Com 111 Introduction To Computer
Com 111 Introduction To Computer
UNIT: 2
COURSE DESCRIPTION
OBJECTIVES:
1.0 Explain concepts of computer
technology
2.0 Discuss computer components
3.0 Discuss computer security threats
4.0 Discuss computer operating systems
5.0 Explain the use of computer in data
processing and presentation
6.0 Browse the internet using the
computer
UNIT: 1
INSTRUCTIONAL MATERIALS: -
Whiteboard
Maker
Posters
Projector
Computer
TEACHING METHODS: -
Lecture
Demonstration
Group discussion
Audiovisual
TYPES OF ASSESSMENT: -
MCQ
Essay
Group presentation
LEARNING OBJECTIVES
Introduction
Definition
Advantages of Computers
Generations of Computers:
1. Input device
2. Central Processing Unit (CPU)
3. Output device
Block diagram of a Computer
MEMORY UNIT
CONTROL UNIT
Unit Function
S/ UNIT FUNCTION
No
1 Input device Reads information from input media and
enters to the computer in a coded form
2 CPU i. Memory unit : Stores program and
data
ii. Arithmetic Logic unit : Performs
arithmetic and logical functions
iii. Control Unit : Interprets program
instructions and controls the input
and output devices
Central Processing Unit: It is the part of the computer that carries out the
instructions of a computer program. It is the unit that reads and executes
program instructions. Hence it is known as the―brain‖ of the computer. The
CPU consists of storage or memory unit, Arithmetic Logic Unit (ALU) and
control unit.
(b) Arithmetic and Logical Unit (ALU): It is the unit where all
Arithmetic operations (addition, subtraction etc.) and logical
functions such as true or false, male or female are performed.
Once data are fed into the main memory from input devices,
they are held and transferred as needed to ALU where
processing takes place. No process occurs in primary storage.
Intermediate generated results in ALU are temporarily placed in
memory until needed at later time. Data may move from primary
memory to ALU and back again to storage many times before the
process is finalized.
Parts of Computer
Whether it's a gaming system or a home PC, the five main components
that make up a typical, present-day computer include:
1. A motherboard
2. A Central Processing Unit (CPU)
3. A Graphics Processing Unit (GPU), also known as a video card
4. Random Access Memory (RAM), also known as volatile memory
5. Storage: Solid State Drive (SSD) or Hard Disk Drive (HDD)
In terms of construction, each of these main components are attached to
the motherboard and then put into a protective case—resembling the
clean, polished look most of us are accustomed to seeing. Sure, most
computers have their own distinct design - and different brands of
hardware installed - but the components listed above are standard across
all computers.
Important: A quick note before we dive into the details—I’m listing and
talking about the different components of a computer. This is by no
means intended to be an invitation to disassemble your computer, nor is
it a set of instructions to do so. Without the proper knowledge, you can
severely damage your computer, and importantly, doing so is unsafe.
1. The Motherboard
All components of a computer communicate through a circuit board
called the motherboard, as was mentioned above.
Function of Motherboard
Function of CPU
1. Whenever you write a line of code (in Python, Java, C++, or any
other programming language), it's broken down into assembly
language—which is a language that the processor can
understand. It fetches, decodes, and executes these instructions.
2. And that’s where the CPU comes in—all the processes a
computer handles are taken care of by the CPU.
3. The Graphics Processing Unit (GPU)
It's not uncommon to hear gamers obsess over the next new
graphics card, as these graphic cards make it possible for
computers to generate high-end visuals like those found in the
many different types of video games.
In addition to video games, though, good graphics cards also come
in handy for those who rely on images in order to execute their
craft, like 3D modelers using resource-intensive software.
Function of Graphics Processing Unit (GPU)
Graphics cards often communicate directly with the display monitor,
meaning a $1,000 graphics card won't be of much use if there isn't
a high-end monitor connected to it.
4. Random Access Memory (RAM)
Function of RAM
5. Storage
What it does: HDDs are made of an actual disk onto which data is
stored. The disk is read by a mechanical arm. (HDDs are cheaper
than SSDs, but are slowly becoming more and more obsolete.)
SSDs (think SIM cards) have no moving parts and are faster than a
hard drive, because no time is spent waiting for a mechanical arm
to find data on a physical location on the disk.
Generations of Computer
The first electronic computers were produced in the 1940s. Since then
a series of tactical breakthrough in electronic has occurred. With each
major breakthrough, the computers based upon the older form of
electronics have been replaced by a new “generation” of computers
based upon the newer form of electronics. These “generations” are
classified as follows: -
Personal Computers
Peripherals: The input, output and secondary storage units like floppy
drives, keyboard, mouse, etc., are called peripherals.
Classification of PCs: PCs are mainly classified on the basis of primary
memory (RAM), Microprocessor, clock speed and peripherals. The
classification is presented in the following table:
Definition
Operating systems usually come pre-loaded on any computer you buy. Most
people use the operating system that comes with their computer, but it's
possible to upgrade or even change operating systems. The three most
common operating systems for personal computers are Microsoft Windows,
macOS, and Linux.
Each operating system's GUI has a different look and feel, so if you switch to
a different operating system it may seem unfamiliar at first. However,
modern operating systems are designed to be easy to use, and most of the
basic
Microsoft Windows
macOS
According to StatCounter Global Stats, macOS users account for less than
10% of global operating systems—much lower than the percentage of
Windows users (more than 80%). One reason for this is that Apple computers
tend to be more expensive. However, many people do prefer the look and
feel of macOS over Windows.
Linux
According to Stat Counter Global Stats, Linux users account for less than 2%
of global operating systems. However, most servers run Linux because it's
relatively easy to customize.
To learn more about different distributions of Linux, visit the Ubuntu, Linux
Mint, and Fedora websites, or refer to our Linux Resources. For a more
comprehensive list, you can visit MakeUseOf's list of The Best Linux
Distributions.
The operating systems we've been talking about so far were designed to run
on desktop and laptop computers. Mobile devices such as phones, tablet
computers, and MP3 players are different from desktop and laptop
computers, so they run operating systems that are designed specifically for
mobile devices. Examples of mobile operating systems include Apple iOS and
Google Android. In the screenshot below, you can see iOS running on an
iPad.
Operating systems for mobile devices generally aren't as fully featured as
those made for desktop and laptop computers, and they aren't able to run all
of the same software. However, you can still do a lot of things with them, like
watch movies, browse the Web, manage your calendar, and play games.
Most software applications are designed to work with just one company's
operating system, like just Windows (Microsoft) or just macOS (Apple).
A piece of software will clearly say which operating systems it supports and
will get very specific if necessary. For example, a video production software
program might say it supports Windows 10, Windows 8, and Windows 7, but
does not support older versions of Windows like Windows Vista and XP.
STUDENTS ACTIVITY
TOPIC: COMPUTER
Define a computer
List/explain types of computers according
to;
OUTCOM
Super computers, Mainframe, Personal
E computers and Mini computers
Classify computers according to: Capacity,
Operating systems, Purpose and
Generations
TASK:
UNIT: 2
TOPIC: COMPONENTS OF A COMPUTER
INSTRUCTIONAL MATERIALS: -
Whiteboard
Maker
Posters
Projector
Computer
TEACHING METHODS: -
Lecture
Demonstration
Group discussion
Audiovisual
TYPES OF ASSESSMENT: -
MCQ
Essay
Group presentation
LEARNING OBJECTIVES
2.1 Identify/explain the hardware of a computer
2.2 Identify/discuss the software of a computer
2.3 Differentiate between hardware and software of a computer
2.4 State the functions of hard and soft ware of computers
A computer cannot operate itself as such it requires human being to run it.
The people – computer users, computer professionals (analysts,
programmers, operators, maintenance, engineers and so on) are termed as
people-ware.
1. System software:
2. Application software:
Introduction
The main difference between hardware and software is that the
hardware refers to physical components of a computer while the
software refers to a set of instructions given to a computer to perform
a certain task.
2. Categories
The hardware has four main categories: input devices, output
devices, secondary storage devices and internal components.
Software is mainly divided into system software and application
software.
3. Tangibility
The hardware is tangible while the software is intangible.
4. Method of Constructing
Furthermore, the hardware is developed using electronic and
other materials. Software is developed by writing instructions
using a programming language.
5. Replacement
When a hardware component is damaged, it can be replaced
with a new component. When software is damaged, it can be
reinstalled using a backup copy. Malware such as virus and
worms can damage software.
6. Initialization
The hardware starts functioning once the software is loaded into
the system. To use software, it should be installed into the
computer.
7. Examples
Keyboard, Mouse, Monitor, Printer, Hard disk, CPU, RAM, and
ROM are few examples of hardware. MS Word, Excel, MSSQL,
MySQL, Photoshop are some example of software.
Conclusion
Both hardware and software are necessary for the proper functioning
of the computer. Software cannot be utilized without hardware while
hardware cannot be utilized without software. The difference between
hardware and software is that hardware refers to physical components
of a computer while software refers to a set of instructions given to a
computer to perform a certain task.
2.4 Functions of Hard and Soft Wares of Computers
Input Devices
Some important input devices are; Key board, Mouse, Scanner, MICR,
Web camera, Microphone etc.
1. Keyboard: The Key board is used for typing text into the
computer. It is also known as standard Input device. A computer
keyboard is similar to that of a type writer with additional keys.
The most commonly available computer keyboard has 104 keys.
Keyboard
2. Mouse: It is a device that controls the movement of the cursor on a
monitor. A mouse will have 2 buttons on its top. The left button is
the most frequently used button. There will be a wheel between the
left and right buttons. This wheel enables us to smoothly scroll
through screens of information. As we move the mouse, the pointer
on the monitor moves in the same direction. Optical mouse is
another advanced pointing device that uses a light emitting
component instead of the mouse ball. Mouse cannot be used for
entering the data. It is only useful to select the options on the
screen.
2. Hard Disk: The hard disk can hold more information than the
floppy disk and the retrieval of information from hard disk is
faster when compared to floppies or tapes. A hard disk is fixed
inside the CPU and its capacity ranges from 20 MB onwards. The
hard disk is made up of a collection of discs (one below the
other) known as platters on which the data is recorded. These
platters are coated with magnetic material. It is less sensitive to
external environmental disorders and hence the storage in hard
disk is safe. A small hard disk might be as much as 25 times
larger than a floppy disk. Storage Capacity of hard disks varies
from 20 MB to several Gega bytes like 80GB, 160GB.
3. CD-ROM: CD-ROM stands for Compact Disk–Read Only Memory.
It is used to store a wide variety of information. Its main
advantage is that it is portable and can hold a large amount of
data.. The storage capacity of most CD-ROMs is approximately
650 MB or 700 MB. CD-ROMs have the following variations:
i. CD-R (Compact disc Recordable): Data can be written onto
it just once. The stored data can be read. Data once
written onto it cannot be erased.
ii. CD-RW (Compact disc Rewritable): It is also called erasable
CD. Data once written onto it can be erased to write or
record new information many times. To use a CD-ROM, a
device called CD drive is needed.
4. DVD: DVD stands for Digital Versatile Disc. It is similar to a CD-
ROM, except that it can store larger amounts of data. The storage
capacity of a DVD is at least 4.7MB. DVDs that can store up to
17GBs are also available. Because of their capacity, DVDs are
generally used to store a very large multimedia presentations and
movies that combine high quality sound and graphics.
STUDENTS ACTIVITY
TOPIC: COMPONENTS OF A COMPUTER
TASK:
UNIT: 3
TEACHING METHODS: -
Lecture
Demonstration
Group discussion
Audiovisual
TYPES OF ASSESSMENT: -
MCQ
Essay
Group presentation
LEARNING OBJECTIVES
3.1 Explain computer security threats
3.2 Identify common computer security threats
i. Computer virus threats
ii. spyware threats
iii. Hackers and predators
iv. Phishing threats
3.3 State ways of preserving the computers from security threats.
3.1 COMPUTER SECURITY THREATS
Introduction
Once the realm of IT security professionals, computer security is now
an issue and concern for all business people. Recent high profile
security breaches such as those at eBay which exposed over 140
million users’ details, the Target retail chain in the US which resulted
in 100 million credit card details of customers being stolen by
criminals, and a US bank which lost over US $45 million within 24
hours. Nearer to home we have seen the Clare based Loyalty build
company suffer a security breach late last year which exposed credit
card details of customers and earlier this month the news headlines
highlighted how police disrupted a criminal gang’s virus network
which they used to steal over $100 million.
Definition
A VIRUS is a set of instructions (or program) or software prepared to
destroy a package and data.
A virus kills data and program files. Although the purpose for
developing such software’s is not known, they appear to be basically
developed for a check against the ―piracy‖ of program packages.
Functioning of viruses
Viruses reside in executable files such as .COM or .EXE. Thus when PC
is switched on, the virus enters the RAM through .COM
(COMMAND.COM) file and starts destructive work of killing data and
program files. Whenever the PC is switched off, they again go back to
the executable files.
More than 1000 computer viruses have been identified. They are
classified as:
i) File Allocation Table (FAT) based viruses
ii) Key board viruses and
iii) File based viruses
1. Clop Ransomware
Ransomware is malware which encrypts your files until you
pay a ransom to the hackers. “Clop” is one of the latest
and most dangerous ransomware threats. It’s a variant of
the well-known CryptoMix ransomware, which frequently
targets Windows users.
Before beginning the encryption process, the Clop
ransomware blocks over 600 Windows processes and
disables multiple Windows 10 applications, including
Windows Defender and Microsoft Security Essentials —
leaving you with zero chance of protecting your data.
