0% found this document useful (0 votes)
85 views

Accessing and Using Internet For Level 1

The document provides an overview of basic internet terms and concepts including: - The internet is a global network of interconnected computer networks that uses TCP/IP to communicate. It allows computers to send and receive information. - Common uses include email, social media, online shopping, news, and entertainment. - Web browsers like Chrome, Firefox, and Safari are used to access websites over the internet. A website is a collection of webpages under a common domain name. - Other key terms defined include URL, webpage, homepage, ISP, IP address, cache, and HTTP. The document serves as an introduction to fundamental internet terminology.

Uploaded by

yabibal
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views

Accessing and Using Internet For Level 1

The document provides an overview of basic internet terms and concepts including: - The internet is a global network of interconnected computer networks that uses TCP/IP to communicate. It allows computers to send and receive information. - Common uses include email, social media, online shopping, news, and entertainment. - Web browsers like Chrome, Firefox, and Safari are used to access websites over the internet. A website is a collection of webpages under a common domain name. - Other key terms defined include URL, webpage, homepage, ISP, IP address, cache, and HTTP. The document serves as an introduction to fundamental internet terminology.

Uploaded by

yabibal
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 98

Accessing and Using Internet

UNIT ONE

outlines
 Overview of Internet
 Internet browsers and setting up homepage
 Adjusting display/view mode
 Loading image
 Deleting coolies and browsing history
Overview of internet
 The Internet is the global system of interconnected computer networks
that uses the Internet protocol suite (TCP/IP)to communicate between
networks and devices.

 It is a network of networks that consists of private, public, academic,


business, and government networks of local to global scope, linked by a
broad array of electronic, wireless, and optical networking technologies.
Cont’d
 A means of connecting a computer to any other computer anywhere in the
world via dedicated routersand servers.

 When two computers are connected over the Internet, they can send and
receive all kinds ofinformation such as text, graphics, voice, video, and
computer programs.
Uses for the Internet

 The Internet is used for many things such as e-mail, social networking.
 job-hunting, getting the latest news, research.
 listening to music, watching videos, getting driving directions.
 reading online books andso much more.
COMMON TERMS YOU MIGHT HEAR AND
WHAT THEY MEAN

BROWSER

• A web browser is an application for accessing websites and the Internet. When a user
requests a web page from a particular website, the browser retrieves its files from a
web server and then displays the page on the user's screen

• The most popular web browsers that are used today are Mozilla Firefox, Google
Chrome, Microsoft Internet Explorer, Apple Safari, and the Opera browser.
WEBPAGE

• A web page is a document written in hypertext (also known as HTML) that you
can see online, using a web browser.

• a single, usually hypertext document on the World Wide Web that can
incorporate text, graphics, sounds,video etc.
website

 is a collection of web pages and related content that is identified by a common


domain name and published on at least one web server. Websites are typically
dedicated to a particular topic or purpose, such as news, education, commerce,
entertainment or social networking.

 Websites are typically dedicated to a particular topic or purpose, such as news,


education, commerce, entertainment or social networking.

 Example Google,http://www.maryhelpcollege.org,www.du.edu.et.
Difference between web page and website

 The webpage is a single document on the web using a unique URL, while a
website is a collection of multiple webpages in which information on a related
topic or another subject is linked together under the same domain address.
HTTP
 stands for Hypertext Transfer Protocol.
 It is a protocol used to access the data on the World Wide Web (www).
 The HTTP protocol can be used to transfer the data in the form of plain text,
hypertext, audio, video, and so on.
URL
• (Uniform Resource Locator) in other words, the web address of internet
pages and Files.
• The URLtells the browser exactly where to find the page.
• URL is a reference to a web resource that specifies its location on a computer
network and a mechanism for retrieving it.
• For example, www.akronlibrary.org is the URL orweb address to get to the
library‘s website. *.com signifies the part of the URL that identifies what
exactly that site is part of i.e., institution, government, business,
Cont’d
 net: network providers
 com: generally, for commercial businesses
 mil: military organizations
 .gov: government organizations
 edu: educational organizations
 org: non-profit organizations
The need to search the Internet
 computer with an Internet connection. The connection comes from an ISP or
Internet Service Provider. ISPs are usually phone or cable companies that charge
you a monthly fee for Internet access. Examples of local ISPs are:ethio telecom
and safaricom.

 DSL (digital subscriber line): a connection through telephone wires using DSL
modem sending digital data. This does not tie up your phone line. Not available
in many areas.
Cont;d
 Cable: a connection through a cable modem using cable wires. You do not
have to have cable television service.

 Satellite: a connection through a satellite. Can be affected by weather.


 Wireless: the computer connects to a router without using wires. Your
computer sends out a radio signal searching for service. Once a signal is
found a connection is made. (Note: In order o use the computer‘s wireless
feature you must have an ISP.)
Cont’d
Hardware: The primary piece of hardware that you need besides your computer is
a Modem. The modem is usually provided by your ISP provider and depends on
the type of Internet
Connection that you have chosen.
Connection you will need a router. A router can be wireless or hard wired with
an Ethernet cable.
Web browser software: A program that allows your computer to search the
Internet. Popular
Cont’d
• Anti-virus software: Programs that will help defend your computer against
harmful viruses that can damage your hard drive.
• There are many different anti-virus programs some of which are free. You
can visit www.download.cnet.com to search for different types of anti-virus
software
Web browsers
• Browsers are the easiest way of finding the information you need. Here you
can find a list of the main Browsers found today and their characteristics
• lists the most popular browsers as follow in terms of market share:Google
Chrome (61.36 %)
 Mozilla Firefox (23.6 %)
 Internet Explorer (8.0%)
 Safari (3.7 %)
 Opera (1.6 %
Types of Web Browsers

• Google Chrome
• Google Chrome is the most prominent browser in the world. It is the fastest
browser that quickly loads multiple pages in a single click. Google's search
bar is simple and makes navigating the internet an easy experience. It has a
variety of extensions, themes, and apps that help increase security and
productivity.
• Another feature that makes it popular is that users can sync their data across
all their Google devices using Chrome.
Cont’d
Micro soft edge

includes Notes, a tool that lets you highlight works or passages on any webpage
and save them to read later.

• It tends to use less power, which is important on a laptop. The trade-off is


that it doesn't have the wealth of extensions or apps you'll find with those
other browsers.
Cont’d

Mozilla Firefox
 Firefox is the second m ost popular browser and is faster than its previous
versions. It is a simple search engine, consumes less RAM than other
browsers, and offers better privacy.
 One of the disadvantages is that it may consume a lot of battery.

• .

• .
Cont’d
Opera

• Opera is similar to Chrome and Firefox as it offers a lot of extensions. Opera


can sync across multiple devices. It has an inbuilt VPN for privacy protection
while browsing and an inbuilt newsreader for daily news updates
Cont’d

Apple Safari
 Safari: Best for MacsSafari is one of the best choices for Mac devices
because it is designed specifically for Apple’smachines.
 It connects quickly and loads full sites faster than any macOS-compatible
browser we tested
Basic Internet Terms and Terminology

• ARPANET: The acronym stands for Advanced Research Projects Agency


Network. ARPA of the United States Department of Defense
developed ARPANET, which became the world’s first packet
switching network. Internet is the successor of ARPANET.
• Internet Service Provider(ISP): A company, which provides users with
an access to the Internet,is known as an Internet service provider or
Internet access provider. Example ethiotel,Safaricom etc…
Cont’d
 IP Address: It is a way of numerically identifying an entity on a computer
network.

