Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore ICT Troubleshooting Skills For Home Office

ICT Troubleshooting Skills For Home Office

Published by ict.ebooks, 2021-12-07 14:04:35

Description: ICT Troubleshooting Skills For Home Office

Search

Read the Text Version

ICT Troubleshooting Skills For Home Office 47 9. For this time, I will save it into folder path D:\\Environment\\Batch 10. Next, go to the desktop and run the Real Time Sync application. 11. Drag the batch job file to the Real Time Sync application windows to import the setting.

ICT Troubleshooting Skills For Home Office 48 12. In the Real Time Sync windows, you can set the automation backup frequency by modify the idle time. By default, it will run every 10 second. 13. After setting up the automation backup setting, go click the “File” option on the top, and click “Save as”. 14. You will need to save this Real Time Sync setting into your computer startup folder. For windows environment, we will need to save it to C:\\Users\\User\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup 15. After save, you will see the Real Time Sync application will automatic run every time when you start your computer. The backup will automatically run based on the batch file you drag into Real Time Sync earlier. In case you need to change backup setting, you just need to open the batch file with Free File Sync, and edit it.

ICT Troubleshooting Skills For Home Office 49 - CHAPTER 8 - Computer Security Objectives: 1. To learn about computer security 2. To learn about cyber attack 3. To learn how to secure your computer 8.1 Importance of Computer Security The fact of the matter is whether you are an individual, small business or large multinational, you rely on computer systems every day. Computer security is important because it keeps your information protected. Every user of a computer or mobile device should be able to grasp how to keep their computer, devices, and data secure. Computer security is everyone’s responsibility. A proper computer security helps prevent viruses and malware, which allows programs to run quicker and smoother. A large scale of cyber-attack might not only affected your personal devices, but other connected device also such as network drive and servers.

ICT Troubleshooting Skills For Home Office 50 8.2 Cyber Attack What is a Cyber Attack? A cyber attack is a malicious attempt by a third party to damage, destroy or alter: 1. Computer networks 2. Computer information systems 3. Personal computer and devices Attacker launch cyber attacks for many reasons, such as to steal money, access financial and sensitive data, weaken integrity or disrupt the operations of a company or an individual. Attacks often result in crimes such as financial fraud, information or identity theft. Common Cyber Security Threats Most likely cyber security threats your business may be exposed to include: 1. Cyber fraud Cyber fraud usually happened when user access to an unauthorized resources or link which created by the attacker. By establish a connection to the unauthorized website, this will open a back door for the attacker to access your computer system, thus causing information leaking. This including phishing, spear phishing, vishing and whaling attack. 2. Malware attacks Malware attack usually happened when a user either unconsciously or purposely running an untrusted installation or script that trigger the malware to be install into the computer. This including ransomware, viruses, Trojans, and spyware attack. 3. Drive-by downloads Drive-by download is similar to malware attack, where cause by downloading from untrusted resources. The download may be done unconsciously in the background, which subsequently cause the malware attack without notice.

ICT Troubleshooting Skills For Home Office 51 4. System hacking System hacking can be done by a person or a team, who exploits the weaknesses in a computer system or network to gain unauthorized access to its data or take illegal advantage of it. We called them hacker. A hacker can hack the computer system because the hacker knows the actual work of computer systems and software which is inside the system. For this, a hacker has information about the systems, networking, and knowledge of other areas related to computer science. Anyone who is using a computer and is connected to the internet is susceptible to the threats of malicious hackers. These online villains generally use viruses, malware, Trojans, worms, phishing techniques, email spamming, social engineering, exploit operating system vulnerabilities, or port vulnerabilities to get access to any victim's system. 5. Insider attack An insider threat is a security risk that originates from within the targeted organization. Insider attack refer to any malicious attacks on a corporate system or network that is done by someone who has been entrusted with authorized access to the network, and also may have knowledge of the network architecture.

ICT Troubleshooting Skills For Home Office 52 8.3 Secure Your Computer Data encryption Encryption is designed to scramble your data so no one can understand what it says without a key. It’s not only useful for protecting information on your computer, but also for making sure text messages and emails on your phone aren’t subject to prying eyes. On your computer, productivity applications such as Microsoft Office and Adobe Acrobat allow you to set passwords on individual documents and specify the type of encryption to be used. Encrypting File System (EFS) and disk encryption products allow you to encrypt files, folders, removable USB drives, flash drives, and more. Data Backup If something should happen to the data you create on your devices or network, or you lose it all, you can recover quickly without hassle if it’s backed up. Backups help protect your photos, documents, and other data not only from a technical malfunction but from ransomware and other malicious hacking. Back up to an online service, external hard drive, or both, for the best data protection.

ICT Troubleshooting Skills For Home Office 53 Protect Password Creating strong passwords and never using the same password across sites or devices is one of the best things you can do to protect yourself from digital invasion. Install Antivirus Ensure that your computer is secured with up-to-date antivirus software. Antivirus is created to defend your computer from the malware attack. It will greatly reduce your risk from the unauthorized cyber attack. Building Self Conscious on Network Security 1. Look for ‘https’ in the URL before you input any confidential information or a password. The added s in https means secure, and guarantees a degree of protection not afforded by the standard http markup. 2. Avoid using normal, unencrypted e-mail and unencrypted Instant Messaging if you’re concerned about confidentiality. Using trusted mail services like Google Gmail or Microsoft Outlook is perfectly fine for mail protection. 3. Ignore unknown or unsolicited links and attachments. Don’t download unfamiliar files or programs onto your computer or other devices. In case you having doubt on certain files to be download or link to be click, please seek for IT consultant advice.

