parts of a Personal Computer: The Central Processing Unit (CPU)

    The CPU and it is one of the most important components within your computer

    It determines how fast your computer will run and is measured by its GHz or MHz speedIt is the CPU that performs all the calculations within the computer

  • Know the Main Parts of a Personal Computer:The Hard Disk

    Hard disks are the main, large data storage area within your computerThey are used to store your operating system, your application programs (i.e. your word processor, games etc) and your dataThey are much faster than CD-ROMs and floppy disks and can also hold much more data

  • Know the Main Parts of a Personal Computer: Common Input/output Devices

    Input devicesKeyboardMouseScannerDigital cameraOutput Devices Monitor (VDU) Printer Speakers

  • Know the Main Parts of a Personal Computer: Types of Memory

    RAMThe RAM (Random Access Memory) is where the operating system is loaded and also where your applications are copied to when you load an application, such as a word processor or database program. ROMThe ROM (Read Only Memory - Basic Input Output System) chip is a special chip held on your computer's system (mother) board. It contains software that is required to make your computer work with your operating system

  • Know the Main Parts of a Personal Computer: Understand the Term Peripheral Device

    A peripheral device is any device that you can attach to your computerYou can attach a scanner, printer, data projector, speakers etc. to your system unit

  • HardwareRefers to the physical equipment or component of electronic data processing system.

  • Central Processing Unit

  • Understand the Term Central Processing Unit (CPU) and Know What the CPU DoesThe CPU is the brains within your computerIt is responsible for logic control and carries out most of the calculations within the computerIt ensures the smooth running of the operating system (e.g. Windows) as well as applications, such as word-processors, spreadsheets and databasesThe CPU speed largely determines the speed of the computer and is measured in megahertz (MHz) or gigahertz (GHz)

  • Memory

  • Understand Different Types of Computer MemoryRAM - Random Access Memory The main 'working' memory used by the computerWhen the operating system loads from disk when you first switch on the computer, it is copied into RAM As a rough rule, a Microsoft Windows based computer will operate faster if you install more RAM. Data and programs stored in RAM are volatile (i.e. the information is lost when you switch off the computer)

  • Understand Different Types of Computer MemoryROM Read Only MemoryRead Only Memory (ROM) as the name suggests is a special type of memory chip that holds software that can be read but not written to .

  • Know How Computer Memory Is Measured

    BitAll computers work on a binary numbering system, i.e. they process data in ones or zeros. This 1 or 0 level of storage is called a bitByteA byte consists of eight bits

  • Know How Computer Memory Is Measured

    ByteA byte consists of eight bitsKilobyteA kilobyte (KB) consists of 1024 bytesMegabyteA megabyte (MB) consists of 1024 kilobytesGigabyteA gigabyte (GB) consists of 1024 megabytesTerabyteA terabyte (TB) consists of 1024 gigabytes

  • Relate computer memory measurementsto characters, files and directories/foldersFile sizeEach byte represents a different character such as letters of the alphabet, numbers, punctuation marks and blank spaceA document such as a letter containing 250 of the above characters would have a file size of 250 bytesA floppy disk of capacity 1.4MB could hold1 400 000 characters say, 200 000 words a whole book!The size of a directory (or folder ) would be found by adding up the sizes of the files contained within itSizes of files and folders are easily found in Windows by using a right mouse click on the icon and examining Properties

  • Input DevicesDevice which enables all users to input data into a computer.

  • Devices for Inputting Data

    The MouseThe mouse is used to open and close files, navigate web sites, and click on a lot of commands (to tell the computer what to do) when using different applications.

    The KeyboardThe keyboard is still the commonest way of entering information into a computerTrackballan alternative to the traditional mouse and often used by graphic designers

  • Devices for Inputting Data

    ScannerA scanner allows you to scan printed material and convert it into a file format that may be used within the PCTouchpadA device that lays on the desktop and responds to pressureLight PenUsed to allow users to point to areas on a screen JoystickMany games require a joystick for the proper playing of the game

  • Devices for Inputting Data

    Digital cameraThis produces a digital picture file that can be printed, sent via e-mail or posted to a web pageA webcam enables moving images to be viewed in real time via the internetMicrophoneA device that allows sound signals to be converted into digital files that may be stored on the computerIt enables voice-recognition software to be usedIt also allows telephony via the internet

  • Output DevicesAny piece ofcomputer hardwareequipment used to communicate the results ofdata processingcarried out by acomputer to the outside world.

