0% found this document useful (0 votes)
3 views

Course of Acces and Using internet

The document provides an overview of the Internet, including its definition, uses, and components such as web browsers, URLs, and IP addresses. It discusses different types of web browsers, their features, and how to configure settings for optimal use. Additionally, it explains the process of accessing and retrieving data from websites, including the roles of DNS servers and routers in data exchange.

Uploaded by

Esku Lulu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Course of Acces and Using internet

The document provides an overview of the Internet, including its definition, uses, and components such as web browsers, URLs, and IP addresses. It discusses different types of web browsers, their features, and how to configure settings for optimal use. Additionally, it explains the process of accessing and retrieving data from websites, including the roles of DNS servers and routers in data exchange.

Uploaded by

Esku Lulu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Prepared by Esku IT Department Maya Global Collage

Course of Accessing and Using Internet

Unit 1 Accessing Internet

1.1 Internet

The Internet is means of connecting a computer to any other computer anywhere in the world
via dedicated routers and servers.

The Internet is a global network of interconnected computers and devices that allows people to
share information, communicate, and access various online services.

When two computers are connected over the Internet, they can send and receive all kinds of
information such as text, graphics, voice, video, and computer programs.

Internet is network of networks.

The internet developed from software called the ARPANET which the U.S military had
developed.

Uses for the Internet:


The Internet is used for many things such as e-mail, social networking, job-hunting, getting the
latest news, research, listening to music, watching videos, getting driving directions, reading
online books and so much more

 Communication
 Information and Learning
 Entertainment
 Business and Work
Financial Transactions

Parts of Internet

A web browser is software that allows you to access and interact with websites and other
online content. It serves as a bridge between you and the World Wide Web (WWW),
interpreting web pages and displaying them on your device.

A webpage is a single document or page of content accessible on the internet via a web
browser.

A website is a collection of interconnected webpages hosted on a web server and accessible via
the internet. It is identified by a unique domain name (e.g., www.example.com) and is designed
to provide information, services, or entertainment to users.

1
Prepared by Esku IT Department Maya Global Collage

HTTP (HyperText Transfer Protocol) is the foundation of communication on the World Wide
Web. It is a protocol that defines how information is transferred between a client (like a web
browser) and a server over the internet.

UR(LUniform Resource Locator): It specifies the location of a resource on the Internet. It


consists of the basic address and path.

URL the web address of internet pages and Files. The URL tells the browser exactly where to
find the page. For example, www.akronlibrary.org is the URL or web address to get to the
library‗s website. *.com signifies the part of the URL that identifies what exactly that site is part
of i.e., institution, government, business, etc.

A. . com: generally, for commercial businesses


B. . net: network providers
C. . mil: military organizations
D. . gov: government organizations
E. . edu: educational organization

F. . org: non-profit organizations


I.ARPANET: The acronym stands for Advanced Research Projects Agency Network. ARPA of the
United States Department of Defense developed ARPANET, which became the world‘s first
packet switching network. Internet is the successor of ARPANET.
II.Internet Service Provider: A company, which provides users with an access to the Internet, is
known as an Internet service provider or Internet access provider. ISP, as it is called, offers
email accounts and other services like remote storage of files for its customers.

III.IP Address:Every device on the Internet has a unique identifier called an IP address It is a way
of numerically identifying an entity on a computer network. The original addressing system
known as IPv4, used 32 bit addresses. With the growth of the Internet, IPv6 came to be used
wherein the addresses are composed of 128 bits.

IV.Cyberspace: This term coined by William Gibson, is used to refer to the computer networks
connected to each other and the content they host. It is often used to refer to the Internet.
V.WWW: It is a collection of interlinked documents that are accessible over the Internet.A
subset of the internet, focused on web pages and resources linked via hyperlinks.It consists of
millions of web pages that contain text, images, voice and videos.

VI.Website: A website is a set of web pages consisting of text, audio and video. Web servers
host websites.
1VII.VIII.Web Page: Web pages are resources of information. They are generally created in the
HTML format and provide the web users with navigational abilities through hyperlinks to other

2
Prepared by Esku IT Department Maya Global Collage

web pages on the web.


IX.Home Page: The term home page is used to refer to the page that is the default page of any
website. It is the main page of a complex website.

X.Web Browser: A web browser is a software application that facilitates user interaction with
the text, audio, video and other information that is located on the web.

1.2 Internet browser and setting up home page

 Browser Software

Is a software program that allows a user to locate, access, and display web pages over the
internet.
1.2.1 Types of browser

A. Mozilla Firefox: Best overall

Mozilla's Firefox is one of the fastest internet browsers we tested for navigating between sites
and for fully loading pages. It also proved to be the most secure during our in-house tests using
live malware.

This browser is compatible with Mac and Windows operating systems, and with Android jand
iOS cell phones and tablets.
Mozilla includes a privacy browser so you can search online without cookies or other trackers.