ICT Troubleshooting Skills For Home Office 54 - CHAPTER 9 - DOCUMENT PROCESSING Objectives: 1. To learn more about document processing devices 2. To learn more about printer driver installation 3. To learn how to print documents 4. To learn how to scan documents 5. To learn how to copy documents to a USB Flash Drive from your computer 6. To learn how to fax documents 7. To learn about common documents problems and solutions 9.1 Document Processing Devices Printer A printer is an external hardware output device that takes the electronic data stored on a computer or other device and generates a hard copy of it. For example, if you created a report on your computer, you could print several copies to hand out at a staff meeting. Scanner A scanner is an input device that scans documents such as photographs and pages of text. When a document is scanned, it is converted into a digital format. This creates an electronic version of the document that can be viewed and edited on a computer. Fax Alternatively referred to as a facsimile, telecopying, or telefacsimile, a fax is a transmission of graphics or text over the phone line. Photocopier Photocopier is a machine that produces paper copies of text documents, photos, or illustrations. Most modern photocopiers use a technology called xerography, a method that uses electrostatic charges on a light sensitive photoreceptor to attract and lay down toner to paper. Heat, pressure or both are then used to meld the toner onto the paper creating a visible image.

ICT Troubleshooting Skills For Home Office 55 9.2 Printer Driver Installation 1. Go to Control Panel > Hardware and Sound > Device and Printer. 2. Select Add Printer. 3. From the Add Printer dialog box, click Add a Local Printer and select Next. 4. Choose a Printer Port - You can select from a drop down of existing ports or use the recommended port setting that your computer selects for you. Click Next.

ICT Troubleshooting Skills For Home Office 56 5. Add your driver. From here, you can either add the disc that came with your printer or select the driver that you downloaded from the manufacturer’s website. 6. Name your printer. 7. Click Finish. 8. Run a test print.

ICT Troubleshooting Skills For Home Office 57 9.3 How to Print Documents 1. Make sure that your printer is connected and turned on. If your printer connects over Wi-Fi, this will mean making sure that you're on the same Internet network as your printer; otherwise, you'll need to plug your printer's USB cable into your computer. 2. Open File Explorer or click the folder-shaped icon in the bottom-left side of the Start window. 3. Go to the document that you want to print. Click the folder that contains the document on the left side of the File Explorer window. Common documents that you can print include the following:  Word, Excel, or PowerPoint documents  PDF files  Photos

ICT Troubleshooting Skills For Home Office 58 4. Select the document. Click the document that you want to print or press CTRL P to open Printer Setting screen. 5. Select your printer. Click the \"Name\" drop-down box, then click your printer's name. 6. Select a number of copies. In the \"Copies\" box, type in the number of copies of the document that you'd like to print. (This is different than the number of pages.) 7. Edit other print settings if need be. The menu for each document type will vary, but you'll have the following options for most documents:  Orientation: Determine whether your document is oriented vertically or horizontally.  Color: Decide between printing in black and white or including color printing. You must have colored ink in your printer to print in color.  Number of sides: Choose single-sided printing to print one sheet of paper per page, or choose double-sided printing to use both sides of a piece of paper. 8. Click Print. Your document will begin printing.

ICT Troubleshooting Skills For Home Office 59 9.4 Scan Documents 1. Place a document face-down in your scanner. You'll also want to make sure that your scanner is on and connected to your computer before proceeding. 2. Open Start. Click the Windows logo in the bottom-left corner of the screen. 3. Type fax and scan into Start. 4. Click Windows Fax and Scan. It's at the top of the Start window. 5. Click New Scan. This option is in the upper-left side of the Fax and Scan window. A new window will open. 6. Make sure that your scanner is correct. If you don't see your scanner's name at the top of the window or the wrong scanner is listed, click Change... in the upper-right side of the window and then select your scanner's name.

ICT Troubleshooting Skills For Home Office 60 7. Select a type of document. Click the \"Profile\" drop-down box, then select the type of document (e.g., Photo) in the drop-down box. 8. Decide on your document's color. Click the \"Color format\" drop-down box, then select either Color or Black and White. Your scanner may also have different options for colors here. 9. Select a file type. Click the \"File type\" drop-down box, then click the file type (e.g., PDF or JPG) that you want to use to store the scanned document on your computer. 10. When scanning anything other than a photo, it's best to select PDF. 11. Change any other options on the page. Depending on your scanner, you may have other options (e.g., \"Resolution\") that you can modify prior to scanning your document. 12. Click Preview. It's at the bottom of the window. This will bring up a preliminary scan to show you what your scanned document will look like. 13. Click Scan. It's at the bottom of the window. Your document will begin scanning into your computer using your selected options and format. 14. Find your scanned document. To do so:  Open Start  Open File Explorer  Click Documents on the left side of the window.  Double-click the Scanned Documents folder.