  • Common Output Devices

    Monitor (VDU)The computer screen is used for outputting information in an understandable format for humans

    TYPES OF MONITORCathode Ray Tube (CRT)Liquid Crystal Display (LCD)

    PrintersThere are many different types of printersIn large organizations laser printers are most commonly used due to the fact that they can print very fast and give a very high quality output

  • Common Output Devices

    PlottersA plotter is an output device similar to a printer, but normally allows you to print larger imagesSpeakersEnhances the value of educational and presentation productsSpeech synthesisersGives you the ability to not only to display text on a monitor but also to read the text to you

  • Input/Output Devices

    TouchscreensThese are both input and output devicesContact with the screen by means of a digit provides the input by making a selectionThe result is then displayed on the screen in the form of information or gives a menu from which further choices may be made

  • Storage DevicesAstorage deviceis a device forstoring processed information(data).

  • Compare Memory Storage Devices

    Hard Disk

    Speed: Very fast! The speed of a hard disk is often quoted as "average access time" speed, measured in milliseconds. The smaller this number the faster the disk.Capacity: Enormous! Often in excess of 80 Gigabytes. A Gigabyte is equivalent to 1024 Megabytes.Cost: Hard disks costs are falling rapidly and normally represent the cheapest way of storing data.

  • Compare Memory Storage Devices

    Diskette (Floppy Disk)

    Speed: Very slow!Capacity: Normally 1.44 MbytesCost: Very cheap

  • Compare Memory Storage Devices

    CD-ROMSpeed: Much slower than hard disks. The original CD-ROM specification is now given a value of 1x speed, and later, faster CD-ROMs are quoted as a multiple of this valueCapacity: Around 650 MbytesCost: Below 50p each

    CD-R disks can be written to only onceCD-RW disks can be written to more than once

  • Compare Memory Storage Devices

    DVD Drives

    Speed: Much faster than CD-ROM drives but not as fast as hard disksCapacity: Up to 17 GBCost: Slightly higher than CD-ROM drives

  • Understand the Purpose of Formatting a Disk

    When Windows formats a diskette it: Erases all previous data Sets up a system for recordingChecks the disk for physical and magnetic errorsMakes the disk compatible with any computer running Windows

  • SoftwareGeneric name of all programsMade up of code interpreted by the hardwareWritten in programming languages

  • Types of SoftwareSystemApplication

  • Distinguish between Operating Systems Software & Applications SoftwareOperating systems softwareThe operating system is a special type of program that loads automatically when you start your computerThe operating system allows you to use the advanced features of a modern computer without having to learn all the details of how the hardware worksApplications softwareAn application program is the type of program that you use once the operating system has been loadedExamples include word-processing programs, spreadsheets and databases

  • Describe the Main Functions of an Operating System Run fundamental operationsLoading and running programsSaving and retrieving dataCommunicating with printers, modems, etc.

    The link between the hardware and you, the userMakes the computer easy to use without having to understand bits and bytes!

  • Name Some Common Operating SystemsWindows 95Windows 98Windows 7 Windows XPLinuxUnix

  • Applications SoftwareIscomputer softwaredesigned to help the user to perform specific tasks.

  • List Some Common Software Applications Together With Their Uses.

    Word processing applicationsMicrosoft Word Lotus Word ProWordPerfect SpreadsheetsMicrosoft Excel Lotus 123 DatabaseMicrosoft Access Lotus Approach

  • List Some Common Software Applications Together With Their Uses.

    PayrollSage software Presentation toolsMicrosoft PowerPoint Lotus Freelance Desktop publishingMicrosoft PublisherAbode PhotoshopMultimedia applicationsMicrosoft's Encarta CD-ROM based encyclopaedias

  • PeoplewareRepresents the personnel involved in systems analysis, programming, computer operations and system maintenance.

  • List of Peopleware and their FunctionSYSTEM ANALYST

    -a person who analyzes and designs a systemPROGRAMMER

    -a person who designs, writes and tests computer programsOPERATOR

    -the one who operates or use the computer

  • List of Peopleware and their FunctionEND USER

    -An entity that needs the appropriate and reliable final informationCOMPUTER ENGINEER

    -Designs the components to be used (especially the hardware)COMPUTER TECHNICIAN

    -Trouble shooter. A person who in system maintenance

  • Systems DevelopmentThis is a general term used to describe the way new software is specified, written by programmers, tested and then delivered to the user.