3. Zeus Gameover
Zeus Gameover is part of the “Zeus” family of malware
and viruses. This piece of malware is a Trojan — malware
disguised as something legitimate that accesses your
sensitive bank account details and steals all of your funds.
The worst thing about this particular variant of the Zeus
malware family is that it doesn’t require a centralized
“Command and Control” server to complete transactions —
which is a flaw found in many cyberattacks that authorities
can target. Instead, Zeus Gameover can bypass centralized
servers and create independent servers to send sensitive
information. In essence, you cannot trace your stolen data.
4. RaaS
“RaaS” — also known as “Ransomware as a Service” — is a
growing industry in the underground hacker community.
People without the knowledge to carry out a sophisticated
ransomware attack can pay to hire a professional hacker or
team of hackers to perform the attack for them.
6. Fleeceware
Fleeceware continues to charge app users large amounts
of money despite users deleting those apps. Recent
research has found that over 600 million Android users
have downloaded “Fleeceware” onto their device in the
past few years.
Although Fleeceware doesn’t pose a considerable security
threat to a user’s device and data, it’s still very common,
and it’s a shady practice by app developers wanting to
cash in on unsuspecting users.
8. Social Engineering
Humans are possibly the weakest link in any security
protocol. This is why cybercriminals are now turning to
human psychology and deception to try and gain access to
personal information.
The hacker will start by contacting a company or service
provider and pretend to be a specific person. They’ll ask
questions regarding the victim’s account and trick the
customer support team into handing over pieces of
sensitive information. Then, they’ll exploit that information
to gain access to a person’s account and data, including
payment details.
Although this isn’t a type of malware per se, social
engineering is an alarming trend, as it doesn’t require
hackers to know about coding or malware development.
Instead, all the attacker needs is to be convincing and
allow human error and complacency to reward them with
the data they need.
9. Cryptojacking
Cryptojacking malware is designed to use a person’s
computing power to help “mine” cryptocurrencies, such as
Bitcoin. Mining requires a huge amount of computing
power to generate new crypto coins, which is why hackers
are attempting to install cryptojacking malware on
computers and mobile devices to help with the mining
process — slowing down the user’s device considerably.
Although cryptojacking attacks dropped significantly in
previous years — mainly due to the sharp fall in the value
of cryptocurrencies, this trend remains a threat. As
cryptocurrency prices continue to rise through 2020,
cryptojacking malware attacks will continue to be lucrative
for cybercriminals.
To keep computer device and all the data safe, there is need to
be using the best antivirus for PC, Mac, Android, and iOS device.
2. Gator (GAIN)
Gator is an adware program that may display banner
advertisements based on user Web surfing habits. Gator is
usually bundled with numerous free software programs,
including the popular file-sharing program Kazaa.
3. 180search Assistant
180search Assistant is an adware program that delivers
targeted pop-up advertisements to a user’s computer.
Whenever a keyword is entered into a search engine or a
targeted Web site is visited, 180search Assistant opens a
separate browser window displaying an advertiser's Web
page that is related to the keyword or site.
4. ISTbar/AUpdate
ISTbar is a toolbar used for searching pornographic web
sites that, when linked to, may display pornographic pop-
ups and hijack user homepages and Internet searches.
5. Transponder (vx2)
Transponder is an IE Browser Helper Object that monitors
requested Web pages and data entered into online forms,
then delivers targeted advertisements.
6. Internet Optimizer
Internet Optimizer hijacks error pages and redirects them
to its own controlling server at http://www.internet-
optimizer.com.
7. BlazeFind
BlazeFind may hijack any of the following: Web searches,
home page and other Internet Explorer settings. BlazeFind
may redirect Web searches through its own search engine
and change default home pages to www.blazefind.com.
This hijacker may also change other Internet Explorer
settings.
8. Hot as Hell
Hot as Hell is a dialer program which dials toll numbers in
order to access paid pornographic Web sites. Hot as Hell
may disconnect a user’s computer from a local Internet
provider and reconnect the user to the Internet using an
expensive toll or international phone number. It does not
spy on the user, but it may accrue significant long distance
phone charges. It may run in the background, hiding its
presence.
9. Advanced Keylogger
Advanced Keylogger, a keystroke logger, has the ability to
monitor keystrokes and take screen shots.
Computer hackers can also try to access your computer and private
information directly if you are not protected with a firewall. So, installing
quality firewall solutions and antivirus protection should be deployed in an
organization to prevent from being a victim to such malicious activities.
Usually disguised with a fake identity, predators can lure you into revealing
sensitive personal and financial information, or much worse.
What Computer hacker and predator can do?
The hacker or computer predator always seeks to somehow deploy the
malicious file to the victim’s computer or personal computing device like
mobile phones. The deployed malicious file helps them to transmit your
personal and financial information without your knowledge and permission or
a computer predator may attack on the private information you unwittingly
revealed. In either case, they may:
i. Hijack your usernames and passwords.
ii. Steal your money and open credit card and bank accounts
in your name
iii. Ruin your credit.
iv. Request new account Personal Identification Numbers
(PINs) or additional credit cards.
v. Make purchases.
vi. Add themselves or an alias that they control as an
authorized user so it’s easier to use your credit.
vii. Sell your information to other parties who will use it for
illicit or illegal purposes.
How to protect yourself from Hackers and Predators?
There are many things we can do to protect our critical information, whether
it is belong to an organization or it’s personal. Security threat awareness is
the first line of defense, so regular training for the employees should be
conducted to train them to encounter the threat at its initial stage before it
can harm or affects the organization’s data. Preventing hacker to access the
computer is the basic rule to prevent such threats; it can be done through
many ways that may include:
i. Use a 2 way firewall.
ii. Update your operating system regularly.
iii. Increase your browser security settings.
iv. Avoid suspicious Websites or allow access to only trusted
Websites.
v. Carefully evaluate free software and file-sharing
applications before downloading them.
vi. Practice safe email protocol.
vii. Don't open messages from unknown senders.
viii. Immediately delete messages you suspect to be spam.
ix. Make sure that you have the best security software
products installed on your PC.
x. Use antivirus protection.
xi. Get anti-spyware software protection.
An unprotected computer is an easy target for computer hackers and
predators. To take it a step further, protect your computer from hackers by
using different systems that can monitor the ins and outs of each
communication and information traffic to detect any suspicious activity.
Legitimate emails from banks and credit card companies will often include
partial account numbers, username or password.