ICT Troubleshooting Skills For Home Office 61 9.5 How to Copy Documents to a USB Flash Drive from Your Computer 1. Navigate to the folder that contains the files you’d like to copy. 2. Plug the USB flash drive into a USB port on the computer 3. Find a place on your USB drive to store the copied files. You can copy files to any folder on the USB drive. 4. Drag file(s) from the computer to the USB drive. With both Explorer windows open (one to the computer, the other to the USB drive), drag a file from the computer to the USB drive. Dragging a file to the USB drive will create a new copy of the file without deleting the original on the USB drive. 5. Or Save an open file right to the USB drive. If you have a file open in a program like Microsoft Word or Photoshop, you can save it directly to the USB drive without having to drag it between Explorer windows. Click “File,” then “Save As,” and select a save location on the USB drive. 6. Eject the drive safely. To ensure you don’t harm the data on the USB drive, you’ll need to safely eject the drive. 9.6 Fax Documents 9.6.1 Sending a Fax with an Online Fax Service 1. Open the program from the online fax service provider that you use 2. Select the file that you want to fax 3. Enter the fax number that you want to send to 4. Press “Send.” 5. Wait for the document to finish transmitting 6. Send another fax, or close the program 9.6.2 Sending a Fax with a Fax Machine 1. Place the document you want to send in the document feeder. There is usually a small icon that will show which was is “face up” for sending your document. 2. Enter the fax number you want to send to, including and extensions to dial externally, and any international dialing codes 3. Press Send or Go (depending on your fax machine model) 4. Wait for the fax to finish scanning and sending your document 5. Take your confirmation page (if you have the feature enabled) 6. Take your original document with you

ICT Troubleshooting Skills For Home Office 62 9.6.3 Sending a Fax with a Computer 1. Open the program you want to use to fax 2. Select the document that you want to have faxed 3. Prepare a cover page to put on top of that document 4. Select the option to “fax”” 5. Enter the fax number you want to send to 6. Select the option to “send.” 7. Wait for the document to finish sending 8. Send another fax, or close the program 9.7 Device Driver Installation and Update 9.7.1 How to install drivers 1. Open the folder containing the downloaded file in File Explorer. 2. Right-click the downloaded ZIP-file and then click Extract All Files. ... 3. Right-click the setup.exe or install.exe file and click Run as administrator. ... 4. Follow the on-screen instructions to perform the installation. 9.7.2 How to update drivers using Windows Update To quickly update device drivers using Windows Update, use these steps: 1. Open Settings. 2. Click on Update & Security. 3. Click on Windows Update. 4. Click the Check for updates button.

ICT Troubleshooting Skills For Home Office 63 9.8 Common Document Processing Problems and Solutions Failed to Print Unable to print the document from computer. Solutions 1. Make sure computer and printer is connected 2. Restart Printer and Computer 3. If problem persist, proceed to reinstall printer driver. Failed to Scan Solutions 1. Make sure computer and scanner is connected 2. Restart Scanner and Computer 3. If problem persist, proceed to reinstall scanner driver. Failed to Fax Solutions 1. Make sure fax machine is turned on, and the phone cable connected to the fax is in good condition. 2. Restart the fax machine. 3. Try to dial your fax number using your phone. If the call cannot go through, please contact your phone service provider for assistant. If the call can go through, then the problem is from the fax machine. Please contact machine vendor for assistant.

ICT Troubleshooting Skills For Home Office 64 Document Upload Error or An Error Occurred \"Error uploading [filename]. An Error Occurred.\" Cause No. 1: The document is corrupted Solutions  Save as a new PDF file: Simply opening your PDF and saving it as a new file will remedy this.  Print the document to a new .PDF Cause No.2 : Document is password protected or secured Solutions 1. Remove the access password protection: Open the document in the program which created it. Under its respective security options, remove the access password. For example, in Adobe Acrobat, go to File > Properties > Security (or type Ctrl-D). 2. By pressing \"Change Settings,\" you can remove the access password by unchecking the box labeled \"Require a password to open the document.\"

ICT Troubleshooting Skills For Home Office 65 - CHAPTER 10 - COMPUTER NETWORKING Objectives: 1. To learn more about computer networking 2. To learn about network devices in office 3. To learn more about IP address and learn how to identify your computer IP 4. To learn common networks problems and solutions 10.1 Introduction to Computer Networking In technological term, networking is referring to the way that devices communicate. It can be from a smallest network possible which is two computer connected together, to a large enterprise network. The method of linking the devices is varying depends on the requirement. It can be cable connected, or through wireless. Above diagram is a typical SOHO network diagram. SOHO network or also term as Small Office Home Office network is a type of Local Area Network connection meant to be used in a small business. It consist of all the basic device to build up a working network environment.

ICT Troubleshooting Skills For Home Office 66 10.2 Identify Network Devices in Office Modem HUAWEI HG8245A Modem is essential need for our network as it will be the one that responsible for receiving and communicating the signal from our internet service provider (ISP). Router TPLINK AC1750 Router are the one allows communication between your local network and the internet. It is usually connected between modem and your network switch. Any incoming or outgoing connection to the internet will need to pass through the router.