 Theoretical addressing system known as IPv4, used 32 bit addresses. With the
growth of the Internet, IPv6 came to be used wherein the addresses are
composed of 128 bits.
Cont’d
• Cyber space is used to refer to the computer networks connected to each other
and the content they host.
• It is often used to refer to the Internet.
• WWW: It is a collection of interlinked documents that are accessible over
the Internet.
• It consists of millions of web pages that contain text, images, voice
and videos.
• A website is a set of web pages consisting of text, audio and video. Web
servers host website.
Cont’d
• URL: It specifies the location of a resource on the Internet. It consists of the
basic address and path.
Web Page
• Web pages are resources of information. They are generally created
in the HTML format and provide the web users with navigational abilities
through hyperlinks toother web pages on the web
• Home Page: It is the main page of a complex website.
• Web Browser: A web browser is a software application that facilitates user
interaction with the text, audio, video and other information that is located on
the web
Cache: Web browsers maintain a cache of recently visited web pages. Some of
them use an external proxy web cache, which is a server program through which
web requests pass.
 This enables the browsers to cache frequently visited pages. Even search
engines make available already indexed web pages through their caches.
HTTP: Hypertext Transfer Protocol, abbreviated as HTTP, is a communications
protocol used for the transfer of information over the Internet.
 A client makes an HTTP request using a web browser to which an HTTP
response is sent from the server
Cont’d
Web Cookie:
 Also known as an HTTP cookie, it is piece of text that is exchanged betweenthe
web client and the web server. It is sent by the web server to the web client and
returned unchanged by the client each time it accesses the server.
Session
 It is an exchange of information between a computer and its user.
 It is established or a certain period of time after which it ends.
Cont’d

Hyperlink
 A reference in a document to another section of the document or to another
document is termed as a hyperlink.
 Hyperlinks are used to redirect the user from one section of page content to
another
Internet Security
Issues like Internet Safety that deal with the content that is made accessible
over the Internet are equally important.

 Internet Privacy relates to safeguarding the privacy of the web users and the
sensitive information on the web from hackers and stalkers.
setting up home page
 Configuring Home page A home page is generally the main page a
visitor navigating to a website from a web searching ine will see, and
it may also serve as a landing page to attract visitors.

 The home page is used to facilitate navigation to other pages on the site by
providing links to prioritized and recent articles and pages, and possibly a
search box. For example, a news website may present headlines and first
paragraphs of top stories, with links to full articles.
Cont’d
 A website may have multiple home pages, although most have one.
Wikipedia, for example, has a
 home page at wikipedia.org, as well as language-specific home pages,
such as en.wikipedia.org and de.wikipedia.org.
Configuring location of temporary files

• Temporary Internet Files are a folder on Microsoft Windows which


serves as the browsercache for Internet Explorer to cache pages and other
multimedia content, such as video and audiofiles, from websites visited by
the user.
• This allows such websites to load more quickly the nexttime they are
visited.Each time a user visits a website using Microsoft Internet Explorer,
files downloaded with each webpage (including HTML and JavaScript
code) are saved to the Temporary Internet Files folder.
Cont’d
 creating a web cache of the web page on the local computer's hard disk
drive, or other form ofdigital data storage.
 The next time the user visits the cached website, only changed content
needs tobe downloaded from the Internet; the unchanged data is available
in the cache.
Configuring privacy and security level

 optimizing your browser’s settings is a critical step in using the Internet


securely and
 privately. Today’s popular browsers include built-in security features, but
users often fail to optimize
 their browser’s security settings on installation. Failing to correctly set up
your browser’s security
 features can put you at a higher risk for malware infections and malicious
attacks
Cont’d
 This installation of our “Cyber security 101” series provides our tips for
securing several of today’s most popular browsers, including Google
Chrome, Mozilla Firefox, and Microsoft Internet Explorer.

 While it is impossible to guarantee complete protection from cyber threats,


following these tips will greatly increase the security of your web browser.
Adjusting display/view mode
 recent versions, Window Internet Explorer has dramatically improved
support for established andemerging industry standards, such as HTML5,
Cascading Style Sheets (CSS), Level 3 (CSS3), andScalable Vector
Graphics (SVG).
 By default, Internet Explorer properly displays Webpagesdesigned
to support these standards.
 Because some of these standards are still evolving, older websites
may not fully support them.
Cont’d
 In addition, later versions of certain standards specify differentbehaviors
than earlier versions of the same standard.As a result, websites
designed to support the earlier versions of these standards may
display differently when viewed with web browsers designed to support
current versions of the standards such as Internet Explorer.