  • Understand How Computer-based Systems Are Developed AnalysisDesignProgrammingTesting

  • Information NetworksA system that uses communications equipment to connect computers and their resources.

  • LAN, MAN and WAN

  • Understand the Terms Local Area Networks (LAN), Metropolitan Area Network (MAN) and Wide Area Networks (WAN)LANA LAN (Local Area Network) is a system whereby individual PCs are connected together within a company or organization

    ALANconnects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings.

  • Understand the Terms Local Area Networks (LAN), Metropolitan Area Network (MAN) and Wide Area Networks (WAN)MAN

    connect computers between buildings in the same geographic area

    It is a type of network that covers an area larger than a LAN but smaller than a WAN e.g a city. The best-known example of a MAN is the cable television network available in many cities.

    WANA WAN (Wide Area Network) as the name implies allows you to connect to other computers over a wider area (i.e. the whole world) The Internet is the largest WAN covering the Earth.

  • Understand the Term Client/ServerA server is a computer program that provides services to other computer programs in the same or other computersA client is the requesting program or user in a client/server relationship

  • List Some of the Advantages Associated with Group Working

    Enables hardware such as a single printer, scanner or modem to be sharedFile-sharing can allow access to files stored on other peoples computers. Information needed by all users is normally stored on a single, powerful computer called a file serverE-mail messages can be exchanged with the networkData Exchange enables users to collaborate on projects.

  • Understand What an INTRANET IsAn intranet is a private network that is contained within an enterpriseThe main purpose of an intranet is to share company information and computing resources among employeesWhen part of an intranet is made accessible to others outside the company, that part becomes part of an extranet

  • Understand What an Extranet IsAn extranet is a private network that uses the Internet protocol and the public telecommunication system to securely share part of a business's information or operations with suppliers, partners, customers, or other businessesAn extranet can be viewed as part of a company's intranet that is extended to users outside the companyAn extranet requires security and privacy. Share news of common interest exclusively with partner companies

  • Understand What the INTERNET IsThe Internet is a global network of interconnected networksThe unique thing about the Internet is the sheer amount of information that you can access from itWhatever your interest you can search for and find information on the most obscure topics

  • Understand what the Internet is used forUsed by governments, universities, companies, retailers, voluntary organisations and private individualsAny used can send a message to any other user and can access files on other computersThe Internet can be used for research, news, entertainment, education, information, sports, current affairs, shopping and art

  • Understand what the World Wide Web (WWW) isThe term World Wide Web is used to describe documents made available over the Internet in HTML formatDocuments can be linked together and users can follow these hyperlinks from document to document

  • Understand what the World Wide Web (WWW) isPages are displayed using an Internet browser To search the Internet you use what are called Internet search engines

    Search engine popularly refers to a Web site that provides a variety of tools to help you find informationWithin the search engine you enter a word or phrase and it will retrieve documents from the Internet based on the information you typed in

  • Understand what the World Wide Web (WWW) isWeb is a collection of files organized as a giant hypertextHypertext

    (data storage system: a system of storing images, text, and other computer files that allows direct links to related text, images, sound, and other data)A computer with a domain name is referred to as a siteyahoo.comWeb site - location in a computer somewhere on the Internethttp://www.yahoo.com

  • The Use of ICT in Everyday Life

  • Identify situations where a computer might be more appropriate than a personRepetitive tasksEasily automated tasksMathematical calculationsDangerous situations

  • Know Some Of The Uses Of Large-scale Computer Applications In BusinessBusiness administrationAirline booking systemsInsurance claims processingOnline banking

  • Know Some Of The Uses Of Large-scale Computer Applications In GovernmentPublic records systemsCensusVehicle registrationRevenue collectionElectronic voting

  • Know Some Of The Uses Of Large-scale Computer Applications In Hospitals/HealthcarePatients recordsAmbulance control systemsDiagnostic controls and instrumentsSpecialist surgical equipment

  • Know Some Of The Uses Of Large-scale Computer Applications In EducationStudent registrationTimetabling systemsComputer-based training (CBT)Distance learningHomework using the Internet

  • Understand the Term TeleworkingThe use of telecommunication to work outside the traditional office or workplace, usually at home or in a mobile situationNew forms of telecommunication such as voice and picture communication and groupware are likely to make telecommuting more social in the future

  • Understand the Term TeleworkingGroupware refers to programs that help people work together collectively while located remotely from each otherGroupware services can includesharing of calendarscollective writinge-mail handlingshared database accesselectronic meetings with each person able to see and display information to others, and other activities.

