Introduction To Get Connected PDF
Introduction To Get Connected PDF
The CISCO Networking Academy get connected course provides an introduction to the digital
world with Networks as a foundation for connecting people and things the curriculum helps
students understand how to use computer and connect to the internet. Get connected also
explores the human network and introduces students to the world of social media. Students
experience the fun and value of interacting with others through common software application
and tools.
WHO SHOULD ENROLL
There are no preconditions for this course. This is an introductory course that focuses on basis
computer and internet navigation skills and their relevance in our global society.
The curriculum is designed for: -
Student looking for a basic introduction to the fundamentals
Student looking for an introduction to the internet, Email/ and social media applications
COURSE FEATURES
Illustrations and narrations will guide the students through each topic to help them
understanding the relevance of Information Technology Fundaments in the world.
Videos and actives rein force learning and keep students engaged quizzes and a final exam
measure student comprehension.
LEARNING OBJECTIVES
Students who complete Get Connected will be able to perform the following tasks: -
Motherboard CD-ROM
The motherboard is the
main circuit board of a
A CD-ROM drive reads
computer. All computer information stored in
components attached compact discs (CDs)
to the motherboard.
The internal components of a computer system consist of the hardware required to store
and process data, and communicate with external devices, such as the input (e.g. keyboard,
mouse), output (e.g. screen, printer), and external storage devices (e.g. USB flash drive). The
External devices that are portable are also called peripheral devices or peripherals.
The main internal components of a computer system are:
Processor
Main memory
Input/output (I/O) controllers
Buses: Address bus, data bus, and control bus.
Processor: Sometimes referred to as the CPU (central processing unit), is the part of the
computer that processes data by executing the instructions of stored programs. At processor
level, these will be low-level instructions in the form of machine code that the processor has
been designed to handle, based on a specific instruction set. For the processor to be able to
execute a program, the program instructions need to be transferred from the secondary
storage to the main memory from where they can be fetched and executed. The data that
needs to be processed is also loaded into the main memory (from secondary storage) or
provided by the input and output devices via the I/O controllers.
Output devices: An output device is any piece of computer hardware equipment used to
communicate the results of data processing carried out by an information processing system
(such as a computer) which converts the electronically generated information into human
readable form.
What is a file: is very much like a typed document that you might find on someone's
desk or in a filing cabinet; it's an item that contains a collection of related information.
Microsoft Windows environment. A file can be a word, spreadsheet, drawing, music or
application program. A Windows file name can have up to 260 characters. A Windows file
usually has a file extension, which helps Windows understand what type it is and how to read
it. A regular word-processing file with a ".txt" file extension may invoke a Windows Notepad
or WordPad program to open it. A picture file with a JPG file extension may invoke a Windows
picture-viewer program. In naming a Windows file, you should avoid these characters: \, /: *,
", >, < and |.
Examples of Files Program Icons
Here are some examples of files and the program icons that represent them:
PDF document (Adobe Reader)
What is File Explorer: Is a file that view and organize files and folders using a built-in
application known as File Explorer (called Windows Explorer in Windows 7 and earlier
versions).
How to Open File Explorer
To open File Explorer, click the File Explorer icon on the taskbar, or double-click any folder
on your desktop. A new File Explorer
window will appear. Now you're ready to
start working with your files and folders.
From File Explorer, double-click a folder to open it. You can then see all of the files stored
in that folder.
To Open a File:
There are two main ways to open a file:
Find the file on your computer and double-click it. This will open the file in its default
application. In our example, we'll open a Microsoft Word document (BdayInvites.docx),
which will open in Microsoft Word.
Open the application, then use the application to open the file. Once the application is
open, you can go to the File menu at the top of the window
and select Open.
Moving and deleting files
As you begin using your computer, you will start to collect
more and more files, which can make it more difficult to find
the files you need. Fortunately, Windows allows you
to move files to different folders and delete files you no
longer use.
To Move a File:
It's easy to move a file from one location to another. For example, you might have a file on
the desktop that you want to move to your Documents folder.
Follow the steps below to move a file:
1. Click and drag the file to the desired location.
2. Release the mouse. The file will appear in the new location. In this example, we have opened
the folder to see the file in its new location.
Note: You can use this same technique to move an entire folder. Note that moving a folder
will also move all of the files within that folder.
Performing authentication
Two popular networking models; OSI model and TCP/IP model describe the functionalities of
the most common protocols. Both models divide the entire communication process in logical
layers.
How the Protocols Layers works
The OSI uses a 7-layer model and TCP/IP networks use a 4-layer model. Because TCP/IP
networks are the most common and important one to understand. The levels are:
Data link level – e.g. Ethernet, Wi-Fi
Networking e.g. IP, – IPv4 Address classes and subnet ting and IPv6
What is a Browse
A browser is software that is used to access the internet. A browser lets you visit websites
and do activities within them like login, view multimedia, link from one site to another, visit
one page from another, print, send and receive email, among many other activities. The most
common browser software titles on the market are: Microsoft Internet Explorer, Google's
Chrome, Mozilla Firefox, Apple's Safari, and Opera. Browser availability depends on the
operating system your computer is using (for example: Microsoft Windows, Linux, Ubuntu,
Mac OS, among others).
Introduction
Social media platforms create an excellent opportunity for you to expand your reach online
and capture more leads, learn more about your audience, and generate sales. There are various
types of social media platforms you can use, you’ll open up opportunities to reach more
members of your target audience.
As a social media pro, you probably already use all the biggest social networks such as
(Facebook, Twitter, LinkedIn) and media sharing sites (Instagram, YouTube, Snapchat), along
with maybe a handful of others like Pinterest and Google Plus. But there’s much more to social
media account than the top social media and media sharing networks. Let look beyond those
social media account. In this lesson, we’ll review the five types of social media account and
provide examples too.
Types of Social Media
These are the five types of social media we’ll cover in this Lesson are:
1. Social networks 2. Media sharing networks
3. Social blogging networks 4. Discussion networks
5. Review networks
1. Social networks: One of the most well-known types of social media is social networks.
This type of networks allows users to connect with people and brands online. Social networks
can help you:
Build brand awareness
Generate new leads
Build relationships with customers
Provide customer service and more
Many people call social networks “relationship platforms” because they allow people to
connect and build a relationship. You can share information, photos, videos, and more through
these sites. These platforms focus on sharing knowledge and connecting with people.
Let’s take a look at three of the most popular types of social networks:
Facebook: With over 2.3 billion monthly active users, Facebook is one of the most popular
social networks available to your business. Many people use these platforms to connect with
family, friends, and brands. For your company, Facebook offers an excellent opportunity to
connect with your audience. In your Facebook You can share status updates, such as Photos,
Videos, Links to content and Polls. Facebook also offers paid advertisements that allow you to
attract new followers to help grow your business.
NOTE: Some Internet services (like free web e-mail) will offer to “remember your ID on this
computer” or “stay signed in”. Do not select this option if the computer you are using is in a
very public place and could potentially be used my several people (e.g. a public library). This
could make your account more vulnerable to someone trying to gain access to it and your
personal information.
Composing an E-mail Message
1. Click on the Compose button in the top left corner of the page.
Note: Tap the Tab key to move to the next field or click in the appropriate box. The blinking
cursor indicates that you can begin typing.
2. Enter the recipient’s e-mail address. If sending to multiple people, separate e-mail addresses
with a comma. And
3. Enter a subject.
4. Type your message in the empty white area.
5. Click the Send button when finished with your message
1. Click Inbox in the pane on the left. The number in parentheses represents
the number of unread messages that you have.
2. Point your mouse pointer over either the subject line or the sender’s name
(right on the text) and click. The message will open. (Note: The bold text
indicates an unread message).
How to Reply a Message
Note: Open a message by clicking on its subject, and then click the Reply button at the top
left of the screen.
1. While looking at the message, click “reply” at the bottom of the email to reply only to
sender of the e-mail. If there are multiple recipients included in the email, the option to “Reply
to all” will appear. “Reply to all” will include everyone included in the original email in your
response. There is also reply button, and a drop-down arrow at the top right of the message
that will give you the option to reply.
2. Type your reply at the blinking cursor, and click send when finished.
How to Forward a Message
Note: To sends a message to the people who are not listed in the original distribution list.
Open a message by clicking on its subject, and then click the Forward button. You can also
use the drop-down menu next to the reply button at the top right of the message to forward
an email.
1. When viewing the message, click Forward.
2. Enter any recipients in the recipients/to: field.
3. Add your own message at the blinking cursor. The sender’s original message will appear
beneath.
4. Click the Send button when finished.
NOTE: If you have a pop-up blocker enabled, you may have to disable it first.
Your web browser should give you a notification when a pop-up is blocked.
NOTE: In most instances, deleting a message from your Inbox will not remove the message from
your account. The deleted message is moved to your “Trash”, or equivalent folder. Most services
will automatically clear deleted messages from your account after a pre-determined amount of
time (usually 30 days).
How to Delete a Message without Opening
There are times you might want to delete a message without reading it. If you don’t recognize
the sender or if a message looks like junk mail (spam), it is highly recommended that you
delete the message without opening it. Select the checkbox to the left of any item that you
want to remove, and click delete. Click the checkbox at the top to select all items.
Note: An important information, if you do not recognize an e-mail sender’s name or e-mail
address, use the delete feature before opening the message. This is recommended for preventing
the spread of viruses through your e-mail account.
Click the buttons in the interactive below to learn more about using the Privacy Settings and
Tools page.
From making first impressions with employers to communicating with colleagues, LinkedIn
can be a useful career tool. Fortunately, creating an account is free, and it only requires your
email address.
If you take the time to learn how to use LinkedIn, it can make a big impact on your professional
life.
What is Twitter:
Twitter is a social networking website that's designed for finding and sharing short updates.
In fact, each post or tweet as they're called on Twitter is limited to just 280 individual
characters (letters, spaces, and punctuation marks). That's not even long enough to include
the first two sentences of this paragraph! Take a look at the tweet we've embedded below:
Tweets are so short that you might wonder why people bother posting them in the first place.
But that's actually a big part of what makes Twitter so popular: It's easy to quickly share what's
happening in your world or follow along with a popular topic in real time.
Creating a Twitter account
If you want to post your own updates to Twitter, you'll need to create an account. There are
two ways to do this:
If you're using a desktop or laptop computer, go towww.twitter.com in your web browser.
If you're using a mobile device, like a smartphone or tablet, download the Twitter app.
Whichever option you choose, you'll want to select Sign up and follow the instructions on the
screen. The account creation process is straightforward enough, but here are some things
you'll want to consider when signing up.
What is YouTube
Introduction
Troubleshooting requires an organized and logical approach to problems with computers and
other components. Sometimes issues arise during preventive maintenance. At other times, a
customer may contact you with a problem. A logical approach to troubleshooting allows you
to eliminate variables and identify causes of problems in a systematic order. Asking the right
questions, testing the right hardware, and examining the right data helps you understand the
problem and form a proposed solution to try.
In this chapter I will be focusing on the approach to problem solving that you can apply to
both hardware, software and Networking. You can also apply many of the steps to problem
solving to other work-related areas.
What is Troubleshooting
Troubleshooting is a skill that you improve over time. Each time you solve a problem, you
increase your troubleshooting skills by gaining more experience. You learn how and when to
combine steps or skip steps to reach a solution quickly.
However, before you begin troubleshooting a computer system or a problem, always follow
the necessary safeguards to protect data on the computer. Some repairs, such as replacing a
hard drive or reinstalling an operating system, might put the data on the computer system
at risk. So, make sure you do everything possible to prevent data loss while attempting repairs.
Note: Always perform a backup before beginning any troubleshooting. You must protect data
before beginning any work on a customer’s computer. If your work results in data loss for the
customer, you or your company could be held liable.
What is Data Backup
A data backup is a copy of the data on a computer hard drive that is saved to another storage
device or to cloud storage.
What is Cloud Storage
Cloud storage, is online storage that is accessed via the Internet. In an organization, backups
may be performed on a daily, weekly, or monthly basis. If you
are unsure that a backup has been done, do not attempt any
troubleshooting activities until you check with the customer.
Here is a list of items to verify with the customer about data
backups:
• Date of the last backup
• Contents of the backup
• Data integrity of the backup
Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution:
After you have determined the exact cause of the problem, establish a plan of action to resolve
the problem and implement the solution. Sometimes quick procedures can correct the
problem. If a quick procedure does correct the problem, verify full system functionality and, if
applicable, implement preventive measures. If a quick procedure does not correct the problem,
research the problem further and then return to Step 3 to establish a new theory of the
probable cause.
After you have established a plan
of action, you should research
possible solutions. The figure lists
possible research locations. Divide
larger problems into smaller
problems that can be analyzed and solved individually. Prioritize solutions starting with the
easiest and fastest to implement. Create a list of possible solutions and implement them one
at a time. If you implement a possible solution and it does not correct the problem, reverse
the action you just took and then try another solution. Continue this process until you have
found the appropriate solution.
Step 5: Verify Full Functionality and, If Applicable, Implement Preventive Measures:
After the repairs to the computer have been completed, continue the troubleshooting process
by verifying full system functionality and
implementing the preventive measures
needed. Verifying full system functionality
confirms that you have solved the original
Verify the solution with the customer. If the customer is available, demonstrate how the
solution has corrected the computer problem. Have the customer test the solution and try to
reproduce the problem. When the customer can verify that the problem has been resolved,
you can complete the documentation for the repair in the work order and in your journal.
Include the following information in the documentation:
Description of the problem,
Steps to resolve the problem, and
Components used in the repair.
Personal Computer (PC) Common Problems and Solutions
Computer problems can be attributed to hardware, software, networks, or some combination
of the three. You will resolve some types of problems more often than others. Common
hardware problems include the following:
Storage Device: Storage device problems are often related to loose or incorrect cable
connections, incorrect drive and media formats, and incorrect jumper and BIOS settings, as
shown in the chart.