When the computer is arm with information and resources, been wiser about
computer security threats and less vulnerable to phishing scam tactics. Take
these steps to fortify the computer security and get better phishing
protection right away:
i. Do not provide personal information to any unsolicited
requests for information
ii. Only provide personal information on sites that have
"https" in the web address or have a lock icon at bottom of
the browser
iii. If you suspect you've received phishing bait, contact the
company that is the subject of the email by phone to check
that the message is legitimate
iv. Type in a trusted URL for a company's site into the address
bar of your browser to bypass the link in a suspected
phishing message
v. Use varied and complex passwords for all your accounts
vi. Continually check the accuracy of personal accounts and
deal with any discrepancies right away
vii. Avoid questionable websites
viii. Practice safe email protocol:
Don't open messages from unknown senders
Immediately delete messages you suspect to be
spam
Make sure that you have the best security software products installed on
your PC for better phishing protection:
An unprotected computer is like an open door for email phishing scams. For
a more potent form of protection, use a spam filter or gateway to scan
inbound messages. Products like Webroot Secure Anywhere® Internet
Security Complete thwart dangerous malware before it can enter your PC,
stand guard at every possible entrance of your computer and fend off any
spyware or viruses that try to enter, even the most damaging and devious
strains. While free anti-spyware and antivirus downloads are available, they
just can't keep up with the continuous onslaught of new spyware strains.
Previously undetected forms of spyware can often do the most damage, so
it's critical to have up-to-the-minute, guaranteed protection.
Given the numerous ways a computer virus can spread, how can a company
ensure that its network is protected?
Everyday new computer viruses are being released and it is essential that
businesses are protected from these viruses by keeping the anti-virus
software up to date. If possible, companies should look at policies whereby
computers that do not have the most up to date anti-virus software installed
are not allowed to connect to the network.
All incoming and outgoing email should be filtered for computer viruses. This
filter should ideally be at the perimeter of the network to prevent computer
viruses. Emails with certain file attachments commonly used by computer
viruses to spread themselves, such as .EXE, .COM and .SCR files, should also
be prevented from entering the network.
Ensure that all users know to never open an attachment or to click on a link
in an email they are not expecting. Even when the email is from a known
source, caution should be exercised when opening attachments or clicking
on links in emails. Criminals use the trust placed in an email contact you
know to trick you into clicking on a link or attachment.
Ensure that all files downloaded from the Internet are scanned for computer
viruses before being used. Ideally this scanning should be done from one
central point on the network to ensure that all files are properly scanned.
It is important that you use a trusted source for your software requirements.
This is to ensure that all software installed can be accounted for and that its
sources can be confirmed to be legitimate. Apart from ensuring that the
correct licensing agreements are in place, using a trusted supplier can help
reduce the risk of software infected with a virus compromising your business.
All users should be educated to never run a computer program unless the
source is known or has originated from a person or company that is trusted.
Most computer viruses and worms try to exploit bugs and vulnerabilities
within the operating system and applications that companies use. New
vulnerabilities are introduced into networks every day, be that from installing
new software and services, making changes to existing systems or simply
from previously undiscovered vulnerabilities coming to light. It is important
to regularly review your network and the applications running on it for new
vulnerabilities. Any discovered vulnerabilities should be rated and prioritised
regarding their criticality and the potential business impact they could have.
Once this has been done, a plan on how to manage those vulnerabilities,
either by patching, upgrading, or managing the vulnerability using tools such
as firewalls or Intrusion Detection Systems should be put into place.
It is important to ensure that regular copies of important files are kept either
on removable media such as portable drives or tape to ensure you have a
trusted source for data in the event that the network is infected with a
computer virus. Not only will this ensure that important data is available in
the event of a computer virus infecting the company’s network, backups will
also enable the company to restore systems to software that is known to be
free from computer virus infection. For added security you should store these
backups securely offsite. That way should a major disaster happen to the
business, e.g. the building goes on fire, the data will remain safe in the
secure offsite location and can be restored quickly in a new facility
Regular monitoring of network and system logs can assist in the early
identification of a computer virus infecting the network or other attacks by
criminals. Unusual traffic patterns or log entries could indicate that the
network has been infected or that its security has been compromised. As
well as monitoring for suspicious traffic and events, it is important that logs
for other devices are checked regularly to ensure that the network remains
protected. Log files for the backups should be checked regularly to ensure
that the backups succeeded, likewise the log files for anti-virus software
deployed should be regularly checked to ensure that all PCs are running the
latest version of the anti-virus software.
Knowing what to do when a computer virus enters the network or when you
suffer a security breach is critical to minimise the damage they may cause,
both to the business and also to customers and suppliers. The incident
response plan should outline the roles and responsibilities that people have
in the event of a computer virus infecting the network or indeed any other
type of security breach. This plan should be drawn up and agreed between
all relevant parties before an incident occurs. Remember, the worst time to
develop a security incident response plan is in the middle of such an
incident.
Cyber criminals poses a very real and constant threat to every business. It is
important that businesses recognise this threat and take the appropriate
steps, such as those outlined above, to reduce the likelihood and minimize
the threat.
STUDENTS ACTIVITY
TASK:
UNIT: 4
Practical Session 1
INSTRUCTIONAL MATERIALS: -
Whiteboard
Maker
Posters
Projector
Computer
TEACHING METHODS: -
Lecture
Demonstration
Group discussion
Audiovisual
TYPES OF ASSESSMENT: -
MCQ
Essay
Group presentation
LEARNING OBJECTIVES
1.4 Boot a computer and explain systematic process of booting a computer
1.5 Identify the uses of Microsoft Word package
1.6 Type a page (word processing) in Microsoft Word format on the
computer
1.7 Explain how to protect a document with a security password
1.8 Identify different software programs on the computer and their specific
usage
1.9 Explain the use of Microsoft Excel in data processing
1.10 Enter data using Microsoft Excel (Data processing)
4.1 BOOT A COMPUTER AND SYSTEMATIC PROCESS OF BOOTING A
COMPUTER
Introduction
Drives of the computer: A computer can have Floppy Disk Drive along
with Hard Disk drives in the system. These are referred as follows:
a) A :\> this imply that the computer is booted through Floppy drive
`A‘and is ready to accept DOS commands. The symbol ―\>‖ is
referred as DOS prompt from where DOS commands can be
entered.
b) C :\> It imply that the PC is booted through the Hard-Disk Drive
`C‘.
a) Cold Booting: It is only switching OFF the system and after some
time again switching ON.
MS-DOS
3. A period (.) is used to separate the first part of a file name from
the extension. (LETTER.TXT, RAMA.WK1, etc.)
Executable Files: The files with extension of either .COM or .EXE are
called executable files. These files are directly executed by typing their
names (without the extension) by the computer. A file with .COM
extension refers to COMMAND file name and the other with .EXE
extension refers “EXECUTABLE” program file.
Batch Files: the file containing a series of DOS commands, which are
executed automatically one at a time in the order entered, is known as
the batch file. A batch file has the extension .BAT. If the batch file is
given a special name AUTOEXEC.BAT, it is automatically executed
when the computer is switched on or during booting.
System Files: These are program files developed for system control.
They have .SYS extension.
This command displays the list of files and directories from the
drive A i.e. the floppy drive. It can be specified with two options:
Eg: DIR STATS.* : lists all files with STATS and other
combinations along with the extensions.