 In order to help such websites display correctly, Internet


Explorer supports a display mode called Compatibility View, which
displays web pages as if they were viewed by an earlier version of the
browser.
Modifying Toolbar
Introduction to toolbars
 A browser toolbar is a toolbar that resides within a browser's window.
 All major web browsers provide support to browser toolbar development as
a way to extend the browser's GUI and functionality.
 Browser toolbars are considered to be a particular kind of browser extensions
that present a toolbar.
 Browser toolbars are specific to each browser, which means that a toolbar
working on a browser does not work on another one.
Cont’d
All browser toolbars must be installed in the corresponding browser before
they can be used, and require updates when new versions are released.
Many unscrupulous companies use software bundling to force users
downloading one program to also install a browser toolbar, some of which
invade the user's privacy by tracking their web history and search history
online. Many antivirus companies refer to these programs as gray ware or
Potentially Unwanted Programs (PUPs).
Developing a toolbar
 The programming language and development tools behind a browser
toolbar vary from one browser to another.
 In Internet Explorer 5 or later toolbars may be created as browser
extensions written in C# or C++. More specifically, it is possible to create
up to three different kinds of toolbars (custom explorer bars, tool bands and
desk bands) and to combine them with browser helper objects in order to
provide added functionality.
Cont’d
 In Firefox toolbars can be created as add-ons that contribute to the GUI by
extending the browser with XUL (support for XUL was removed in Firefox
version 57).
 The logic behind the toolbar is written in JavaScript running under
expanded privileges
 In Safari 5 or later toolbars can be created as extensions that add bars and
buttons.
 The logic behind the toolbar is written in JavaScript with access to a special
JavaScript API to interact with the Safari application and web content.
 Google Chrome 4 or later toolbars can be created as extensions that add
browser actions to the browser window.
 The logic behind the toolbar is written in JavaScript with access to a special
JavaScript API to interact with the Chrome application and web content.
 In Opera 11 or later toolbars can be created as extensions that add buttons to
the browser window. The logic behind the toolbar is written in JavaScript
with access to a special JavaScript API to interact with the Opera application
and web content.
 In Firefox, Chrome, Safari and Opera toolbar styling is done though CSS.
Native vs injected toolbars
 Some major browsers (Internet Explorer and Firefox) enable the creation of
native toolbars i.e., toolbars which are directly inserted in the browser
window. Examples of native toolbars are Google Toolbar and Stumble upon
Toolbar.
 Native toolbars use browser-specific code to create the same toolbar for
each different browser version. Some toolbar developers use a different
approach and make the browser extension inject a JavaScript file in every
web page visited by the user.
Accessing and retrieving data from particular site
From URL to IP address
 The easiest way to access a website is to write the desired address into the
address bar located in the browser.
 This address is known as a Uniform Resource Locator (URL), and every
webpage can be reached with its own individual URL (web address).
 A URL is made up of several sections; all of which have their own
functions.
 generic example of a webpage URL:The World Wide Web (WWW) is
a system of electronically stored hypertext documents
Cont’d
 URLs are generally comprised of letters, meaning that people can
easily remember them.
 Computers, on the other hand, work with combinations of numbers (known
as IP addresses) to find a server on the internet.
 An additional step is required in order to access content from the web
browser. This step requires translating a webpage’s URL into the
corresponding IP address.
 The task is carried out by DNS servers, which are responsible for managing
the Domain Name System.
Cont’d
The hypertext transfer protocol (HTTP)
 is used in the World Wide Web in order to transfer webpage datafrom the
web server to the browser.
 The HTTP protocol header is followed by the hostname, which consists of
a second-level and top level domain (in this order).
 In the web, we usually see “www” as third-level domain, but there are
other sub domains.
 If a URL points to a specific directory or file, the relevant information will
be placed after the hostname.
Cont’d

DNS server: a directory for IP addresses


 When a web address is entered into the search bar of the browser, the
browser looks for the requested domain in its cache. If it’s not there, it
requests the operating system’s DNS server to find the required IP address.
 A DNS server is liable for the name resolution. The DNS server that is to be
requested can be configured in the operating system as well as in the router.
Per default, the internet access provider sets the address of its own DNS
server there.
Cont’d
 Since requesting the domain name system takes some time, the IP
addresses of sites that have already been visited are usually stored in the
operating system’s or the browser’s DNS cache.
 This cache keeps IP addresses at hand for future visits to the website.
 This lightens the load of the DNS server and speeds up the webpage’s
loading time.
The router as a link between computer and
server
 The router is the interface between the internet and home network.
 It requests data from the internet and distributes it to networking devices
such as desktop computers, laptops, and tablets.
 The router is required as a link since the devices in the home network
communicate with each other using local IP addresses, while outwardly
sharing the router’s public IP address.
Cont’d
 The network addresses are then translated with a process known as Network
Address Translation (NAT).
 With modern IPv6 internet connections, translations via NAT generally
aren’t needed since every device in the network is allocated a public IP
address.
Data exchange via HTTP
 When the IP address of the chosen webpage is identified, the browser
requests the relevant data for the page from the appropriate web server.
 This request takes place via HTTP in the form of a data packet, which
contains all the information the web server needs in order to deliver the web
page data.
 The browser communicates the IP address of the chosen webpage, and
provides information on the operating system, itself, and the device on
which the webpage should be displayed.
Cont’d
 The router adds its own public IP address as sender and forwards the packet
to the public internet.
 The webserver processes the information and transmits an HTTP
status code.
 Should the request be successful, the server sends a data packet to the
web browser with all the information required for the page.
 If the server can’t find the webpage at the requested address, it either sends
a 404 error code (webpage not found) or sends the visitor to the new URL
via redirect if it’s known.
Page rendering in web browsers
 Incoming data packets from the internet are finally forwarded from
the router to the computer on which the webpage is being accessed.
 The web browser then takes on the task of analyzing the data packets. Web
pages generally comprise of HTML, CSS, and JavaScript files whose lines of
code contain detailed information about how the webpage should be presented
While HTML documents define the structure and controls of a webpage, the
design information specified in Cascading Style Sheets (CSS files).
 Elements that help user interaction on the webpage are usually implemented
with JavaScript.
Loading image
 The web browser simply retrieves the files that have changed since the last
visit meaning that the website doesn’t take as long to accessing information
on the Internet you may have to consider whether to load or not load images.

 Understanding the capabilities of your modem, computer and


browser will help you to make an informed decision.
Cont’d
Modem Speed
 The bandwidth of your Internet connection is dependent on the
speed of your modem.
 If the bandwidth is small it will not be able to download images very
quickly. The file format of any image saved on the computer will take up
much more memory area than text.
 Hence, you must make sure that you have adequate storage area for image
file and the bandwidth is large enough to transfer the image file.
Computer speed and capacity

 the speed and capacity of your computer also affects the speed at which
images are loaded.

 If the computer's speed is slow and the capacity minimal, it may be better
to turn off multimedia features such as pictures, sounds and videos in
order to speed up the delivery and display of webpage information.
Cont’d
browser Capabilities

 To display web page details as quickly as possible, consideration should be


given to the types of browsers available.

 Browsers such as Microsoft Internet Explorer and Netscape


Navigator are referred to as graphical browsers as they are able
to display graphics, colors and multimedia feature.
Deleting Cookies and Browsing History
• A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is
used for an origin website to send state information to a user's browser
and for the browser to return the state information to the origin site.
• The state information can be used for authentication, identification
of a user session, user’s preferences, shopping cart contents, or
anything else that can be accomplished through storing text data Cookies
are not software.
• They cannot be programmed, cannot carry viruses, and cannot install
malware on the host computer. However, they can be used by spyware to
track user's browsing activities.
Cont’d
What Are How do I clear my cookies and browsing history on my computer?
 Caches and Cookies?
 Open Google Chrome.
 Click the menu button ⋮ > More Tools > Clear browsing data.
 On the Clear browsing data window, select which time range you want to
clear.
 Put a check beside Cookies and other site data and Cached images and
files, and then click Clear data
Unit two
Search Internet
2 Search engines
2.1. Opening search engines using search parameters
 A search engine is a tool we use to find websites and information on the
Internet. Search engines will
 search other computers connected to the Internet and classify the files they
find on these computers.
 Some search engines ‘crawl’ or ‘spider’ in different ways, while others create
directories. Therefore,
Cont’d
• search engines need access to different computers connected to
• the Internet. For these reasons it is useful to use a variety of search engines
• The most commonly used search engines include Google,Yahoo,MSN, bing
Alta ,Vista Netscape , Ask
• There are a huge variety of search engines. Most search engines explore
most of the computers connected to the Internet. However, some ‘search
engines’ are really a search of a particular site, or perhaps a group of sites.
Some specialist search engines are based on specific topic areas. For
example, Web Wombat was the original Australian search engine.
Cont’d
When you use this search engine you will find your results listed in order of
relevance to Australia. Other examples include:
 Lexplore — specialises in information related to international law
 Travelocity — specialises in information related to travel
 Hotwire — specialises in information related to computer and
communications technology.
Cont’d

Searching information on the internet the Internet


 in order to use a search engine, you must first locate the search engine on
the Internet. Usually you would do this either by typing in the URL of the
search engine you wish to use.
 A search bar will appear and you type your expression into this bar. How
you express your search will be explained late.
Cont’d
Cont’d
 This is the search bar in Google. Access this screen by typing in the URL
http://www.google.com.Alternatively, you might click on the Search button
on the toolbar of your browser.
 This will take you to a search engine screen to allow you to enter your
search expression.
 Note: if you use the Search button, your browser may randomly generate
which search engine to use for your search.
2.2 Searching the World Wide Web
• To begin searching the World Wide Web (aka the Internet) you must
launch a web browser.
• There are many different web browsers to choose from and it is up to
personal preference on which one you choose.
saving and presenting searching engine
 The results above show that this is unlikely to be recorded as one sequence
of text, so the search engine can’t find anything matching this
particular entry when we put double quotations around the whole
phrase.
 Notice that different search engines will give you different results. Different
search operators, such as double quotations, + and – symbols, AND, OR,
NOT will also give you different results.
 A special note here is that the Internet is a very dynamic world. Information
located engines varies on a daily, and sometimes hourly, basis.
2.3.1. Introduction to online Data Storage
 Online data storage refers to the practice of storing electronic data with a
third party services accessed via the internet.
 Some services store only a particular of data, such as photos, music or back
up data, while others will allow users to store any type of file.
 Most of these vendors offer a small amount of storage for free with
additional storage capacity available for a free, usually paid on a monthly or
annual basis.
Benefits of online storage
 Accessibility and redundancy.
 Data security. ...
 Ability to collaborate on documents and files.
 Scalability.
 Cost and resource savings.
 Archives and backup data
2.4 Bookmark the Webpage

• A bookmark is a saved shortcut that directs your browser to a specific


webpage. It stores the title, URL, and icon of the corresponding page. Saving
bookmarks allows you to easily access your favorite locations on the Web.
• 2.3.1 Creating and Saving Book marks To create a bookmark, simply visit
the page you want to bookmark and select Add Bookmarkor Bookmark
this Page from the Bookmarks menu.
• NOTE: A bookmark only stores the location of a webpage, not store the
contents of the
• webpage itself. Therefore, when you open a previously saved bookmark,
the contents of page
• may have changed since the last time you viewed it
Adjust Print Margins on a Web Browser
• It is helpful to bookmark frequently visited websites and useful
references since you don'thave to remember the URLs. Additionally, you
can just click the bookmarks instead of typingin the full web addresses.
Some browsers even display your bookmarked pages in the autocomplete
drop down menu as you type in the address bar. This allows
you to visitbookmarked pages without even opening the bookmarks
window or sidebar in your browser.
Cont’d
• 2.3.2 Modifying Page set up options and printing Information
• Both Internet Explorer and Mozilla Firefox enable you to adjust print
margins from the Print menu.
• Printing background colors If you are trying to print a story with a
background color.
• Internet Explorer and Firefox users will need to also turn on 'Print
Background Colors', usually found under Page Setup.
• Chrome and Safari have this option turned on by default.
Shutting Down and Exiting Browser
• shutting Down and Exiting Browser Before you are going to shut down
your browser first you should save all the necessary informationAnd also
you must wait if down loading and uploading data/image is on progress, if
you shut down before the data is completed your data may be corrupted or
destructed.
2.6 The Commandments of Computer Ethics
 Make yourself look good online – spelling and grammar count! Always
write thoughtful post sand keep your language clean
Share expert knowledge
Help keep flame* wars under control
Respect other people’s privacy
Don’t abuse your power
Be forgiving of other people’s mistakes
These basic rules are adapted and updated from living internet.com

Help the newbie’s – good netiquette dictates that you share your knowledge
to new users by answering some of their questions. Remember, you too
were a newbie once
Research before asking – most sites have a Frequently Asked Questions
(FAQs) page to guide new users. Read this before emailing or messaging so
as not to waste other people’s time.
Remember emotion – subtle emotions and meanings do not transmit very
well in an email. However, do not use all caps as it designates shouting, or
overuse smileys and emoticons as these may make you look unprofessional.
Cont’d
 Do not use a computer to harm other people.
 Do not interfere with other people’s computer work
 Do not snoop around in other people’s computer files.
 Do not use a computer to steal.
 Do not use a computer to bear false witness.
 Do not copy or use proprietary software for which you have not paid.
Cont’d
 Do not use other people’s computer resources without authorization or
proper compensation.
 Do not appropriate other people’s intellectual output.
 Do think about the social consequences of the program you are writing or
the system you are designing.
 Always use a computer in ways that insure consideration and respect for
your fellow humans.
UNIT THREE

Organize and Complete Daily Work Activities

outlines
3. Work plans and Goals
3.1 Work goals and plans to Organize Work Activities
 Our personal work goals and plans need to fit in with your overall team’s goals
and plans.
 Make sure you actively participate in work meetings about work goals and
plans. If you don’t
 understand something, ask questions to clarify what you have to do. If you
think something isn’t
 fair, make sure you speak out. Everyone needs to understand and agree to the
goals and plans that
 have been established. Your work goals and plans should be negotiated with at
least one other .
Cont’d
person. People you need to negotiate your work plan with:
 Coach or mentor
 Supervisor or manager
 Team leader
 Peers, work colleagues or other members of your team
3.1.1 Set goals

Knowing what you want to achieve can help you attain it. Goals should be:
 S= Specific
 M= Measurable
 A= Attainable
 R= Realistic
 T= Timely
Specific
• Specific Goals should be straightforward and emphasize what you want to
happen. Specifics help us tofocus our efforts and clearly define what we are
going to doSpecific is the What, Why, and HowWHAT are you going to do?
Use action words such as direct, organize, coordinate, lead, develop, plan,
build etc.WHY is this important to do at this time?

• What do you want to ultimately accomplish?HOW are you going to do it?


(By...)Ensure the goals you set is very specific, clear and easy.
Measurable

 If you can't measure it, you can't manage it. In the broadest sense, the whole goal
statement is a measure for the project; if the goal is accomplished, it is a success.
 Establish concrete criteria for measuring progress toward the attainment of each
goal you set. When
 you measure your progress, you stay on track, reach your target dates, and
experience the
 Exhilaration of achievement that spurs you on to continued effort required to
reach your goals
Attainable

 goals you set which are too far out of your reach, you probably won't
commit to doing.

 Although you may start with the best of intentions, the knowledge that it's
too much for you means your subconscious will keep reminding you of
this fact and will stop you from even giving it your best.
realistic
 The goal needs to be realistic for you and where you are at the moment. For
instance, it may be more realistic to set a goal of completing 5 things on
your to do list than completing everything on your to do list.
 Be sure to set goals that you can attain with some effort! Too difficult and
you set the stage for failure, but too low sends the message that you aren't
very capable.
Timely

 Set a timeframe for the goal: for next week, in three months, by
November. Putting an end point on your goal gives you a clear target to
work towards.
 If you don't set a time, the commitment is too vague. It tends not to
happen because you feel you can start at any time.
 Without a time limit, There’s no urgency to start taking action now.
 Time must be measurable, attainable and realistic
3.1.2 Prioritizing
 Efficiency and effectiveness are not the same someone who works hard and
is well organized but spends all their time on unimportant tasks may be
efficient but not effective.
 To be effective, you need to decide what tasks are urgent and important and
to focus on these.
 This is called Prioritizing It's important to list the tasks you have and to sort
these in order of priority, and then to devote most time to the most
important tasks. This avoids the natural tendency to concentrate on the
simple, easy tasks and to allow too many interruptions to your work.
3.1.3 Procrastination

 Procrastination is the scourge of action planning.


 It's important that you manage 'Your fear of doing things' you don't want
to do and realize that the fear is often far worse than any possible negative
results.
 The best time to do something is usually NOW.
3.1.4 Plan & Organize Work Activities
 Planning and organization makes efficient use of your time at the office by
keeping you focused from beginning to completion of a project.
 A comprehensive plan for work activities and projects ensures you tackle all
necessary steps for success.
 An organizational plan also facilitates collaboration and information sharing
with other team members who play a role in the completion of the activities.
Tweaking your organizational method allows you to create the most effective
planning system for your office.
Cont’d
Step 1 Identify the scope and goals of the planning process related to each
work activity.
 Step 2 Break down the major tasks for the activity into smaller steps that
you need to take for completion, essentially creating a to-do list for the
project.
 If other employees are working on the tasks with you, assign each person
a role and specific responsibilities to divide the workload.
Cont’d
 Step 3 Establish the timeline for completing the work activity.
 Give yourself enough time to complete all associated tasks before the
deadline passes.
 Step 4 Write each due date for the project tasks on your calendar, or set up
reminders that pop up on your computer screen as the deadlines approach.
Cont’d
Step 5
 Identify potential problems or barriers you may face for the work
activities. Create an action plan to avoid those issues to keep the project
on track.
Step 6 Utilize an online project management program for major work
activities that are critical to the company's success.
 These programs are particularly effective for complicated projects or
activitiesthat involve many team members.
Cont’d
Step 7
 Schedule planning meetings, when active participation and feedback is
needed ,from others working on the project. Keep the meetings focused
and productive to use the time efficient
Step 8
 Send out regular updates and communication to all other employees who
are working on the project. This allows all team members to stay informed
and update their to-do lists and timelines as necessary.
Team Relationship
 are the things you want to accomplish. They must be realistic. If you want your
plan to work, you need to take each goal and evaluate it. To be effective, goals
need to be SMART, as in the following SMART goal-setting formula.
 Your personal work goals and plans need to fit in with your overall team’s
goals and plans.
 Make sure you actively participate in work meetings about work goals and
plans. If you don’t understand something, ask questions to clarify what you
have to do. If you think something isn’t fair, make sure you speak out.
3.3 Complete tasks on time
• Keep your daily work schedule on hand so you can see what needs to be
done every day.
• Get into the habit of ticking off each task as you complete it. This can be
satisfying and will also remind you of what else you need to do that day.
• If you are not completing your daily tasks and are regularly behind
schedule, you need to discuss the situation with your supervisor. You
might need some help to manage your time better, or you may need to
share some of your work with other people.

You might also like