ICT Troubleshooting Skills For Home Office 67 Network Switch TPLINK SG105 UBIQUITI 48PORT SWITCH Network Switch is a centralized device that link all your other devices together, such as computer, laptop and router, through the wired connection. It can be range from a small number of port, example TPLINK 105 which only have 5 network ports, to a large number of port, example UBIQUITI 48port switch. This requirement is depends on how many units of device you would like to connect and how is the network architecture being designed.

ICT Troubleshooting Skills For Home Office 68 Network Interface Card Network interface card is a hardware component inside a computer. The function of the NIC card is to allow the computer to connect to the network. Normally it comes with a RJ45 Ethernet Port, but some might have wireless antenna also. Which mean it may provide either wired or wireless connection for the computer. Network Cable Ethernet Cable Cat5e - Cat7a Category Shielding Max Transmission Speed (at 100 meters) Max Bandwidth Cat 3 Unshielded 10Mbps 16 MHz Cat 5 Unshielded 100 MHz Cat 5e Unshielded 10/100Mbps 100 MHz Cat 6 Shielded or Unshielded 1,000Mbps / 1Gbps 250 MHz Cat 6a 1,000Mbps / 1Gbps 500 MHz Cat 7 Shielded 10,000Mbps / 10Gbps 600 MHz Cat 7a Shielded 10,000Mbps / 10Gbps 1,000Mhz Shielded 10,000Mbps/10Gbps Ethernet cable is a type of copper cable where we use in our daily home or office environment. It is the cable that connecting your PC to the Ethernet faceplate on the wall or direct to the network switch. This type of cable is cheap and can be found in many computer related shop.

ICT Troubleshooting Skills For Home Office 69 Fiber-optic cable Fiber-optic cable is very thin cable which build on strand of pure glass. Different from copper Ethernet cable which transmit on electromagnetic wave, fiber-optic cable is transmit through light wave. The pure glass structure build inside the cable is acting as a waveguide for light to travel over long distances. For the year 2020, Fiber optic is still expensive compare to common copper cable. Just like the network interface card, fiber-optic cable also require a specific fiber connector to connect. The connector is not cheap also. Regardless all the disadvantage, fiber-optic cable still the first choice toward future proof solution. There are a lot of significant benefit of using fiber-optic cable. Benefit of fiber-optic cable: 1. They have high bandwidth capacity, typically measure with terabit/s. 2. They have very low transmission losses 3. They do not dissipate heat 4. They are immune to cross-talk and electromagnetic interference

ICT Troubleshooting Skills For Home Office 70 Wireless Access Point TPLINK WA901ND UBIQUITI NETWORK AC PRO AP Above image is 2 type of Wireless Access Point. TPLINK 901ND is a common type of access point for home/a very small office/department area use. While for Ubiquiti network AC PRO access point is a high end access point with build in wireless antenna inside it. It is normally use for enterprise level company to provide strong and stable wireless signal. A Wireless Access Point is a device that creates a wireless local area network, or WLAN in an office or large building. An access point connects to a wired router, or switch via an Ethernet cable, and emit the wireless signal to a designated area. Now a days, you will notice there are typical two type of WIFI signal in your area - 2.4GHz WIFI and 5GHz WIFI signal. Signal Speed Stability Coverage 2.4GHz Low Low High 5GHz High High Low

ICT Troubleshooting Skills For Home Office 71 10.3 Introduction to IP Address IP stands for Internet Protocol. IP address is an address assigned at each of the computer device for them to communicate on the network. Principle of IP Address: a) 1 byte = 8 bits b) IP address is calculated based on “2n”, where “n” = number of bit Example: No. of Bit 1 2 3 4 5 6 7 8 26 27 2n 20 21 22 23 24 25 64 128 Value 1 2 4 8 16 32 c) 2 device in each of the network cannot have 2 same IP address, or else it will cause the device communication failure due to IP conflict. d) In a network, the 0 and 255 are always assigned network and broadcast address, and can never be used as devices IP address. (Refer to Subnet Mask section for details) There are basically two version of IP address – IPv4 and IPv6 IPv4 – Internet Protocol version 4  IPv4 is a 32bit address  Total unique address = 232 = 4,294,967,296  Example: 192.168.1.1 IPv6 – Internet Protocol version 6  IPv6 is a 128bit address  Total unique address = 2128 = 340,282,366,920,938,463,463,374,607,431,768,211,456  Example: 2404:1980:2f45:c0e7:5181:879a:ea41:fc55  IPv6 is developed to resolve IPv4 exhaustion issue, due to bunch of global devices keep increasing every day. Due to majority of the global system are still communicate through IPv4, IPv6 cannot be implement directly to the global world, but it is gradually replacing IPv4. All the new technology device now a days are all build to support IPv6.

ICT Troubleshooting Skills For Home Office 72 Subnet Mask A Subnet Mask is use to identify the available IP address in a network. It is important to understand its concept especially when you want to determine the network size. Common Subnet Mask Structure Subnet Mask Network Address IP Address Available Broadcast Address 10.0.0.1 – 10.255.255.254 10.255.255.255 255.0.0.0 10.0.0.0 255.255.0.0 172.16.0.0 172.16.0.1 – 172.16.255.254 172.16.255.255 255.255.255.0 192.168.1.0 192.168.1.1 – 192.168.1.254 192.168.255.255

ICT Troubleshooting Skills For Home Office 73 10.4 Identify Your Computer IP Address To identify your computer IP address: 1. On your keyboard – click “Windows” + “R” to open Run Windows 2. On the Run Windows – type “cmd” to open Windows Command Prompt. 3. On the Windows Command Prompt – type “ipconfig” to show the IP address details of your computer. 4. You will notice that there is the IP address, Subnet Mask and Default Gateway. By referring to the above diagram: 1. IPv4 address is the IP address assigned from router to your computer. 2. Subnet Mask refer to the portion of the IP address available in the network. Subnet mask 255.255.255.0, mean that there are only maximum 254 devices can be communicate in this network. (From 192.168.43.1 – 192.168.43.254). 3. Default gateway normally is refer to your router IP address.