B. Chrome: Best for Google Drive


Google Chrome comes standard on most Android mobile devices, so it is a good choice
for cell phones and tablets and Windows and Mac computers.Plus we‘ve found that it
works a bit better than Firefox on Android devices. If you use Chrome on multiple
devices, logging in to your account will give you quick access to documents you saved in
Google Docs, your Gmail messages and your bookmarks, regardless of the device you‘re
on. Search history is also saved with your account.
Chrome‘s privacy browser is available on all devices, including cell phones, to keep your
online activity private.

C. Microsoft Edge: Best for battery life


Compatibility issues for older Windows machines Microsoft Edge comes standard with
computers running the Windows 10 operating system, but it also works on both Android and
iOS cell phones. it's also a better proposition than Chrome or Firefox.
That's because Edge tends to use less memory (RAM) so it will feel faster on older computers
and tends to use less power, which is important on a laptop.

3
Prepared by Esku IT Department Maya Global Collage

Microsoft is one of the few internet browser developers that offers 'telephone support if you
are having difficulties with its program.
D. Safari: Best for Macs
Safari is one of the best choices for Mac devices because it is designed specifically for Apple‘s
machines. It connects quickly and loads full sites faster than any macOS-compatible browser we
tested.
This browser is the default for iPhones and iPads, and it syncs through your iCloud account, so
any changes you make on one device will be available on any device connected to your account.

E. Opera: Good all-rounder


Opera is decently fast, about on par with Firefox and Chrome when it comes to initial startup,
site navigation and page loading. It‘s compatible with both Windows and Mac computers, and
works on iOS and Android mobile devices. The URL bar doubles as a search bar, and it has
stacking, which means you can drag and drop open tabs in the order you want them.
1.2.2 Setting up Internet Option
A.Configuring Home page
A home page is generally the main page a visitor navigating to a website from a web search
engine will see, and it may also serve as a landing page to attract visitors.
The home page is used to facilitate navigation to other pages on the site by providing links to
prioritized and recent articles and pages, and possibly a search box. For example, a news
website may present headlines and first paragraphs of top stories, with links to full articles, in a
dynamic web page that reflects the popularity and recentness of stories. Meanwhile, other
websites use the home page to attract users to create an account. Once they are logged in, the
home page may be redirected to their profile page. This may in turn be referred to as the
"personal home page".

A website may have multiple home pages, although most have one. Wikipedia, for example, has
a home page at wikipedia.org, as well as language-specific home pages, such as
en.wikipedia.org and de.wikipedia.org.
B. Configuring location of temporary files
Temporary Internet Files are a folder on Microsoft Windows which serves as the browser cache
for Internet Explorer to cache pages and other multimedia content, such as video and audio
files, from websites visited by the user. This allows such websites to load more quickly the next
time they are visited.
Each time a user visits a website using Microsoft Internet Explorer, files downloaded with each
web page (including HTML and JavaScript code) are saved to the Temporary Internet Files
folder, creating a web cache of the web page on the local computer's hard disk drive, or other
form of digital data storage. The next time the user visits the cached website, only changed
content needs to be downloaded from the Internet; the unchanged data is available in the

4
Prepared by Esku IT Department Maya Global Collage

cache.
1.2.3 Configuring privacy and security level

Configuring privacy and security level" means adjusting settings on a device, application, or
online account to control how much personal information is shared and to implement security
measures to protect that data.
Optimizing your browser‘s settings is a critical step in using the Internet securely and
privately. Today‘s popular browsers include built-in security features, but users often fail to
optimize their browser‘s security settings on installation. Failing to correctly set up your
browser‘s security features can put you at a higher risk for malware infections and malicious
attacks. This installation of our ―Cyber security 101‖ series provides our tips for securing
several of today‘s most popular browsers, including Google Chrome, Mozilla Firefox, and
Microsoft Internjgned to support the earlier versions of these standards may display differently
when viewed with web browsers designed to support current versions of the standards, such as
Internet Explorer. In order to help such websites display correctly, Internet Explorer supports a
display mode called Compatibility View, which displays web pages as if they were viewed by an
earlier version of the browser.

1.3.1 Modifying Toolbars


Introduction to toolbars
A browser toolbar is a toolbar that resides within a browser's window.

Browser toolbars are specific to each browser, which means that a toolbar working on a
browser does not work on another one. All browser toolbars must be installed in the
corresponding browser before they can be used, and require updates when new versions are
released.

All major web browsers provide support to browser toolbar development as a way to extend
the browser's GUI and functionality.

I.Developing a toolbar

The programming language and development tools behind a browser toolbar vary from one
browser to another.
In Internet Explorer 5 or later toolbars may be created as browser extensions written in C# or
C++.
In Firefox toolbars can be created as add-ons that contribute to the GUI by extending the
browser with XUL the toolbar is written in JavaScript .

In Safari 5 or later toolbars can be created as extensions that add bars and buttons the toolbar
is written in JavaScript with access to a special JavaScript API to interact with the Safari

5
Prepared by Esku IT Department Maya Global Collage

application and web content.


In Google Chrome 4 or later toolbars can be created as extensions that add browser actions to
the browser window the toolbar is written in JavaScript with access to a special JavaScript API
to interact with the Chrome application and web content.

In Opera 11 or later toolbars can be created as extensions that add buttons to the browser
window the toolbar is written in JavaScript with access to a special JavaScript API to interact
with the Opera application and web content.
In Firefox, Chrome, Safari and Opera toolbar styling is done though CSS.

II.Native vs. injected toolbars

Native toolbars use browser-specific code to create the same toolbar for each different browser
version.
Some major browsers (Internet Explorer and Firefox) enable the creation of native toolbars i.e.,
toolbars which are directly inserted in the browser window. Examples of native toolbars are
Google Toolbar and Stumble Toolbar.

Injected toolbars use essentially the same JavaScript code to draw the toolbar for each
different browser version. All major browsers support injected toolbars.
Native toolbars present faster load times, since injected toolbars must wait for the DOM to be
created in order to insert the toolbar in it. Toolbars require less frequent updates because part
of their code is dynamically downloaded in the JavaScript file that draws the toolbar. Injected
toolbars allow for shorter development times since the JavaScript code that creates the toolbar
may be written once for all browsers.
Injected toolbars allow for an easier toolbar update policy, since changes that are made in the
injected JavaScript code do not require releasing a new toolbar version.

Injected toolbars consume requests to download the JavaScript code that inserts the toolbar in
every page, while native toolbars consume no such requests.
1.3.2 Accessing and retrieving data from particular site

Accessing and Retrieving Site Data

the process of extracting information from a website, typically by using programming


techniques to download the website's HTML code and then parsing it to identify and extract
specific data points like text, images, or other elements based on predefined criteria, often
called "web scraping.".

6
Prepared by Esku IT Department Maya Global Collage

a. From URL to IP address


The easiest way to access a website is to write the desired address into the address bar located
in the browser. This address is known as a Uniform Resource Locator (URL)

example of a webpage URL:The World Wide Web (WWW) is a system of electronically stored
hypertext documents. The hypertext transfer protocol (HTTP) is used in the World Wide Web in
order to transfer webpage data from the web server to the browser.

Hypertext Transfer Protocol Secure (HTTPS) is an encrypted version of the protocol:

Computers work with combinations of numbers (known as IP addresses) to find a server on the
internet. This step requires translating a webpage‘s URL into the corresponding IP address.

b. DNS server: a directory for IP addresses

The domain name system (DNS) is a naming database in which internet domain names are
located and translated into Internet Protocol (IP) addresses.

When a web address is entered into the search bar of the browser, the browser looks for the
requested domain in its cache. The DNS server that is to be requested can be configured in the
operating system as well as in the router. Per default, the internet access provider sets the
address of its own DNS server there.

c. The router as a link between computer and server


The router is the interface between the internet and home network. It requests data from the
internet and distributes it to networking devices such as desktop computers, laptops, and
tablets.

allowing data to be transmitted between them by directing packets of information to the


correct destination across the network, essentially acting as a traffic manager to ensure smooth
communication between devices on the internet.

The router is required as a link since the devices in the home network communicate with each
other .

using local IP addresses, while outwardly sharing the router‘s public IP address. The network
addresses are then translated with a process known as Network Address Translation (NAT).

d.Data exchange via HTTP


When the IP address of the chosen webpage is identified, the browser requests the relevant
data for the page from the appropriate web server. This request takes place via HTTP in the
form of a data packet, which contains all the information the web server needs in order to
deliver the webpage data. The browser communicates the IP address of the chosen webpage,

7
Prepared by Esku IT Department Maya Global Collage

and provides information on the operating system, itself, and the device on which the webpage
should be displayed. If the server can‘t find the webpage at the requested address, it either
sends a 404 error code (webpage not found) or sends the visitor to the new URL via redirect if
it‘s known.
e. Page rendering in web browsers

Page rendering" in web browsers refers to the process where a browser takes HTML, CSS, and
JavaScript code and transforms it into a visually interactive web page that users can see on their
screen.Incoming data packets from the internet are finally forwarded from the router to the
computer on which the webpage is being accessed. The web browser then takes on the task of
analyzing the data packets.

Each browser has a cache in which data is temporarily stored when a webpage is accessed.

1.4 Loading image

In accessing information on the Internet you may have to consider whether to load or not load
images.
Loading image can be perform by using the capabilities of your modem Speed, computer and
browser .

I.Modem Speed

Modem Speed is the rate at which it can transmit data, measured in bits per second (bps) or
megabits per second (Mbps).
Having a fast modem connected to your computer will download images quickly. If a slower
speed modem is connected to your computer, then images will be downloaded at a much
slower rate. Being aware of your modem‘s capabilities will help you decide on whether images
should be loaded or not loaded. The bandwidth of your Internet connection is dependent on
the speed of your modem. If the bandwidth is small it will not be able to download images very
quickly.