  • Understand the Term TeleworkingAdvantagesReduced or no commuting timeGreater ability to focus on one taskFlexible schedulesReduced company space requirements

    DisadvantagesLack of human contactLess emphasis on teamworkDistractions at home

  • Electronic World

  • Understand the term Electronic Mail (E-mail)E-mail (electronic mail) is the exchange of computer-stored messages by telecommunicationYou can also send non-text files, such as graphic images and sound files, as attachmentsA large percentage of the total traffic over the Internet is e-mailE-mail can be distributed to lists of people as well as to individuals

  • Electronic Mail (E-mail)If you are sending a traditional letter to many people, then you have to pay a fixed price for each person that you are sending the letter toThe great thing about email is that when you have the correct software you can send to one person or many people for almost the same price and that price will be a fraction of the cost of using traditional posted letters. The other great thing about email is that transmission of the email is almost instantaneousWhether the recipient is in the next room or on the other side of the world

  • Electronic Mail (E-mail)

  • Electronic Mail (E-mail)

    An e-mail account provides the rights to a storage area or mailboxEach mailbox has a unique [email protected] e-mail message is a document that is composed on a computer and remains in digital form so that it can be transmitted to another computerEvery message includes a message header and the body of the message, usually displayed in a formAn e-mail attachment is a file that travels with a message to the recipient

  • Electronic Mail (E-mail)To send and receive email you require a computer, plus the necessary hardware and softwareInternal company emails are sent and received via your companys LAN (Local Area Network)

    ComputerModem or routerTelephone line or cableE-mail client software e.g. Outlook Express or web browser

  • Understand the term e-Commerce

    E-commerce:

    Refers to a wide range of online business activities for products and services.E-commerce describes the buying and selling of products, services, and information via computer networks including the Internet

  • Understand the term e-Commerce

    Advantages

    Service is available 24 hours a dayOpportunity to view a wide range of products and make comparisonsVery competitive prices as a result of low overheadsNo need of physical company set-ups.Easy to start and manage a business.Customers can easily select products from different providers without moving around physically.

    Disadvantages

    Choosing from a virtual, so cannot physically examine the goodsThere is no human contactRisk of insecure payment methodsTime for delivery of physical products.Privacy, security, payment, identity, contract.

  • Health and Safety, The Environment

  • Understand What Elements and Practices Can Help Create a Good Working Environment

    Appropriate positioning of monitors, keyboards and adjustable chairsUse of a mouse matUse of a monitor filterProvision of adequate lighting and ventilationFrequent breaks away from the computer

  • List some common health problems associated with using a computerInjuries to wrists caused by prolonged typing (RSI) Repetitive strain injuryEye strain caused by screen glareBack problems associated with poor seating or bad posture

  • List some safety precautions when using a computerMake sure cables are safely securedEnsure power points are not overloadedProper handling of tools and computer materials/equipmentKeep your work area clean & wellAlways be careful!

  • Computer Viruses

  • Understand the term virus when used in computingA virus is a piece of programming code usually disguised as something else that causes some unexpected and usually undesirable eventA virus is often designed so that it is automatically spread to other computer usersSome viruses wreak their effect as soon as their code is executedother viruses lie dormant until circumstances cause their code to be executed by the computerSome viruses are playful in intent and effect and some can be harmful, erasing data or causing your hard disk to require reformatting

  • Be aware when and how viruses can enter a computer systemAs a file attached to an e-mail messageVia instant messengers such as Yahoo!, MSN and Windows MessengerOn an infected disketteAs a download via the internetBy hackers gaining access to your computer via a communications port

  • Know about anti-virus measuresDo not open e-mail attachments unless they are from a trusted sourceInstall a firewall program such as ZoneAlarm (free from www.zonelabs.com)Buy anti-virus software that can screen e-mail attachmentsKeep anti-virus software up to date on a weekly basisSchedule regular virus scans of hard drivesInstall all the critical Windows updates from MicrosoftBe aware of hoax e-mail warnings

  • Know what to do when a virus infects a computerViruses should be detected by up to date anti-virus softwareThe software will normally attempt to repair (or disinfect) the file, delete it or quarantine itVirus removal tools can be downloaded via the internet (e.g. from www.symantec.com)

  • Copyright and the Law

  • Understand software copyrightCopyright issues apply to:Computer softwareGraphicsTextAudioVideoFacts themselves are not copyrighted, but how they are presented on a website is

  • Understand copyright issues relating to removable mediaCopyright applies to files and programs stored on:CDsDVDsZip disksDiskettes

  • Know how to check the Product ID numberA product ID number needs to be keyed in when the software is first installed and is to be found on the CD case/sleeveFor installed software, the product ID number may be found from:Help > About [name of program]For Microsoft products, this is usually a different number to that used for installation

  • Understand the terms Shareware, Freeware, End-user Licence agreementShareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it laterSome software developers offer a shareware version of their program with a built-in expiration date (after 30 days, the user can no longer get access to the program)

  • Understand the terms Shareware, Freeware, End-user Licence agreementFreeware is software that is offered at no cost However, it is copyrighted so that you can't incorporate its programming into anything you may be developingThe least restrictive "no-cost" programs are uncopyrighted programs in the public domain software

  • Understand the terms Shareware, Freeware, End-user Licence agreementAn End User Licence Agreement (EULA) is a legal contract between a software application author or publisher and the user of that application

    The EULA, often referred to as the "software licence," is similar to a rental agreement; the user agrees to pay for the privilege of using the software, and promises the software author or publisher to comply with all restrictions stated in the EULA

    The user is asked to indicate they that "accept" the terms of the EULA by opening the shrink wrap on the application package, breaking the seal on the CD case, sending a card back to the software publisher, installing the application, executing a downloadable file, or by simply using the application

  • COMPUTER CRIMEis a growing threat to society by the criminal or irresponsible actions of computer individuals who are taking advantage of the widespread use and vulnerability of computers and the Internet and other networks.

  • Computer CrimeHacking is the obsessive use of computers, or the unauthorized access and use of networked computer systems.Illegal hackers (also called crackers) frequently assault the Internet and other networks to steal or damage data and programs.

  • Computer CrimeHackers can: Monitor e-mail, Web server access, or file transfers to extract passwords or steal network files, or to plant datathat will cause a system to welcome intruders. Use remote services that allow one computer on a network to execute programs on another computer to gainprivileged access within a network. Use Telnet, an Internet tool for interactive use of remote computers, to discover information to plan other attacks.

  • Computer CrimeCyber-TheftMany computer crimes involve the theft of money. In the majority of cases, they are inside jobs that involve unauthorized network entry and fraudulent alternation of computer databases to cover the tracks of the employeesinvolved

  • Computer CrimeSoftware Piracy:Computer programs are valuable property and thus are the subject of theft from computer systems. Unauthorized copying of software or software piracy is a major form of software theft because software is intellectual property, which is protected by copyright law and user licensing agreements.

  • Computer CrimeUnauthorized Use at Work:The unauthorized use of a computer system is called time and resource theft. A common example is unauthorized use of company-owned computer networks by employees. This may range from doing private consulting or personal finances, or playing video games to unauthorized use of the Internet on company networks.

  • Penalties for ViolationU.S. Computer Fraud and Abuse Act 1 to 5 years in prison for a first offence 10 years for a second offence 20 years for three or more offences Fines ranging up to $250,000 or twice the value of stolen data

  • Penalties for ViolationIntellectual Property Code of the Philippines1st offense: Imprisonment of 1 year to 3 years plus a fine ranging from P50,000 to P150,000.2nd offense: Imprisonment of 3 years and 1 day to 6 years plus a fine ranging from P150,000 to P500,000.3rd offense to subsequent offenses: Imprisonment of 6 years and 1 day to 9 years plus a fine ranging from P500,000 to P1.5 million.

  • Transaction Security and Data Protection

  • Transaction Security and Data ProtectionBiometric SecurityThese are security measures provided by computer devices, which measure physical traits that make each individual unique.

    This includes: Voice verification Fingerprints Retina scanning Face recognition

  • Transaction Security and Data ProtectionSecurity Codes:Typically, a multilevel password system is used for security management. First, an end user logs on to the computer system by entering his or her unique identification code, or user ID.The end user is then asked to enter a password in order to gain access into the system. Next, to access an individual file, a unique file name must be entered.

  • Transaction Security and Data ProtectionBackup Files which are duplicate files of data or programs, are another important security measure.

    System security monitors are programs that monitor the use of computer systems and networks and protect them from unauthorized use, fraud, and destruction.

  • THANK YOU