ICT Troubleshooting Skills For Home Office 74 10.5 Common Computer Networks Problems and Solutions 1. No Internet Access When you see the “Connected, no internet access, connected but no internet”, or similar errors on your computer, it means that your computer is connected to the router correctly but can’t connect to the internet. Solution: 1. Before you do any troubleshooting, it’s important to determine whether your PC is the only device with no internet connection. If other device internet is working, meaning the problem is from your computer. 2. If the problem is from your PC: 2.1 Reboot your PC.

ICT Troubleshooting Skills For Home Office 75 2.2 If still the same, please click “Windows” + “R”, and type “ncpa.cpl” to access network adaptor window. 2.3 Right click the internet connection adaptor you are using, and click “properties”.

ICT Troubleshooting Skills For Home Office 76 2.4 Double click the “Internet Protocol version 4 (TCP/IPv4)” to access the IP address setting page. 2.4 Check your IP address setting. 2.4.1 If you are connect through Home Router, normally the IP address is assigned automatically. Please make sure you select the “Obtain an IP address automatically” and “Obtain DNS server address automatically”, then click “ok” to apply the setting. 2.4.2 If you are connect through company network, please consult IT professional to check the IP setting for your company network. 3. If all device unable to access internet, please restart your router. If still the same, please contact your internet service provider for assistant.

ICT Troubleshooting Skills For Home Office 77 - CHAPTER 11- WEB TECHNOLOGY Objectives: 1. To learn more about Web Technology, Web Application, Web Browser, Web Cache & Bookmarking. 2. To learn about browser data backup & Restore. 11.1 Introduction to Web Technology WWW affectively called “The Web”. It is a collection of information stored on the networked computers over the world. Individual document pagers on the WWW are called web pages and are accessed with a software application running on the user’s computer, commonly called “Web Browser”. Web pages may contain text, images, videos and other multimedia components, as well as web navigation features consisting of hyperlinks. WEB or Internet? Web or Internet, both are not the same things, “Web” is a collection of documents that interconnected by hyper-links. These documents are accessed by Web Browsers and provided by Web Server. While, “Internet” is a collection of documents or networking devices connecting together. What is Technology? “Technology” is referred to the use of scientific knowledge for practical purposes or applications, whether in industry or in our everyday lives.

ICT Troubleshooting Skills For Home Office 78 What is Web Technology? “Web Technology” is referred to a method by which computers communicated with each other through the use of markup languages and Multimedia package History of Web Technology The early 1990, Tim Bernes-Lee design the first Web Browser/ Editor and Web Server up and run on a NeXT computer at CERN (European Organization, Nuclear Research). In August 1991, he announced the WWW software on the internet newsgroups and interest in the project spread around the world. In year 2001, Eric Jordan design his company 2A, as it was known to the Flash community. This website was inspiration to many and as often copied, and site with this layout were as being “2Advanced” in their design; the phrase became accepted as almost a style of web design in itself. 2Advanced V3 Expansions is remembered for being the most copied website ever and for being voted “the most influential Flash website of the decade” in the official pools conducted by FWA for Adobe. Year 2007, is the arrival of full-screen video together with the iPhone. This website was a game designed to promote milk, where the objective was to break onto Fort Fridge and get the Glass, while avoiding Milkatraz. The production values were utter perfection, with staggering 3D and video, while the game itself was great fun and highly addictive. Year 2010, this was the first 100 percent HTML5 website. As an interactive Chrome’s browser, Google Maps, and HTML5 website that really sook Flash. It also worrying tremors to die-hard Flash designers and developers around the world, ultimately marking the end of Flash and massive shift into developing website and experiences that no longer required internet plug-ins. In year 2012, the next-generation project of Google Chrome. Google Chrome redefined the web-design landscape, where this project was a prime example of the future of digital would hold, by amalgamating real-life experiences with those on the web. For example, user able to visit the Science Museum in London and interact with five experiments there, or compare this by integrating with the same experience but live via the browser, 24 hours per day.

Web Terminologies ICT Troubleshooting Skills For Home Office 79 Client Any computer on the network that Server requests services from another computer on the network. Web Page Any computer that receives requests Web Site from client’s computer, processes and Web Development sends the output. Web Browser Any page that is hosted on the Internet. Collection of interlinked Web pages that How Does the Web Works? is hosted on the Internet. The process of creating, modifying Web pages. A program that receives information from the Web. E.g. IE, CHROME, Mozilla and etc. The Web information is stored in the Web Pages in HTML format. The Web pages are stored in the computers called “Web Server” file system. “Web Client” reading the pages using specific web browsers, such as Internet Explorer (IE), NETSCAPE, Mozilla, Chrome, Safari, Opera and etc. The web server waits for the request from the web clients over the Internet.

ICT Troubleshooting Skills For Home Office 80 Who Defines Web Standard? The web standard is defined by World Wide Web Consortium (W3C). The W3C’s long term goals for the web are Universal Access, Semantic Web and Universal Access. The Universal Access used to make the web accessible to all by promoting technologies that take into account the vast differences in culture, language, education, ability, material resources & physical limitations of users on all continents. The Semantic Web used to develop a software environment that permits each user to make the best use of the resources available on the web. While, the Universal Access is to guide the web’s development with careful consideration for the novel legal, commercial, & social issues by this technology. Protocols Governing Web Protocols is the set of conventions governing the processing & especially the data in an electronic communication system. There are several types of protocols governing the web, such as shows in the table below. Hypertext Transfer Protocol (HTTP) – Protocol used to access data on the WWW. – Uses one TCP connection on well known port - 80. – Two types of HTTP message: Request, Response. – Used to transport HTML pages from web servers to web browsers. – Transfers data in the form of plain text, hypertext, audio, video & etc. Transmission Control Protocol/ Internet – A set of protocols developed to Protocol (TCP/IP) allow cooperating computers to share resources across a network. – They provide a few basic services that everyone needs (File transfer, electronic mail, remote log on & etc.) across a very large number of clients & server systems. User Datagram Protocol (UDP) – An unreliable connection less protocol used to control the management of application level

ICT Troubleshooting Skills For Home Office 81 services between computers. – It is used for transport by some applications, which must provide their own reliability. File Transfer Protocol (FTP) – It allows file transfer between two computers with log in required. – FTP allows user to copy any kind of computer file (text, software, images, sound & etc.) from one computer to another via a network using the Internet. Simple Mail Transfer Protocol (SMTP) – It is used to transport mail over Internet. – It is an application layer proto Post Office Protocol Version 3 (POP3) – SMTP used by clients to access an internet mail server to get mail. – It is NOT a transport layer protocol. Internet Mail Access Protocol Version 4 – IMAP4 used by clients to access an (IMAP4) internet mail server to get mail. – It is NOT a transport layer protocol. TELNET – It is used to remotely open a session on another computer. – It relies on TCP for transport. Dynamic Host Configuration Protocol – A method of assigning & controlling (DHCP) IP addresses of computers on a given network. – A server-based service that automatically assigns IP numbers when a computers boot.

ICT Troubleshooting Skills For Home Office 82 Cyber Crime Cyber Crime is referred to all the activities done with criminal intent in cyberspace or using the medium of Internet. There are several types of cybercrime, such as; credit card frauds, Sale of illegal articles (narcotics, weapons and wildlife), Online gambling, Intellectual Property Crimes (Software privacy, copyright infringement, trademarks violations, theft of computer source code), Email spoofing, Forgery, Phishing, Cyber terrorism and etc. Cyber Laws is a system of law and regulation for the cyber space. It refers to all the legal and regulatory aspects of the Internet and the WWW. There are several types of cyber laws applicable to worldwide, such as shows in the table below. Intellectual – A legal field that refers to creations of the mind such as Property Law musical, literary & artistic works, inventions (symbols, name, images & designs) used in commerce, including copyrights Privacy Law trademarks patterns & related rights. Freedom of Expression – It gives creators exclusive rights to their creations, thereby Jurisdiction providing an incentive for the author to develop & share the information rather than keep it secret. – The right not confined to verbal speech but is understood to protect any act of seeking, receiving & imparting information or ideas, regardless of the medium used. – The right not confined to verbal speech but is understood to protect any act of seeking, receiving & imparting information or ideas, regardless of the medium used. – The practical authority granted to a formally constituted legal body or to a political leader to deal with & make pronouncements on legal matters & by implication, to administer justice within a defined area of responsibility. – Any cybercrime is also subject to the legal body constituted.

ICT Troubleshooting Skills For Home Office 83 Why We Need Cyber Laws? To answers this question, we can look into India country site of view. The coming of the Internet led to the emergence of numerous ticklish legal issues and problems which necessitated the enactment of Cyber Laws. The existing laws of India, even with the most benevolent and liberal interpretation, could not be interpreted in the light of emerging cyberspace. None of the existing laws gave any legal validity or sanction to the activities in Cyberspace. Internet requires an enabling and supportive legal infrastructure in tune with the times. IT ACT 2000 was Enacted on 17TH May 2000 – India (12th nation in the world to adopt cyber laws). The objective of this act was to Provide legal recognition for transaction carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “Electronic Commerce”. This act also used to facilitate electronic filing of documents with government agencies and e-Payments. There are several types of civil wrongs doing under this IT Act such as Chapter IX of IT Act, Section 43, Data Diddling, Hacking with Computer Systems, Data Alteration: Section 66, – Publishing Obscene Information (Pornography): Section 67, Un-authorized access to protected system: Section 70 and etc. Below is the Computer Related Crimes Under IPC & Special Laws under IT ACT 2000. – Sending threatening messages  Sec 503 IPC by email – Sending defamatory messages  Sec 499, 500 IPC by email – Forgery of electronic records  Sec 463, 470, 471 IPC – Bogus websites, Cyber Frauds  Sec 420 IPC – Email spoofing  Sec 416, 417, 463 IPC – Online sale of Drugs  NDPS Act – Web – Jacking  Sec. 383 IPC – Online sale of Arms  Arms Act

ICT Troubleshooting Skills For Home Office 84 Web Development Process There are two basic steps required in making webpage. The first steps is we need to used word pad or any application that able to create the HTML file. After the, when the HTML file ready, we will upload this file to server to be shared to the world. How a web browser displays a Home Page? This questions can be answers through the graphic shown below. 11.2 Web Application Web is the popular name for conducting business. Web Applications use the Internet’s infrastructure to deliver their functionality. Today web used in various fields, such as; web used for e-commerce, business to business application, online education, electronic data interchange, customer registration, marketing and sales, online order or purchasing, online payment (E-cash) and etc. The features of Web application, make it become popular among people al around the world. It has Lower maintenance and production costs, easily accessible, it run in web browser and web servers, they do not depend on installing client software on each user’s computer, reduces time and cost, not limited to any specific application. There are several types of web application, such as, data Intensive Application that provide an interface to browse & query large amount of data, Information System Applications that combine the service-oriented applications & data intensive application e.g., online banking system, Brochure Web Applications that composed of static web pages and Service Oriented Applications that contain the programming logic to implement the specific service.

ICT Troubleshooting Skills For Home Office 85 11.3 Web Browser Utility Web Utilities is referred to a utility for device management that has been built in this machine. This utility allows using a web browser from a computer on a network to remotely control the main control panel or monitor the machine status. The administrator can perform operations such as: setting up account tracks, registering scan destination and importing/ exporting various setting data. The operating environment for web browser utility can be shown as in the table below. OPERATING SYSTEM WEB BROWSER Windows Vista Microsoft Internet Explorer 9 Mozilla Firefox 7.0 or later (JavaScript & Cookies Enabled) Windows 7, 8.1, 10, Server 2012 Microsoft Internet Explorer 11 Mozilla Firefox 7.0 or later (JavaScript & Cookies Enabled) Macintosh OS X Mozilla Firefox 7.0 or later (recommended) (JavaScript & Cookies Enabled) Linux Mozilla Firefox 7.0 or later (recommended) (JavaScript & Cookies Enabled) Accessing Web Utilities 1. Start the web browser. 2. Enter the following URL in the address bar & press Enter.  http://<IP address for the machine >:30091  (ex) if the IP address of the machine is 192.168.1.20, enter “http://192.168.1.20:30091”.  You can also access from the Web Utilities link on the [Administrator mode] screen or [Login] screen of PageScope Web Connection. The [Main page] screen of Web Utilities of the machine is displayed.

ICT Troubleshooting Skills For Home Office 86 3. The use the Machine Manager Setting menu, click [Machine Manager Setting]. The password entry dialog box is displayed. 4. Enter “admin” in the User Name text box, and the 8-character administrator password in the password box, then click on [OK].  The [Machine Manager Setting] screen is displayed.  The username “admin” (for accessing the Machine Manager Setting menu) cannot be changed. 5. Make various setting as necessary.  To return to the [Main Page] screen, click [Main Page].  To enable the SSL encrypted communication, click [Enable] for [SSL Setting].  To re-disable the SSL encrypted communication, click [Disable] for [SSL Setting].

ICT Troubleshooting Skills For Home Office 87 11.4 Web Browsing Cache TWO TYPES OF COMPUTER MEMORY Dynamic RAM (DRAM) Static RAM (SRAM) – Use capacitor to store data. – Doesn’t have to be refreshed. – The capacitor needs to constantly & – SRAM is what is used in CPU CACHE. – Faster than DRAM. dynamically often refresh with – Expensive. electricity in order for them to store data.

ICT Troubleshooting Skills For Home Office 88 CPU Cache is a CPU internal memory, it stores copies of data & instructions from RAM, that's waiting to be used by the CPU. CPU Cache holds common data, that it thinks that CPU going to access over & over again, because when the CPU need to access certain data, it always checks the fasters cache memory first to see if the data it needs is there. If it’s not, then the CPU will have going back to the slower primary memory or RAM to get the data it needs. CACHE memory is so important because if the CPU can access what it needs on the fasters CACHE, then the faster the computer will perform. So, basically the whole idea behind CACHE is to make the computer run faster at the cheaper price. If the Computer run without CPU CACHE, it will be a lot slower because even though RAM is becoming faster, it still can’t feed the data to the CPU fast enough. This is because the CPU have got so fast, that a lot of time is waiting around doing nothing while it waits for more data & this creates a ‘bottleneck’. So, that’s why the CPU CACHE was developed, so it can act like a middle man between CPU & RAM to assist & feeding the CPU the data it needs a lot faster, which will reduce the bottleneck. There are three level on CPU Cache, which are; Level 1 Cache: called ‘Primary Cache’, located on the processor. Runs at the same speed as the processor. Fasters cache on the computer. Level 2 Cache: called ‘External Cache’. Used to catch recent data accesses from processor that were not caught by the Level 1 Cache and Level 3 Cache: Used to catch recent data accesses from processor that were not caught by the Level 2 Cache. If the CPU can’t fine the data, it needs from this THREE [3] levels. Then, it will go back to the slower RAM to find the data there.

ICT Troubleshooting Skills For Home Office 89 Level 2 Cache, in earlier computers, Level 2 cache was located on a separate chip on the motherboard. In modern CPUs, Level 2 cache is located on the processor. Size larger than Level 1 cache, but it’s not as fast as Level 1 cache. Level 3 Cache also located on the processor. Size larger than Level 2, but it’s not as fast as Level 2 cache. Often referred to as ‘Shared Cache’, because its memory is shared between all the cores in the CPU. Level 1 and 2 Cache are dedicated to their own CPU core. 11.5 Bookmarking Bookmarking submission is the best & efficient off page optimization activity to collect the backlink for our own site. Through this activity we collect only one backlink but we cache all URL for our site. It works for both traffic & pagerank for the web page. Bookmarking plays a very important role to increase a page rank. Social bookmarking is a powerful tool in promoting a website. We can use it for share bookmarks, deliver the content and to make it easier to remember the URL. Social Marker is a free service designed to reduce the time & effort needed to socially bookmark a website. It can help user spread a link on 17 of the best social bookmarking sites in under 15 minutes. It helps user get a lot of backlinks & increase your traffic. 11.6 Browser Data Backup & Restore With so many browsers around it’s not unusual for users to have multiple type of browsers at once to test out & see if one is preferred to another. The problem is with every browser comes a new user profile where all your favorites, page/search histories, addons, cookies, preferences & other settings are stored. If you want to try other browsers, backup your settings or transfer them from one computer to another. You want to be able to back up all the data that matters so it can be restored later. The easiest way to backup Google Chrome is to do it through the browser. To do so, you must create a Google account or sign in with your existing one. By clicking the three dots in the browser’s top-right cornet & then on the “settings” option near the bottom of this menu.

ICT Troubleshooting Skills For Home Office 90 From here, you should see a large, blue button labelled “turn on sync…”. Once you click it, you’ll be taken to Google login page. Here you can either log in with an existing Google account or create a new one by clicking “create account”. How To Backup Google Chrome In Browser From here, you should see a large, blue button labelled “turn on sync…”.Once you click it , you’ll be taken to Google login page. Here you can either log in with an existing Google account or create a new one by clicking “create account”.

ICT Troubleshooting Skills For Home Office 91 To create a new account, you’ll need to enter your name, date of birth & desired Gmail address, as well as a password. Once your account is created, repeat the same steps above to arrive at the login screen again. Either way, once you’re done linking your account with the browser, you can return to the settings menu & click “turn on sync” gain, which will prompt you to confirm. From here, click “manage sync” to see what information is being transferred. You can either choose to sync everything, or pick & choose from the list. Once you’ve decided what to sync, it will be made automatically available across devices, so longs as you sign in with the same Google account.

ICT Troubleshooting Skills For Home Office 92 How To Backup Google Chrome: Bookmarks, History & More To summarize, you can backup Google Chrome using your Google account by following these steps: 1. Enter the setting menu 2. Create or log in to a Google Account 3. Return to the settings menu & click “turn on sync 4. Click “manage sync” and choose what you want to save to your account. How to Manually Backup Google Chrome If you don’t want Google to have all your information on its servers – meaning you are not using a Google account – you can still backup the browser manually. If you only want to backup Chrome sites, you can just use bookmarks. Export Chrome Bookmarks You can access it through the three dots menu.

ICT Troubleshooting Skills For Home Office 93 Then, go to “bookmarks”. After that, select “bookmark manager”. The bookmark manager will open up in a new tab & looks like this:

ICT Troubleshooting Skills For Home Office 94 Then, click on the word “organize”, just over your actual bookmarks. A menu will pop up. This menu will let you do all sorts of things, including adding new bookmarks as well as creating folders. But we want the option “Export bookmarks to HTML file”. After click on “Export bookmarks to HTML file”. A window file explorer ‘save file’ will pop up. You can rename the file (which recommend), but don’t change the file type. It has to be .html for any of this to work right. The file is then saved to your hard drive.

ICT Troubleshooting Skills For Home Office 95 Importing Bookmarks The process is same as export bookmarks. Except that in the bookmark manager’s “organize” menu you choose “Import bookmarks to HTML file” rather than “Export”. You then be taken to file explorer where you can search for your .html. They will take you to bookmarks manager, where all you need to do is click on “import”. Dialog box will pop up where you can select the browser you’re importing from & click import. You’re Done!

ICT Troubleshooting Skills For Home Office 96 - CHAPTER 12 - MOBILE TECHNOLOGY Objectives: 1. To learn more about mobile technology 2. To learn about mobile device and operating system 3. To learn about mobile application 4. To learn about mobile utility 5. To learn about mobile phone problems 12.1 Introduction to Mobile Technology Mobile technology is the technology used for cellular communication. Mobile technology has evolved rapidly over the past few years ,a standard mobile device has gone from being no more than a simple two-way pager to being a mobile phone, GPS navigation device, an embedded web browser and instant messaging client, and a handheld gaming console. Mobile computing by way of tablet computers are becoming more popular. Tablets are available on the 3G and 4G networks. Mobile technology has different meanings in different aspects, mainly based on the wireless technology of wireless devices (including laptops, tablets, mobile phones, etc.) equipment information technology integration.


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook