100% found this document useful (1 vote)
641 views

Introduction To Get Connected PDF

The document provides an introduction to different types of computer systems. It discusses supercomputers, mainframe computers, mini computers, and microcomputers (personal computers). For each type, it describes their size, speed, storage capacity, typical uses, and examples. The key points are: - Supercomputers are the fastest and most powerful but also largest and most expensive. Mainframe computers are large and expensive but not as fast as supercomputers. Mini computers are smaller than mainframes. Microcomputers like PCs are the smallest, cheapest, and most commonly used type. - Each type has different typical applications based on their capabilities. Supercomputers are used for complex scientific tasks. Mainframes are used for large organizations handling vast amounts
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
641 views

Introduction To Get Connected PDF

The document provides an introduction to different types of computer systems. It discusses supercomputers, mainframe computers, mini computers, and microcomputers (personal computers). For each type, it describes their size, speed, storage capacity, typical uses, and examples. The key points are: - Supercomputers are the fastest and most powerful but also largest and most expensive. Mainframe computers are large and expensive but not as fast as supercomputers. Mini computers are smaller than mainframes. Microcomputers like PCs are the smallest, cheapest, and most commonly used type. - Each type has different typical applications based on their capabilities. Supercomputers are used for complex scientific tasks. Mainframes are used for large organizations handling vast amounts
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

Introduction to get connected

The CISCO Networking Academy get connected course provides an introduction to the digital
world with Networks as a foundation for connecting people and things the curriculum helps
students understand how to use computer and connect to the internet. Get connected also
explores the human network and introduces students to the world of social media. Students
experience the fun and value of interacting with others through common software application
and tools.
WHO SHOULD ENROLL
There are no preconditions for this course. This is an introductory course that focuses on basis
computer and internet navigation skills and their relevance in our global society.
The curriculum is designed for: -
 Student looking for a basic introduction to the fundamentals
 Student looking for an introduction to the internet, Email/ and social media applications
COURSE FEATURES
 Illustrations and narrations will guide the students through each topic to help them
understanding the relevance of Information Technology Fundaments in the world.
 Videos and actives rein force learning and keep students engaged quizzes and a final exam
measure student comprehension.
LEARNING OBJECTIVES
Students who complete Get Connected will be able to perform the following tasks: -

CHAPTER CHAPTER LEARNING


Computer Identify different types of computer systems, internal components and
Basics peripherals.
Files and Understand the directory structure of Microsoft windows and how to work
Directories with files and folders using a text editor
All about Understand computer networking, how to browse and search the internet,
the Internet and how to use email.
Exploring Create and use various types of social media accounts, and search the
the Human internet and how to use email.
Network
Keep Identify common problems and implement simple solution for Hardware,
yourself Software and Networks.
connected

E-mail: [email protected] Phone Numb: 07032955803 1


CHAPTER ONE: Computer Basics
Introduction
A Computer is an electronic computational device which can perform Arithmetic,
mathematical, and logical operation with incredible speed, and can store gigantic amount of
information and data. The information or data can be recalled at whatever point the client
demands or requests. As the days are passing by different types of computer system are being
utilized or used for particular and specific reason. As the need of clients, these days are
changing the advancement of modern computer innovation are heading off to a distinctive
level envision the old personal computer which involved an entire building, gigantic weight,
and created enormous heat, the heat or warmth utilize by this computer was fantastically high
and the current modern-day computer can fit your palm simply like your cell phone, imagine
how smaller your tablet is and your Personal computer.

What are The Different Types of Computer Systems


According to their size and capabilities computer system are basically classified into four
different types of computers which are-
 Super Computer
 Mainframe Computer
 Mini Computer
 Micro or Personal computer
Super Computer
These are the speediest computers compared with all other computers, which have fast,
amazing capacity or storage limit, expensive and require gigantic space they are called as
"Super Computer". Also They are accommodated in a large Air Conditioned room, some of
them can take an entire building for its installation.
However, in term of abilities Supercomputer can play out a speed of nanoseconds or even in
picoseconds, the speed of the supercomputer is million times quicker and faster than personal
computer. Super computer speed is measured or counted in "FLOPS" (Floating Point Operation
per Second) it can perform a speed of over 1 billion per second.
What we Use Super Computer for:
They are generally used as a part of complex Scientific application, climate determining,
Monitoring earthquake, they are expertized in the particular fields, for example, space
investigation, space examine, atomic weapons, and genetic engineering.
Type of Super Computer
Seymour Cray planned and designed the first Supercomputer "CDC 6600" in 1964. CDC 6600
is known as the first-ever Supercomputer. Today, China's "Tianhe -2" is the world's quickest

E-mail: [email protected] Phone Numb: 07032955803 2


and fastest Supercomputer. The Tianhe -2 can perform 100 Petaflops, i.e. quadrillions of
floating-point operations every second China has built up the quickest supercomputer of all
time. It has around 37 while the USA has 233.
Examples:
 PARAM 10000 which was developed in India by C-DAC, Pune
 IBM Deep Blue which was specially designed for playing chess
 Tianhe-2 which was developed in china
Mainframe Computer
They are gigantic in size, quick, extremely costly and expensive they are not as quick as the
supercomputer but still, they are exceptionally costly. They are planned and created to process
an incredible amount of information and data they can execute millions of guidelines or
instruction per second and can store billions of information or data.
What we Use Mainframe computer for:
They can store and process a tremendous or remarkable amount of information accordingly
it is generally utilized and used as a part of educational organizations, railway reservations, in
a portion of the administration segment where bulk information has to be saved, it is
additionally used as a part of Insurance Sector.
Type of Mainframe Computer
They support more than 1000 remote computers and can work as a “HOST” for different and
multiple operating systems.
Examples:
 IBM Z890
 Hitachi’s Z800
Mini Computer
They are called as "Midrange Computers" and were produced in the 1960s using transistor,
center memory technology, and innovation. They are quite smaller in size, less expensive and
speedier yet not as quick as a mainframe computer or supercomputer, they are utilized or
used as a part of private company organizations, and in the production, department to monitor
or screen the manufacturing process.
Types of Computer Mini Computer
They help multi-client Operations and have a very difficult operating system to deal with and
can function as a "HOST" in a system where 100 terminals can be supported. The effective
and powerful minicomputer is called as "Super-Minis".
Examples:
 VAX

E-mail: [email protected] Phone Numb: 07032955803 3


 Texas Instrument TI-990
Microcomputer
They are commonly called as “Personal Computer” (PC). They are the smallest and the cheapest
as compared with minicomputers, mainframe computer, and supercomputers. Despite this
they are widely used among people or end-user clients, due to their low cost they are so small
that they can be kept on a table (PC) or even carry out in a bag (Laptop) or even in a Palm
(Mobile Devices).
However, microcomputer is digital computer which consists of single or more CPU’s know as
Microprocessor they have input and output units as well as primary and secondary storage
units, their processing speed is less in terms of minicomputers, mainframe computer, and
supercomputers. Microcomputer speed is measured in MHZ (Mega-Hertz) and GHZ (Gage-
Hertz).
What we Use Microcomputer:
Micro or personal computer are the fastest-growing user’s computer system, compared to
other different types of computer systems. Personal computer, they are designed primarily for
single operation but still they can be used as a “workstation” in computer networking.
Type of Microcomputer
Microcomputer have an input unit which encourages the users to give instruction or data to
the control unit, and an output unit which performs display information in desired or wanted
form.
Examples of Microcomputers:
 Desktop Computer
 Tower Computer
 Laptop
 PDA | Palmtop
 Tablet PC
 Desktop computers: These are the single user computer which can be fit on a table. They
are small in size usually with single or only 1 “microprocessor” (CPU) they are designed for a
single location, desktop computers can be used for entertainment, graphics and user can
perform high level language, with a single user operating system but it can also be used as
host in computer networking.
However, desktop computer is also called “Personal Computer”. They can work faster and can
store a considerable amount of data or information, they are cheaper and smaller in size but
compared to other different types of computers they are found wondering.

E-mail: [email protected] Phone Numb: 07032955803 4


 Tower Computer: The tower computer is built and designed like a tower building. The
machines are as powerful as the desktop. The monitor can be kept apart from the
microprocessor (CPU), they are designed for a single location, Tower computers can be used
for entertainment, graphics and user can perform high level language, with a single user
operating system but it can also be used as host in computer networking.
Tower computer are a common style of case that are design because they allow heat to rise
and escape more easily, and also providing easy access to components in the computer.
Sizes of Tower Cases:
There are various sizes of tower cases which are:
 Full-sized Tower case: This type of tower case is taller and have more feature.
 Midsize Tower Case: This type of tower case is two times smaller than Full-sized tower case.
 Mini Tower Case: Also this type of tower case is smaller than Midsize tower case.
 Laptop: They can perform with AC or with Battery, these computers are usually used by
the persons who have to work from one location to another, not as desktop and tower
computer which sticks to one place as they need AC power to operate. There is a wide range
of people who use these types of computers daily may be an engineer who has to give a
presentation, a student who needs to demonstrate his project, a lawyer, a businessman, a
teacher, a graphic designer, a salesperson, etc. The biggest acid of laptops is their mobility.
Types of Laptop
There are two types of Laptop which are:
 Mini Laptop: This types of laptop is does not have CDROM port and you can only use flash
disk or external CDROM and time you want to share any items, such as program, file or
document etc. and not every program can run on it because the size.
 Full size Laptop: This type of laptop has CDROM port and can run any program.
 Tablet PC: The tablet computers are also called “notebook”. Which enables clients to
communicate utilizing computerized pen or a fingertip without utilizing a mouse or keyboard.
They can't satisfy the functionality of Personal Computer or Laptops.
Palmtop: Palmtops are very small in size devices Which includes input and output function.
Users can attach mouse or keyboard They can perform each and every task or operation as
Personal Computer or Laptop. They have a graphical screen where a client can do all the
functions, for example, sending emails, office works, and communication inside in a little
package. These are the Different computer types which are utilized or used as a part of gigantic
numbers around the world

E-mail: [email protected] Phone Numb: 07032955803 5


Internal Components of Computer System
Internal is a term used to describe a device that is installed in the computer and it can also
be refers as any devices that is inside the computer which are:
 Motherboard
 Processors (CPU)
 RAM Modules
 Optical Drive
 Hard Drive
 Heat Sink
 Floppy Drive
 System Fan
 Power Supply
 Sound card
 Video card
 Network card

Motherboard CD-ROM
The motherboard is the
main circuit board of a
A CD-ROM drive reads
computer. All computer information stored in
components attached compact discs (CDs)
to the motherboard.

Processor CPU Hard Drive

The CPU processes A hard drive is the


instructions, performs primary device that a
calculations and computer uses to
manages the flow of store information
information through a
computer.
Random Access Memory Heat sink
(RAM) RAM temporarily A heat sink is a device
stores information
that incorporates a fan
inside a computer. The
to reduce the
Information is lost when
computer is turned off. temperature of a
hardware component
(e.g. processor)

E-mail: [email protected] Phone Numb: 07032955803 6


Floppy Drive Sound Card
A sound card is an
A floppy drive stores
expansion card or IC for
and retrieves producing sound on a
information on floppy computer that can be
disks. heard through speakers
or headphones.

System Fan Video card


A fan is a hardware known as a display adapter,
device that keeps the graphics card, video
overall computer device adapter, video board, or
cool by circulating air to video controller, a video
or from the computer or card is an expansion that
component. connects to a computer
motherboard.

Power Supply Network Card


A NIC is a computer
A power supply
expansion for connecting
changes normal to a network (e.g., home
household electricity network or Internet) using
into electricity that a an Ethernet cable with
computer can use. an RJ-45 connector.

The internal components of a computer system consist of the hardware required to store
and process data, and communicate with external devices, such as the input (e.g. keyboard,
mouse), output (e.g. screen, printer), and external storage devices (e.g. USB flash drive). The
External devices that are portable are also called peripheral devices or peripherals.
The main internal components of a computer system are:
 Processor
 Main memory
 Input/output (I/O) controllers
 Buses: Address bus, data bus, and control bus.
 Processor: Sometimes referred to as the CPU (central processing unit), is the part of the
computer that processes data by executing the instructions of stored programs. At processor
level, these will be low-level instructions in the form of machine code that the processor has
been designed to handle, based on a specific instruction set. For the processor to be able to
execute a program, the program instructions need to be transferred from the secondary
storage to the main memory from where they can be fetched and executed. The data that
needs to be processed is also loaded into the main memory (from secondary storage) or
provided by the input and output devices via the I/O controllers.

E-mail: [email protected] Phone Numb: 07032955803 7


 Main memory: is memory that can be accessed directly by the processor. The main
memory consists of memory locations where instructions or data are stored as binary
sequences. Each memory location has a physical address, which is a number used to locate
that memory location and access its contents.
There are two types of main memory:
 Volatile memory: This type of main memory loses its contents when power is removed.
Example of Volatile memory is Random Access Memory (RAM).
Random Access Memory is a volatile memory that has addressable locations. Each location
can be accessed randomly, so any instruction or data can be placed in any location (overwriting
whatever it previously contained).
 Non-volatile memory: which keeps its contents even without power. Example of non-
volatile memory is Read Only memory (ROM).
Read Only Memory: is a non-volatile memory, and also distinct from secondary storage, which
the processor can't work with directly.
Input/output (I/O) controllers: All external devices are connected through I/O controllers.
These provide the mechanism for input data to be received for processing and the results of
computation can be output from the system using the relevant I/O device(s). I/O controllers
provide a set of addressable registers that the processor can access to communicate with the
I/O devices. For example, the characters entered using a keyboard would be stored in an I/O
controller that the processor can access and process, such as display on a screen.
However, it is not favorable for peripheral devices to be directly attached to the processor.
Each device operates in a different way, at different speeds, and using different electronic
signals. An I/O controller can be described as an interface between the core computer system
and its peripherals, but peripheral device has a cable or connector to be connected to the
port or A physical port (e.g. a USB port used to connect a keyboard or a mouse to a computer).
The I/O controller circuitry facilitates the exchange of data in the form of electrical signals
between the processor and the peripheral. The controller then translates the signals into the
correct form. The peripheral device almost certainly operates at a much slower speed than the
processor. The interface provides a buffer so that the disparate timing requirements can be
satisfied.
When a new peripheral is added, a device driver is also needed. This is a piece of software
that provides a software interface for the peripheral device, which enables the operating
systems to access the functions of the hardware without having to be configured specifically
for every device that is used. Many devices are now 'plug and play' which means that the
driver is either embedded or automatically downloaded when the hardware is connected.

E-mail: [email protected] Phone Numb: 07032955803 8


 BUSES: The different units of a computer system are connected together using buses. An
internal bus typically consists of a set of parallel connections that allow internal components
to communicate with each other and exchange data. For example, in order to execute
instructions and process data, the processor needs to communicate with the main memory
and with the input and output devices. There are also external buses that are used to connect
the peripherals to the processor in a serial or parallel way. Different types of hardware are
used to implement the various types of internal and external buses depending on their
intended use, for example wires, electronic pathways, and tracks on printed circuits.
Type of Buses
In this model architecture, a computer has three main types of buses: the address, data, and
control bus. Each one serves a specific purpose and is used for a specific type of data. The
address, data, and control bus together are known as system bus. The system bus is used to
connect the processor (CPU) and main memory (RAM).
Address bus: The address bus is used to specify the address of a memory location to either
read (i.e. load) data from or write (i.e. store) data to that memory location.
Data bus: The data bus is used to transfer data and instructions to and from the processor
and the other units of a computer system.
Control bus: The control bus is used to send control signals that manage and orchestrate
the operations that take place inside a computer system. This includes exchanging status
signals between the components of the computer system, and transmitting clock signals
required for the coordination of operations.

What is Computer Peripherals


Computer peripherals are the Devices which are connected to the computer but they are not
the core computer architecture. Core Computer Architecture mainly consist of Computer
Motherboard, Central Processing Unit (CPU), power supply, memory [RAM], Hard disk,
Computer case or Cabinet and Various other etc.
Computer Peripherals can be defined as the devices which can be easily removed and
plugged into personal computer system. Just as mouse you can remove it any time and
change it with ease. same for keyboard. But in laptop it is difficult to remove because it is
built inside the case
Types of Computer Peripheral Devices
Computer peripheral can be classifying into three parts which are:
 Input device
 Output device
 Other device or external device

E-mail: [email protected] Phone Numb: 07032955803 9


 Input Devices: Is any peripheral (piece of computer hardware equipment to provide data
and control signals to an information processing system such as a computer or other
information appliance. Input device Translate data from form that humans understand to one
that the computer can work with. Most common are keyboard and mouse

Examples of Input Devices


1. Keyboard 8. MIDI keyboard 15. Trackballs
2. Mouse (pointing device) 9. Optical Mark Rader (OMR) 16. Barcode reader
3. Microphone 10. Graphics Tablets 17. Digital camera
4. Touch screen 11. Cameras 18. Joystick
5. Scanner 12. Pen Input 19. Gamepad
6. Webcam 13. Video Capture Hardware 20. Electronic Whiteboard
7. Touchpads 14. Microphone 21. Optical Character Rader

 Output devices: An output device is any piece of computer hardware equipment used to
communicate the results of data processing carried out by an information processing system
(such as a computer) which converts the electronically generated information into human
readable form.

E-mail: [email protected] Phone Numb: 07032955803 10


Examples of Output Devices
1. Monitor 2. LCD Projection Panels
3. Printers 4. Computer Output Microfilm (COM
5. Plotters 6. Speaker(s)
7. Projector
Note Basic types of monitors are a. Cathode Ray Tube (CRT). B. Liquid Crystal Displays (LCD). c. light-
emitting diode (LED). Printer types: 1-Laser Printer. 2-Ink Jet Printer. 3-Dot Matrix Printer
Examples of External Devices
 External hard drives
 Flash Drives
 Media card readers
 Digital camcorders
 Digital mixers
 MIDI equipment
Note: There are some computer peripherals which are used both as input and output
devices.

E-mail: [email protected] Phone Numb: 07032955803 11


CHAPTER TWO: Files and Directories
Introduction
It may be easier to explain directories structure with an analogy or comparing. So think of
your computer as a large file room, filled with file cabinets. Each file cabinet contains folders
and files. This is the basic idea of directories. Directories are very similar to file cabinets. They
can hold subdirectories and files.
Folders are also called "directories," and they are created on the hard drive (HD) or solid state
drive (SSD) when the operating system and applications are installed. Files are always stored
in folders. In fact, even the computer's desktop is a special kind of folder that displays its
contents across the screen (see desktop).
Note in this chapter you will Understand how to work with files and folders, is very important
item of using a computer. Once you understand how files and folder work, you'll use them all the
time. In this lesson, we'll show you the absolute basics of working with files, including how
to open files, move your files into folders, and delete files

 What is a file: is very much like a typed document that you might find on someone's
desk or in a filing cabinet; it's an item that contains a collection of related information.
Microsoft Windows environment. A file can be a word, spreadsheet, drawing, music or
application program. A Windows file name can have up to 260 characters. A Windows file
usually has a file extension, which helps Windows understand what type it is and how to read
it. A regular word-processing file with a ".txt" file extension may invoke a Windows Notepad
or WordPad program to open it. A picture file with a JPG file extension may invoke a Windows
picture-viewer program. In naming a Windows file, you should avoid these characters: \, /: *,
", >, < and |.
Examples of Files Program Icons
Here are some examples of files and the program icons that represent them:
PDF document (Adobe Reader)

Advertising Brochure (Publisher)

Text document (Word)

Monthly statistics table (Excel)

E-mail: [email protected] Phone Numb: 07032955803 12


 What is a folder: A folder is a bin or container where files are collected and organized for
easier access. If you put thousands of paper files on someone's desk, it would be virtually
impossible to find any particular one when you needed it. That's why people often store paper
files in folders inside a filing cabinet. Arranging files into logical groups makes it easy to locate
any particular file.
However, windows use folders to help you organize files. You can put files inside a folder,
just like you would put documents inside a real folder. Not only do folders hold files, but they
also can hold other folders. A folder within a folder is usually called a subfolder. You can
create any number of subfolders, and each can hold any number of files and additional
subfolders.
Examples of Folder Icons
Here are some examples of Folder icons them:

What is File Explorer: Is a file that view and organize files and folders using a built-in
application known as File Explorer (called Windows Explorer in Windows 7 and earlier
versions).
 How to Open File Explorer
To open File Explorer, click the File Explorer icon on the taskbar, or double-click any folder
on your desktop. A new File Explorer
window will appear. Now you're ready to
start working with your files and folders.

From File Explorer, double-click a folder to open it. You can then see all of the files stored
in that folder.

E-mail: [email protected] Phone Numb: 07032955803 13


Notice that you can also see the location of a folder in the address bar near the top of the
window

 To Open a File:
There are two main ways to open a file:
Find the file on your computer and double-click it. This will open the file in its default
application. In our example, we'll open a Microsoft Word document (BdayInvites.docx),
which will open in Microsoft Word.
Open the application, then use the application to open the file. Once the application is
open, you can go to the File menu at the top of the window
and select Open.
 Moving and deleting files
As you begin using your computer, you will start to collect
more and more files, which can make it more difficult to find
the files you need. Fortunately, Windows allows you
to move files to different folders and delete files you no
longer use.
 To Move a File:
It's easy to move a file from one location to another. For example, you might have a file on
the desktop that you want to move to your Documents folder.
Follow the steps below to move a file:
1. Click and drag the file to the desired location.
2. Release the mouse. The file will appear in the new location. In this example, we have opened
the folder to see the file in its new location.
Note: You can use this same technique to move an entire folder. Note that moving a folder
will also move all of the files within that folder.

E-mail: [email protected] Phone Numb: 07032955803 14


 To Create a New folder:
1. Within File Explorer, locate and select the New folder button. You can also right-click where
you want the folder to appear, then select New >
Folder.
2. The new folder will appear. Type the
desired name for the folder and press Enter. In our
example, we'll call it School Documents.
3. The new folder will be created. You can now
move files into this folder.
 To Rename a File or Folder:
You can change the name of any file or folder. A unique name will make it easier to remember
what type of information is saved in the file or folder.
1. Click the file or folder, wait about one second, and click again. An editable text field will
appear.
2. Type the desired name on your keyboard
and press Enter. The name will be changed.
 You can also right-click the folder and
select Rename from the menu that appears.

To Delete a File or Folder:


If you no longer need to use a file, you can delete it. When you delete a file, it is moved to
the Recycle Bin. If you change your mind, you can move the file from the Recycle Bin back
to its original location. If you're sure you want to permanently delete the file, you will need
to empty the Recycle Bin.
1. Click and drag the file to the Recycle Bin icon on the desktop. You can also click the file
to select it and press the Delete key on your keyboard.
2. To permanently delete the file, right-click the Recycle Bin icon and select Empty Recycle
Bin. All files in the Recycle Bin will be permanently deleted.
Note that deleting a folder will also delete all of the files within that
folder.

E-mail: [email protected] Phone Numb: 07032955803 15


 Adjusting your Windows Settings
At some point, you may want to adjust your computer's settings. For example, you might
want to change your desktop background or modify your Internet settings. You can change
these settings and more from the Control Panel.
However, in Windows 10, the Control Panel has mostly been replaced by the Settings app.
The Control Panel is still available, but most of the tasks and settings are now also located in
the Settings app.
 To Open the Settings app (Windows 10):
1. Click the Start button, then select the gear icon.

 To open the Control Panel (Windows 10):


Right-click the Start button, then select Control Panel.
 To open the Control Panel (Windows 8):
In Windows 8, you can open the
Control Panel directly from the
Start screen. Using your keyboard,
type Control Panel and press
the Enter key.

 To Open the Control Panel (Windows 7 and earlier):


1. Click the Start button, then select Control Panel.
2. The Control Panel will appear. Simply click a setting to
adjust it. In this example, we'll click Change desktop
background to choose a new wallpaper for our desktop.

E-mail: [email protected] Phone Numb: 07032955803 16


CHAPTER THREE: All About the Internet
Introduction
Networking, also known as computer networking, is the practice of transporting and
exchanging data between nodes over a shared medium in an information system. Networking
comprises not only the design, construction and use of a network, but also the management,
maintenance and operation of the network infrastructure, software and policies.
Computer networking enables devices and endpoints or end devices to be connected to each
other on a local area network (LAN) or to a larger network, such as the internet or a private
wide area network (WAN). This is an essential function for service providers, businesses and
consumers worldwide to share resources, use or offer services, and communicate. Networking
facilitates everything from telephone calls to text messaging to streaming video to the internet
of things (IoT).

Important Components of the Computer Network


When learning computer networking, this should be your first topic. A computer is built from
the four important components which are: End devices, Media, Protocols and Networking
devices. Let’s understand each of these components.
1. End devices: An end device is the device that sends or receives the data or service in the
network. An end device might be a PC, Laptop, Smartphone or any other device that is capable
of the sending and receiving data the data and connected with the network. To build a
network, at least two end devices are required.
However, end devices are categorized in two types which are; server & Client end device
 Server end device: Is the device which provides data or service.
 Client end device: Is the device which receives the offered data or service from the server
end device.
2. Media: The media provides connectivity between the end devices. Unless end devices are
connected through any kind of media, they cannot exchange data or service.
However, there are two types of media; wired media and Wireless media.
 Wired media: This requires the use of a physical transferred of data through cables.
The wired cable connection is called Ethernet.
wired media cables are categorized into three which are;
1. Coaxial cable: There are several types of coaxial cable which are 10Base5 (thicknet), 10Base2
(Thicknet), RG-59 (cable TV), RG-6 (better than RG-59)
2. Twisted-pair cables: The are terminated with an RJ-45 connector. The twisted-pair cables
come in two types: Unshielded Twisted-pair (UTP) and Shielded Twisted-pair (STP)
3. Fiber-optic cables: this types of cable are classified into two types

E-mail: [email protected] Phone Numb: 07032955803 17


 Single-mode fiber (SMF)- This type of fiber cable uses lasers to send a single ray of light that
can travel hundreds of kilometers.
 Multimode fiber(MMF)- Also in this type of fiber cable uses LEDs to send multiple light signals
that can travel up to 550 meters.
 Wireless media: This requires the uses radio waves to transferred data over the air enabling
devices to connected to a network without any cable. Wireless networks use Wi-fi as the data
link protocol. Other wireless networking options are being developed for the IOT (Internet of
things). Other alternatives devices that can connect without using cable but radio waves are:
microwave, satellite, cellular and Bluetooth etc.
Differences Between Wired and Wireless Media:
 Wired media: The wired media network offers greater speed, reliability and security
compared to wireless media. Whereas
 Wireless media: The wireless media network tends to provide more flexibility, mobility and
scalability.
3. Protocols: Can be defines as a set of rules that govern how computers talk to each other.
Or A protocol is a set of predefined rules that specifies standards for a particular stage or all
stages of the communication between two or more end devices.
There are some of the common functions performed by the protocols.
 Initializing and terminating the communication process

 Performing encryption and compression before sending the data

 Packing data in such a format that it can travel in the network

 Providing logical addressing

 Performing error correction

 Performing authentication

Two popular networking models; OSI model and TCP/IP model describe the functionalities of
the most common protocols. Both models divide the entire communication process in logical
layers.
How the Protocols Layers works
The OSI uses a 7-layer model and TCP/IP networks use a 4-layer model. Because TCP/IP
networks are the most common and important one to understand. The levels are:
 Data link level – e.g. Ethernet, Wi-Fi

 Networking e.g. IP, – IPv4 Address classes and subnet ting and IPv6

 Transport level e.g. TCP, UDP

 Application level – e.g. HTTP

E-mail: [email protected] Phone Numb: 07032955803 18


4. Networking device: A networking device works between the end devices. It controls and
forwards the flow of data. Based on the functionalities, a networking device can be categorized
in three types; forwarding device, connecting device and the securing device.
 Forwarding device: A forwarding device forwards the data. This device usually has multiple
ports which are used to connect more than two end devices in a single network. Hub, bridge
and Ethernet switch provide this functionality.
 Connecting device: A connecting device connects two or more different types of media
and protocols. If two end devices are located in the different logical networks or connected
through the different types of media, they need a connecting device to exchange the data.
Router and Multilayer switch provide this functionality.
 Securing device: A securing device secures the data from unauthorized access. When data
packet arrives to it, based on pre-defined rules it performs security checks and takes the
forwarding decision. Common devices which provide this functionality are the Firewall and
NAT.
Classification of the computer network
Once you learned the important components of the network, this should be your next topic.
Computer networks are mainly categorized based on the geographical location, access types
and relationship between end devices.
 Based on the geographical location
Based on the geographical coverage, the network is classified into three types;
 Local Area Network: Is a computer network covering a small Networks geographical area
like a home, office or groups of buildings e.g. a school Network.
 Metropolitan Area Network (MAN): Is a larger computer network that spans a city or
campus. They typically use wireless infrastructure or optical fiber connections to link their sites.
 Wide Area Networks (WAN): Is a network system connecting cities, countries or continents,
a network that uses routers and public communication links.
 Based on the Access Type
On the basis of allowing users to access network resources, the network is classified into three
types; Intranet, Extranet and Internet.
 Intranet: An Intranet is a private network. In this network, external users are not allowed
to access the network resources.
 Extranet: An Extranet is also a private network. But in this network, after proper
authorization, external users are allowed to access a small portion of the network.
 Internet: The Internet is the public network. Any user can connect with this network.

E-mail: [email protected] Phone Numb: 07032955803 19


 Based on the Relationship Between the End Devices
Based on how the end devices access each other, the network is categorized in two types;
peer to peer network and clients/server network.
 Peer to Peer: Is a network were all end devices have equal rights. In another words, peer
to peer is a network that all nodes are equal and any node can talk to any other node.
 No node has any special role. This was the original networking model of windows
networking. (windows for Workgroups)- Diagram below: -
 Client Server: In this type of network server, decides which client will have what rights.
Also, in other word a Client Server network is a server that has a special role e.g. file
server, domain controller, web server etc. A client connects to a server to use the appropriate
services. This is the networking model used on the web and the Internet and on modern
large Windows networks. -Diagram below: -

What is a Browse
A browser is software that is used to access the internet. A browser lets you visit websites
and do activities within them like login, view multimedia, link from one site to another, visit
one page from another, print, send and receive email, among many other activities. The most
common browser software titles on the market are: Microsoft Internet Explorer, Google's
Chrome, Mozilla Firefox, Apple's Safari, and Opera. Browser availability depends on the
operating system your computer is using (for example: Microsoft Windows, Linux, Ubuntu,
Mac OS, among others).

E-mail: [email protected] Phone Numb: 07032955803 20


What a Browser Needs to Connect to Internet
 A browser needs a computer, smartphone, or tablet that meets the system requirements
and a workable computer system, so it can allow it to connect to other computers internet.
 A modem or telephone line/Wireless radio (antenna)
 An Internet Service Provider (ISP)
What Happens When You First Open a Browser
When you first open your Internet browser, if you're connected to the Internet it loads your
homepage or show a start screen with your favorite pages. Once open, you can browse the
Internet by following hyperlinks or use a search engine to search for what you would like to
find.
What is my Browser, IP Address and Host Name
Your particular browser you are using now (also known as "user agent") is "Mozilla/5.0
(Linux; Android 7.0; TECNO WX3) Apple WebKit/537.36 (KHTML, like Gecko)
Chrome/80.0.3987.99 Mobile Safari/537.36"
Your Internet Protocol (IP) Address is 102.89.2.243
Your Hostname is 102.89.2.243
How to Open Google's Chrome
Note: Before you start browser form your home or office, you should make sure that your
computer, your modem, telephone line/Wireless radio (antenna) and or smartphone hotspot
have being connected to the internet and you want to browse, the first thing to do is to start
a web browser.
To start a browser (e.g. Google’s Chrome) follows this step.
Double Click on the desktop icon Google’s Chrome) or any browser you wish is the best for
your browser open than
Click on the taskbar button to open the browser.
Searching for Information on the Internet
In this section you will learn how to search for information through the
internet using search engine. A search engine is a web server that collects
data from other web servers and puts it into a database (much like an index), it provides links
to pages that contain the object of your search. Also search engine is a program or web site
that enables users to search for web by using keywords throughout the search for the
information on the internet.

E-mail: [email protected] Phone Numb: 07032955803 21


There a difference types of search engine, among them
are: google.com, yahoo.com, Ask.com, about.com,
msn.com, bing.com and facebook.com etc. A search
engine like I say is a program or web site that can enable
users to search for information by using keywords for
performing the search. You can also use phrases or more
the one word to perform your search. Let’s learn in the
following practical how to search for information using search engine.
How to search for Information on the Internet Using a Search Engine
1. Open Google’s Chrome.
2. Click in the box of the Address bar and erase the content inside.
3. Type on the address bar www.google.com and they press the Enter key on your keyboard.
Or click on the Arrow button at the end of the address bar.
Note: Google has a built in search engine, look at the Google screen you will find a text field
at the centre of the screen with a search button.
What is E-Mail
E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication.
E-mail can be distributed to lists of people as well as to individuals. However, you can also
send non-text files, such as graphic images and sound files, as attachments sent in binary
streams.
Who are Webmail providers
Today, the top three webmail providers are Yahoo!, Microsoft'sOutlook.com (previously
Hotmail), and Google's Gmail. These providers are popular because they
allow you to access your email account from anywhere with an Internet
connection. You can also access webmail on your mobile device.
Other email providers
Many people also have an email address hosted by their company, school, or organization.
These email addresses are usually for professional purposes. For example, the people who
work for this website have email addresses that end with @gcflearnfree.org. If you are part
of an organization that hosts your email, they'll show you how to access it.
However, many hosted web domains end with a suffix other than .com. Depending on the
organization, your provider's domain might end with a suffix like .gov (for government
websites), .edu (for schools), .mil (for military branches), or .org (for nonprofit
organizations).

E-mail: [email protected] Phone Numb: 07032955803 22


CHAPTER FOUR: Exploring the Human Network

Introduction
Social media platforms create an excellent opportunity for you to expand your reach online
and capture more leads, learn more about your audience, and generate sales. There are various
types of social media platforms you can use, you’ll open up opportunities to reach more
members of your target audience.
As a social media pro, you probably already use all the biggest social networks such as
(Facebook, Twitter, LinkedIn) and media sharing sites (Instagram, YouTube, Snapchat), along
with maybe a handful of others like Pinterest and Google Plus. But there’s much more to social
media account than the top social media and media sharing networks. Let look beyond those
social media account. In this lesson, we’ll review the five types of social media account and
provide examples too.
Types of Social Media
These are the five types of social media we’ll cover in this Lesson are:
1. Social networks 2. Media sharing networks
3. Social blogging networks 4. Discussion networks
5. Review networks
1. Social networks: One of the most well-known types of social media is social networks.
This type of networks allows users to connect with people and brands online. Social networks
can help you:
 Build brand awareness
 Generate new leads
 Build relationships with customers
 Provide customer service and more
Many people call social networks “relationship platforms” because they allow people to
connect and build a relationship. You can share information, photos, videos, and more through
these sites. These platforms focus on sharing knowledge and connecting with people.
Let’s take a look at three of the most popular types of social networks:
 Facebook: With over 2.3 billion monthly active users, Facebook is one of the most popular
social networks available to your business. Many people use these platforms to connect with
family, friends, and brands. For your company, Facebook offers an excellent opportunity to
connect with your audience. In your Facebook You can share status updates, such as Photos,
Videos, Links to content and Polls. Facebook also offers paid advertisements that allow you to
attract new followers to help grow your business.

E-mail: [email protected] Phone Numb: 07032955803 23


 Twitter: Twitter has over 326 million monthly active users. This platform is used similarly
to Facebook, with users posting photos, videos, status updates, links, polls, and more.
The most significant distinction between these social networks is the size of the message.
Twitter’s unique attribute is that you only have 280 characters for each of your messages. This
limit means that you need to get to the point with what you’re trying to say. Twitter also
offers paid advertisements for your business. You can run a multitude of different ads to gain
new followers and earn conversions for your business.
 LinkedIn: LinkedIn boasts over 610 million users in more than 200 million countries and
territories. This social network is a great place for professionals to connect. It’s an excellent
platform for building professional relationships, sharing information, finding new jobs, and
recruiting new candidates. You can also advertise to people who use LinkedIn. It’s a great
place to target professionals interested in your business.
2. Media sharing networks: If you’re looking for one of the most visual types of social media
platforms, which you can create different types of social media campaigns through these social
media site, in these media sharing networks focus on sharing photos and videos. Many people
are visual learners. These media sharing networks are a great place for your business to share
visual content and engage your audience.
Let’s take a look at three social media options for media sharing networks:
 Instagram: The Instagram has over 1 billion active monthly users, Instagram is a great
place to share photos and videos. This type of social media platform allows you to give a
visual insight into your business. You can get creative and share inspiring images and video.
Instagram is great when you’re running different types of social media campaigns. You can
promote your products or services and provide your audience with a great visual
representation of your brand. Also, Instagram offers advertising options for your business, too.
You can use photos and videos to advertise to interested leads. It’s a great way to reach
people and gain new followers and sales.
 Pinterest: Has over 250 million monthly active users that use this visually-focused site. This
media sharing network focuses mostly on sharing and pinning photos. Users pin these photos
to their boards and can refer back to them later.
This media platform is excellent for sharing creative ideas, as well as your products. You can
share photos that link to blog posts, recipes, DIY ideas, and more. It’s essential to keep in
mind that you’re on a creative platform, so you want to ensure your posts fit the creative
theme. If you owned a flower shop, for example, you could post pictures of your arrangements
or create pins where people can buy your arrangements. In comparison, a pizza shop could

E-mail: [email protected] Phone Numb: 07032955803 24


share photos of their pizza or how-to posts for creating a pizza. Overall, Pinterest is a great
media platform for helping you connect with leads.
 YouTube: Has over 1.8 billion monthly logged-in users on its platform. Additionally,
YouTube is the second-largest search engine in the world. People actively search for videos
and watch them on this platform. If you’re looking to engage people through videos, YouTube
is an excellent channel for it. This media platform allows you to create videos and share them
anywhere. It’s a unique opportunity for you to build brand awareness and engage your
audience.
3. Social blogging networks: Blogging networks allow you to publish content for your
audience and help them discover it. This type of social media is a great way to build
engagement and get people familiar with your business. The social blogging networks is one
of the more unique types of social media because they require creating constant content to
publish. While they increase visibility, brand awareness, and generate leads, they need more
work than other social platforms.
Let’s look at two examples of social blogging networks you can use:
 Tumblr: Is one of the most popular blogging platforms, with over 425.7 million accounts.
Many people use Tumblr to share information, photos, and videos.
This social media site isn’t your typical blogging site, though.
While you can post long-form content, many people use Tumblr to share photos, videos, and
other exciting content. You may need a balance of content on yours to help increase
engagement.
Medium: Is a great blogging platform that covers various topics around the web. This platform
is open to bloggers of all skill levels, whether you’re just starting to blog or have been blogging
for years.
This social blogging platform helps you reach new readers and help them get to know your
brand. If you’re looking to improve your content to reach more people, Medium is a great
starting point.
4. Discussion networks: Are another specific type of social media platform. These social
platforms focus on discussing news, information, and opinions. People see content threads
and join them to see what people are commenting or saying.
These networks are an excellent way for you to do market research. You can learn a lot about
your audience by looking at what they say about your brand on these forums. Even if you
have a lesser-known brand, you can still see what people are saying about different topics in
your industry.

E-mail: [email protected] Phone Numb: 07032955803 25


When you use discussion networks, you can learn what people talk about when it comes to
your business or industry. You can gain a greater understanding of how customers perceive
your business or products. Many people turn to these forums for answers or to see if people
have similar problems.
There are two main discussion networks you can use:
 Reddit: Is a popular discussion network you may want to use. People post about topics
that vary from finance to politics to funny videos. This forum features communities known as
“subreddits.” Each of these communities covers a different topic. When you enter each
subreddit, you can see information on the subject and see what people are posting.
If you use Reddit, you can monitor different subreddits related to your business or industry to
understand how your customers and audience perceive your company and market. You can
also learn common questions or concerns.
 Quora: Is another discussion forum you can use for your business. This discussion forum
allows you to get involved with questions people ask on the web. When people use Quora,
they ask questions that people from the Quora community can answer. This format allows you
to answer questions related to your industry and provide your audience with the knowledge
they seek. If you want to build brand exposure through spreading knowledge, Quora is a great
social media platform for that. This platform will allow you to answer industry-related questions
and help people get the information they need.
5. Review networks: When you’re running different types of social media campaigns, it’s
essential to know which sites are influenced solely by users. Review networks are a prime
example of social websites that impact your audience but depend 100% on them. Review
networks allow people to find, review, and share information about brands and their products.
When you have good reviews, these platforms can bring positive social proof to your business
and its claims.
When you look at reviews, you understand how people perceive your brand. It’s an excellent
way for you to understand their opinion and improve their experience.
Let’s look at two reviews sites you’ll want to monitor:
 Yelp: Is a review platform where people can share their opinions and experiences with a
business. This platform allows users to search for any company and find what people in the
community are saying. Businesses can’t pay to remove or alter reviews, so all positive and
negative posts remain on this site.
When you’re on this website, look at the reviews for your company and see what people are
saying. It’s a helpful way for you to understand what your audience thinks of your business.
You can use this as an opportunity for you to improve your audience’s experience.

E-mail: [email protected] Phone Numb: 07032955803 26


 Glassdoor: This type social media allows you to see what employees say about your
business. You can see the pros, cons, and advice to management. Glassdoor enables you to
comment on these reviews, too.
By using Glassdoor, you’ll understand your employees’ likes and dislikes about your company.
It will put you on the fast track to improving their experience. When employees have a better
experience with your company, your customers will have a better experience, too.
Getting started with Email
You should now have a good understanding of what email is all about. Over the previous
chapter, we discuss about what is e-mail, who are Webmail providers and other email provider.
In this chapter we are going to talk about how to create and managed E-mail account and
others social media account too.
Setting up your Own Email Account
If you want to sign up for your own email account, we suggest choosing from one of the
three major webmail providers.
 Yahoo! Mail: Click Create Account
 Outlook.com: Click Sign up
 Gmail: Click Create an account. Click on this link Setting Up a Gmail Account for help)
Follow this step to Log onto any one of the free e-mail services available on the Internet. The
examples in this handout will illustrate the Gmail Service. You can access this account on any
computer that has Internet access by connecting to the web site gmail.com
 Connect to the Internet.
 Go to gmail.com
 Look for the button or link that directs you to create a new account.
 Create a unique username and password for your account. Complete additional registration
information as required.
Other Registration Form Details
1. If any portion of the registration form includes automatic selections that you do not want
to be applied to your e-mail account, make sure that you un-select the option by clicking in
any boxes that might be checked.
2. You may be asked to type a code verification several times to help prevent automated
registrations.
3. Be certain to read any terms of service, end user licensing agreement, privacy policies. These
statements will detail how your account information will be used. For example, “will my account
information be shared with advertisers or partnering services?”

E-mail: [email protected] Phone Numb: 07032955803 27


Sign in to Your Account
1. Make your connection to the Internet as you normally would.
2. Go to the e-mail provider’s web site (e.g. gmail.com).
3. Enter your username, or e-mail address on the first screen, and click “Next”
4. Enter your password on the next screen, and then click “Next.”

NOTE: Some Internet services (like free web e-mail) will offer to “remember your ID on this
computer” or “stay signed in”. Do not select this option if the computer you are using is in a
very public place and could potentially be used my several people (e.g. a public library). This
could make your account more vulnerable to someone trying to gain access to it and your
personal information.
Composing an E-mail Message
1. Click on the Compose button in the top left corner of the page.
Note: Tap the Tab key to move to the next field or click in the appropriate box. The blinking
cursor indicates that you can begin typing.
2. Enter the recipient’s e-mail address. If sending to multiple people, separate e-mail addresses
with a comma. And
3. Enter a subject.
4. Type your message in the empty white area.
5. Click the Send button when finished with your message

E-mail: [email protected] Phone Numb: 07032955803 28


Reading Your Mail
To read your mail, you must go to your Inbox. It is similar to retrieving your mail from your
postal mail box at home. The Inbox includes new messages that you have not yet read and
older messages that you may not have deleted or moved out of the Inbox. Messages will
remain in your Inbox until you delete them or move them to another folder.

1. Click Inbox in the pane on the left. The number in parentheses represents
the number of unread messages that you have.
2. Point your mouse pointer over either the subject line or the sender’s name
(right on the text) and click. The message will open. (Note: The bold text
indicates an unread message).
How to Reply a Message
Note: Open a message by clicking on its subject, and then click the Reply button at the top
left of the screen.
1. While looking at the message, click “reply” at the bottom of the email to reply only to
sender of the e-mail. If there are multiple recipients included in the email, the option to “Reply
to all” will appear. “Reply to all” will include everyone included in the original email in your
response. There is also reply button, and a drop-down arrow at the top right of the message
that will give you the option to reply.
2. Type your reply at the blinking cursor, and click send when finished.
How to Forward a Message
Note: To sends a message to the people who are not listed in the original distribution list.
Open a message by clicking on its subject, and then click the Forward button. You can also
use the drop-down menu next to the reply button at the top right of the message to forward
an email.
1. When viewing the message, click Forward.
2. Enter any recipients in the recipients/to: field.
3. Add your own message at the blinking cursor. The sender’s original message will appear
beneath.
4. Click the Send button when finished.

E-mail: [email protected] Phone Numb: 07032955803 29


How to Printing an E-mail Message
Open the message, and then click the print icon at the top right, above the message, or select
print from the drop-down menu at the top right of the message. A new
window will open and the print dialogue box will pop up
automatically. At that point, you will choose your printing options.

NOTE: If you have a pop-up blocker enabled, you may have to disable it first.
Your web browser should give you a notification when a pop-up is blocked.

How to Delete a Message After Reading


Note: After you open the message, the option to delete will appear at the top of the message,
above the subject of the email message (The trash can icon). You can also select the folder
icon to “move to”, then select “trash” to move the email to the trash folder.

NOTE: In most instances, deleting a message from your Inbox will not remove the message from
your account. The deleted message is moved to your “Trash”, or equivalent folder. Most services
will automatically clear deleted messages from your account after a pre-determined amount of
time (usually 30 days).
How to Delete a Message without Opening
There are times you might want to delete a message without reading it. If you don’t recognize
the sender or if a message looks like junk mail (spam), it is highly recommended that you
delete the message without opening it. Select the checkbox to the left of any item that you
want to remove, and click delete. Click the checkbox at the top to select all items.

Note: An important information, if you do not recognize an e-mail sender’s name or e-mail
address, use the delete feature before opening the message. This is recommended for preventing
the spread of viruses through your e-mail account.

E-mail: [email protected] Phone Numb: 07032955803 30


Introduction
Facebook is a social networking site, that makes it easy for you to connect and share with
family and friends online. Originally designed for college students, Facebook was created in
2004 by Mark Zuckerberg while he was enrolled at Harvard University. By 2006, anyone over
the age of 13 with a valid email address could join Facebook. Today, Facebook is the world's
largest social network, with more than 1 billion users worldwide.
Why use Facebook
Have you ever wondered why people like using Facebook, after all there are already a lot of
other ways to communicate online, like through email, instant messaging, and so on. What
makes Facebook unique is the ability to connect and share with the people you care about
at the same time.
However, Facebook account is now an expected part of being online, much like having your
own email address. And because Facebook is so popular, other websites have worked
to integrate Facebook. This means you can use a single Facebook account to sign in to
different services across the Web.
How does Facebook share work:
Facebook allows you to send messages and post status updates to keep in touch with friends
and family. You can also share different types of content, like photos and links. But sharing
something on Facebook is a bit different from other types of online communication. Unlike
email or instant messaging, which are relatively private, the things you share on Facebook
are more public, which means they'll usually be seen by many other people. While Facebook
offers privacy tools to help you limit who can see the things you share, it's important to
understand that Facebook is designed to be more open and social than traditional
communication tools. We'll talk more about sharing and controlling your privacy in our lessons
on Facebook privacy and adjusting privacy settings.
How to Creating a Facebook account
Before you can use Facebook, you must create an account. Creating a Facebook account is
free. All you need to get started is an email address or a Phone contact and a few minutes of
your time.
To create a Facebook account:
1. Navigate to www.facebook.com in your web browser.
2. Under the words Sign Up, enter your personal information and desired password, then
click Sign Up.

E-mail: [email protected] Phone Numb: 07032955803 31


1. You can then follow the directions on the screen to find friends, upload a profile picture,
learn about privacy settings, and more.
Before you can access all of Facebook's features, you'll need
to confirm your email address. To do this, sign in to your
email account, open the confirmation message from
Facebook, and click Confirm Your Account.

Facebook for Mobile


Devices
Facebook makes it easy to connect on the go. In fact, most Facebook users primarily access
the site from a mobile device. Facebook offers an official mobile app on a variety of
smartphones and tablets, including iOS and Android. You can use the mobile app to do just
about everything you can do in the desktop version of Facebook: post status updates and
pictures, read stories and updates, and chat with friends.
Note: If you don't have a smartphone, you may be able to access a limited version of Facebook on your
phone through the Facebook for Every Phone program or Facebook texts.
Facebook for Android and Facebook for iPhone

E-mail: [email protected] Phone Numb: 07032955803 32


Understanding basic privacy settings
Whenever you share something on Facebook, you can choose who you'll share with. In the
infographic below, you can see the most common sharing options, including Only
me, Lists, Friends, and Public.

Sharing and privacy


Even if you customize your privacy settings, it's important to understand that the things you
share on Facebook are visible to a lot of other people. This is because Facebook is designed
to be more open and social than traditional communication tools.
For example, let's say you post a photo on a friend's Timeline. By default, that photo will be
visible to all of your friends on Facebook, not just the person you shared it with. The photo
will also be visible to anyone who is friends with your friend. This is one reason people enjoy
using Facebook, because it's easy to share with lots of people at the same time.
As long as you're somewhat careful about the things you share, Facebook doesn't pose a
serious risk to your privacy. Before you share anything on Facebook, like a comment or status
update, you'll need to consider how comfortable you are with many people seeing this
information. If you wouldn't feel comfortable sharing something in a public place, you may
not want to share it on Facebook either.
Using Facebook's privacy settings
In Facebook, it's important to choose the privacy settings that will work best for you.
Facebook offers two main ways to control your privacy:
 You can apply privacy settings that set general rules about who can contact you and view
your information.
 You can control who sees every individual thing you share.

E-mail: [email protected] Phone Numb: 07032955803 33


How to use Facebook Privacy shortcuts
Note: The fastest way to change your privacy settings is to use privacy shortcuts. To access
privacy shortcuts, first click the Help Center button on the toolbar, then click Privacy
Shortcuts, and follow the steps below:
From here, you can modify who sees your posts, block certain individuals, and perform
a privacy checkup.

The Privacy Settings and Tools page


Any changes you make from Privacy Shortcuts will be reflected on the Privacy Settings and
Tools page. This is where you can control some of the most important privacy settings on
Facebook.
To access the Privacy Settings and Tools page:
1. Click the drop-down arrow on the Toolbar, then select Settings.
2. The Settings page will appear. Next, select Privacy. The Privacy
Settings and Tools page will appear.

Click the buttons in the interactive below to learn more about using the Privacy Settings and
Tools page.

E-mail: [email protected] Phone Numb: 07032955803 34


Note: In addition to your overall privacy settings, you can control who sees everything you
share with the audience selector. This allows you to change your default privacy
settings and make things more private or less private. If you change your mind later, you can
go back and change the privacy level for that post at any time.
How to Use the Audience Selector:
You'll see the audience selector across different parts of Facebook, including in the
Publisher and Timeline. In this example, we'll use the audience selector on the Publisher
to share a status update.
1. Click the audience selector.
2. Choose the desired audience. In this example, we'll
choose Public
3. Click Post to share with the selected audience.
Keep in mind that modifying the audience selector will
change the default audience setting for future posts.
You should always double-check the audience selector
before sharing anything on Facebook.
Using Facebook chat
Facebook chat and messages allow you to communicate privately with your friends on
Facebook. Unlike the other things you share on Facebook, such as status updates or
photos, chats and messages will not be shared with all of your friends or posted on your
Timeline.
However, this lesson i will focus on the desktop version of Facebook. If you're using a
mobile device, you'll need a separate app called Facebook Messenger to send chats and
messages.
How to Use Facebook Chat:
1. Locate and select the chat box in the bottom-right
corner of the screen.
2. A list of friends who are currently available to
chat will appear. Select an available friend.
3. A chat window will appear. Type your message,
then press Enter key. Your conversation will appear in
the chat window.
4. When you're finished, click X to close the chat window or press Esc key on your keyboard.

E-mail: [email protected] Phone Numb: 07032955803 35


How to Modify your Facebook Account
Once you start using Facebook, you may need to modify your account settings. These settings
control things like your password and notifications. Changing these settings is optional, and
you can modify them at any time.
 To modify your Account settings, click the drop-down arrow on the toolbar, then
select Settings.
Note: If you're using the mobile app, tap the Menu button and select
Settings & Privacy.

How to Sign Up for Facebook Texts:


1. Click the drop-down arrow on the toolbar, then select Settings.
2. The Settings page will appear. Select Mobile, then click Add a Phone.
3. A dialog box will appear. Enter your country and phone number, then choose whether
you'd like to receive a text or phone call to confirm your number. Click Continue.
4. After a few minutes, you should receive a confirmation code.
5. Return to Facebook and enter the confirmation code in the dialog box. Uncheck the boxes
if you don't want your phone number posted on your Timeline or to receive Facebook
messages as texts, then click Next.
6. Facebook texts will be activated, and your Facebook text settings will appear. From here,
you can change your phone number, set a limit on the number of texts you'll receive each
day, and more.
How to Post a Status Update with Facebook Texts:
 Text your status update as a message to 32665.
 The status update will be posted to Facebook using your default privacy settings

E-mail: [email protected] Phone Numb: 07032955803 36


Deactivating and Deleting your Facebook account
If you decide that you no longer want to use Facebook, it's easy to deactivate your account.
When you deactivate your account, you're hiding all of your information on Facebook. No one
will be able to contact you on Facebook or view the things you've shared, including your
Timeline, status updates, and photos. If you decide that you'd like to return to Facebook, you'll
still be able to reactivate your account and recover your old information.
However, deactivating your account does not fully mean you have deleted your account
permanently but it is possible to delete your account permanently with no option for recovery.
Note: You should only do this if you are absolutely sure you want to permanently delete your
Facebook account.
In this lesson am going to show you steps how to deactivate and delete your Facebook
account:
How to Deactivate Your Account:
1. Click the drop-down arrow on the toolbar, then select Settings.
2. The Settings page will appear. Click Manage Account.
3. Click Deactivate your account.
4. Select a reason for deactivating the account. If you want, you can add more details in the text
box below. When you're done, click Deactivate.
5. Select Deactivate Now.
.
Your account is now deactivated. You'll have the option to reactivate your account at any time by
signing in to Facebook with your old account information
How to Delete your Facebook account
To delete your Facebook account, follow this link to the Delete My Account page. If you'd like
to save photos and posts from your account, click Download Info. Then click Delete Account.

E-mail: [email protected] Phone Numb: 07032955803 37


What is LinkedIn:
LinkedIn is a popular social network with a specific purpose. While other social networks like
Facebook and Twitter focus more on your personal life, LinkedIn is all about professional
networking that is, building a group of contacts to help advance your career.
Why use LinkedIn
More and more businesses use LinkedIn to screen and recruit potential employees. This is why
creating a LinkedIn account can make a difference when searching for your next job. Once
you've signed up, you can add information to your profile page, which is a brief summary of
your skills and employment history that effectively serves as an online resume.
To build your network, you can add contacts (also known as connections) with other LinkedIn
users. As you make connections, you’ll be able to get skill endorsements, ask for
recommendations, and find new job opportunities.
You can also join groups focused on various companies, industries, and occupations. Groups
can keep you up to date on the latest news in your field, as well as help you find others who
share your professional interests.
Job Search Tool
LinkedIn has a powerful job search tool that can find openings around the world. You can
then filter these results by company, experience level, and more. Some openings also have an
Easy Apply option, which allows you to apply to a job with only a few clicks by submitting the
information in your LinkedIn profile.

From making first impressions with employers to communicating with colleagues, LinkedIn
can be a useful career tool. Fortunately, creating an account is free, and it only requires your
email address.
If you take the time to learn how to use LinkedIn, it can make a big impact on your professional
life.

E-mail: [email protected] Phone Numb: 07032955803 38


Creating a LinkedIn Account:
Creating a LinkedIn account is simple. All you need is an email address and a few minutes of
your time. Let’s take a look at how it works.
How to Started Create your LinkedIn Account
To get started, go to linkedin.com in your web browser. Enter your information, choose a
password, then click the Join button. LinkedIn will guide you through the steps of adding
more detail to your profile.
Next, you'll need to verify your email address. Go to your email inbox, look for a message
from LinkedIn, then click the confirmation button or type the PIN into
LinkedIn. It may also ask for your phone number to send you another
verification code, so you may want to have your phone nearby just in case.

What is Twitter:
Twitter is a social networking website that's designed for finding and sharing short updates.
In fact, each post or tweet as they're called on Twitter is limited to just 280 individual
characters (letters, spaces, and punctuation marks). That's not even long enough to include
the first two sentences of this paragraph! Take a look at the tweet we've embedded below:
Tweets are so short that you might wonder why people bother posting them in the first place.
But that's actually a big part of what makes Twitter so popular: It's easy to quickly share what's
happening in your world or follow along with a popular topic in real time.
Creating a Twitter account
If you want to post your own updates to Twitter, you'll need to create an account. There are
two ways to do this:
 If you're using a desktop or laptop computer, go towww.twitter.com in your web browser.
 If you're using a mobile device, like a smartphone or tablet, download the Twitter app.

Whichever option you choose, you'll want to select Sign up and follow the instructions on the
screen. The account creation process is straightforward enough, but here are some things
you'll want to consider when signing up.
What is YouTube

E-mail: [email protected] Phone Numb: 07032955803 39


YouTube is a free video sharing website that makes it easy to watch online videos. You can
even create and upload your own videos to share with others. Originally created in 2005,
YouTube is now one of the most popular sites on the Web, with visitors watching around 6
billion hours of video every month. If you've ever watched a video online, there's a good
chance it was a YouTube video.
Why use YouTube
One reason YouTube is so popular is the sheer number of videos you can find. On average,
100 hours of video are uploaded to YouTube every minute, so there's always something new
to watch! And you'll find all kinds of videos on YouTube adorable cats, quirky cooking demos,
funny science lessons, quick fashion tips, and a whole lot more.
Another reason YouTube is so popular: It's all about user-generated content. Instead of videos
from major TV networks and movie studios, you'll find amazing and creative videos made by
people just like you. And YouTube isn't a one-way street—you can jump in, record and share
your own videos, and become a part of the community.
Is YouTube appropriate for everyone:
With so much content on YouTube, it's important to note that not all YouTube videos are
appropriate for everyone, especially children under the age of 13. However, there are tools
you can use, such as Safety Mode, to restrict the types of videos you can view.

E-mail: [email protected] Phone Numb: 07032955803 40


CHAPTER FIVE: Keep Yourself Connected

Introduction
Troubleshooting requires an organized and logical approach to problems with computers and
other components. Sometimes issues arise during preventive maintenance. At other times, a
customer may contact you with a problem. A logical approach to troubleshooting allows you
to eliminate variables and identify causes of problems in a systematic order. Asking the right
questions, testing the right hardware, and examining the right data helps you understand the
problem and form a proposed solution to try.
In this chapter I will be focusing on the approach to problem solving that you can apply to
both hardware, software and Networking. You can also apply many of the steps to problem
solving to other work-related areas.
What is Troubleshooting
Troubleshooting is a skill that you improve over time. Each time you solve a problem, you
increase your troubleshooting skills by gaining more experience. You learn how and when to
combine steps or skip steps to reach a solution quickly.
However, before you begin troubleshooting a computer system or a problem, always follow
the necessary safeguards to protect data on the computer. Some repairs, such as replacing a
hard drive or reinstalling an operating system, might put the data on the computer system
at risk. So, make sure you do everything possible to prevent data loss while attempting repairs.
Note: Always perform a backup before beginning any troubleshooting. You must protect data
before beginning any work on a customer’s computer. If your work results in data loss for the
customer, you or your company could be held liable.
What is Data Backup
A data backup is a copy of the data on a computer hard drive that is saved to another storage
device or to cloud storage.
What is Cloud Storage
Cloud storage, is online storage that is accessed via the Internet. In an organization, backups
may be performed on a daily, weekly, or monthly basis. If you
are unsure that a backup has been done, do not attempt any
troubleshooting activities until you check with the customer.
Here is a list of items to verify with the customer about data
backups:
• Date of the last backup
• Contents of the backup
• Data integrity of the backup

E-mail: [email protected] Phone Numb: 07032955803 41


• Availability of all backup media for a data restore
Note: If the customer does not have a current backup and you are not able to create one, ask
the customer to sign a liability release form. A liability release form contains at least the following
information:
 Permission to work on the computer without a current backup available
 lease from liability if data is lost or corrupted
 Description of the work to be performed
Review of the Six Steps for Troubleshooting:
Before you start to troubleshoot your customer, computer system there are six steps to follows
which are:
Troubleshooting Steps
Step 1 Identify the problem.
Step 2 Establish a theory of probable cause.
Step 3 Test your theories to determine the cause of the problem.
Step 4 Establish a plan of action to resolve the problem and implement the solution.
Step 5 Verify full functionality and, if application, implement preventive measures.
Step 6 Document your findings, actions, and outcomes.
Step 1: Identify the Problem
The first step in the troubleshooting process is to identify the problem. During this step, gather
as much information as possible from the customer and then from the computer.
Conversation Etiquette When you are talking to
the customer, follow these guidelines:
 Ask direct questions to gather information.
 Do not use industry jargon.
 Do not talk down to the customer.
 Do not insult the customer.
 Do not accuse the customer of causing the
problem. By communicating effectively, you can
elicit the most relevant information about the problem from the customer. The chart above
lists some of the important information to gather from the customer.
Open-Ended and Closed-Ended Questions
 Open-ended questions: Allow customers to explain the details of the problem in their own
words. Use open-ended questions to obtain general information. Based on the information
from the customer, you can proceed with closed-ended questions.
 Closed-ended questions: generally, require a yes or no answer. These questions are
intended to get the most relevant information in the shortest time possible.

E-mail: [email protected] Phone Numb: 07032955803 42


Documenting Responses: Document the information obtained from the customer in the work
order and in the repair journal. Write down anything that you think might be important for
you or another technician. The small details often lead to the solution of a difficult or
complicated problem.
Beep Codes: Each BIOS manufacturer has a unique beep sequence, a combination of long
and short beeps, for hardware failures. When troubleshooting, power on the computer and
listen. As the system proceeds through the POST, most computers emit one beep to indicate
that the system is booting properly. If there is an error, you might hear multiple beeps.
Document the beep code sequence, and research the code to determine the specific hardware
failure.
BIOS Information
If the computer boots and stops after the POST, investigate the BIOS settings to determine
where to find the problem. A device might not be detected or configured properly. Refer to
the motherboard documentation to make sure that the BIOS settings are accurate.
Event Viewer: When system, user, or software errors occur on a computer, the Event Viewer
is updated with information about the errors. The Event Viewer application shown in the image
records the following information about the problem:
 What problem occurred
 Date and time of the problem
 Severity of the problem
 Source of the problem
 Event ID number
 Which user was logged in when the problem
occurred
Although the Event Viewer lists details about
the error, you might need to further research
the solution.
Device Manager
The Device Manager shown in here displays all
the devices that are configured on a computer.
The operating system flags the devices that are not operating correctly with an error icon. A
yellow circle with an exclamation point (!) indicates that the device is in a problem state. A
red circle and an X mean that the device is disabled. A yellow question mark (?) indicates that
the system does not know which driver to install for the hardware.

E-mail: [email protected] Phone Numb: 07032955803 43


Task Manager
The Task Manager shown on the left displays the
applications that are currently running. With the Task
Manager, you can close applications that have stopped
responding. You can also monitor the performance of the
CPU and virtual memory, view all processes that are
currently running, and view information about the
network connections.
Diagnostic Tools
Conduct research to determine which software is available to help diagnose and solve
problems. Many programs to help you troubleshoot hardware are available. Manufacturers of
system hardware usually provide diagnostic tools of their own. For instance, a hard drive
manufacturer might provide a tool to boot the computer and diagnose why the hard drive
does not boot Windows.
Step 2: Establish a theory of probable cause
The second step in the troubleshooting process is to establish a theory of probable cause.
First, create a list of the most
common reasons why the error
would occur. Even though the
customer may think that there
is a major problem, start with
the obvious issues before moving to more complex diagnoses. List the easiest or most obvious
causes at the top. List the more complex causes at the bottom. The next steps of the
troubleshooting process involve testing each possible cause.
Step 3 Test Your Theories to Determine the Cause of the Problem:
To determine the cause of the problem by testing your theories of probable causes one at a
time, starting with the quickest and
easiest. This image identifies some
common steps to determine the
cause of the problem. After
identifying an exact cause of the
problem, you then determine the
steps to resolve the problem. As you become more experienced at troubleshooting computers,

E-mail: [email protected] Phone Numb: 07032955803 44


you will work through the steps in the process
faster. For now, practice each step to better
understand the troubleshooting process. If you
cannot determine the exact cause of the
problem after testing all your theories, establish
a new theory of probable causes and test it. If
necessary, escalate the problem to a technician
with more experience. Before you escalate,
document each test that you tried, as shown in
here.

Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution:
After you have determined the exact cause of the problem, establish a plan of action to resolve
the problem and implement the solution. Sometimes quick procedures can correct the
problem. If a quick procedure does correct the problem, verify full system functionality and, if
applicable, implement preventive measures. If a quick procedure does not correct the problem,
research the problem further and then return to Step 3 to establish a new theory of the
probable cause.
After you have established a plan
of action, you should research
possible solutions. The figure lists
possible research locations. Divide
larger problems into smaller
problems that can be analyzed and solved individually. Prioritize solutions starting with the
easiest and fastest to implement. Create a list of possible solutions and implement them one
at a time. If you implement a possible solution and it does not correct the problem, reverse
the action you just took and then try another solution. Continue this process until you have
found the appropriate solution.
Step 5: Verify Full Functionality and, If Applicable, Implement Preventive Measures:
After the repairs to the computer have been completed, continue the troubleshooting process
by verifying full system functionality and
implementing the preventive measures
needed. Verifying full system functionality
confirms that you have solved the original

E-mail: [email protected] Phone Numb: 07032955803 45


problem and ensures that you have not created another problem while repairing the computer
Whenever possible, have the customer verify the solution and system functionality.
Step 6: Document your Findings, Actions, and Outcomes:
After the repairs to the computer have been completed, finish the troubleshooting process
with the customer. Communicate the problem and the solution to the customer verbally and
in writing. The figure shows the steps to be taken when you have finished a repair.

Verify the solution with the customer. If the customer is available, demonstrate how the
solution has corrected the computer problem. Have the customer test the solution and try to
reproduce the problem. When the customer can verify that the problem has been resolved,
you can complete the documentation for the repair in the work order and in your journal.
Include the following information in the documentation:
 Description of the problem,
 Steps to resolve the problem, and
 Components used in the repair.
Personal Computer (PC) Common Problems and Solutions
Computer problems can be attributed to hardware, software, networks, or some combination
of the three. You will resolve some types of problems more often than others. Common
hardware problems include the following:
Storage Device: Storage device problems are often related to loose or incorrect cable
connections, incorrect drive and media formats, and incorrect jumper and BIOS settings, as
shown in the chart.

E-mail: [email protected] Phone Numb: 07032955803 46


E-mail: [email protected] Phone Numb: 07032955803 47
Motherboard and Internal Component: These problems are often caused by incorrect or
loose cables, failed components, incorrect drivers, and corrupted updates, as shown in the
chart.

E-mail: [email protected] Phone Numb: 07032955803 48


Power Supply: Power problems are often caused by a faulty power supply, loose
connections, and inadequate wattage, as shown in the chart.

E-mail: [email protected] Phone Numb: 07032955803 49


CPU and Memory - Processor and memory problems are often caused by faulty installations,
incorrect BIOS settings, inadequate cooling and ventilation, and compatibility.

E-mail: [email protected] Phone Numb: 07032955803 50

You might also like