II.Computer speed and capacity

The speed and capacity of your computer also affects the speed at which images are loaded. If
the computer's speed is slow and the capacity minimal, it may be better toturn off multimedia
features such as pictures, sounds and videos in order to speed up the delivery and display of
web page information.
To display a web page without graphics, select Tools from the menu bar and choose Internet
Options. From the Internet Options dialogue box there are six tabbed sections. Select the
Advanced tabbed section.

8
Prepared by Esku IT Department Maya Global Collage

III.Browser Capabilities
To display web page details as quickly as possible, consideration should be given to the types of
browsers available. Browsers such as Microsoft Internet Explorer and Netscape Navigator are
referred to as graphical browsers as they are able to display graphics, colors and multimedia
features.
When a web site is visited, the details of that web page are stored in the browser's cache. Web
pages stored to be read offline are also stored in the cache. Microsoft Internet Explorer's cache
is labeled 'Temporary Internet Files' whereas Netscape Navigator stores its cache in the
program folder. This speeds up the display of pages that are visited frequently because the Web
page details are accessed from the cache instead of from the web. It is possible to increase the
size of the cache, but doing this will reduce the space available for other files on your computer.

1.4.2 Uniform Resource Locator (URL)


Each website is located at a unique global address called a Uniform Resource Locator (URL).
When you know the address of a web site it is much easier to locate. Referencing the Uniform
Resource Locator URL allows you to jump directly to that page at that URL regardless of where
you currently are on the web. All web browsers let you jump directly to a Uniform Resource
Locator (URL) a unique address for Internet resources that are available through a web
browser, including files or directories.

URL‘s specify three pieces of information needed to retrieve a document:


the protocol to be used
the server address and port to which to connect
the path to the information
The format for a URL is: Protocol://server-name: port/path. For example,
http://home.netscape.com/welcome/html
When a web site is displayed on the screen, it is possible to access the links that are contained
within that site. Clicking on a link (or tabbing to the link and pressing Enter) will take you to
another section of the web site, a Web page related to the site or even to a different web site.

A link- is a connection from one web resource to another. Although a simple concept, the link
has been one of the primary forces driving the success of the web.
A link has two ends – called anchors-- and a direction. The link starts at the "source" anchor and
points to the "destination" anchor, which may be any Web resource (e.g., an image, a video
clip, a sound bite, a program, an HTML document, an element within an HTML document, etc.).
After you have successfully identified the URL you will be able to access the links provided by
the URL.

1.5 Deleting Cookies and Browsing History

9
Prepared by Esku IT Department Maya Global Collage

A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin
website to send state information to a user's browser and for the browser to return the state
information to the origin site.
The state information can be used for authentication, identification of a user session, user's
preferences, shopping cart contents, or anything else that can be accomplished through storing
text data.
Cookies are not software. They cannot be programmed, cannot carry viruses, and cannot install
malware on the host computer. However, they can be used by spyware to track user's browsing
activities – a major privacy concern that prompted European and US law makers to take action.
Cookies could also be stolen by hackers to gain access to a victim's web account, thus, the need
to delete cookies.

Unit Two: Search Internet

Search Internet is an entry into a search engine that yields both paid and organic
results.

2 search engine
A search engine is a tool we use to find websites and information on the Internet. Search
engines will search other computers connected to the Internet and classify the files they find on
these computers.

2.1.1 Opening search engines using search parameters

The most commonly used search engines include:


I. Google:-Most widely used, AI-powered search results
II. Yahoo:
III. MSN
IV. bing:-Bing is a popular crawler-based search engine developed by Microsoft.
V. AltaVista
VI. Netscape
VII. Ask

A. Differences between search engines

There are a huge variety of search engines. Most search engines explore most of the computers
connected to the Internet.

Some specialist search engines are based on specific topic areas. For example, Web Wombat
was the original Australian search engine. When you use this search engine you will find your

10
Prepared by Esku IT Department Maya Global Collage

results listed in order of relevance to Australia.


Other examples include:
 Lexplore — specialises in information related to international law
 Travelocity — specialises in information related to travel
 Hotwire — specialises in information related to computer and communications technology

B. Searching information on the internet the Internet


In order to use a search engine, you must first locate the search engine on the Internet.
Usually you would do this either by typing in the URL of the search engine you wish to
use. A search bar will appear and you type your expression into this bar.

This is the search bar in Google. Access this screen by typing in the URL
http://www.google.com.
Alternatively, you might click on the Search button on the toolbar of your browser. This will
take you to a search engine screen to allow you to enter your search expression. Note: if you
use the Search button, your browser may randomly generate which search engine to use for
your search.

2.1 .2 GETTING STARTED USING GOOGLE CHROME

What is Google?

Google is the most popular search engine on the Internet. A search engine is a program that
searches for items online that correspond to keywords or characters specified by internet users.
Google is easy to use, and also more effective than the average search engine, making it easier
to find what you are looking for.
Google is also home to a variety of features such as Google Maps, Google Drive, Google Docs,
Images, Gmail, Calendar, Translate, and much more.

2.2 Searching the World Wide Web

To begin searching the World Wide Web (aka the Internet) you must launch a web browser.
There are many different web browsers to choose from and it is up to personal preference on
which one you choose.
2.2.1 Performing a search using Google chrome
Let‗s visit Google:
• Type google.com in the address bar.
• In Chrome, type your search terms into the address bar, or go Google.com in your web
browser. Just type your search terms in the search bar, then click the Google Search button or
press Enter on your Keyboard.

11
Prepared by Esku IT Department Maya Global Collage

After you type search terms into search bar, you will see a list of relevant websites called search
results.If the site doesn't have what you need, click on the Back button at the top of the
browser window to return to the results page to look for more options.
• Click in the search box and type recipes.
• A drop box will appear below with suggestions of other search terms.
• Feel free to click on one if it matches what you are looking for.
• Hit the Enter key or click on the Google Search button to conduct the search.

2.2.2 Composing a search expression


When you are looking for search terms try to:
 Type in the question in a full English sentence.
 Use just the main keywords.
 Add more keywords to narrow down (reduce) the number of hits.
 Define (by clicking a button) if you wish to search the entire web, or if you just wish to search
Australian sites.
 Use synonyms and acronyms for the keywords.
 Use words to broaden your search like OR.
 Use words to narrow your search like AND, +, -, NOT.
 Use double quotation marks to ensure the phrase you are using is located in exactly that
sequence.
2.2.3 Narrowing or broadening a search
The trick to getting good results from your search expression is to be able to broaden or narrow
your search as required.
 Use words to broaden your search like OR.
 Use words to narrow your search like AND, +, -, NOT.
Notice that different search engines will give you different results.

2.3 saving and presenting searching engine

Online data storage refers to the practice of storing electronic data with a third party
servicesaccessed via the internet. It‘s an alternative to traditional local storage (such as disk or
tape storages) and portable storages (such as optical Medias or flash drives). It can also be
called ―hosted storage or ―cloud storage

2.3.1. Introduction to online Data Storage


In recent years, the number of vendors offering online data storage for both consumers and
business has increased dramatically. Some services store only a particular of data, such as
photos, music or back up data, while others will allow users to store any type of file.

2.3.2. Benefits of online storage

12
Prepared by Esku IT Department Maya Global Collage

Is used for the ability to access data from anywhere.

it help transfer data between devices.

It also provides the ability to share files among different users.

Used for backup and disaster recovery situations because it‘s located off site.
2.4 Bookmark the Webpage ss

A bookmark is a saved shortcut that directs your browser to a specific webpage. It stores the
title, URL, and icon of the corresponding page.

All major web browsers allow you to create bookmarks, though each browser provides a slightly
different way of managing them. For example, Chrome and Firefox display your bookmarks in
an open window, while Safari displays them in a list in the sidebar of the browser window.
Internet Explorer uses the name "Favorites" to refer to bookmarks, and like Safari, it displays all
your favorites in a list within the browser window side bar
2.3.1 Creating and Saving Book marks
To create a bookmark, simply visit the page you want to bookmark and select Add Bookmark or
Bookmark this Page from the Bookmarks menu. In Internet Explorer, you can click the star icon
to open the Favorites sidebar and click Add to Favorites to add the current page to your
bookmarks.

Saving bookmarks allows you to easily access your favorite locations on the Web.

Some browsers even display your bookmarked pages in the auto complete drop down menu as
you type in the address bar. This allows you to visit bookmarked pages without even opening
the bookmarks window or sidebar in your browser.
NOTE: A bookmark only stores the location of a webpage, not store the contents of the
webpage itself. Therefore, when you open a previously saved bookmark, the contents of page
may have changed since the last time you viewed it.

2.3. Adjust Print Margins on a Web Browser

To take the information with you everywhere, you must print it. You can print Web pages
directly from your Web browser and, to print more data on a page; you can adjust the print
margins.
2.3.2 Modifying Page set up options and printing Information
Both Internet Explorer and Mozilla Firefox enable you to adjust print margins from the Print
menu.

How to print with modified page setup:

13
Prepared by Esku IT Department Maya Global Collage

Open the document: Load the document you want to print in your application.

Access Page Setup: Go to the "File" menu and select "Page Setup".

Adjust settings: Make necessary changes to paper size, orientation, margins, etc.

Print: Click "Print" and select the desired printer settings.


 Printing background colors
If you are trying to print a story with a background color, Internet Explorer and Firefox users will
need to also turn on 'Print Background Colors', usually found under Page Setup. Chrome and
Safari have this option turned on by default.
 Other printing options

This explains how you can remove the number of pages, date, title etc. that the browser
applies to the headers and footers of each printed page by default.
 Different browsers, operating systems and printers
 Shutting Down and Exiting Browse
Before you are going to shut down your browser first you should save all the necessary
information and also you must wait if down loading and uploading data/image is on progress. If
you shut down before the data is completed your data may be corrupted or destructed.

2.5 OHS and netiquette principles implemented on online communication

This is include guidelines to ensure safe and respectful interactions in the digital space,
encompassing aspects like privacy protection, appropriate language use, avoiding harassment,
and maintaining professional boundaries
In the information superhighway, netiquette (internet-etiquette) are the rules of the road. it
helps you become better understood, exude professionalism, and create a positive online
reputation that will lead you to more lasting and meaningful connections.
2.4.1Observing OHS and netiquette principles

Observing Occupational Health and Safety (OHS) and netiquette principles is essential for
maintaining a safe and respectful work or online environment.

1) Observing OHS Principles

OHS ensures a safe and healthy workspace while using digital devices. Some key principles
include:

a) Proper Ergonomics:

b)Workplace Safety

14
Prepared by Esku IT Department Maya Global Collage

c)Safe Digital Practices

d) Eye Protection
e) Screen Time Management

2. Observing Netiquette Principles

Netiquette (Internet etiquette) ensures respectful and effective communication online:


2.4.2 Core rules of netiquette
In her book Netiquette, Writer Virginia Shea wrote these important guidelines:
 Remember the human – this is the Golden Rule of internet communications. Always be aware
that you are talking to a person, not a device. Therefore, the same rules of courtesy apply.
 Adhere to the same standards of behaviour online that you follow in real life
 Know where you are in cyberspace – netiquette varies from domain to domain.

 Respect other people‘s time and bandwidth


 Make yourself look good online – spelling and grammar count! Always write thoughtful posts
and keep your language clean.
 Share expert knowledge
 Help keep flame* wars under control
 Respect other people‘s privacy
 Don‘t abuse your power

 Be forgiving of other people‘s mistakes

*Flaming is writing content online that intentionally invokes responses such as rage, sadness,
humiliation, self-doubt, and others. From: No bullying.com.
Netiquette basics

These basic rules are adapted and updated from living internet.com:
 Help the newbie’s – good netiquette dictates that you share your knowledge to new users by
answering some of their questions. Remember, you too were a newbie once.
 Research before asking – most sites have a Frequently Asked Questions (FAQs) page to guide
new users.

 Remember emotion – subtle emotions and meanings do not transmit very well in an email.

Living internet.com also has helpful tips on the Netiquette of sending, Netiquette of replying,
and Netiquette of confidentiality. You can read them here: Internet Etiquette.
2.6 The Ten Commandments of Computer Ethics

15
Prepared by Esku IT Department Maya Global Collage

(from the Computer Ethics Institute)


 Do not use a computer to harm other people.
 Do not interfere with other people‘s computer work.
 Do not snoop around in other people‘s computer files.

 Do not use a computer to steal.


 Do not use a computer to bear false witness.
 Do not copy or use proprietary software for which you have not paid.
 Do not use other people‘s computer resources without authorization or proper
compensation.
 Do not appropriate other people‘s intellectual output.

 Do think about the social consequences of the program you are writing or the system you are
designing.
 Always use a computer in ways that insure consideration and respect for your fellow humans.
Unit Three: Organize and Complete Daily Work Activities

3. Work plans and Goals


Our personal work goals and plans need to fit in with your overall team‘s goals and
plans.
Make sure you actively participate in work meetings about work goals and plans. If you
don‘t understand something, ask questions to clarify what you have to do. If you think
something isn‘t fair, make sure you speak out. Everyone needs to understand and agree
to the goals and plans that have been established. Your work goals and plans should be
negotiated with at least one other person.
People you need to negotiate your work plan with:
• Coach or mentor
• Supervisor or manager
• Team leader
• Peers, work colleagues or other members of your team
3.1 Work goals and plans to Organize Work Activities
Be clear on your work duties position description should tell you what your
responsibilities are, clarify with supervisor
 How does your job affect the organizations goals?
 What do you need to achieve on a daily basis?
 What do you need to achieve on a daily basis?
3.1.1 Set goals
Knowing what you want to achieve can help you attain it.

16
Prepared by Esku IT Department Maya Global Collage

A good way to organize your tasks and get things done is to set goals. Work goals
provide:

• A purpose for the work

• Valuable feedback on your progress

• Further incentive to achieve – it feels great to reach a goal.

Some goals are short-term goals, such as preparing a letter for a client. Others are long-
term, such as improving the team‘s filing procedures. You should try to distinguish
between your short-term goals, your day-to-day goals and the long-term goals set by
your supervisor and team. Your goals are the things you want to accomplish. To be
effective, goals need to be SMART, as in the following SMART goal-setting formula.
Goals should be:
 S= Specific
 M= Measurable
 A= Attainable
 R= Realistic
 T= Timely
I. Specific
Goals should be straightforward and emphasize what you want to happen. Specifics help
us to focus our efforts and clearly define what we are going to do
Specific is the What, Why, and How
WHAT are you going to do? Use action words such as direct, organize, coordinate, lead,
develop, plan, build etc.
WHY is this important to do at this time? What do you want to ultimately accomplish?
HOW are you going to do it? (By...)Ensure the goals you set is very specific, clear and
easy
II. Measurable
If you can't measure it, you can't manage it. In the broadest sense, the whole goal
statement is a measure for the project; if the goal is accomplished, it is a success.
Choose a goal with measurable progress, so you can see the change occur
How will you be when you reach your goal? Be Specific! "I want to read 3 chapter books
of 100 pages on my own before my birthday" shows the specific target to be measure. "I
want to be a good reader" is not as measurable.
When you measure your progress, you stay on track, reach your target dates, and
experience the Exhilaration of achievement that spurs you on to continued effort

17
Prepared by Esku IT Department Maya Global Collage

required to reach your goals.


III. Attainable
When you identify goals that are most important to you, you begin to figure out ways
you can make them come true. You develop the attitudes, abilities, skills, and financial
capacity to reach them. Your begin seeing previously overlooked opportunities to bring
yourself closer to the achievement of your goals.
A goal needs to stretch you slightly so you feel you can do it and it will need a real
commitment from you. The feeling of success which this brings helps you to remain
motivated.
IV. Realistic
This is not a synonym for "easy. ―Realistic, in this case, means ―do able. ―It means
that the learning curve is not a vertical slope; that the skills needed to do the work are
available; that the project fits with the overall strategy and goals of the organization. A
realistic project may push the skills and knowledge of the people working on it but it
shouldn't break them.
Devise a plan or a way of getting there which makes the goal realistic. The goal needs to
be realistic for you and where you are at the moment. For instance, it may be more
realistic to set a goal of completing 5 things on your to do list than completing
everything on your to do list.
Be sure to set goals that you can attain with some effort!
Set the bar high enough for satisfying achievement!
V. Timely:-Time must be measurable, attainable and realistic.
Set a timeframe for the goal: for next week, in three months, by November. Putting
an end point on your goal gives you a clear target to work towards. If you don't set a
time, the commitment is too vague. It tends not to happen because you feel you can
start at any time. Without a time limit, There‘s no urgency to start taking action now.

3.1.2Prioritizing:- To devote most time to the most important tasks.


Efficiency and effectiveness are not the same someone who works hard and is well
organized but spends all their time on unimportant tasks may be efficient but not
effective. To be effective, you need to decide what tasks are urgent and important
and to focus on these. This is called Prioritizing It's important to list the tasks you
have and to sort these in order of priority.You will need to carefully
l?.........?.locatio.................................

3.1.3Procrastination

18
Prepared by Esku IT Department Maya Global Collage

Procrastination is the scourge of action planning. It's important that you manage 'Your fear of
doing things' you don't want to do and realize that the fear is often far worse than any possible
negative results. The best time to do something is usually NOW.

Taking action generates the impetus for further action Break goals down into their components
so that You can accomplish them one step at a time. Write these steps down, and try to be as
specific as you can when you do this.
Try to complete one task before you go on to the next.
Reward yourself for achieving these goals to maintain your enthusiasm. When things are not
working out, you need to persevere and learn how to take a positive attitude towards
frustration and failure.
Mistakes are a crucial part of any creative process and each is a lesson leading you towards the
right solution. Try to be aware that satisfaction comes as much from pursuing goals as from
achieving them.Work at effective strategies to deal with pressure these can vary from taking
exercise, to relaxation techniques such as meditation, to simply sharing problems with friends.

Organize your time


Work to schedule so that you meet deadlines in good time doesn‘t leave everything
until the last minute.
3.1.4 Plan & Organize Work Activities
Planning and organization makes efficient use of your time at the office by keeping you
focused from beginning to completion of a project. Acomprehensive plan for work
activities and projects ensures you tackle all necessary steps for success. An
organizational plan also facilitates collaboration and information sharing with other
team members who play a role in the completion of the activities.
Tweaking your organizational method allows you to create the most effective planning
system for your office.
 Step 1
Identify the scope and goals of the planning process related to each work activity.
Determine what you need to accomplish for the success of the activity or project.
Identify the employees who will play a role in the task if it is a team project.
 Step 2
Break down the major tasks for the activity into smaller steps that you need to take for
completion, essentially creating a to-do list for the project. If other employees are
working on the tasks with you, assign each person a role and specific responsibilities to
divide the workload.
 Step 3
Establish the timeline for completing the work activity. Assign each individual task that
goes into the activity a completion date to make sure everything is completed in a

19
Prepared by Esku IT Department Maya Global Collage

timely manner. Give yourself enough time to complete all associated tasks before the
deadline passes.
 Step 4
Write each due date for the project tasks on your calendar, or set up reminders that pop
up on your computer screen as the deadlines approach.
 Step 5
Identify potential problems or barriers you may face for the work activities. Create an
action plan to avoid those isses to keep the project on track.
 Step 6
Utilize an online project management program for major work activities that are critical
to the company's success. These programs are particularly effective for complicated
projects or activities that involve many team members. The progress is tracked and all
employees can stay updated through the program.
 Step 7
Schedule planning meetings, when active participation and feedback is needed ,from
others working on the project. Keep the meetings focused and productive to use the
time efficiently.
 Step 8
Send out regular updates and communication to all other employees who are working
on the project. This allows all team members to stay informed and update their to-do
lists and timelines as necessary
3.2 Team Relationship
Your personal work goals and plans need to fit in with your overall team‘s goals and
plans.
Make sure you actively participate in work meetings about work goals and plans. If you
don‘t understand something, ask questions to clarify what you have to do. If you think
something isn‘t fair, make sure you speak out.
3.2Negotiate work plans and goals with the appropriate people
Everyone needs to understand and agree to the goals and plans that have been
established. Your work goals and plans should be negotiated with at least one other
person. People you need to negotiate your work plan with:
• Coach or mentorLeenjisaa ykn gorsaa
• Supervisor or manager Suppervaayizara ykn hogganaa
• Team leader Hogganaa garee
• Peers,Hiriyyoota work colleagues or other members of your team
Identify your role in the organization from the organization to the work group to the
individual worker – the big picture‘ goals and plans are broken down until they reflect
your individual tasks and responsibilities.

20
Prepared by Esku IT Department Maya Global Collage

If you don‘t understand how you fit into the big picture‘, ask your supervisor to explain.
3.2.2 Determine your resources
Resources are the things you need to help you complete a task.When you are planning
your work, make sure that you allow enough time to gather resources. You need to
know where relevant resources are kept, and whether you need permission to take
them.
For example, your supervisor may need to sign a form or you may need to write down
what you have taken. Make sure you always follow your organization‘s procedures for
using resources
3.2.3 Work out prioritiesWantoota dursa kennaniif hojjedhu
Once you know the required time lines and the relative importance of your tasks, you
can set priorities. Your day-to-day workload will usually include a variety of tasks. Some
tasks need to be completed straight away, such as arranging a courier or answering a
telephone call. Others, such as filing or data entry, are routine tasks that are done
regularly, but may be done at any stage during the day. Your supervisor might tell you
which tasks to do first. Try to organize your work so that it is completed in time for
others to do theirs. Sometimes you will have to change your priorities.
For example, yourUse planning tools
Your organization might require a more long-term schedule, such as a weekly or
monthly work plan. This gives you a long-term view of your tasks and priorities and is
more formal than a daily work plan.
You will usually work this out in your work group and with your manager or supervisor.
Whether you are writing a short-term or a long-term schedule, there are various
planning tools you can use to help you plan your workload. fe’iinsa hojii
Below are some examples of useful planning tools.meeshaalee karooraa faayidaa qaban.
A.Review prioritiesWantoota dursa kennaniif irra deebi’ii ilaali
It is a good idea to review your list of priorities about halfway through each day. This
gives you a chance to monitor your daily work schedule, set new priorities and make the
best use of your remaining time. Regularly review your long-term work schedule. As
priorities change within the organization, your own priorities should change as well.
Your supervisor should tell you about any changes as they occur. Always check with your
supervisor if you are not sure about your priorities.
There are many reasons for an organization to change its priorities. Often, it‘s in
response to outside factors.sababoota alaa Outside factors that affect organizational
priorities include:
 a change in the price of materials needed for manufacturing a product
 a decrease or increase in sales of a product
 a change in government regulations.

21
Prepared by Esku IT Department Maya Global Collage

B.Do several tasks at the same time


As you gain more experience, you need to develop the ability to work on several tasks at
the same time. Life might be simpler if you could just work on one task, and then the
next.
Time management and multi-taskinghojii hedduu hojjechuu are the important skills in a
workplace. They are skills that take practice and require you to think and plan ahead.
For example, many tasks, such as photocopying or working on receptionsimannaa , may
involve some waiting, and this waiting time can often be used to do something
I. Supervisor feedback
Feedback from your supervisor is also valuable gati-qabeessa. They may have a private
discussion with you for things that only concern you. At other times they will give you
feedback in a team meeting, particularly if what they have to say concerns the rest of
the work group. As well as informal discussion and advice, you may have a more formal
review. This may be called performance appraisal‘ and can happen every six months or
once a year. It is an opportunity for you and your supervisor to sit down and discuss all
aspects of your work. Write notes about points that you can rise in discussion with your
supervisor and review your work plan for the last six months or year in preparation for
your performance appraisal. When reviewing your work plan, you should consider the
following points.
II. Performance appraisalMadaallii raawwii hojii
The purpose of the performance appraisal is to be clear about your job requirements
and the necessary standards of work performance and behavior. Your manager should
give you constructive feedback on your progress in relation to your work plan for the
lastsix months or year. An appraisal is also an opportunity to identify training and
development needs related to your position and the business needs of the organization.
3.3 Complete tasks on time
Keep your daily work schedule on hand so you can see what needs to be done every
day. Get into the habit of ticking offmallattoo itti godhi each task as you complete it. This
can be satisfying and will also remind you of what else you need to do that day. If you
are not completing your daily tasks and are regularly behind schedule, you need to
discuss the situation with your supervisor.You might need some help to manage your
time better, or you may need to share some of your work with other people.

22

You might also like