Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore Computer Skills Part1

Computer Skills Part1

Published by sarath.bhushan, 2016-11-19 06:26:37

Description: Computer Skills Part1

Keywords: none

Search

Read the Text Version

COMPUTER SKILLS Student Work book

CONTENTS SESSION 1: INTRODUCTION TO COMPUTERS 5 SESSION 2: COMPUTER HARDWARE AND SOFTWARE 11 SESSION 3: CREATE UPDATE AND DELETE FILE 18 SESSION 4: TYPING TUTOR 22 SESSION 5: INSTALLING APPLICATIONS 27 SESSION 6: INTERNET FUNDAMENTALS 29 SESSION 7: BROWSERS 31 SESSION 8: SEARCH ENGINES 34 SESSION 9: EMAIL & PASSWORDS 37 SESSION 10: PASSWORDS 39 SESSION 11: COMPUTER SECURITY 41 SESSION 12: COMPOSING EMAILS 43 SESSION 13: EMAIL ETIQUETTES 47 SESSION 14: ANTI VIRUS 49 SESSION 15: SCANNING COMPUTER 52 SESSION 16: SPAM AND PHISHING 54 SESSION 17: WINDOWS XP SHORTCUT KEYS 57 SESSION 18: OFFICE PRODUCTIVITY SOFTWARE 59 SESSION 19: MS WORD – LAYOUT AND BUTTON 61 SESSION 20: WORKING WITH DOCUMENTS 63 SESSION 21: CUSTOMIZE WORD ENVIRONMENT 65 SESSION 22: EDITING DOCUMENT 66 SESSION 23: FORMATTING TEXT 69 SESSION 24: FORMATTING PARAGRAPHS 72 SESSION 25: ADDING BORDERS AND SHADING 73 SESSION 26: ADDING LINKS 74 SESSION 27 & 28: ADDING TABLES 75 SESSION 29: CONVERT TABLE TO TEXT & TEXT TO TABLE 79

CONTENTS SESSION 30: GRAPHICS 80 SESSION 31: PAGE FORMATTING 82 SESSION 32: SPLIT WINDOW 84 SESSION 33: TABLE OF CONTENTS 85 SESSION 34: INSERT FOOTNOTE, ENDNOTE AND COMMENTS 86 SESSION 35: MAIL MERGE 87 SESSION 36: OTHER TOOLS 89 SESSION 37 - 40: PRACTICAL LAB 92 SESSION 41-44: MS EXCEL 93 SESSION 45: FUNCTIONS IN EXCEL 100 SESSION 46: CHARTS 104 SESSION 47: CHARTS 106 SESSION 48: SORTING 107 SESSION 49: DATABASE OPTIONS IN SPREADSHEET 109 SESSION 50 - 60: PRACTICAL’S IN EXCEL 110 SESSION 61-72: POWERPOINT SOFTWARE & PRACTICAL’S 113 SESSION 72-75: MS PAINT & PRACTICALS 121 SESSION 76-77: MOBILE TECHNOLOGY. 131 SESSION 78-79: ECOMMERCE. 134 SESSION 80: NETWORKING AND BANKING OPERATIONS 136

Session 1: INTRODUCTION TO COMPUTERS Introduction: Computers are machines that perform tasks or calculations according to a set of instructions, or programs. The first fully electronic computers, introduced in the 1940s, were huge machines that required teams of people to operate. Compared to those early machines, today’s computers are amazing. Not only are they thousands of times faster, they can fit on your desk, on your lap, or even in your pocket. Computers work through an interaction of hardware and software. Hardware refers to the parts of a computer that you can see and touch, including the case and everything inside it. The most important piece of hardware is a tiny rectangular chip inside your computer called the central processing unit (CPU), or microprocessor. It’s the “brain” of your computer—the part that translates instructions and performs calculations. Hardware items such as your monitor, keyboard, mouse, printer, and other components are often called hardware devices, or devices. Software refers to the instructions, or programs, that tell the hardware what to do. A word- processing program that you can use to write letters on your computer is a type of software. The operating system (OS) is software that manages your computer and the devices connected to it. Windows is a well-known operating system. Types of computers Computers range in size and capability. At one end of the scale are supercomputers, very large computers with thousands of linked microprocessors that perform extremely complex calculations. At the other end are tiny computers embedded in cars, TVs, stereo systems, calculators, and appliances. These computers are built to perform a limited number of tasks. The personal computer, or PC, is designed to be used by one person at a time. Desktop computers Desktop computers are designed for use at a desk or table. They are typically larger and more powerful than other types of personal computers. Desktop computers are made up of separate components. The main component, called the system unit, is usually a rectangular case that sits on or underneath a desk. Other components, such as the monitor, mouse, and keyboard, connect to the system unit. 5 Computer Skills Student Work book

Laptops and netbooks Laptops are lightweight mobile PCs with a thin screen. Laptops can operate on batteries, so you can take them anywhere. Unlike desktops, laptops combine the CPU, screen, and keyboard in a single case. The screen folds down onto the keyboard when not in use. Netbooks (also referred to as mini notebooks), are small, affordable laptops that are designed to perform a limited number of tasks. They’re usually less powerful than laptops, so they’re used mainly to browse the web and check e mail. Smartphones Smartphones are mobile phones that have some of the same capabilities as a computer. You can use a smartphone to make telephone calls, access the Internet, organize contact information, send e mail and text messages, play games, and take pictures. Smartphones usually have a keyboard and a large screen. Handheld computers Handheld computers, also called personal digital assistants (PDAs), are battery-powered computers small enough to carry almost anywhere. Although not as powerful as desktops or laptops, handheld computers are useful for scheduling appointments, storing addresses and phone numbers, and playing games. Some have more advanced capabilities, such as making telephone calls or accessing the Internet. Instead of keyboards, handheld computers have touch screens that you use with your finger or a stylus (a pen-shaped pointing tool). Tablet PCs Tablet PCs are mobile PCs that combine features of laptops and handheld computers. Like laptops, they’re powerful and have a built-in screen. Like handheld computers, they allow you to write notes or draw pictures on the screen, usually with a tablet pen instead of a stylus. They can also convert your handwriting into typed text. Some Tablet PCs are “convertibles” with a screen that swivels and unfolds to reveal a keyboard underneath. 6 Computer Skills Student Work book

Purpose of a Computer In the workplace, many people use computers to keep records, analyze data, do research, and manage projects. At home, you can use computers to find information, store pictures and music, track finances, play games, and communicate with others—and those are just a few of the possibilities. You can also use computer to connect to the Internet, a network that links computers around the world. Internet access is available for a monthly fee in most urban areas, and increasingly, in less populated areas. With Internet access, you can communicate with people all over the world and find a vast amount of information. Here are some of the most popular things to do with computers: The web The World Wide Web (usually called the web, or web) is a gigantic storehouse of information. The web is the most popular part of the Internet, partly because it displays most information in a visually appealing format. Headlines, text, and pictures can be combined on a single webpage—much like a page in a magazine—along with sounds and animation. A website is a collection of interconnected webpages. The web contains millions of websites and billions of webpages. Surfing the web means exploring it. You can find information on the web about almost any topic imaginable. For example, you can read news stories and movie reviews, check airline schedules, see street maps, get the weather forecast for your city, or research a health condition. Most companies, agencies, museums, and libraries have websites with information about their products, services, or collections. Reference sources, such as dictionaries and encyclopedias, are also widely available. The web is also a shopper’s delight. You can browse and purchase products—books, music, toys, clothing, electronics, and much more—at the websites of major retailers. You can also buy and sell used items through websites that use auction-style bidding. Email Email (short for electronic mail) is a convenient way to communicate with others. When you send an e mail message, it arrives almost instantly in the recipient’s e mail inbox. You can send e mail to many people simultaneously, and you can save, print, and forward e mail to others. You can send almost any type of file in an e mail message, including documents, pictures, and music files. And with e mail, you don’t need a postage stamp! 7 Computer Skills Student Work book

Instant messaging Instant messaging is like having a real- time conversation with another person or a group of people. When you type and send an instant message, the message is immediately visible to all participants. Unlike e mail, all participants have to be online (connected to the Internet) and in front of their computers at the same time. Communicating by means of instant messaging is called chatting. Pictures, music, and movies If you have a digital camera, you can move your pictures from the camera to your computer. Then you can print them, create slide shows, or share them with others by e mail or by posting them on a website. You can also listen to music on your computer, either by importing music from audio CDs or by purchasing songs from a music website. Or, you can tune in to one of the thousands of radio stations that broadcast over the Internet. If computer comes with a DVD player, you can watch movies too. Gaming Thousands of computer games in every conceivable category are available to entertain People.Get behind the wheel of a car, battle frightening creatures in a dungeon, or control civilizations and empires! Many games allow you to compete with other players around the world through the Internet. Windows includes a variety of card games, puzzle games, and strategy games. A general-purpose computer has these parts: 1. Processor: the “brain” that does arithmetic, responds to incoming information, and generates outgoing information 2. Primary storage (memory or RAM): the “scratchpad” that remembers information that can be used by the processor. It is connected to the processor by a system bus (wiring). 3. System and expansion busses: the transfer mechanisms (wiring plus connectors) that connect the processor to primary storage and input/output devices. 8 Computer Skills Student Work book

A computer usually comes with several input/output devices: For input: a keyboard, a mouse; For output, a display (monitor), a printer; For both input and output: an internal disk drive, memory key, CD reader/writer, etc., as well as connections to external networks. For reasons of speed, primary storage is connected “more closely” to the processor than are the input/output devices. Most of the devices (e.g., internal disk, printer) are themselves primitive computers in the sense that they contain simple processors that help transfer information to/from the processor to/from the device. Here is a simple picture that summarizes the above: 9 Computer Skills Student Work book

Exercise: 1.What is a desktop computer 2.What is a laptop computer 3.What is a handheld 4.What is email 5.What is the purpose of web 6.What is the purpose of instant messaging 7.What is the purpose of a computer 10 Computer Skills Student Work book

Session 2: COMPUTER HARDWARE AND SOFTWARE Parts of a Computer If you use a desktop computer, you might already know that there isn’t any single part called the “computer.” A computer is really a system of many parts working together. The physical parts, which you can see and touch, are collectively called hardware. (Software, on the other hand, refers to the instructions, or programs, that tell the hardware what to do.) The following illustration shows the most common hardware in a desktop computer system. Your system might look a little different, but it probably has most of these parts. A laptop computer has similar parts but combines them into a single, notebook-sized package. Let’s take a look at each of these parts. System unit The system unit is the core of a computer system. Usually it’s a rectangular box placed on or underneath your desk. Inside this box are many electronic components that process information. The most important of these components is the central processing unit (CPU), or microprocessor, which acts as the “brain” of your computer. Another component is random access memory (RAM), which temporarily stores information that the CPU uses while the computer is on. The information stored in RAM is erased when the computer is turned off. Almost every other part of your computer connects to the system unit using cables. The cables plug into specific ports(openings), typically on the back of the system unit. Hardware that is not part of the system unit is sometimes called a peripheral device or device. 11 Computer Skills Student Work book

Storage Your computer has one or more disk drives—devices that store information on a metal or plastic disk. The disk preserves the information even when your computer is turned off. Hard disk drive Your computer’s hard disk drive stores information on a hard disk—a rigid platter or stack of platters with a magnetic surface. Because hard disks can hold massive amounts of information, they usually serve as your computer’s primary means of storage, holding almost all of your programs and files. The hard disk drive is normally located inside the system unit. CD and DVD drives Nearly all computers today come equipped with a CD or DVD drive, usually located on the front of the system unit. CD drives use lasers to read (retrieve) data from a CD; many CD drives can also write (record) data onto CDs. If you have a recordable disk drive, you can store copies of your files on blank CDs. You can also use a CD drive to play music CDs on your computer. CD DVD drives can do everything that CD drives can, plus read DVDs. If you have a DVD drive, you can watch movies on your computer. Many DVD drives can record data onto blank DVDs. Floppy disk drive Floppy disk drives store information on floppy disks, also called floppies or diskettes. Compared to CDs and DVDs, floppy disks can store only a small amount of data. They also retrieve information more slowly and are more prone to damage. For these reasons, floppy disk drives are less popular than they used to be, although some computers still include them.Why are these disks called “floppy” disks? The outside is made of hard plastic, but that’s just the sleeve. The disk inside is made of a thin, flexible vinyl material. 12 Computer Skills Student Work book

Mouse A mouse is a small device used to point to and select items on your computer screen. Although mice come in many shapes, the typical mouse does look a bit like an actual mouse. It’s small, oblong, and connected to the system unit by a long wire that resembles a tail. Some newer mice are wireless. A mouse usually has two buttons: A primary button (usually the left button) and a secondary button. Many mice also have a wheel between the two buttons, which allows you to scroll smoothly through screens of information. Mouse pointers When you move the mouse with your hand, a pointer on your screen moves in the same direction. (The pointer’s appearance might change depending on where it’s positioned on your screen.) When you want to select an item, you point to the item and then click (press and release) the primary button Pointing and clicking with your mouse is the main way to interact with your computer. For more information. Keyboard A keyboard is used mainly for typing text into your computer. Like the keyboard on a typewriter, it has keys for letters and numbers, but it also has special keys: „ The function keys, found on the top row, perform different functions depending on where they are used. „ The numeric keypad, located on the right side of most keyboards, allows you to enter numbers quickly. „ The navigation keys, such as the arrow keys, allow you to move your position within a document or webpage. You can also use your keyboard to perform many of the same tasks you can perform with a mouse. 13 Computer Skills Student Work book

Monitor A monitor displays information in visual form, using text and graphics. The portion of the monitor that displays the information is called the screen. Like a television screen, a computer screen can show still or moving pictures. There are two basic types of monitors: CRT (cathode ray tube) monitors and the newer LCD (liquid crystal display) monitors. Both types produce sharp images, but LCD monitors have the advantage of being much thinner and lighter. Printer A printer transfers data from a computer onto paper. You don’t need a printer to use your computer, but having one allows you to print e mail, cards, invitations, announcements, and other material. Many people also like being able to print their own photos at home. The two main types of printers are inkjet printers and laser printers. Inkjet printers are the most popular printers for the home. They can print in black and white or in full color and can produce high-quality photographs when used with special paper. Laser printers are faster and generally better able to handle heavy use. Speakers Speakers are used to play sound. They can be built into the system unit or connected with cables. Speakers allow you to listen to music and hear sound effects from your computer. Modem To connect your computer to the Internet, you need a modem. A modem is a device that sends and receives computer information over a telephone line or high-speed cable. Modems are sometimes built into the system unit, but higher-speed modems are usually separate components. 14 Computer Skills Student Work book

Computer Hardware Computer hardware is the collection of physical elements that constitutes a computer system. Computer hardware refers to the physical parts or components of a computer such as the monitor, mouse, keyboard, computer data storage, hard drive disk (HDD), system unit (graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical objects that can be touched. In contrast, software is instructions that can be stored and run by hardware. Software is any set of machine-readable instructions that directs a computer’s processor to perform specific operations. A combination of hardware and software forms a usable computing system Computer Software Computer software, or simply software is any set of machine-readable instructions that directs a computer’s processor to perform specific operations. Computer software contrasts with computer hardware, which is the physical component of computers. Computer hardware and software require each other and neither can be realistically used without the other. Computer software includes computer programs, libraries and their associated documentation. The word software is also sometimes used in a more narrow sense, meaning application software only. Software is stored in computer memory and cannot be touched i.e. it is intangible. At the lowest level, executable code consists of machine language instructions specific to an individual processor – typically a central processing unit (CPU). A machine language consists of groups of binary values signifying processor instructions that change the state of the computer from its preceding state. For example, an instruction may change the value stored in a particular storage location inside the computer – an effect that is not directly observable to the user. An instruction may also (indirectly) cause something to appear on a display of the computer system – a state change which should be visible to the user. The processor carries out the instructions in the order they are provided, unless it is instructed to “jump” to a different instruction, or interrupted. Software written in a machine language is known as “machine code”. However, in practice, software is usually written in high-level programming languages that are easier and more efficient for humans to use (closer to natural language) than machine language. High-level languages are translated, using compilation or interpretation or a combination of the two, into machine language. Software may also be written in a low-level assembly language, essentially, a vaguely mnemonic representation of a machine language using a natural language alphabet. Assembly language is translated into machine code using an assembler. 15 Computer Skills Student Work book

Types of Software: Based on the goal, computer software can be divided into: Application software, which uses the computer system to perform useful work or provide entertainment functions beyond the basic operation of the computer itself. There are many different types of application software, because the range of tasks that can be performed with a modern computer is so large, which is designed to directly operate the computer hardware, to provide basic functionality needed by users and other software, and to provide a platform for running application software. System software includes: „ Operating systems, which are essential collections of software that manage resources and provides common services for other software that runs “on top” of them. Supervisory programs, boot loaders, shells and window systems are core parts of operating systems. In practice, an operating system comes bundled with additional software (including application software) so that a user can potentially do some work with a computer that only has an operating system. „ Device drivers, which operate or control a particular type of device that is attached to a computer. Each device needs at least one corresponding device driver; because a computer typically has at minimum at least one input device and at least one output device, a computer typically needs more than one device driver. „ Utilities, which are computer programs designed to assist users in maintenance and care of their computers. Malicious software or malware, which are computer programs developed to harm and disrupt computers. As such, malware is undesirable. Malware is closely associated with computer- related crimes, though some malicious programs may have been designed as practical joke. Exercise: 1. Name some of the input devices 2. Name some of the output devices 16 Computer Skills Student Work book

3. What is the purpose of Printer 4. What is the purpose of Monitor 5.What is the purpose of Compact disk 6.What is the purpose of Hard disk 7.What is the purpose of Mouse and what is a mouse pointer 8. What is RAM 17 Computer Skills Student Work book

Session 3: CREATE UPDATE AND DELETE FILE Configure a File Item File preference items allow you to copy, modify the attributes of, replace, and delete files. Before you create a File preference item, you should review the behaviour of each type of action possible with this extension. Creating a File item To create a new File preference item 1. Open the Group Policy Management Console . Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit . 2. In the console tree under Computer Configuration or User Configuration , expand the Preferences folder, and then expand the Windows Settings folder. 3. Right-click the Files node, point to New , and select File . 4. In the New File Properties dialog box, select an Action for Group Policy to perform. (For more information, see “Actions” in this topic.) 5. Enter file settings for Group Policy to configure or remove. (For more information, see “File settings” in this topic.) 6. Click the Common tab, configure any options, and then type your comments in the Description box. 7. Click OK . The new preference item appears in the details pane. Actions This type of preference item provides a choice of four actions: Create, Replace, Update, and Delete. The behaviour of the preference item varies with the action selected and whether the file already exists. 18 Computer Skills Student Work book

Create Copy a file (or multiple files in one folder) from a source location to a destination location if it does not already exist at the destination, and then configure the attributes of those files for computers or users. Delete Remove a file (or multiple files in one folder) for computers or users. Replace Delete a file (or multiple files in one folder), replace it with another file or files, and configure the attributes of those files for computers or users. The net result of the Replace action is to overwrite the files at the destination location. If the file does not exist at the destination, then the Replace action copies the file from the source location to the destination. Update Modify settings of an existing file (or multiple files in one folder) for computers or users. This action differs from Replace in that it only updates file attributes defined within the preference item. All other file attributes remain as configured on the file. If the file does not exist, then the Update action copies the file from the source location to the destination. File settings Type the location from which to copy the Source file(s) . Source file(s) This location can be a fully qualified UNC path or a path on a local or mapped drive from the perspective of the client. This field can contain variables. This field can also contain single character (?) and multiple character (*) wildcards, allowing you to copy or modify multiple files. This option is available only if the action selected is Create , Replace , or Update . Type the location to which to copy a file or the location of the file to be modified. This location can be a fully qualified Destination UNC path or a path on a local or mapped drive from the file perspective of the client. Parent folders are created as necessary. You must include the file name, and you can change the file name by providing a different name for it than specified in the Source file(s) field. This option is available only if the action selected is Create , Replace , or Update and the Source files(s) does not include wildcards. 19 Computer Skills Student Work book

Type the location of the folder to which to copy files or the location of the files to be modified. This location can be a fully qualified UNC path or a path on a local or mapped drive Destination from the perspective of the client. Parent folders are created folder as necessary. This option is available only if the action selected is Create , Replace , or Update and the Source files(s) includes wildcards. To delete a file, type the path for the file from the perspective of the client. Delete file(s) To delete multiple files within a folder, incorporate single character (?) and multiple character (*) wildcards in the file name. This option is available only if the action selected is Delete . Suppress To allow multiple files to transfer even if one or more indi- errors on vidual files fail to transfer, select this check box. Only errors individual file due to an attempt to replace, delete, or configure attributes actions of a file are suppressed. Such errors may be due to the file being in use, access being denied, or the source file not being found. With this option selected, such errors can only be detected in the trace file. This option is distinct from the default preference error suppression that can be overridden on the Common tab. To configure file system attributes for the files being trans- ferred select the appropriate check boxes in the Attributes box. Unchecked attributes are removed from Attributes the file at the destination 20 Computer Skills Student Work book

Exercise: 1. Explain how to create a file 2. Explain how to update a file 3. Explain how to modify a file 21 Computer Skills Student Work book

Session 4: TYPING TUTOR Introduction Welcome to RapidTyping 5 program. Improve your typing skills through a series of easy lessons! Learning how to type properly without looking at the keyboard is simple. Rapid Typing Tutor makes keyboard training fun and entertaining. Full courses for Beginner, Advanced and Expert typists „ Introduction course. First time using keyboard. The course covers all characters typed on your keyboard. „ Beginner course. This course helps to learn the position of keys on the keyboard. After completing this course, you will know which finger to use to hit each key without looking at the keyboard. The course also covers upper-case letters, special symbols, and the numeric pad. „ Advanced course, helps to improve your typing speed by memorizing frequently used syllables and words. „ Expert course helps you to perfect the skills acquired by typing an actual text. Note: Introduction and Beginner courses are available for all keyboards. Experienced and Advanced courses are available, on the moment, only for following keyboards: „ Arabic „ Dutch „ English „ French „ German „ Greek „ Hungarian „ Russian „ Spanish 22 Computer Skills Student Work book

Virtual Keyboard To help you learn how to place your fingers on the keyboard, Typing Tutor displays a virtual keyboard with zone highlights. In this way, you’ll always know which hand belongs to which zone. This way, you’ll always know which hand belongs to which zone. Typing Tutor supports all famous keyboard layouts: „ QWERTY, QWERTZ, AZERTY „ Dvorak, Dvorak for left or right hand „ BEPO, Colemak, ABNT2and many others. Also RapidTyping supports: „ one, two and tree block keyboards „ the Numeric pad and Ergonomic keyboard is also covered Moving Hands To further simplify your typing lessons, Typing Tutor displays moving hands over the keyboard. The hands show which finger you have to use to press the current key. „ also, one Left/Right hand use is supported; Classroom is supported We recommend installing RapidTyping on a local server in a classroom, so that it can be easily run on each workstation over the network. „Student statistics from the teacher’s computer in real-time, over the local network „In classrooms without a local network, students can save the results to file „Convenient for adding a large number of students „Different courses assigned to different student groups „Observe over all group progress „Student password „The simplest customization: simple to unpack (or install) the RapidTyping distribution to the network folder with access for students. 23 Computer Skills Student Work book

Progress Tracking „ The statistics reflect your typing speed, accuracy and time- out, complete with a summary at the end of each lesson „ and it suggests your next step: Go to the next lesson or Try again comparing the results with Course goals ( you can customize this ) „ You can evaluate your own performance or that of your kids or students at any time by simply looking at charts. Rapid Typing Tutor tracks your progress, and allows you to view your results at any time. „ overall lesson rate, typing speed( WPM, CPM, KPM, WPS, CPS, KPS ), accuracy and time-out are enabled in the both: table and chart presentation „ also, for each lesson, statistics by each character and keystroke in the column charts Lesson editor Because of your system’s Regional Setting has specific settings RapidTyping has only suggested a small number of courses, by default. If you want to have more courses the RapidTyping library will help you. „ You can always insert courses from the library or create your own „ RapidTyping library has different courses for all languages „ The library is constantly updated with new courses „ Typing Tutor allows access to any course/lesson at any time, from easiest to most advanced Make Your Own Plan Plan your lessons according to your( or your students ) skills and capabilities. Rapid Typing Tutor offers you complete freedom of learning, allowing you to make your own lessons and plan your studies. „ You can create a course of your own. „ RapidTyping offers a built-in Lesson Editor that lets you: „ insert txt or rtf text from file(s) of any size „ split a long text into lessons of specific length „ The editor filters out symbols that are missing on the existing keyboard from the imported text (such as special Word symbols or foreign-language symbols) 24 Computer Skills Student Work book

„ customize the course goals and the lesson view settings „ The editor filters out symbols that are missing on the existing keyboard from the imported text (such as special Word symbols or foreign-language symbols) Symbols covered by the lesson are highlighted on the virtual keyboard 25 Computer Skills Student Work book

Exercise: 1. Explain the purpose of a typing tutor 2. What is your present tying speed? 26 Computer Skills Student Work book

Session 5: INSTALLING APPLICATIONS You can do a lot with the programs and features included in Windows, but you might want to install other programs. How you add a program depends on where the installation files for the program are located. Typically, programs are installed from a CD or DVD, from the Internet, or from a network. If you want to uninstall or make changes to a program already installed on your computer, see Uninstall or change a program. To install a program from a CD or DVD Insert the disc into your computer, and then follow the instructions on your screen. If you’re prompted for an administrator password or confirmation, type the password or provide confirmation. Many programs installed from CDs or DVDs open an installation wizard for the program automatically. In these cases, the AutoPlay dialog box appears and you can choose to run the wizard. For more information. If a program doesn’t begin installation automatically, check the information that came with the program. This information will likely provide instructions for installing the program manually. If you can’t access the information, you can also browse through the disc and open the program setup file, usually called Setup.exe or Install.exe. If your program was written for an earlier version of Windows, To install a program from the Internet 1.In your web browser, click the link to the program. 2.Do one of the following: „ To install the program immediately, click Open or Run, and then follow the instructions on your screen. If you’re prompted for an administrator password or confirmation, type the password or provide confirmation. „ To install the program later, click Save, and then download the installation file to your computer. When you’re ready to install the program, double-click the file, and then follow the instructions on your screen. This is a safer option because you can scan the installation file for viruses before you proceed. 27 Computer Skills Student Work book

To install a program from a network If you connect your computer to a domain (such as an internal corporate network) that has programs that you can add, you can install programs from Control Panel. 1.Open Get Programs by clicking the Start button,clicking ControlPanel,clicking Programs, clicking Programs and Features, and then,in the left pane,clicking Install a program from the network. 2.Click a program in the list, and then click Install. 3.Follow the instructions on your screen. If you’re prompted for an administrator password or confirmation, type the password or provide confirmation. Exercise: 1. Explain the steps on how to install an application in the computer 28 Computer Skills Student Work book

Session 6: INTERNET FUNDAMENTALS The Internet links are computer networks all over the world so that users can share resources and communicate with each other. Some computers, have direct access to all the facilities on the Internet such as the universities. And other computers, eg privately-owned ones, have indirect links through a commercial service provider, who offers some or all of the Internet facilities. In order to be connected to Internet, you must go through service suppliers. Many options are offered with monthly rates. Depending on the option chosen, access time may vary. The Internet is what we call a metanetwork, that is, a network of networks that spans the globe. It’s impossible to give an exact count of the number of networks or users that comprise the Internet, but it is easily in the thousands and millions respectively. The Internet employs a set of standardized protocols which allow for the sharing of resources among different kinds of computers that communicate with each other on the network. These standards, sometimes referred to as the Internet Protocol Suite, are the rules that developers adhere to when creating new functions for the Internet. The Internet is also what we call a distributed system; there is no central archives. Technically, no one runs the Internet. Rather, the Internet is made up of thousands of smaller networks. The Internet thrives and develops as its many users find new ways to create, display and retrieve the information that constitutes the Internet. History & Development of the Internet: In its infancy, the Internet was originally conceived by the Department of Defense as a way to protect government communications systems in the event of a military strike. The original network, dubbed ARPANet (for the Advanced Research Projects Agency that developed it) evolved into a communications channel among contractors, military personnel, and university researchers who were contributing to ARPA projects. The network employed a set of standard protocols to create an effective way for these people to communicate and share data with each other. ARPAnet’s popularity continued to spread among researchers, and in the 1980’s the National Science Foundation, whose NSFNet, linked several high speed computers, took charge of the what had come to be known as the Internet. By the late 1980’s, thousands of cooperating networks were participating in the Internet. In 1991, the U.S. High Performance Computing Act established the NREN (National Research & Education Network). NREN’s goal was to develop and maintain high-speed networks for research and education, and to investigate commercial uses for the Internet. The rest, as they say, is history in the making. The Internet has been improved through the developments of such services as Gopher and the World Wide Web. 29 Computer Skills Student Work book

Even though the Internet is predominantly thought of as a research oriented network, it continues to grow as an informational, creative, and commercial resource every day and all over the world. Exercise: 1. Explain the importance of internet 2. What is the advantages of internet 3. What are the disadvantages of internet 30 Computer Skills Student Work book

Session 7: BROWSERS Content description: The primary purpose of a web browser is to bring information resources to the user (“retrieval” or “fetching”), allowing them to view the information (“display”, “rendering”), and then access other information (“navigation”, “following links”). This process begins when the user inputs a Uniform Resource Locator (URL), for example http://en.wikipedia.org/, into the browser. The prefix of the URL, the Uniform Resource Identifier or URI, determines how the URL will be interpreted. The most commonly used kind of URI starts with http: and identifies a resource to be retrieved over the Hypertext Transfer Protocol (HTTP). Many browsers also support a variety of other prefixes, such as https: for HTTPS, ftp: for the File Transfer Protocol, and file: for local files. Prefixes that the web browser cannot directly handle are often handed off to another application entirely. For example, mailto: URIs are usually passed to the user’s default e-mail application, and news: URIs are passed to the user’s default newsgroup reader. In the case of http, https, file, and others, once the resource has been retrieved the web browser will display it. HTML and associated content (image files, formatting information such as CSS, etc.) is passed to the browser’s layout engine to be transformed from markup to an interactive document, a process known as “rendering”. Aside from HTML, web browsers can generally display any kind of content that can be part of a web page. Most browsers can display images, audio, video, and XML files, and often have plug-ins to support Flash applications and Java applets. Upon encountering a file of an unsupported type or a file that is set up to be downloaded rather than displayed, the browser prompts the user to save the file to disk. Information resources may contain hyperlinks to other information resources. Each link contains the URI of a resource to go to. When a link is clicked, the browser navigates to the resource indicated by the link’s target URI, and the process of bringing content to the user begins again. Information resources may contain hyperlinks to other information resources. Each link contains the URI of a resource to go to. When a link is clicked, the browser navigates to the resource indicated by the link’s target URI, and the process of bringing content to the user begins again. 31 Computer Skills Student Work book

Types of Browsers 1. Mozilla Browser 2. Google Chrome 3. Internet Explorer 4. Opera Etc User interface Some home media devices now include web browsers, like this LG Smart TV. The browser is controlled using an on-screen keyboard and LG’s “Magic Motion” remote. Most major web browsers have these user interface elements in common: „ Back and forward buttons to go back to the previous resource and forward respectively. „ A refresh or reload button to reload the current resource. „ A stop button to cancel loading the resource. In some browsers, the stop button is merged with the reload button. „ A home button to return to the user’s home page. „ An address bar to input the Uniform Resource Identifier (URI) of the desired resource and display it. „ A search bar to input terms into a search engine. In some browsers, the search bar is merged with the address bar. „ A status bar to display progress in loading the resource and also the URI of links when the cursor hovers over them, and page zooming capability. „ The viewport, the visible area of the webpage within the browser window. „ The ability to view the HTML source for a page. Exercise: 1. Name some of the browsers 32 Computer Skills Student Work book

2. What are the advantages of internet browsers 3. What is the best browsers 4. What is the user interface of browsers 33 Computer Skills Student Work book

Session 8: SEARCH ENGINES A search engine is a website that you can use to look up web pages, like a yellow pages for the Internet. When you enter a keyword into the search engine, the search engine will look through the billions of web pages to help you find the ones that you are looking for. There are many different types of search engines made by different companies, the most popular ones are Bing, Yahoo!, and Google. Each of the search engines have their own individual ways of organizing information so the results can vary from one search engine to another. Reading an Internet Address: To use Internet e-mail successfully, you must understand how the names and addresses for computers and people on the Internet are formatted. Mastering this technique is just as important as knowing how to use telephone numbers or postal addresses correctly. Fortunately, after you get the hang of them, Internet addresses are usually no more complex than phone numbers and postal addresses. And, like those methods of identifying a person, an organization, or a geographic location— usually by a telephone number or a street address—Internet addresses have rules and conventions for use. Sample Internet Address: [email protected] The Internet address has three parts: 1.a user name [custcare in the example above] 2.an “at” sign (@) 3.the address of the user’s mail server [aucegypt.edu in the example above] Sometimes it’s useful to read an Internet address (like [email protected]) or a domain name from right to left because it helps you determine information about the source of the address. 34 Computer Skills Student Work book

An address like [email protected] doesn’t tell me much about the person who’s sending me a message, but I can deduce that the sender is affiliated with an educational institution because of the suffix edu. The right-most segment of domain names usually adhere to the naming conventions listed below: EDU Educational sites in the United States COM Commercial sites in the United States GOV Government sites in the United States NET Network administrative organizations MIL Military sites in the United States ORG Organizations in the U.S. not covered by the categories above (e.g., non-profit orginaizations). .xx where xx is the country code (e.g., .eg for Egypt). The list below lists several search engines and how each one gathers information, plus resources that evaluate the search engines. Selected Search Engines (listed alphabetically) Alta Vista Alta Vista, maintained by The Digital Equipment Corp., indexes the full text of over 16 million pages including newsgroups. Check out the Alta Vista Tips page. Excite Netsearch Excite includes approximately 1.5 million indexed pages, including newsgroups. Check out the Excite NetSearch handbook. InfoSeek Net Search Indexes full text of web pages, including selected newsgroups and electronic journals. Just under one-half million pages indexed. Check out the InfoSeek Search Tips. Inktomi As of December 1995, the Inktomi search engine offers a database of approximately 2.8 million indexed Web documents and promises very fast search retrievals. Results are ranked in order of how many of your searched terms are used on the retrieved pages. Lycos Lycos indexes web pages (1.5 million +), web page titles, headings, subheadings, URLs, and significant text. Search results are returned in a ranked order. 35 Computer Skills Student Work book

Magellan Magellan indexes over 80,000 web sites. Search results are ranked and annotated. Open Text Index Indexes full text of approximately 1.3 million pages. Check out the Open Text Help pages for tips on using this search engine. WebCrawler Maintained by America Online, WebCrawler indexes over 200,000 pages on approximately 75,000 web servers. URLs, titles, and document content are indexed. WWWW — World Wide Web Worm Approximately 250,000 indexed pages; indexed content includes hypertext, URLs, and document titles. Yahoo A favorite directory and search engine, Yahoo has organized over 80,000 Web sites (including newsgroups) into 14 broad categories. Yahoo also maintains a comprehensive list of links to Yahoo - Computers and Internet:Internet:World Wide Web: Searching the Web other web search engines, indexes, and guides. Exercise: 1. What is a search engine 2. Name some of the search engines 3. What is an internet address 4. What is the purpose of internet address 36 Computer Skills Student Work book

Session 9: EMAIL & PASSWORDS Electronic mail, or e-mail, is probably the most popular and widely used Internet function. E-mail, email, or just mail, is a fast and efficient way to communicate with friends or colleagues. You can communicate with one person at a time or thousands; you can receive and send files and other information. You can even subscribe to electronic journals and newsletters. You can send an e-mail message to a person in the same building or on the other side of the world. How does E-mail Work? E-mail is an asynchronous form of communication, meaning that the person whom you want to read your message doesn’t have to be available at the precise moment you send your message. This is a great convenience for both you and the recipient. On the other hand, the telephone, which is a synchronous communication medium, requires that both you and your listener be on the line at the same time in order for you to communicate (unless you leave a voice message). It will be impossible to discuss all the details of the many e-mail packages available to Internet users. Fortunately, however, most of these programs share basic functionality which allow you to: *send and receive mail messages *save your messages in a file *print mail messages *reply to mail messages *attach a file to a mail message Exercise: 1.What is an E Mail 37 Computer Skills Student Work book

2.Name some E mail providers 3.What is the purpose of EMail 4.What can be sent in EMail 38 Computer Skills Student Work book

Session10:PASSWORDS A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which should be kept secret from those not allowed access. The use of passwords is known to be ancient. Sentries would challenge those wishing to enter an area or approaching it to supply a password or watchword, and would only allow a person or group to pass if they knew the password. In modern times, user names and passwords are commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines (ATMs), etc. A typical computer user has passwords for many purposes: logging into accounts, retrieving e-mail, accessing applications, databases, networks, web sites, and even reading the morning newspaper online. A log in window for a website requesting a username and a password. Despite the name, there is no need for passwords to be actual words; indeed passwords which are not actual words may be harder to guess, a desirable property. Some passwords are formed from multiple words and may more accurately be called a passphrase. The term passcode is sometimes used when the secret information is purely numeric, such as the personal identification number (PIN) commonly used for ATM access. Passwords are generally short enough to be easily memorized and typed. Most organizations specify a password policy that sets requirements for the composition and usage of passwords, typically dictating minimum length, required categories (e.g. upper and lower case, numbers, and special characters), prohibited elements (e.g. own name, date of birth, address, telephone number). Some governments have national authentication frameworks that define requirements for user authentication to government services, including requirements for passwords. Exercise: 1. What is a password 39 Computer Skills Student Work book

2. Name places you can apply for passwords 3. What is the purpose of password 4. What will happen if passwords are not used for a mail box 40 Computer Skills Student Work book

Session 11: COMPUTER SECURITY Computer security (also known as cyber security or IT security) is information security as applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the whole Internet. The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction, and is of growing importance in line with the increasing reliance on computer systems of most societies worldwide. Cyber security involves protecting the information and systems we rely on every day-whether at home, work or school. There are three core principles of cyber security: Confidentiality, Integrity, and Availability. 1.Confidentiality: Information that is sensitive or confidential must remain so and be shared only with appropriate users. 2.Integrity: Information must retain its integrity and not be altered from its original state. 3.Availability: Information and systems must be available to those who need it. Different types of data and systems require different levels of appropriate security. For example, your confidential medical records should be released only to those people or organizations (i.e. doctor, hospital, insurance, government agency, you) authorized to see it (confidentiality); the records should be well protected so that no one can change the information without authorization (integrity); and the records should be available and accessible to authorized users (availability). Cyber Security Importance. The increasing volume and sophistication of cyber security threats-including targeting phishing scams, data theft, and other online vulnerabilities-demand that we remain vigilant about securing our systems and information. The average unprotected computer (i.e. does not have proper security controls in place) connected to the Internet can be compromised in moments. Thousands of infected web pages are being discovered every day. Hundreds of millions of records have been involved in data breaches. New attack methods are launched continuously. These are just a few examples of the threats facing us, and they highlight the importance of cyber security as a necessary approach to protecting data and systems. 41 Computer Skills Student Work book

Exercise: 1. What is cyber security 2. What is confidentiality 3. What is the purpose of confidentiality 4. What is the purpose of cyber security 42 Computer Skills Student Work book

Session 12: COMPOSING EMAILS The Compose page is the page on which you write and address your outgoing E-mail messages. To access the Compose page, click Compose in the left-side navigation panel or click the email icon next to a name in your address book. For security purposes, your session automatically expires when no account activity is registered for more than 30 minutes. Since typing text is not considered an activity for timeout purposes, your session may expire when composing a long message. To avoid this, make sure to Save your work. Addressing Your Message If you have created nicknames in the Address Book page, simply type the nickname in the appropriate field. Otherwise type in the full E- mail address. In order to send your message to multiple recipients, separate each recipient by a comma. For example: nickname1, nickname2, [email protected]. Include main recipients in the To: field and secondary recipients you’d like to carbon copy in the Cc: field. If you wish to hide the names of your secondary recipients, use the Bcc: field to blind carbon copy. Note: When you open the Compose page from the Address Book page, the selected nickname will automatically appear in the To: field. Composing Your Message - The Subject Line Although the Subject is an optional field, it is a good idea to enter one. Your recipients may receive many E-mail messages, perhaps even several from you alone. The Subject helps your recipient distinguish between different messages. Entering Your Message Text Type your message in the large text box. If your message grows beyond the size of the box, a scroll bar will automatically appear. Tip #1: You can include a URL (Uniform Resource Locator) so that it is a live link. For example, http://www.host.domain embedded in a message, will be clickable in most E-mail packages in use today. Be sure to include the http:// designator. Tip #2: You can also enter text by cutting and pasting from a word processor or text editor. Use right mouse button popup menus to cut or copy and paste selected text. 43 Computer Skills Student Work book

Saving a Message Click the Save button on the toolbar to save the message to the Draft folder. To retrieve the saved message, click Folders in the left navigation bar and select the Draft folder. Click the message that you would like to display. Attaching a File - To attach a file to your message: Click Attach. The Attachment area will be opened in a new window. Click Browse... and search for the file or type the full path name of the file you wish to attach. Press the Attach File button and the file name will appear in the Attachment List. To remove an already attached file, select the file from the Attachment List and press the Remove button. Press the OK button to return to the Compose window. Note: In order to attach files to your messages, you must have a browser that supports file upload (e.g. Netscape Navigator 2.0 or Internet Explorer 3.02 and later). Internet Explorer 3.02 users must have the File Upload Patch installed on their system, before attempting to attach files. Tip #1: The file you attach can be of any type, for example: a sound file, an image or even a spreadsheet. Adding attachments to your message can be done at any time while composing the message. Tip #2: We recommend that you use compression software, such as Winzip, to compress files before attaching. This saves time and money when sending messages with attachments. Adding your Signature Check the Add my signature option to append a signature to your message. A signature is a fixed block of text that may be included at the end of your outgoing messages. For example: ———————————— My First & Last Name [email protected] http://www.host.domain Add to SentLog Check the Add to SentLog option to save your message in the SentLog folder after your message is sent. 44 Computer Skills Student Work book

Check Spelling To check the spelling in your message, choose the appropriate language from the selection list and press the Spell Checker button. The Spelling area will be opened in a new window. The first word not found in the Spelling Dictionary will appear on the top of the page marked in red text. You will see a list of possible suggestions, from which you can select the appropriate spelling replacement. You may also write in your own replacement in the Change to edit box. To accept a change, press the Change button. To disregard a suggested change, press the Ignore button. Continue this process until the end of the message is reached. To stop the spell checking process at any time, press the Cancel button. Sending Your Message Click the Send button to send your message on its way. After the message is successfully sent, a copy of it is stored in your SentLog folder. Exercise: 1. Explain the term E Mail 2. Explain the signature for an email 3. Explain the purpose of signature 4. What is the purpose of sent log 45 Computer Skills Student Work book

5. What is the purpose of subject line in email 6. What is the purpose of Cc for an mail 7. What is the purpose of BCc 8. What is to field in an EMail 46 Computer Skills Student Work book

Session 13: EMAIL ETIQUETTES It is amazing to find that in this day and age, some companies have still not realized how important their email communications are. Many companies send email replies late or not at all, or send replies that do not actually answer the questions you asked. If your company is able to deal professionally with email, this will provide your company with that all important competitive edge. Moreover by educating employees as to what can and cannot be said in an email, you can protect your company from awkward liability issues. Purpose:A company needs to implement etiquette rules for the following three reasons: 1. Professionalism: by using proper email language your company will convey a professional image. 2.Efficiency: emails that get to the point are much more effective than poorly worded emails. 3.Protection from liability: employee awareness of email risks will protect your company from costly law suits. 32 most important email etiquette tips: 1. Be concise and to the point 2. Answer all questions, and pre-empt further questions 3. Use proper spelling, grammar & punctuation 4. Make it personal 5. Use templates for frequently used responses 6. Answer swiftly 7. Do not attach unnecessary files 8. Use proper structure & layout 9. Do not overuse the high priority option 10. Do not write in CAPITALS 11. Don’t leave out the message thread 12. Add disclaimers to your emails 13. Read the email before you send it 14. Do not overuse Reply to All 15. Mailings > use the bcc: field or do a mail merge 16. Take care with abbreviations and emoticons 17. Be careful with formatting 47 Computer Skills Student Work book

18. Take care with rich text and HTML messages 19. Do not forward chain letters 20. Do not request delivery and read receipts 21. Do not ask to recall a message. 22. Do not copy a message or attachment without permission 23. Do not use email to discuss confidential information 24. Use a meaningful subject 25. Use active instead of passive 26. Avoid using URGENT and IMPORTANT 27. Avoid long sentences 28. Don’t send or forward emails containing libelous, defamatory, offensive, racist or obscene remarks 29. Don’t forward virus hoaxes and chain letters 30. Keep your language gender neutral 31. Don’t reply to spam 32. Use cc: field sparingly Exercise: 1. Name some Email etiquettes 2. Name some of the places email etiquettes play a vital role 3. What is the purpose of Email etiquettes 48 Computer Skills Student Work book

Session 14: ANTI VIRUS Dangers loom everywhere on the internet, and when surfing the net, it is always better to be safe than sorry. Even though you may not intentionally visit suspicious websites, one wrong click to a seemingly innocent site can still leave your computer infected with a malicious computer virus or malware. Once on your computer, these harmful programs can steal your sensitive information and destroy your files. Often, infected machines need to have their hard drives wiped completely clean in order to truly eradicate the virus. This results in the loss of files, photos and other vital data. Hackers and other miscreants are constantly churning out new viruses and malware that is designed to steal financial information, website passwords and other sensitive information from innocent victims. Millions of new viruses pop up each year and new threats are discovered every day. In this constantly changing environment, it is impossible to completely avoid the threat of viruses, but using trustworthy antivirus software can minimize your risk for infection and the damage done. What Is Antivirus Software? Antivirus software is a program that is designed to find and neutralize malware and viruses. These programs are able to scan your computer’s hard drive and identify files that are malicious or suspicious. The antivirus software can attempt to delete, quarantine, or trigger an alert when it detects files that are harmful. Additionally, many antivirus software suites also have settings that can prevent your computer from downloading or executing harmful files in the first place. Use Caution When Choosing Antivirus Software Unfortunately, in the world of antivirus software, not all products provide equal protection. As awareness of antivirus software has spread, even antivirus programs have become the target of unscrupulous hackers and attackers. As a result, there are many programs on the internet that appear to be legitimate antivirus suites, yet they are really malicious programs designed to steal information and infect machines. This all-too-common scenario makes it even more important to choose a trustworthy antivirus software solution. Thankfully, there are many trustworthy companies that produce antivirus software. These products have a wide range of features and a wide range of costs, but the available options provide a large scope of legitimate software suites to choose from. 49 Computer Skills Student Work book

Choosing the Best Antivirus Solution The first aspect to consider when choosing antivirus software is typically cost. Full featured suites can cost a pretty penny, but there are also free options that provide adequate coverage for home computer users. The most popular free option is Microsoft Security Essentials. Microsoft entered the antivirus arena in 2009, with its Microsoft Security Essentials product. Offered for free, this product provides a good level of support and protection for users of Microsoft Windows products. MSE has received rave reviews since its release, and it is currently the most popular antivirus software used in North America and the second most popular antivirus software used worldwide. The product is easy to download and install, and is an excellent choice for those who are not computer savvy. Due to these factors, MSE is a full-featured suite that can be safely recommended for the vast majority of computer users. It can be downloaded here. However, MSE can only be used on legally licensed Windows computers. For those who wish to seek other options here is a short list of the top software providers for both free and premium antivirus suites. While this list may not include all trustworthy antivirus vendors, it includes a good variety of different programs that should meet the needs of most computer users. Free Antivirus Software Products AVG Antivirus: http://free.avg.com Avast!: http://www.avast.com Premium Antivirus Software Products McAfee VirusScan: http://www.mcafee.com Symantic: http://www.symantic.com Trend Micro: http://www.trendmicro.com Kaspersky: http://www.kaspersky.com 50 Computer Skills Student Work book

Exercise: 1. Name some of the anti-virus software’s 2. Name some of the premium anti-virus software’s 3. What is the purpose of anti-virus software’s 4. Name some free anti-virus software’s 5. What is computer virus 51 Computer Skills Student Work book


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook