Computer Essentials ECDL NOTES – Computer Essentials Computer Essentials 1. Computers and Devices 1.1 ICT 1.1.1 Define the term Information and Communication Technology (ICT) Information and Communication Technologies (ICT) refers to technologies that provide access to information through telecommunications. It is similar to Information Technology (IT), but focuses primarily on communication technologies. This includes the Internet, wireless networks, cell phones, and other communication mediums. In the past few decades, information and communication technologies have provided society with a vast array of new communication capabilities. For example, people can communicate in real-time with others in different countries using technologies such as instant messaging, voice over IP (VoIP), and video-conferencing. Social networking websites like Facebook allow users from all over the world to remain in contact and communicate on a regular basis. Modern information and communication technologies have created a "global village," in which people can communicate with others across the world as if they were living next door. For this reason, ICT is often studied in the context of how modern communication technologies affect society. 1.1.2 Identify different types of ICT services/uses like: Internet services, mobile technology, office productivity applications Internet Services Wi-Fi Some public places, such as airports and local councils now offer wireless access to the Internet. Sometimes this service is provided free of charge. It may also be provided with a charge, or else you may need a username and password in order to use the service (e.g. in universities) 2 ©TCTC ECDL NOTES – Computer Essentials Cable The same cable that supplied TV channels can also supply your Internet connections. Often cable gives you very high speed Internet access Dial Up The most common type of Internet connection. Your computer is connected to a modem which connects to the phone line. You can use dialup or broadband via the phone line. Satellite If you live in a very remote area, your only way to connect to the Internet may be via a satellite link. This may require large satellite dishes and expensive specialised equipment. The cost of the Internet connection may also be high Mobile Technology Smart phone A Smartphone is a mobile phone (cell phone) offering advanced computer-like features. Capabilities and standards vary from one manufacturer to another. Most smartphones have some sort of operating system allowing you to connect to other devices and also to install applications. Most smartphones allow you to send and receive emails and may even allow you to browse the Web. Some have a personal organizer built into them and some sort of contact management organiser. Some even have a miniature computer-type keyboard built into them, while others have a touch screen. You might even have GPS positioning systems. Some smartphones allow you to read documents in Microsoft Word or Adobe PDF format. 3 ©TCTC ECDL NOTES – Computer Essentials Other features can include a built-in camera, the ability to play music, display photos and video clips, media software for playing music, browsing photos and viewing video clips. Mobile Phone A mobile phone or cell phone is used for mobile communication (including speech, text-messaging, e-mailing and accessing the web) Many also allow you to send and receive pictures and video. Most mobile phones use a signal from a local transmission tower and will not work when you are out of range or if the signal is blocked by mountains, or even buildings. Satellite phones use a signal coming from a satellite. They tend to be much more expensive to purchase and use. While you should never be out of range, the satellite signal may be blocked by tall buildings. Office productivity applications Word processing applications A word processing program (such as Microsoft Word) allows you to produce letters, memos, etc., easily. You can easily mail merge a list of names and addresses to produce mass mailers, individually addressed to customers or subscribers. Spreadsheets applications A spreadsheet program (such as Microsoft Excel) allows you to work out a company’s income, expenditure and then calculate the balance. It enables you to make 'what if' type projections of how the company will fair in the future and to forecast how changes in prices will affect profits. Database applications A database program (such as Microsoft Access) allows you to compile information and then to search this information to extract just the information you require. For instance, if you have a database of all the equipment housed within an office you can very simply produce a report listing only the equipment above a certain value. Presentation applications A presentation program (such as Microsoft PowerPoint) allows you to produce professional looking presentations, which can be printed out directly onto slides for use with an overhead projector. Alternatively, you can display your presentations directly on a computer screen or via a computerised projector. 4 ©TCTC ECDL NOTES – Computer Essentials 1.2 Hardware 1.2.1 Define the term hardware. Identify the main types of computers like: desktops, laptops, tablets. Identify the main types of devices like: smart phones, media players, digital cameras What is Hardware? The term hardware refers to the physical components of your computer such as the system unit, mouse, keyboard, monitor etc. 5 ©TCTC ECDL NOTES – Computer Essentials Main types of computers:- desktops, laptops, tablets. Desktops A desktop computer (or desktop PC) is a computer that is designed to stay in a single location. It may be a tower (also known as a system unit) or an all-in-one machine, such as an iMac. Unlike laptops and other portable devices, desktop computers cannot be powered from an internal battery and therefore must remain connected to a wall outlet. In the early age of computers, desktop computers were the only personal computers available. Since laptops and tablets did not exist, all home PCs were desktop computers. Still, the term "desktop computer" was used back then to differentiate between personal PCs and larger computers, such as mainframes and supercomputers. Laptops Laptop computers, as the name implies, are small portable computers which can run on batteries as well as mains power. They use special screens, rather than the traditional bulky VDUs (Visual Display U nits), which allows for longer battery life as well as portability. A newer term, “Notebooks”, simply indicates a VERY small laptop. These are especially popular with salespersons on the move or people giving presentations. While they tend to still be more expensive than an equivalent Desktop computer, they can now match the power of a Desktop computer. Tablets A tablet, or tablet PC, is a portable computer that uses a touch screen as its primary input device. Most tablets are slightly smaller and weigh less than the average laptop. While some tablets include fold out keyboards, others, such as the Apple iPad and Motorola Xoom, only offer touch screen input. 6 ©TCTC ECDL NOTES – Computer Essentials Early tablet touch screens were designed to work with light pens, but most modern tablets support human touch input. Many tablets now support multitouch input, which allows you to perform gestures with multiple fingers, such as pinching an image to zoom out, or spreading your fingers apart to zoom in. Tablets without physical keyboards allow you to enter text using a pop-up keyboard that appears on the screen. Main types of devices:- smartphones, media players, digital cameras Smartphone A Smartphone is a mobile phone (cell phone) offering advanced computer-like features. Capabilities and standards vary from one manufacturer to another. Most Smartphone have some sort of operating system allowing you to connect to other devices and also to install applications. Most Smartphone allow you to send and receive emails and may even allow you to browse the Web. Some have a personal organizer built into them and some sort of contact management organiser. Some even have a miniature computer-type keyboard built into them, while others have a touch screen. You might even have GPS positioning systems. Some Smartphone allow you to read documents in Microsoft Word or Adobe PDF format. Other features can include a built-in camera, the ability to play music, display photos and video clips, media software for playing music, browsing photos and viewing video clips Media Players Media players allow you to store digital music and video. A famous example is the ipod from Apple, which lets you store your digital music which you can then listen to at your leisure. Thousands of songs can be stored on these devices. You can also get devices with a built-in screen which will allow you to watch films and video clips that you download to these devices. 7 ©TCTC ECDL NOTES – Computer Essentials Digital Cameras A digital camera can be used in the same way a traditional camera can, but instead of storing images on rolls of film which require developing, the images are stored digitally in memory housed within the camera (or on memory cards). These pictures can easily be transferred to your computer and then manipulated within any graphics programs which you have installed on your computer. 1.2.2 Define the terms processor, Random Access Memory (RAM), storage. Understand their impact on performance when using computers and devices. Processor A processor, or "microprocessor," is a small chip that resides in computers and other electronic devices. Its basic job is to receive input and provide the appropriate output. While this may seem like a simple task, modern processors can handle trillions of calculations per second. The central processor of a computer is also known as the CPU, or "central processing unit." This processor handles all the basic system instructions, such as processing mouse and keyboard input and running applications. Read only Memory (ROM) Read Only Memory (ROM) as the name suggests is a special type of memory chip which holds software which can be read but not written to. A good example is the ROM-BIOS chip, which contains read-only software. Often network cards and video cards also contain ROM chips Random Access Memory (RAM) Random Access Memory (RAM) is the main 'working' memory used by the computer. When the operating system loads from disk when you first switch on the computer, it is copied into RAM. The original IBM PC could only use up to 640 KB of memory (just over half a megabyte), whereas a modern computer can effectively house as much RAM as you can afford to buy. Commonly modern computers are supplied with over 128 MB of RAM (Usually you find computers with 1 or 2 GB or RAM – 1 GB is equivalent to 1024 MB). As a rough rule, a Microsoft Windows based computer will operate faster if you install more RAM. When adverts refer to a computer having 128 Mbytes of memory, it is this RAM which they are talking about. Data and programs stored in RAM are volatile (i.e. the information is lost when you switch off the computer). 8 ©TCTC ECDL NOTES – Computer Essentials Storage A computer storage device is any type of hardware that stores data. The most common type of storage device, which nearly all computers have, is a hard drive. The computer's primary hard drive stores the operating system, applications, and files and folders for users of the computer. While the hard drive is the most ubiquitous of all storage devices, several other types are common as well. Flash memory devices, such as USB keychain drives and iPod nanos are popular ways to store data in a small, mobile format. Other types of flash memory, such as compact flash and SD cards are popular ways to store images taken by digital cameras. External hard drives that connect via Fire wire and USB are also common. These types of drives are often used for backing up internal hard drives, storing video or photo libraries, or for simply adding extra storage. Finally, tape drives, which use reels of tape to store data, are another type of storage device and are typically used for backing up data. 1.2.3 Identify the main types of integrated and external equipment like: printers, screens, scanners, keyboards, mouse/track pad, webcam, speakers, microphone, and docking station. Printers Most data is printed once you have created it and there are a vast number of different printers available to accomplish this. Most common are inkjet and laser printers both of which can now produce coloured output. There are many different types of printers. In large organisations and offices, laser printers are most commonly used because they can print very fast and give a very high quality output. In most organisations, the printers are connected to the computers via a network. This means that each person with a computer does not require his or her own printer. Each computer connected to the network can print using a particular shared printer. Laser Printer This type of printer is mostly used in offices where high amount of copies is necessary to be printed, it is more economical and it uses the same system as a photocopier, these are more common in black and white only, but nowadays colour laser printers are also being introduced. Inkjet Printer The inkjet printer is the most commonly used printer at home. It makes use of cartridges filled with inks. 9 ©TCTC ECDL NOTES – Computer Essentials Impact Printer A printer in which a keystroke actually hits the paper, like a typewriter, to produce hard copy. Dot Matrix Printer Used in offices for invoicing purposes. They make use of papers with holes at the sides, and also have a carbonated paper. Daisy Wheel and Line Printer An almost obsolete type of printer. A daisy wheel printer has a small plastic 'wheel' with spokes running out from its centre. At the end of each spoke there is a flat part that has a raised alphanumeric character shape. The way it works is that the wheel is rotated to bring a character up against an inkribbon. Then a tiny hammer pushes the shape on to the ribbon causing a letter or number to appear on the paper behind the ribbon. Daisy wheel printers are noisy and slow compared to modern ink-jet and laser printers. Plotter Plotters are used to print or plot large formats such as floor plans and large photographic posters. Plotters are often used by engineers, designers and architects to produce large technical drawings (often a metre wide and any length). The paper is rolled back and forth; while a set of ink pens move side to side, dropping down onto the paper when required. Screens Monitor- (VDU- Visual Display Unit) VDU stands for Visual Display Unit. In other words, it is the monitor of the computer. It is used for showing the main output of the computer in way that humans can understand, since the computer works and calculates only in binary (1 and 0). Traditional computer monitors are based on the same sort of technology that is used within a television screen. Recently, the TFT (Thin Film Transistor) monitors were introduced. These will take less space on the desk than the traditional CRT (Cathode Ray Tube) monitors and use less energy. Projection devices Projection devices can be attached to your computer and are useful for displaying presentations to a group of people. They are best used in combination with presentation programs, such as Microsoft PowerPoint. They are used within education and are also very popular for sales presentations. 10 ©TCTC ECDL NOTES – Computer Essentials Touch Screen A touch screen is a display that also serves as an input device. Some touch screens require a proprietary pen for input, though most modern touch screens detect human touch. Since touch screen devices accept input directly through the screen, they do not require external input devices, such as mice and keyboards. This makes touch screens ideal for computer kiosks, as well as portable devices, such as tablets and smart phones. Scanners A scanner allows you to scan printed material and convert it into a file format which may be used within the PC. You can scan pictures and then manipulate these inside the PC using a graphics application of your choice. In addition, you can scan printed text and convert this not just to a picture of the text but also to, actual text which can be manipulated and edited as text within your word-processor. There are a number of specialist programs, generically called OCR (Optical Character Recognition) programs which are specifically designed for converting printed text into editable text within your applications. Keyboards The keyboard allows you to type information into the computer. It has evolved over the years. The keyboard is built into laptop computers but is a separate item if used with a Desktop computer. They can be connected via cables or may be wireless. Mouse/trackpad Mouse When using an operating system, such as Microsoft Windows, you use the mouse to select drop down menus, to point and click on items, to select items and to drag and drop items from one place to another. Trackpad A trackpad (also touchpad) is a pointing device consisting of specialized surface that can translate the motion and position of a user's fingers to a relative position on screen. They are a common feature of laptop computers and also used as a substitute for a computer mouse where desk space is scarce. Touchpads vary in size but are rarely made larger than 40 square centimeters (about 6 square inches). They can also be found on personal digital assistants (PDAs) and some portable media players. 11 ©TCTC ECDL NOTES – Computer Essentials Webcam Ever since it was invented, the Web has become increasingly interactive. You can now use a small digital movie camera (a Webcam) mounted on the PC monitor to allow two-way communication involving not just text communication but sound and video communication as well. While not yet considered a standard piece of PC kit, it is only a matter of time Speakers Most computers are sold with the capability to add a pair of speakers to your system unit. In fact, in some cases, the computer screen may have speakers built directly into the unit. Microphone Early voice recognition systems offered very poor results, due to the limitations of the software combined with hardware limitations. It takes an awful lot of CPU processing power to convert the spoken word into text which appears on the screen. Things are changing rapidly however and recent systems allow you to talk to a PC and see text appear on the screen. Most of these systems require an initial training period, where you train the software to respond to your particular voice. Whilst still not perfect this is a key technology of the future. Docking station. A docking station, or dock, is a device that connects a laptop to multiple peripherals. It provides a single connection point that allows a laptop to use a connected monitor, printer, keyboard, and mouse. This allows a laptop to function like a desktop computer. 1.2.4 Identify common input/output ports like: USB, HDMI. Universal Serial Bus (USB) Port You will see one or more USB sockets at the back / front of the system unit, allowing you to plug in devices designed for the USB. These devices include printers, scanners and digital cameras. Memory sticks can also be plugged into a USB port allowing you to copy data to or from your hard disk. 12 ©TCTC ECDL NOTES – Computer Essentials HDMI (High-Definition Multimedia Interface) HDMI (High-Definition Multimedia Interface) is a compact audio/video interface for transferring uncompressed video data and compressed/uncompressed digital audio data from a HDMIcompliant device ("the source device") to a compatible computer monitor, video projector, digital television, or digital audio device. HDMI is a digital replacement for existing analogue video standards. There are a number of HDMI-standard cable connectors available, each of which can be used for any uncompressed TV or PC video format, including standard, enhanced, high definition, and 3D video signals 1.3 Software and Licensing 1.3.1 Define the term software and distinguish between the main types of software like: operating systems, applications. Know that software can be installed locally or available online. Software Software is the collection of instructions which makes the computer work. For instance, when you type in words via the keyboard, the software is responsible for displaying the correct letters, in the correct place on the screen. Software is held either on your computer’s hard disk, CD-ROM, DVD or on a diskette (floppy disk) and is loaded (i.e. copied) from the disk into the computers RAM (Random Access Memory), as and when required. Software is also available online There are two types of software: Systems or Operational Software (Operating System) Applications Software Systems Software System software refers to the files and programs that make up your computer's operating system. System files include libraries of functions, system services, drivers for printers and other hardware, system preferences, and other configuration files. The programs that are part of the system software include assemblers, compilers, file management tools, system utilities, and debuggers. The system software is installed on your computer when you install your operating system. 13 ©TCTC ECDL NOTES – Computer Essentials Applications Software An application program is the type of program which you use once the operating system has been loaded. Examples include: - Word-processing programs (for producing letters, memos etc) - Spreadsheets (for doing accounts and working with numbers) - Databases (for organising large amounts of information) - Games Graphics programs (for producing pictures, advertisements, manuals etc). It is important that you recognise examples of application programs covering the following areas: - Word processing - Spreadsheets - Databases - Presentations - E-mailing and Web browsing - Photo editing - Computer games 1.3.2 Define the term operating system and identify some common operating systems for computers and devices. The operating system is a special type of program which loads automatically when you start your computer. The operating system allows you to use the advanced features of a modern computer without having to learn all the details of how the hardware works. There are a number of different types of operating system in common use. The IBM PC (Personal Computer) was introduced way back in 1981 and was originally supplied with an operating system called DOS (Disk Operating System). This operating system was very basic, and you had to be a bit of a computer expert just to understand how to use it. It was NOT user-friendly. Later on, Microsoft introduced Windows and this is the operating system which is most widely used on PCs today. There are a number of different types of Windows. Most people are today running Windows XP or Windows Vista, Windows 7 or Windows 8 Other examples of Operating Systems are: - Windows 95 - Windows 98 - Windows 2K (or Windows 2000) - Linux and UNIX 14 ©TCTC ECDL NOTES – Computer Essentials 1.3.3 Identify common examples of applications like: office productivity, communications, social networking, media, design, mobile applications. Examples of office productivity software include Microsoft Office, Google Apps For Business, Libre Office Productivity Suite, Open Office, Zoho, KOffice, MS Publisher, Notepad, WordPad, Paint, and PhotoFiltre. Examples of Communications include Skype, Viber, What’s Up Examples of Social Networking Facebook, Twitter, Linked IN Examples of Media include Windows Media Player, VLC Example of Design include Photoshop, Gimp, Kompozer Example of Mobile Applications such as Play store, Calendar, email 1.3.4 Define the term End-User License Agreement (EULA). Recognise that software must be licensed before use. When you purchase a piece of software you don't actually own the software. What you are buying is a licence to be able to use the software. You are able to load your software onto your machine at home and use it for as long as you like. The licence which comes with commercial software is also known as the EULA or End User Licence Agreement. An End user Licence agreement is a legal contract between a software author or publisher and the user. Software Copyright is a way to legally protect the ownership of software. The EULA will appear on the first screen of the installation wizard when you start to install the product. In order to continue with installation, you must read and agree to the terms set out in the licence. 1.3.5 Outline the types of software licenses: proprietary, open source, trial version, shareware, freeware. Proprietary Proprietary software or closed source software is computer software licensed under exclusive legal right of the copyright holder with the intent that the licensee is given the right to use the software only under certain conditions, and restricted from other uses, such as modification, sharing, studying, redistribution, or reverse engineering. Usually the source code of proprietary software is not made available. Open source software This type of software licence makes the programming code available to anyone who wishes to enhance or develop the code. Over the years many companies have complained that Microsoft is reluctant to share this level of code detail with competitors, which they claim gives Microsoft an unfair advantage and stifles competition. It is important not to confuse open source software with free software. Sometimes the source code is made available within the public domain for use by all, as they see fit. In other cases the source code is made available to particular companies under tight non - disclosure agreements, to protect commercial sensitivities. 15 ©TCTC ECDL NOTES – Computer Essentials Trial Version Trial version refers to a version of the product that will be close to full-featured, but with certain aspects "disabled." Shareware This is where you can use software for a free trial period. Sometimes the shareware versions may be fully functional, but after a time period will either start to display an annoying message, asking you to register (i.e. pay for) your software, or in some cases it may stop working altogether after the trial period. This 'try before you buy' method of getting software is becoming increasing popular with the major software suppliers. Freeware This is software which can be copied or downloaded free. It is often fully functional. Examples may include software developed by organisations such as Universities, where the aim was not to profit from the software. It is very important not to confuse freeware and shareware. 1.4 Start Up, Shut Down 1.4.1 Start a computer and log on securely using a user name and password. First check that all cables are plugged securely into the rear of the machine. Then check that the monitor is turned on. Locate the power switch on the system unit (tower) and press it once to turn on the computer. You may be asked to supply a logon ID and a password. 1.4.2 Log off, shut down, and Restart a computer using an appropriate routine. Log off Click on button that represents Start Click on the arrow next to shutdown 16 ©TCTC ECDL NOTES – Computer Essentials And then click Log Off Shut Down Click on button that represents Start Click on the button to shutdown Restart Click on button that represents Start Click on the arrow next to shutdown And then click Restart 2. 2 Desktop, Icons, Settings 2.1 Desktop and Icons 2.1.1 Outline the purpose of the desktop and the task bar The Desktop is the first screen you see in your computer after Windows is loaded. And it always stays there (sometimes underneath other windows) until you shut down your computer. The Purpose of the Desktop is to provide icons such as Recycle Bin, Shortcuts which you have created and more 17 ©TCTC ECDL NOTES – Computer Essentials The purpose of the taskbar is to provide the user with an easy way of opening and managing programs installed on their computer. 2.1.2 Identify common icons like those representing: files, folders, applications, printers, drives, and shortcuts/aliases, recycle bin/wastebasket/trash. 18 ©TCTC ECDL NOTES – Computer Essentials 2.1.3 Select and move icons. Click on the icon to Select it and then drag it to where you need the icon you can also use Cut, Copy and Paste techniques 2.1.4 Create, rename, move, delete a shortcut/alias. Creating Desktop Shortcut Icons Sometimes it might be necessary for you to create a shortcut on the desktop. Usually the reason behind this is that you use a particular file / folder on a regular basis and you want to be able to open it easily and quickly. To Create a New Shortcut: Right click on a file / folder. Move the pointer to send to. Click Desktop (Create Shortcut). A shortcut to that file / folder will be created on the desktop. Move a Shortcut to another Location on your Computer Right click on a file / folder. Click create shortcut. The shortcut will be created next to your selected file / folder. Move the shortcut to the desired location. (Using cut & paste or drag & drop techniques). 19 ©TCTC ECDL NOTES – Computer Essentials Rename a shortcut or Delete a Shortcut Right click on the shortcut. Click on Rename to change the name of the Shortcut or Delete if you want to remove the shortcut 2.2 Using Windows 2.2.1 Identify the different parts of a window: title bar, menu bar, toolbar, ribbon, status bar, scroll bar. Ribbon Title Bar Menu Bar Status Bar Tool Bar Scroll Bar 20 ©TCTC ECDL NOTES – Computer Essentials 2.2.2 Open, collapse, expand, restore down, maximise, resize, move, and close a window. You need to do other actions with windows, including: collapsing, expanding, restore, resizing, moving and closing To MOVE a window, hover over the title bar. Then click the left mouse button and drag the window to the position you want. To COLLAPSE the window, click the minimize icon To Expand the window, click the maximize icon To CLOSE the window, click the close icon To Open a File. Click Once and a Window will open. Choose the file you want to open and click Open 2.2.3 To RESIZE a window, move the mouse over the edges of the window until you see a doubleended arrow. You then need to click the left mouse button and drag the window to the right size. Switch between open windows. If you have windows open, but they are minimized, you can restore them quickly and easily. All you need to do is click on the window that you want to open, displayed in the taskbar. If you want to switch between two open windows i.e. if you have one open but want to view another that is minimized, simply click on the application icon and then choose from the files you have opened 21 ©TCTC ECDL NOTES – Computer Essentials 2.3 Tools and Settings 2.3.1 Use available help functions. Click on button that represents Start Then Click on Help and Support A window will load up. In Search Help box write what you need to search example how to rename files and click on the magnifier glass Click on the category you need the information about example rename a file and then all the information about renaming a file will occur 2.3.2 View the computer's basic system information: operating system name and version number installed RAM. Click Start Control Panel 22 ©TCTC ECDL NOTES – Computer Essentials Click on System and Security and then click on System The following window will be displayed: Operating system Version Number CPU Speed RAM – Random Access Memory Note: You can also display the computer’s basic system information, by right clicking on the computer from the menu Start and selecting Properties. 2.3.3 Change desktop configuration settings: date and time, volume settings, background, resolution. Change Date and Time From the Control Panel Click on Clock, Language and Region Click on Date and Time 23 ©TCTC ECDL NOTES – Computer Essentials Change the date, Month and year from the calendar given and the time from the arrows facing up and down Volume Settings From the Control Panel Click on Hardware and Sound Click on Sound Then double click on speakers 24 ©TCTC ECDL NOTES – Computer Essentials Click on the tab Levels and change the volume of the speakers accordingly Background From the Control Panel Click on Appearance and Personalization Click on Personalization Click on Desktop Background From Picture location choose whether you need solid Colours, a picture from library or Top Rated Photos. In case it’s a picture saved in your documents click on browse and search for the desired picture After you have chose the picture choose how the picture should be positioned ex fit to screen, tile etc 25 ©TCTC ECDL NOTES – Computer Essentials Resolution From the Control Panel Click on Appearance and Personalization Click on Display Click Adjust Resolution from the left 2.3.4 Change, add, and remove keyboard language. Change default language. Change/Add keyboard Language From the Control Panel Click on Clock, Language and Region 26 ©TCTC ECDL NOTES – Computer Essentials Click on Region and Language Then Click on the tab Keyboards and Language Click on Change Keyboard Click on Add and select a Country Remove Keyboard Language Click on the Language you want to remove from the installed Service and Click Remove Change Default Language Click on the arrow to change the default Language 27 ©TCTC ECDL NOTES – Computer Essentials 2.3.5 Shut down a non-responding application Sometimes a program / application fail to respond i.e. the program ‘hangs’. Typically non-responsive cannot be closed in the normal way. In such case, you need to follow these steps in order to shut down (close) the program: Press Ctrl, Alt and Delete on your keyboard A window will occur. You will see a list of things which you can choose from. It’s important that you click on Start Task Manager. You will see a list of programs. Click on the program that is not responding and click End Task The End Program dialog box will be displayed. Click End Now button 1 3 2 2.3.6 Install, uninstall an application. To install an application put the CD that you bought in the CD Drive. Open the computer from the Start Button and double click on the Application Icon. Then follow step by step by its wizard To uninstall an application: From the Control Panel Click on Programs Click on Programs and Features 28 ©TCTC ECDL NOTES – Computer Essentials 2.3.7 Choose Software from the list below that you wish to Remove and Click on Uninstall Connect a device (USB flash drive, digital camera, media player) to a computer. Disconnect a device using an appropriate routine. Connect a USB Flash Drive Put the pendrive in a USB port and automatically the Computer will install it Connect a Digital Camera and Media Player Attach appropriate end of cable to the camera and the other end to the USB port found either on the front or on the back of your tower. Connect to camera Connect to USB port 29 ©TCTC ECDL NOTES – Computer Essentials Disconnect a device using an appropriate routine. 2.3.8 Click on the arrow facing upwards in the system tray Click on the icon that shows a USB wire and click Eject. When the Text Safe to Remove Hardware appears on the screen pull out the pendrive Capture a full screen, active window. Locate the print screen button on your keyboard and press it once. This will take a picture of the current screen. Click Paste. If you only need to capture a copy of the active window, press Alt from your keyboard and press the print screen button, whilst holding the Alt key. When you click Paste in an application, you will see that only the active window will be pasted and not the whole screen 30 ©TCTC ECDL NOTES – Computer Essentials 3. 3 Outputs 3.1 Working with Text 3.1.1 Open, close a word processing application. Open, close files. Opening a Word Processing Application Click on the Start Button Click All Programs Select Microsoft Office Click on Microsoft Office Word To close a Document / Microsoft Word Click the Microsoft Office Button and click close, Close. OR Otherwise click on the small ‘x’ button Opening an Existing Document 3.1.2 Click the Microsoft Office Button and Click Open, or Press CTRL+O (Depress the CTRL key while pressing the ―O‖) on the keyboard Choose the location where the file is Saved Click on the file and Click Open Enter text into a document. Flashing insertion point indicates where the next character you type will appear. Simply start typing to enter text. If you make any mistakes, use the Backspace key to delete unwanted characters. 3.1.3 Copy, move text within a document, between open documents. Paste a screen capture into a document Select the text that you wish to copy. Click on the Home tab and select Copy Click at the position within the document where you wish to paste the copied text. If you wish to paste it in another document, click on the document window on the taskbar. Click on the Home Tab again and Select Paste. Move text within a document or between open documents. Select the text that you wish to move. Click on the Home tab and select Cut Click at the position within the document where you wish to paste the copied text. If you wish to paste it in another document, click on the document window on the taskbar. Click on the Home Tab again and Select Paste. 31 ©TCTC ECDL NOTES – Computer Essentials Paste a screen capture into a document 3.1.4 Locate the print screen button on your keyboard and press it once. This will take a picture of the current screen. Click Paste. If you only need to capture a copy of the active window, press Alt from your keyboard and press the print screen button, whilst holding the Alt key. When you click Paste in an application, you will see that only the active window will be pasted and not the whole screen Save and name a document. Click the Microsoft Office Button Click Save or Save As OR Press CTRL+S (Depress the CTRL key while pressing the ―S‖) on the keyboard, OR Click the Save icon on the Quick Access Toolbar 32 ©TCTC ECDL NOTES – Computer Essentials Write the name of the document in the file name field then click Save 3.2 Printing 3.2.1 Install, uninstall a printer. Print a test page. Install a Printer Click Start button. Click Control Panel. Click on Hardware and Sound 33 ©TCTC ECDL NOTES – Computer Essentials Click on Devices and Printers Double-click Add Printer to start the Add Printer Wizard, and then click next. Follow the on-screen instructions to finish the wizard. Uninstall a printer Click Start button. Click Control Panel. Click on Hardware and Sound Click on Devices and Printers Click on Remove Device and Click Yes 34 ©TCTC ECDL NOTES – Computer Essentials Print a test page 3.2.2 Open Printers by clicking the Start button Picture of the Start button, Then click Control Panel Click Hardware and Sound, And then click devices and Printers. Right-click the printer that you want to test, and then click Properties. On the General tab in the Printer Properties dialog box, click Print Test Page. Set the default printer from an installed printer list. Normally in a computer network environment, there will be several printers. Users will therefore need to send their documents to a specific printer – probably to the printer closest to their computer system. Such users will set this printer as the default printer. The default printer is the printer to which a computer sends documents when you select the Print command without first specifying which printer you want to use with a program. You can have only one default printer; it should be the printer you use most often. To set a printer as the default printer: Click Start button. Click Control Panel. Click on Hardware and Sound Click on Devices and Printers 35 ©TCTC ECDL NOTES – Computer Essentials 3.2.3 The Printers window appears, showing a list of printers connected to the network will be displayed. Right-click the name of the printer to set as a default printer. Click Set as Default Printer. The icon of selected printer will display a checkmark on the top right corner. Print a document from a word processing application. Click on the Office Button. Point to Print, and then click on Print from the sub-menu The Print dialog box will be displayed as illustrated below. In the Page range section choose whether you wish to print all the pages in the document, the current page only, selected pages, or a particular selection. In the Copies section specify how many copies of the same document you wish to print. 36 ©TCTC ECDL NOTES – Computer Essentials You can choose to print all the pages in the range specified, or else you can choose to only print the odd or the even pages. Finally, click OK. 3.2.4 View, pause, restart, cancel a print job. View a Print Job Once you have started printing you can view a print job’s process. Double click on the printer icon displayed at the bottom-right of your screen. This will display a dialog box showing the progress of your print jobs. Otherwise, from the Control Panel, click on Printers, then doubleclick on the printer in use. Pause, Restart or Cancel a Print Job Open to View the Print Job Progress Right click on the file you want to cancel, pause or Restart and choose From the Menu given 4 File Management 4.1 Introducing Files and Folders 4.1.1 Understand how an operating system organises drives, folders, files in a hierarchical structure. Navigate between drives, folders, sub-folders, files. What are Drives, Folders and Files? When accessing a drive on your computer, Windows uses a system of drive letters to serve as logical pointers to the different physical drives you have access to. From each drive letter it is possible to access all of your files stored on that particular physical drive. For instance, the Hard Disk drive letter is usually ‘C’. On some computers, you will find two hard disks, one of which will be the C drive and the other will be the D drive. The Floppy Disk is referred to as drive A. Pen drives are referred to as 37 ©TCTC ECDL NOTES – Computer Essentials Removable Disks and they may be assigned different letters, depending on the number of disks installed on your computer. To help organise your files it is possible to create folders (also referred to as directories) to help divide and even sub-divide the files stored within the various logical drives available. A system of hierarchical folders within folders which represent your hard disk are often referred to as the folder (directory) tree, in the same way the very top of the file system is known as the root folder (directory). Finally, at the very end of this structure are the various files which we use. Each file name can be up to 255 characters in length. 4.1.2 4.1.3 Display file, folder properties like: name, size, location. Right click on the folder. Click Properties. Change view to display files and folders like: tiles, icons, list, and details. Open the Folder and click on the View tab on the right hand side of the screen and choose between tiles, icons, list and details 38 ©TCTC ECDL NOTES – Computer Essentials 4.1.4 Identify common file types like: word processing, spreadsheet, presentation, portable document format (pdf), image, audio, video, compressed, executable files. Within the Windows Explorer window each file will be marked with a small icon, as illustrated. In the example shown, the first file displays an icon representing Microsoft Word, and if you look along the line of information about this file, it clearly states (assuming that you are using the details mode to view the files) that the file is indeed a Microsoft Word Document. The second file is marked as a Microsoft PowerPoint Presentation file in the same way. File extensions File names usually end with a 3 character extension. A period (.) separates the filename from the file extension. Some of the common file extensions are listed below: 39 ©TCTC ECDL NOTES – Computer Essentials 4.1.5 Open a file, folder, drive. To open a File, folder or drive, double click on it. 4.1.6 Recognise good practice in folder, file naming: use meaningful names for folders and files to help with searching and organisation. Create file names that are logical, meaningful to all users, simple to read and relevant. Use lowercase when naming files. Do not use the following characters: &, ( ) % # ‘ â€oe / \ - { } [ ] < > @ When numbering similar types of files or sequences try to anticipate maximum numbers Files should not be located in directory structures with more than six levels, as this can create difficulties when accessing and archiving files. 40 ©TCTC ECDL NOTES – Computer Essentials 4.1.7 4.1.8 4.1.9 Create a folder. Identify the area where you will create your new folder, e.g. Desktop or My Documents. Right click in an empty space, point to New, and then click Folder. A new folder will be created and you can use the keyboard to type a name for the folder. Press Enter Rename a file, folder. Right click on the folder / file. Click Rename. Type in a new name. Press Enter Search for files by properties: all or part of file name using wildcards if necessary, content, date modified. To open the Search dialog box, click on the Start button, and write the file/folder where you have Start Search and click on See more results. Automatically it will start searching but f you need more options click on the Search Box. This will show the Add Search filter window. Options you can search for files and folders by date modified, kind, type size etc. Click on the one you need to Search with 41 ©TCTC ECDL NOTES – Computer Essentials To search for a file using wildcards instead of the full name. In the previous example, we knew the full name of the file or folder for which we were searching. In some cases we may only know part of the name, in which case we can use wildcards. For example: To search for all files whose names start with z o Type: z* To search for all files whose names start with za o Type: za* To search for all files whose names start with za and contain 5 characters o Type: za??? To search for all Microsoft Excel files whose names start with za and contain 5 characters o Type: za???.xls 4.1.10 View list of recently used files. Click on the Start icon (bottom-left of your screen), and from the popup menu displayed select Recent Items A submenu will display a list of recently used documents. Clicking on one of these document files will load the document into the relevant program. 4.2 Organising Files and Folders 4.2.1 Select individual, adjacent, nonadjacent files, folders. To select an individual file / folder simply click once on the file / folder. The file / folder will be highlighted in blue. To select a number of adjacent files / folders. Click on the first file / folder in the block you wish to select, then press Shift and keep holding the key whilst clicking on the last file / folder in the block. 42 ©TCTC ECDL NOTES – Computer Essentials 4.2.2 To select a number of non-adjacent files / folders. Click on the first file / folder that you wish to select. Then press and hold the Ctrl key, whilst clicking on the other files / folders that you wish to select. Sort files in ascending, descending order by name, size, type, date modified. The files displayed in My Computer window can be sorted by name, size, file type and the date/time last modified: Click View, Details. Click the appropriate header: Note: To reverse the sort order, re-click the appropriate header. Counting the Number of Files of a particular type in a Folder Let’s say you have a folder that contains files of different types and you want to know the number of files that are of the type .txt (text files). Follow these steps: 43 ©TCTC ECDL NOTES – Computer Essentials Set the view to Details. Sort the files by type. Click on the first text file in the list. Press and hold the Shift button, while clicking on the last text file in the list. Right click on one of the files in the list and click Properties. You will see the following window: This means that in the folder we have 10 files which are of the type ‘.txt’. 44 ©TCTC ECDL NOTES – Computer Essentials 4.2.3 4.2.4 Copy, move files, folders between folders, drives. Select the files / folders that you wish to duplicate / move. Right click on the file or folder to Copy (to duplicate) OR Cut (to move). Open the folder where you want to paste the files / folders and Right click, Paste. Delete files, folders to the recycle bin/wastebasket/trash and restore to original location. Deleting Files To delete a file, simply right click on it and click Delete. The same procedure applies for a folder. Files and folders that you delete are placed in the recycle bin, from where you can permanently delete a file or restore it. 45 ©TCTC ECDL NOTES – Computer Essentials To permanently delete a file / folder: In the Recycle Bin right click on the file / folder that you wish to remove permanently, then click on delete Restore from Recycle Bin: Double click on the Recycle bin to open it. Right Click on the file or folder you want to Restore Click Restore OR In case you want to restore all of them: Double click on the Recycle bin to open it. Click Restore all 4.2.5 Empty the recycle bin/wastebasket/trash. To empty the Recycle Bin: Double click on the Recycle bin to open it. Click, Empty Recycle Bin. 4.3 Storage and Compression 4.3.1 Identify the main types of storage media like: internal hard disk, external hard disk, network drive, CD, DVD, Bluray Disc, USB flash drive, memory card, online file storage. Internal Hard Disk: All PCs are supplied with an internal hard disk. This is where the operating system (such as Windows) is stored. It is also were you store your data. When you install new applications, they are copied from CD or DVD to your internal hard disk. External hard drives: As the name suggests these are secondary hard disks that you can plug into your computer. They are normally connected via a USB cable. They are available in a range of speeds and storage capacities and are an ideal way to backup your data, such as photos or movies. Network Drives and online file storage: Within an office it is normal that the computers are connected together via a network. This allows you to store your data centrally, on a network server. This network server should be backed-up by the IT support staff on a daily basis. This means that your data is safely backed up for you. Alternatively you may create and store your data 46 ©TCTC ECDL NOTES – Computer Essentials on your own PC or laptop and periodically copy it across the network to be stored safely on a central network server. In many companies network software automatically backs up selected folder on each computer to the central server. CD: Most computers are now supplied with a CD- ROM (Compact Disc - Read Only Memory) drive. CD-ROM discs look exactly like music CDs but contain computer data instead of music. The advantage of a CD-ROM is that it can hold a vast amount of data (equivalent to the storage capacity of over 450 floppy disks). The other big advantage of CD-ROMs is that they are interchangeable. This means that you can own a range of different CD-ROM s and choose which one to insert into your CD-ROM drive. DVD: Short for "Digital Versatile Disk”. Similar to CD-ROM drives but allows you to use DVD disks, which contain vastly more information than a traditional CD ROM disk. These also transfer the data from the disk to the computer far faster, allowing you to watch movies on your computer screen. A CD-ROM can store 650 – 700 MB of data, while a single-layer; single-sided DVD can store 4.7 GB of data. Blue-ray is an optical disc format such as CD and DVD. It was developed for recording and playing back high-definition (HD) video and for storing large amounts of data. While a CD can hold 700 MB of data and a basic DVD can hold 4.7 GB of data, a single Blu-ray disc can hold up to 25 GB of data. USB flash drive: Flash drives plug into the USB port and when viewed via the Windows Explorer, look just like any other drive. They are supplied in a range of sizes with the 1 GB devices being a very cheap way of transferring relatively small amounts of data between computers. Memory Card: A memory card (also called a flash memory card) is a card containing memory chips that is often used in devices such as digital cameras, mobile phones, music players, video game consoles, GPS system and similar devices where there is a need to store data in a compact from, often using a battery power source. There are a number of different types of memory cards with different storage capacities. Many new PCs have built-in slots for different ty pes of memory cards. 4.3.2 Identify file size, folder size, storage capacity measurements like: KB, MB, GB, and TB. KB: Kilobyte represents 1,024 bytes, MB: Megabyte represents 1,048,576 bytes, GB: Gigabyte represents 1,073,741,824 bytes TB: Terabyte represents 1,099,511,627,776 bytes 47 ©TCTC ECDL NOTES – Computer Essentials 4.3.3 4.3.4 View available space on a storage device. Go to Computer from the Start Button Right Click on The drive which you need to check the available space Click on Properties Understand the purpose of file, folder compression. File compression allows you to compress files so that the file size becomes smaller. This allows you to save disk space. It is useful when sending files over the Internet (especially when you have a slow connection). 4.3.5 Compress files, folders. Right click on the folder, From the popup menu displayed, select Send to, Then click Compressed (zipped) Folder. 48 ©TCTC ECDL NOTES – Computer Essentials 4.3.6 Extract compressed files, folders to a location on a drive. Right click on the zipped folder that contains the files that you wish to open. Click Extract All This will display a Window and click Extract 49 ©TCTC ECDL NOTES – Computer Essentials 5 Networks 5.1 Network Concepts 5.1.1 Define the term network. Outline the purpose of a network: to share, access data and devices securely. Network is when you have two or more computers connected to each other, you have a network. The purpose of a network is to enable the sharing of files and information between multiple systems and also access data and devices securely by a Username and Password the Internet could be described as a global network of networks. Computer networks can be connected through cables, such as Ethernet cables or phone lines, or wirelessly, using wireless networking cards that send and receive data through the air. 5.1.2 Define the term Internet. Identify some of its main uses like: World Wide Web (WWW), VoIP, e-mail, IM. Internet A collection of networks started by and for the US military to enable them to 'survive' a nuclear war. Later adopted by the educational system, and now exploited by the commercial world. The Internet is a global network of interconnected networks. The unique thing about the Internet is the sheer amount of information which you can access from it. Whatever your interest, you can search for and find information on the most obscure topics. The Internet is an incredibly valuable tool, which can be used for research, communication, marketing and business, amongst other things. World Wide Web (WWW) vs. the Internet The World Wide Web (WWW) is just a small part of the Internet as a whole. The Internet relates to all the hardware and software involved, as well as the WWW. It also includes FTP (File Transfer Protocol), email and newsgroups. The WWW is basically the text and pictures which you can view using your web browser, such as Microsoft Internet Explorer, or Netscape Navigator. Voice over Internet Protocol (VoIP) Voice over Internet Protocol, is a technology that allows you to talk with other people via the Internet. You can talk at no extra cost to other people using VoIP on their computers. You can even make calls to real telephones at a much cheaper rate than normal. This system is ideal when you need to make a lot of long distance of international calls. You can use VoIP by just installing a microphone and headset, or you can purchase a special VoIP compatible phone, which will normally plug into one of the USB sockets on 50 ©TCTC ECDL NOTES – Computer Essentials your computer. A well known VoIP product supplier is Skype, who produce a range of excellent phones. Electronic mail (e-mail) Email allows you to send a message to another person almost instantly, anywhere in the world. It requires both computers to be connected to the Internet. As well as sending a text message, files can be sent as email attachments. Instant messaging (IM) Instant messaging (IM) provides a mechanism for real-time communication between two or more people sending text messages via their computers. This is different from sending an email which once sent may be read sometime later by the person you sent the email to. Some types of instant messaging software let you speak rather than having to type your messages. You can use your web cam so that you can see the person you are talking to. 5.1.3 Define the terms intranet, virtual private network (VPN) and identify their main uses. Intranet is a smaller, closed version of the Internet, which can only be accessed by authorized members of an organisation. Intranets are becoming an increasingly popular way to share information within a company or other organisation. An Intranet uses Internet technologies to allow users to access company documents, search databases, schedule meetings and of course send emails. The Intranet can only be accessed by employees working within a particular firm, using a specific username and password. VPN (Virtual Private Network) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost. 51 ©TCTC ECDL NOTES – Computer Essentials 5.1.4 Understand what transfer rate means. Understand how it is measured: bits per second (bps), kilobits per second (kbps), megabits per second (mbps), and gigabits per second (gbps). Transfer rate is commonly used to measure how fast data is transferred from one location to another. For example, a hard drive may have a maximum data transfer rate of 480 Mbps, while your ISP may offer an Internet connection with a maximum data transfer rate of only 1.5 Mbps. When you download or upload data the speed of the data transfer is measured by the amount of data that is transferred per second. Common transfer rate units are: 5.1.5 Bits per second (bps). (Very slow connections will be quoted in bits per second). Kilobits per second (kbps). Megabits per second (mbps). (High speed data transfer is measured in megabits bits per second.) Gigabits per second (gbps) Understand the concepts of downloading from, uploading to a network. You can ‘download’ data from a network, for instance you can download a file from a web site. Another example of downloading would be copying a file from another computer on your Local Area Network to the hard disk on your computer. Uploading refers to copying data from your computer to another computer, either on your local area network or on your company website. 5.2 Network Access 5.2.1 Identify the different options for connecting to the Internet like: phone line, mobile phone, cable, wi-fi, wi-max, satellite. Phone line The most common type of Internet connection. Your computer is connected to a modem which connects to the phone line. You can use dialup or broadband via the phone line. Cable The same cable that supplied TV channels can also supply your Internet connections. Often cable gives you very high speed Internet access. Mobile phone: This is often very expensive. The connection is established via special, Internet compatible mobile phones. Wi-Fi Some public places, such as airports and local councils now offer wireless access to the Internet. Sometimes this service is provided free of charge. It may also be provided with a charge, or else you may need a username and password in order to use the service (e.g. in universities) 52 ©TCTC ECDL NOTES – Computer Essentials Wi-Max WiMAX systems are expected to deliver broadband access services to residential and enterprise customers in an economical way. Loosely, WiMax is a standardized wireless version of Ethernet intended primarily as an alternative to wire technologies ( such as Cable Modems, DSL and T1/E1 links ) to provide broadband access to customer premises. WiMAX would operate similar to WiFi but at higher speeds, over greater distances and for a greater number of users. WiMAX has the ability to provide service even in areas that are difficult for wired infrastructure to reach and the ability to overcome the physical limitations of traditional wired infrastructure. Satellite If you live in a very remote area, your only way to connect to the Internet may be via a satellite link. This may require large satellite dishes and expensive specialised equipment. The cost of the Internet connection may also be high. 5.2.2 Define the term Internet Service Provider (ISP). Identify important considerations when selecting an internet subscription option like: upload speed, download speed and quota, cost. ISP stands for Internet Service Provider – If you want to connect to the internet you need to subscribe via an Internet Service Provider. The ISP gives you a connection to the internet either via your telephone line, cable connection or via a special digital high-speed line (ADSL). It’s important to consider these options when selecting an internet subscription:Upload speed – It t determines how quickly your computer/LAN can transmit data to other locations. In media streaming, its function is to send the initial request for web pages and files to the server. Download speed – It reflects how much data can be transmitted to your computer/LAN at one time. This affects the speed of web page loading, file downloading, video/audio streaming, etc A quota – it is the limit example of downloading from Internet Cost – It depends on the service and what it consist of. 5.2.3 Recognise the status of a wireless network: protected/secure, open. Click Networks Icon . Available networks are displayed in the system tray In the Wireless Network Connection Hover your cursor over a network name to view a popup that lists the security type. o If the security type is something such as WEP or WPA2, your network is secured. 53 ©TCTC ECDL NOTES – Computer Essentials o o 5.2.4 If the security type is something such as Unsecured or No authentication (open), your network is not secured. If you notice an exclamation on the network icon that means also that it is not secures Connect to a wireless network. Click on Start Then click on Control Panel Then click on Network and Internet Click on Network and Sharing Then click Connect to a Network And choose which wireless you would like to connect to. Note: Those wireless networks that are for free you will notice that they will have an exclamation mark on top of them the others you would need a password 6 Security and Well-Being 6.1 Protecting Data and Devices 6.1.1 Recognise good password policies like: create with adequate length, adequate character mix, do not share, change regularly. 54 ©TCTC ECDL NOTES – Computer Essentials Password policies refer to guidelines or requirements on the structure and use of passwords. They can be required for access to a computer system or a group of files or a single file. The following are some guidelines for password policies: They should never be blank. They should not be the names of family members or pets or anything else that would be easy for an intruder to try out. Ideally they should never be words, especially words like administrator, admin or root. They should never be less than five characters and preferably longer. Short passwords can easily be determined by a brute force password cracker. This is a piece of software that repeatedly feeds in all combinations of letters and numbers until accessed is gained. With short passwords this can be done in seconds. A good policy is to use a meaningless combination of letters and numbers that is seven or eight characters long. What some users do is to take a meaningful word such as looking and replace the o with the number 0 and the letter i with the number 1 so that the password becomes l00k1ng. You could also make a less obvious change, for example replace k with 3 and g with 9 so that the password becomes loo3in9. Passwords should be changed on a regular basis. Administrators can set a policy that automatically causes passwords to expire after a certain period of time, for example 7 days. 6.1.2 Define the term firewall and outline its purpose. A firewall consists of software and hardware protection against invasion via the internet. In larger companies any connection to the internet automatically goes through a firewall that would have been installed and customized by the company‘s technical IT team. The importance of including a firewall in your security strategy is apparent; however, firewalls do have the following limitations: A firewall cannot prevent users or attackers with modems from dialling in to or out of the internal network, thus bypassing the firewall and its protection completely. Firewalls cannot enforce your password policy or prevent misuse of passwords. Your password policy is crucial in this area because it outlines acceptable conduct and sets the ramifications of noncompliance. Firewalls are ineffective against nontechnical security risks such as social engineering, as discussed in Chapter 1, “There Be Hackers Here.” 55 ©TCTC ECDL NOTES – Computer Essentials Firewalls cannot stop internal users from accessing websites with malicious code, making user education critical. Firewalls cannot protect you from poor decisions. Firewalls cannot protect you when your security policy is too lax. 6.1.3 Understand the purpose of regularly backing up data to a remote location. It’s important to take regular backups as your files can be lost or destroyed accidentally; the hard disk may also develop problems. Thus, backups have to be made not only on the hard disk but also on an external device such as CDs, DVDs, external hard disks or tape drives. This data should also be protected from fire or flood disasters. 6.1.4 Recognise the importance of regularly updating software like: anti-virus, application, operating system software. No computer software is perfect, just as no human is perfect. This is why, over time, the software matures as a result of important updates released by their developers. Upon the first release of a computer program, there will be numerous unforeseen problems and issues experienced by the initial user base, most of which the developer could not have discovered without the feedback from users. Hence, the developers release updates. Basically, updates are additions to software that can help prevent or fix problems, or enhance and improve how your computer works. With this in mind, it is important to remember to regularly check for updates to your software (including Windows, Microsoft Office) for a variety of reasons. Improved security is the most important reason why you should make sure to update your software. Security updates are designed to protect your software (and computer) from harmful programs, viruses, and exploits. You wouldn’t want your software to leave a back door open on your computer and give intruders access to your personal information. New features are released over time for software as the creators continue to develop and mature it. Some features may improve the functionality of the program, or allow you to easily perform that one task you could never do before. Enhanced overall performance of the software and the computer is also often a good reason to keep up-to-date with updates to your PC programs. At initial creation developers may only envision one way of writing code and using computer resources to accomplish the necessary task. Then, down the road, the software developer may discover a less resource-intensive way to complete the same task, or a simpler way to write the code, either of which could help improve load times of software and inuse performance. 56 ©TCTC ECDL NOTES – Computer Essentials 6.2 Malware 6.2.1 Understand the term malware. Identify different types of malware like: virus, worm, Trojan, spyware. Malware is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on Virus These are malicious programs that are intended to make sabotage. They can destroy some or all your files stored on your computer or even the computer itself. An anti-virus program is a must to be installed on your computer system to be protected. It is important that you update the antivirus on a regular basis. Computer Viruses can easily copy themselves once downloaded on your computer; sometimes they can also send themselves to recipients in your email address book. Worm A worm is a virus that does not infect other programs. It makes copies of itself, and infects additional computers (typically by making use of network connections) but does not attach itself to additional programs; however a worm might alter, install, or destroy files and programs 57 ©TCTC ECDL NOTES – Computer Essentials Trojan Trojan is a malware attack that disguises itself as something innocent, such as a computer game, or a YouTube search results page. An example of a devastating Trojan horse used an email with a link that supposedly connected the reader to a video of the Saddam Hussein hanging, but instead just infected them with malware. Once installed on a computer, the 'Saddam' Trojan horse then downloaded and installed a key logger onto the infected computer. This key logger was used to record every keystroke by a computer‘s user, thus stealing financial account information and passwords. Trojans are particularly dangerous because they all appear so harmless on the surface. Often Trojans are found on a particular website (usually adult, gaming, or gambling), hide in downloaded free software, or, as in the "Saddam" Trojan horse, a person might be infected by clicking on a link sent to them in an email. Spyware As the name implies, this is software that "spies" on your computer. Nobody likes to be spied on, and your computer doesn't like it either. Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet. So how does spyware get on your computer? Just like viruses, spyware can be installed when you open an e-mail attachment containing the malicious software. It can also be installed when you install another program that has a spyware installer attached to it. 6.2.2 Be aware how malware can infect a computer or device Once a computer has been compromised by malware, cyber criminals can attempt to access your personal information by logging your keystrokes or monitoring your computer’s activity. Your computer could also be controlled to visit websites or perform other actions without your knowledge. The effects of malware range from brief annoyance to computer crashes and identity theft. 58 ©TCTC ECDL NOTES – Computer Essentials 6.2.3 Use anti-virus software to scan a computer. Antivirus software is a type of utility used for scanning and removing viruses from your computer. While many types of antivirus (or "antivirus") programs exist, their primary purpose is to protect computers from viruses and remove any viruses that are found. An anti-virus program is a must to be installed on your computer system to be protected. It is important that you update the antivirus on a regular basis. Updating an antivirus program ensures that you have as many samples of virus definitions in your system as possible. This ensures that your computer is completely protected from latest virus definitions, which are created every day. 6.3 Health and Green IT 6.3.1 Recognise ways to help ensure a user’s well-being while using a computer or device like: take regular breaks, ensure appropriate lighting and posture. If you do any physical activity for a long time without a break you risk straining or injuring yourself. Using a keyboard or a mouse for a prolonged period can lead to the computer user’s equivalent of tennis elbow. It can affect the fingers, hands, wrists, elbows, or even the back. Repetitive Strain Injury (RSI) RSI stands for Repetitive Strain Injury. This mean damage to nerves, muscles and other soft body tissues resulting from repeated physical movement. To avoid this one needs to take regular breaks Eyesight Extended periods of staring at PC screen can lead to fatigue and ultimately to eyestrain. Make sure that your work area is adequately lit and ventilated. Posture The hardware of your pc should be arranged in the best possible way in order to provide comfort for the user. The Desk The desk should not be very high or very low. When you are using the keyboard, your arms should rest horizontally. The Chair The height and seat depth of the chair should be adjustable. 59 ©TCTC ECDL NOTES – Computer Essentials The Screen The top of the screen should rest at eye level. It is advisable that the user stays 40 – 60 cms away from the screen. The Keyboard You may wish to use a wrist pad to relieve pressure on your wrists. Other Factors The area where you are using the computer should be adequately lit. Make sure that no light reflects on the monitor. Take frequent breaks when using the computer. Also, make sure you never have any trailing cables around your computers, as these can result in accidents. 6.3.2 Recognise computer and device energy saving practices: turning off, adjusting automatic shutdown, backlight, and sleep mode settings. People are becoming more aware and more concerned about how our modern lifestyle is having an impact on the environment. Here are some of the things that you, as a computer user, can do to help reduce the impact on our environment: Use a monitor that consumes less power whilst the computer is inactive. If you are not going to be using your computer for a period of time, switch it off and don't just leave it on standby. Apply Automatic Shutdown to the Computer 60 ©TCTC ECDL NOTES – Computer Essentials 6.3.3 Recognise that computers, devices, batteries, printer cartridges and paper should be recycled. We can also help to reduce the impact on our environment by: Recycle paper for printing. If you are printing out non essential documents, print on the back of old paper. If the paper can no longer be used put it into a recycling bin. Don't print unless absolutely necessary. Read your documents on the screen. Pass them onto others in an electronic format Recycle your old printer ink cartridges and toners. Recycle your computer - Just because you want a new computer doesn't mean to say that your old one is worthless. You can pass your computer onto someone else. 6.3.4 Identify some options available for enhancing accessibility like: voice recognition software, screen reader, screen magnifier, on-screen keyboard, high contrast. There are a range of options to improve computer accessibility. These cover: Voice recognition software Screen reader software Screen magnifier software On-screen keyboard High Contrast Voice recognition software Voice recognition software lets you talk to a computer and use simple commands or sentences. These systems are easily confused by regional accents and background noise, but are getting better each year as the software improves. Screen reader software Screen reader software is designed for the visually impaired and tries to interpret the contents of the computer screen and then communicate that information in different formats, such as speech output, sound icons or as Braille output. Screen magnifier software This type of software magnifies the screen contents, making it easier to read. Microsoft Windows has basic screen magnifier software included. 61 ©TCTC ECDL NOTES – Computer Essentials On-screen keyboard An on-screen keyboard is a representation of the physical keyboard on the screen. It is designed for use by individuals who are not able to use a physical keyboard. Window s has a basic onscreen keyboard option located within the Accessories group. High Contrast Make the screen easier to read with a High Contrast colour scheme. You can heighten screen contrast with an alternative colour combination or change the font sizes for greater legibility. 62 ©TCTC