3. COPY: The COPY command is used to copy files from one place
to another. The way to execute copy command is to type COPY
leave a space followed by the source file name again a space
followed by destination file.
Syntax: copy {Drive name} <source file> {Drive name} <target file
name> e.g
1. COPY STATS MATHS copies a file ―STATS‖ with the name ―MATHS‖ on the
same drive
2. COPY PATH A: ENTO copies a file ―PATH‖ from the current drive to
drive ―A‖ with the file name ―ENTO‖.
REN: The REN command is used to rename the old file with another name.
The way to execute Rename command is to type REN leave a space followed
by the old file name again followed by a space and new file name.
C:\> CLS
DIR| SORT/R (or) DIR/O-N: Displays all the files in reverse order
(i.e Z to A)
3. VOL: This command displays the volume label of the current disk
Thus while in ―C‖ drive, one can directly invoke files of DOS,
WORDSTAR (WS) (or) LOTUS directories by giving the following
command:
When you’re ready to turn off the computer, use the Shut Down
command on the start menu. Using the Shut Down command
ensures that programs are closed properly. It prompt you to save your
work if haven’t done so already, and removes any temporary files the
program may have created. This ensures that all your work is saved
properly, and prevents your hard disk from becoming cluttered with
temporary files.
MICROSOFT WORD
1. Word Wrapping
2. Spell checking and grammar
3. Protecting documents
4. Editing facilities
5. Page preview facility
6. Mail merging
7. Auto correct
8. Help through office assistant
9. Find and replace facility etc
The Microsoft Office button performs many of the functions that were
located in the File menu of older versions of Word. This button allows
you to create a new document, open an existing document, save or
save as, print, send (through email or fax), publish or close.
You can also add items to the quick access toolbar. Right click on any
item in the Office Button or the Ribbon and click on Add to Quick
Access Toolbar and a shortcut will be added to the Quick Access
Toolbar.
The Ribbon
The Ribbon is the panel at the top portion of the document. It has
seven tabs: Home, Insert, Page Layout, References, Mailings, Review,
and View that contain many new and existing features of Word. Each
tab is divided into groups. The groups are logical collections of features
designed to perform functions that you will utilize in developing or
editing your Word document. Commonly used features are displayed
on the Ribbon, to view additional features within each group, click on
the arrow at the bottom right of each group. Each of the tabs contains
the following tools:
Home: Clipboard, Fonts, Paragraph, Styles, and Editing.
Insert: Pages, Tables, Illustrations, Links, Header & Footer, Text, and
Symbols
Mailings: Create, Start Mail Merge, Write & Insert Fields, Preview
Results, Finish
Click the Microsoft Office Button and Click New or Press CTRL+N
(Depress the CTRL key while pressing the “N”) on the keyboard. If you
wish to start from a blank document, click Blank. If you wish to start
from a template, you can browse through your choices on the left, see
the choices on center screen, and preview the selection on the right
screen
Note: To enter text into a document simply click the insertion point
where the text will begin and start typing.
Saving Document
Opening A Document
Click the Microsoft Office Button and Click Open, or Press CTRL+O
(Depress the CTRL key while pressing the “O”) on the keyboard, or if
you have recently used the document you can click the Microsoft
Office Button and click the name of the document in the Recent
Documents section of the window
Editing a Document
2. Copy and Paste Text: Highlight the text you wish to copy and
right click and click Copy, put your cursor where you want the
text in the document and right click and click Paste.
3. Cut and Paste Text: Highlight the text you wish to copy, right
click, and click Cut, put your cursor where you want the text in
the document, right click, and click Paste.
4. Drag Text: Highlight the text you wish to move, click on it and
drag it to the place where you want the text in the document.
Remember that you can preview how the new font will look by
highlighting the text, and hovering over the new font typeface.
Select the text and right click to display the font tools
Adding Tables
To create a table:
Place the cursor on the page where you want the new table
Click the Tables Button on the Tables Group. You can create a
table one of four ways:
Highlight the number of row and columns
Click Insert Table and enter the number of rows and columns
Click the Draw Table, create your table by clicking and entering
the rows and columns
The dialog box will open on the screen and you can search for
clip art.
Click Insert
Numbering Pages: To give your pages numbers
Features of Word-processing:
1. Word-wrap
2. Cursor control
3. Editing
4. Formatting
5. Spell-check
6. Thesaurus
7. Macros
8. Printing
9. File management
10. Mail merge printing
Formatting: The text formatting refers to the way the text is desired
to appear on a page. This includes following functions;
Setting left and right margins
Paragraph settings
Line spacing
Selecting font specifications such as underline, bold, italics,
superscripts and subscripts
Setting foot-notes
Number of lines per page
Printing page numbers and headings for ‗Header‘ and ‗Footer‘
Table of contents
Indexing the text
Save the document and then reopen it. Word flashes a message that the
author would like you to open this as read-only, unless you need to make
changes. Click Yes to open the document in read-only mode. Of course,
anyone can say no and open the document in edit mode. The goal is to make
it easier for people to open the document as read-only to mitigate the
chances of making unintended changes.
At the Encrypt Document window, create a password and click OK. Be sure to
use a complex but memorable password. If you forget the password,
Microsoft offers no way to retrieve or reset it, which means you won't be able
to access the document. Type the password again to confirm it. Click OK.
Resave and close the document. Reopen it. Type the password to access the
document. Click OK.
Remove the Password
To remove the password, click the File menu and select Protect Document.
Click on the option to Encrypt with Password. At the Encrypt Document
window, delete the dots that obscure your password. Click OK. Resave and
close the document. The next time you open it, you won't be asked for a
password.
Restrict Editing
Click on the File menu and return to the Protect Document button. Select the
option to Restrict Editing.
Your document then displays a Restrict Editing pane on the right for
formatting and editing restrictions. Here, you can give people permission to
read your document, as well as select what they can edit and how.
Formatting Restrictions
Editing Restrictions
Under Editing Restrictions, check the box to Allow only this type of editing in
the document. Click on the drop-down menu underneath. You can now pick
from among four options: Tracked changes turns on Track Changes for any
reader of your document and restricts all other types of
editing; Comments allows readers to insert comments in your document but
make no other modifications; Filling in forms lets readers fill in forms
you've created but not change those forms; and No changes (Read
only) puts your document in read-only mode so no changes can be made.
Select the option you want.
Exceptions
If you check the option for Comments or No changes (Read only), you can
create exceptions for anyone to be able to edit certain parts of your
document. In the Exceptions section, check the box for Everyone and select
any parts of the document that you want anyone to be able to edit.
Enforce Protection
Finally, click on the option for Yes, Start Enforcing Protection. Type and then
retype a password and click OK. Resave and close the document. Reopen it.
The editing controls on the Ribbon are now grayed out. Click in any section
of the document that you allowed for editing, and the controls become
accessible.
Signing Certificate
To create a digital signature, you'll need a signing certificate. The first time
you do this, Word flashes the message: "To sign a Microsoft Office document
you need a digital signature, would you like to get one from a Microsoft
partner now?" Click Yes. A Microsoft support page pops up to help you find a
digital ID. Try the links for the various providers to get a digital ID. Then, click
on the link at the webpage to Add or remove a digital signature in Office
files. Scroll down the page to learn how to add a digital signature.
After you have the digital ID, return to the Protect Document button and
again click on the option to Add a Digital Signature. At the Sign window, fill
out the necessary fields and click the Sign button. You may be asked to
confirm the digital signature. Click OK.
Your document is now digital signed and made read-only. Word explains that
the document has been signed and marked as final and that if anyone
tampers with it, the signatures become invalid. Anyone who opens the
document will see the notice of your digital signature.
Mark as Final
Finally, if you can't or don't want to use a digital signature, you can still mark
the document as final. Click on the File menu and return to the Protect
Document button. Select the option to Mark as Final.
A pop-up message tells you: "This document will be marked as final and then
saved." Click OK. Another message appears and tells you: "This document
has been marked as final to indicate that editing is complete and that this is
the final version of the document. When a document is marked as final, the
status property is set to 'Final' and typing, editing commands, and proofing
marks are turned off. You can recognize that a document is marked as final
when the Mark as Final icon displays in the status bar." Click OK.
Edit Anyway
When someone opens the document, a message pops up at the top:
"MARKED AS FINAL. An author has marked this document as final to
discourage editing." An Edit Anyway button also appears. If someone clicks
on that button, he or she can still edit and resave the document. But then
the document would show you as the author and the other person as the one
who last modified it. So the ultimate goal here is not to stop someone from
editing the document but to tell readers that the document is final and that
you should appear as both the author and the person who last modified it.
Video on how to protect a document (https://youtu.be/kclxXiIe4lc)
1. Productivity Softwares
2. Collaborative Softwares
3. Utility Softwares
4. Specialized Softwares
Productivity Softwares
Standard Toolbar
The Standard toolbar, located beneath the menu bar, has buttons for
commonly performed tasks like adding a column of numbers, printing,
sorting, and other operations. Excel let's you customize the toolbar or
even display multiple toolbars at the same time. The Standard Excel XP
toolbar appears in the
figure below.
While this is a perfectly fine way of doing it, a more efficient way would
be to use a Data Entry Form in Excel.
Below is a data entry form that you can use to make entries to this
data set.
Data Entry Form in Excel
Using a data entry form in Excel needs a little pre-work.
You would notice that there is no option to use a data entry form in
Excel (not in any tab in the ribbon).
To use it, you will have to first add it to the Quick Access Toolbar (or
the ribbon).
Adding Data Entry Form Option To Quick Access Toolbar
Below are the steps to add the data entry form option to the Quick
Access Toolbar:
1. Right-click on any of the existing icons in the Quick Access
Toolbar.
2. Click on ‘Customize Quick Access Toolbar’.
3. In the ‘Excel Options’ dialog box that opens, select the ‘All
Commands’ option from the drop-down.
6. Click OK.
7. The above steps would add the Form icon to the Quick Access Toolbar
(as shown below).
8. Once you have it in QAT, you can click any cell in your dataset (in
which you want to make the entry) and click on the Form icon.
Note: For Data Entry Form to work, your data should be in an Excel
Table. If it isn’t already, you’ll have to convert it into an Excel Table
(keyboard shortcut – Control + T).
New: This will clear any existing data in the form and allows you to
create a new record.
Delete: This will allow you to delete an existing record. For example, if
I hit the Delete key in the above example, it will delete the record for
Mike Banes.
Restore: If you’re editing an existing entry, you can restore the
previous data in the form (if you haven’t clicked New or hit Enter).
Find Prev: This will find the previous entry.
Find Next: This will find the next entry.
Criteria: This allows you to find specific records. For example, if I am
looking for all the records, where the candidate was Hired, I need to
click the Criteria button, enter ‘Hired’ in the Status field and then use
the find buttons. Example of this is covered later in this tutorial.
Close: This will close the form.
Scroll Bar: You can use the scroll bar to go through the records.
Now let’s go through all the things you can do with a Data Entry form
in Excel.
Note that you need to convert your data into an Excel Table and select
any cell in the table to be able to open the Data Entry form dialog box.
If you haven’t selected a cell in the Excel Table, it will show a prompt
as shown below:
The above snapshot shows basic navigation where you are going
through all the records one after the other.
But you can also quickly navigate through all the records based
on criteria.
For example, if you want to go through all the entries where the
status is ‘In-progress’, you can do that using the below steps:
1. Select any cell in the Excel table.
2. Click on the Form icon in the Quick Access Toolbar.
3. In the Data Entry Form dialog box, click the Criteria button.
Deleting a Record
You can delete records from the Data Entry form itself.
This can be useful when you want to find a specific type of
records and delete these.
Below are the steps to delete a record using Data Entry Form:
1. Select any cell in the Excel table.
2. Click on the Form icon in the Quick Access Toolbar.
3. Navigate to the record you want to delete
4. Click the Delete button.
While you may feel that this all looks like a lot of work just to
enter and navigate through records, it saves a lot of time if
you’re working with lots of data and have to do data entry quite
often.
STUDENTS ACTIVITY
TASK:
Demonstrate on computer
UNIT: 5
Practical Session 2 (Slides and hand-outs with Microsoft Power
point)
INSTRUCTIONAL MATERIALS: -
Whiteboard
Maker
Posters
Projector
Computer
TEACHING METHODS: -
Lecture
Demonstration
Group discussion
Audiovisual
TYPES OF ASSESSMENT: -
MCQ
Essay
Group presentation
LEARNING OBJECTIVES
5.1 Explain how to use Auto, Content, Wizard, design template, blank slide
or existing presentation to create slides
5.2 Explain how to insert objects and graphs into slides
5.3 Explain how to create hand-outs and the rationale behind it
5.1 How to use Auto, Content, Wizard, design template, blank slide
or existing presentation to create slides
A PowerPoint has two methods for creating a slide presentation:
• Choose a theme template
• Create a blank presentation (this method is covered in Unit 3)
PowerPoint software has built in and free online pre-designed
templates that contain various color schemes and pre-arranged
elements in a slide, e.g text and graphics. Select a template and
PowerPoint will format the entire presentation according to that
template.
Steps to choosing a theme template:
1. Open PowerPoint.
2. At the PowerPoint window, click the File tab, and then click New.
3. The Available Templates and Themes screen will appear, click on
an available template or download a free template from the
office.com online templates.
4. Once you have selected the desired template, it will be displayed
in normal view.
3. The new slide should appear below the selected slide. If you want
to add a new slide between two, select the first of the two slides
and click New Slide.
4. Notice the New Slide button contains a New Slide button arrow.
Click on the arrow to view different slide layouts. Another way to
change the slide layout is by clicking on the Layout button
located in the Slides group. The slide layout option determines
the position of the objects on a slide. Simply click on the layout
you want to use and it will appear in the slide pane.
Create Slide Content
Entering text and images into your presentation slide is easy and fun.
When using the theme template the first slide to appear in Normal
view is called the Title Slide.
The title slide is the slide that is used to introduce the presentation to
the audience. It has two text placeholders for text: title text
placeholder and sub-title text placeholder. Placeholders are the
building blocks for a PowerPoint slide.
To insert text in a placeholder, left click inside of the textbox and begin
typing. Once you have entered text, click outside the text box to see
how your text looks. The placeholder then becomes an object.
An object is any item on a slide that can be manipulated. Objects are
the building blocks that make up a slide. A text object can moved
around and repositioned on a slide.
To apply formatting to text inside an object, select the text with your
cursor, then click on the Home tab and in the Font group add text
attributes such as bold, underline, and italics. The Paragraph group,
located next to the Font group, contains commands that allow you to
change the alignment of text, insert numbers or bullets to lists, and
indent text.
You can also edit your text by accessing the Font dialogue box by
clicking the Font group dialogue box launcher. (The dialogue box
launcher is the small button containing a diagonal arrow that displays
in the lower right corner of the group.) The Font dialogue box includes
special effects such as: double strikethrough, superscript and
subscript.
Another quick and easy way to format slides is by using a slide master.
A Slide Master will reduce the steps needed to format all the slides in
a presentation. Any changes made in the slide master will affect all
slides in the presentation. This allows for consistency in any
presentation.
A slide master appears in the slide pane and in the Outline/Slide pane.
The largest thumbnail in the pane is the slide master and the other
thumbnails represent associated layouts. Click on the master slide or a
specific layout to apply formatting or themes. Once formatting changes
have been made click on Close Master View to return to the normal
view.
For more information on Slide Masters take this link to Microsoft Tips
for using Slide Masters. Multi-Level Bulleted Lists
The first-level bullet will be displayed under the title placeholder. Once
you have typed your text next to the first-level bullet press Enter on
your keyboard. The new first-level bullet automatically appears.
Press Tab on your keyboard and the first-level bullet becomes a
second level bullet. Press Shift + Tab this will decrease the indent
and bring the bullet back to first level.
Clip Art
PowerPoint provides many ways to insert clip art or graphic into a slide.
(Note: It is important to be certain that you have the legal right to use clip
art, photographs, sounds, and movies in your slide show). You can import
files saved in several different formats or add your own graphic or
PowerPoint has its own gallery of Microsoft clip art images. To insert a clip art
image choose a slide layout that has a content placeholder. Click the Insert
Clip Art button in the placeholder.
The Clip Art Task pane displays on the right side of the screen.
Enter a word that describes the clip art that you want in the text box labeled
“Search for,” and click Go. Graphics that are similar to the word that you
entered in the search box will appear in the task pane. Use the scrollbar to
browse through available clip art.
Click once on the clip art you would like to insert. Your clip art will appear on
the current slide, with sizing handles visible and the Picture Tools Format tab
will open.
The Picture Tools Format tab allows for color adjustment, cropping a picture,
adding lines around the picture and compressing a picture. By hovering over
each command in the available groups, the quick tip screen will appear
identifying the command that the icon represents.
Around the image, are sizing handles. They allow you to move and resize the
image on the slide.
Step 1:
i. Move your cursor over the picture and click once to select it.
ii. You will see a number of small circles appear along the edge of
the picture.
iii. These circles are called “sizing handles.”
iv. There is also one green circle, which is used to rotate the image.
Step 2:
Step 3:
i. Release the mouse button when you have achieved the desired
shape.
Step 1:
i. Move your cursor over the picture and click once. You will see
the sizing handles described above.
Step 2:
i. Click your cursor on one of the sizing handles that appear on the
corner of the picture.
ii. Hold the mouse button down and drag the picture to make it
smaller or larger.
iii. Using these corner handles maintains the original proportions of
the image (it does not stretch or squish).
Step 3:
i. Release the mouse button when you have achieved the desired
size.
ii. The size of a picture can also be changed by adjusting the aspect
ratio which is the relationship between the height and width of
an object.
iii. To change the aspect ratio of an object right click on the object
and select Size and Position.
iv. The Size and Position dialogue box will appear. Click on the size
tab. Check that the Lock aspect ratio box is selected.
To move a picture:
Step 3: Release the mouse button when you are satisfied with the location
of the image.
Adding Shapes
By clicking on the Insert tab and then Shapes in the Illustrations group you
can draw a variety of shapes, straight lines, free-form lines, or pre-designed
shapes and lines.
Once you have inserted Shapes on a slide you can then enhance the shape
by adding color to the shape, an outline, an effect, or any of the preset styles
available in the Shape Styles group located in the Illustrations section of the
Insert Ribbon.
Adding SmartArt
Sometimes when you are working with text the normal text attributes of
bold, italics, underline and colour are just not enough to capture the
audience’s attention. SmartArt allows you to create really dynamic illustrated
text! There are 7 basic types of SmartArt to choose from.
When you choose to add a SmartArt object you will work in two panes. As
you add text on the left side pane, the text is transferred into SmartArt
design. You can add or remove bulleted points to suit your own needs.
Use the features on the SmartArt Design ribbon to customize the colours and
appearance to suit your presentation. The SmartArt design can be moved,
adjusted and resized in the same fashion that a graphic can be adjusted.
When building presentations in PowerPoint, you will most often insert text in
a slide’s placeholders. However, when you want a label, an object, or have
control over where text is positioned you may want to use Text Boxes.
Click the Text Box button in the Text group of the Insert tab. Then click
and drag on the slide to create a text box. Enter the text then apply
formatting.
WordArt
Once formatted drag the WordArt to a location on the slide that is suitable
for your presentation.
The Notes Master is similar to the Slide Master (your time-saving best friend)
in that you can change the font family, color and size. You can also adjust
the size of the slide on the Notes Pages and change page orientation.
Here is also where you can add your company logo to every slide to comply
with corporate information distribution policies. Here, and only here (NOT on
your live slides, please).
However, the Notes Master is quite unlike the Slide Master in that you have
few formatting options outside of what I’ve mentioned. Although you can
visibly add shapes and lines, or remove the slide border in the Notes Master,
the changes will not show on your Notes Pages. A bit of false advertising, but
you can always add those elements to the individual Notes Pages.
Next, enable page numbers if they aren’t already. Only in the case of
handouts and phone-only presentations do I recommend page numbers.
Now, we’re going to refine every slide into a handout page. Click “Close
Master” and go to the first slide, then go to View → Notes Page.
For every slide, format the notes you wrote using bold, numbered lists, and
here, bullet points are ok. Make it narrative, for the readers’ benefit.
Remember, you are not there to guide them, so write your notes in a
professional yet conversational manner.
Feel free to remove some slides (like section headers) if a separate printed
page won’t provide any value.
Consolidate some slides if you feel a single idea is too sparse for one slide.
Let’s say you have three slides using the same chart because you have three
separate insights to present. Remember, you want to pace your live
audience one idea at a time. Example below:
For the handout, I can consolidate and add number annotations to take them
through corresponding points in my notes without using up 3 whole pages.
See the Notes Pages view below:
Note: all of the extra images and annotations you add to the Notes Page will
only display in Notes view.
You’re done! It will take a few tries to get the final product right, but once
you get the hang of it, you’ll never sweat the handout request again!
Benefits for the presenter
1. They allow you to cut down on the amount of material you cover
in your presentation and so not commit information overload.
2. They allow you to stop worrying about forgetting what you want
to say.
3. Audience members will have a concrete reminder making your
presentation more memorable.
4. Audience members can easily contact you later.
This is lazy and not effective. If your slides are bullet-point slides
(not recommended) then they will often be cut-down sentences
which will no longer make sense to the reader a week later. And
if they are visual slides (recommended) then they’re also unlikely
to make sense without additional text. If you’re presenting with
visual PowerPoint slides, one of the easiest ways of creating a
handout is to type the text of the handout in the “Notes” pane of
the PowerPoint edit screen. Then print your slides as “Notes”.
You’ll have an effective handout.
5. Include references
The handout may be passed onto people who were not at your
presentation. Or an audience member may look at it a year from
now when they’ve forgotten most of your presentation. Make
sure that it will make sense to them. For people who weren’t
present include brief credibility-establishing information about
you.
If you decide to go the web way, you can cut down the hard copy
handout to one page with the most important points from your
presentation, your contact details and the web address.
STUDENTS ACTIVITY
TOPIC: COMPUTER
Demonstrate on computer
UNIT: 6
(PRACTICAL SESSION 3)
INSTRUCTIONAL MATERIALS: -
Whiteboard
Maker
Posters
Projector
Computer
TEACHING METHODS: -
Lecture
Demonstration
Group discussion
Audiovisual
TYPES OF ASSESSMENT: -
MCQ
Essay
Group presentation
LEAARNING OBJECTIVES
6.1 Explain what the Internet is and its uses
6.2 Provide the full meaning of www
6.3 Explain / identify a browser on the computer
6.4 State the importance of emails and personally open an e-mail account
6.5 Connect with friends on social media
6.6 Carry out an assignment using online educational materials with
search engines like Google, Chrome, etc
6.7 Download and save online resources on a computer etc.
How to Download and Save Any Article as a PDF, or Print or Email or
video
These instructions will allow you to download, save and print any
article as a PDF.
2. Click on the “print” icon Print icon just below the article title.
3. You will see three choices in the upper left. Choose “PDF” to
download and save the article. Alternatively, you can choose
“Print” or “Email” to perform those operations.
4. If you prefer to save or print the article without the images, in
the upper right check the box “Remove Images”.
5. Once you have saved a PDF, you are welcome to use your Adobe
Acrobat PDF-editing tool to add your land grant university logo,
or your contact information.
Wide Area Network: When a network is located over wide areas such
as cities, states, countries or even continents, it is called a WAN e.g
i. Computers in different branches of a Globalized company.
ii. Internet
INTERNET
The internet is a global connection of computers. These computers are
connected via a huge network of telecommunication links. The internet
allows you to access to a whole resource of data and information
stored at different sites (called hosts) and locations around the world.
The communication links which inter connect each host computer use
a common method of transmission known as TCP/IP, which stands for
Transmission Control Protocol / Internet Protocol.
There have been many different web browsers that have come and
gone over the years. The first, named WorldWide Web (later changed
to Nexus), was invented by Tim Berners-Lee in 1990. However, the first
graphical browser and widely used browser that help bring popularity
to the Internet was NCSA Mosaic.
Note: If you changed your browser settings, it may also open the last
opened web pages or all the tabs you had opened when it was last closed.
What things to do when bored on the Internet?
Tip: In certain browsers, pressing the Alt key on your keyboard shows
hidden options.
Settings (menu)
Nearly all modern browsers today have moved advanced options and
features in the upper-right or left corner of the browser window. Each
browser's menu button is different:
the icon.
Forward
The forward button moves you forward a page. It only works if you have
previously used the back button. If you have not gone back, and your
browser shows a forward button, it will be grayed out.
Stop
The stop button no longer exists in the majority of modern web browsers.
However, its function (to stop a web page from loading) may still be
executed by pressing the Esc key.
Refresh (reload)
As you browse the Internet the browser cache's data it downloads, meaning
they store some or all parts of each page you visit on your computer. This
feature is useful as it allows users to not have to download the full page each
time they visit the same site. On some sites, you may want to refresh the
page to get the latest version (e.g., on a news site). The Refresh button can
also be used to reload a page that has failed to load because of an error.
Note: Press the F5 key or Ctrl+R to refresh the page from the keyboard. If
the F5 key is not working, you can also do a force reload by pressing Ctrl+F5
in Windows or on an Apple computer press command+R.
Home
The Home button is used to return users to their default web page; the same
page that loads when the browser is first opened.
• How to change my browser's homepage.
• How to make Computer Hope your homepage.
Search
In the past, the Search button open, the default search page or execute a
search on the text found in the address or URL text field. Today's browsers
have what is called an omnibox, which is a search function built into the
address bar.
Full Screen
History
This feature allows users to view the pages that have been visited since the
browser history was last cleared or created. All your saved pages are stored
in your Internet cache.
• How do I view my Internet browser's history?
• How do I clear my Internet browser history?
Note: The shortcut key for history for most browsers is Ctrl+H.
Favorites (bookmarks)
This folder stores websites or pages chosen by the user. The term "Favorites"
is used with Microsoft Internet Explorer; in other browsers this may be known
as bookmarks or a hotlist.
This feature, although no longer a button and may be accessed through the
main settings menu or pressing Ctrl+P on the keyboard.
Font (size)
This button no longer exists but was used to increase or decrease the size of
a font; an option now covered by the zoom feature.
Zoom
On modern browsers, holding down the Ctrl key and pressing either the "+"
(plus key) or "-" (minus key) zooms in or out, increasing and decreasing the
size of font and images. To reset the zoom function to its default size, press
Ctrl+0 (zero) at the same time.
Edit
Used to open and edit the web page you are currently viewing in an HTML
editor. Today, no longer found in browsers.
Search Engines:
Search engines are utilities used to search for information on the web. A user
interface is provided where you can enter the word or phrase you are
searching for. The search engine looks for the keywords we have entered
and returns the results of the search, providing links to relevant Web sites
for us to choose from. Some commonly used search engines are MSN, Alta
Vista, Google, Yahoo! search and Info seek etc.
STUDENTS ACTIVITY
TOPIC: How to Browse Using the Computer and the Internet
TASK:
Demonstrate on computer
References: