Learning and Growing-Up: Welcome
Learning and Growing-Up: Welcome
WELCOME
Piotr Haraszewski
Illustrations by JM Blasi
www.kefas.biz
ISBN 978-83-927983-6-1
he time you use it for education and homework does not count, but
please remember that for a young person like you, spending more than an
hour a day in front of the computer can be both addictive and cause you to
have health problems. In order for you to stay healthy and develop well, you
need to spend a lot of time outdoor and get plenty of fresh air. Because of all
that, your mom and dad will control the time you spend on the computer.
8
STORAGE
SYSTEM
f we want our computer to work well, its a good idea to divide it into three
different parts called partitions. It is kind of like dividing space in a car. The
first partition includes the system (just like the engine of the car is placed in
a separate space). The second partition should be used for the data you often
use (just like the passenger space in the car). It is quite comfortable not having
the engine in the passenger area, dont you think? Its the same way with having
a special partition for the system in your computer.
CRUCIAL DATA
10
11
C
bs hapte
djf
dk r 9
gfl
;g
bd
12
13
nce your machine is set up and ready, you will no doubt want to explore
the world. Thats what the Internet is for. Just remember said Adams
dad millions of people have access to the Internet. Some of them are wise
and responsible, and you will be able to learn a lot from them, but there
are others who are depraved, crazy or have mental problems. Those
people fill the Internet with their sick ideas and try to infect others with
them. Its like a sickness.
ust like we protect our bodies from bacteria by avoiding them, we should
protect ourselves from the Internet sites whose main purpose is to corrupt our
minds. Try to remember this simple rule: if you wouldnt allow someone to
enter your house or your car, you shouldnt let them enter your computer,
either. This will save you from many problems. Computer experts have a
saying: Garbage in, garbage out. In real life it means that if you fill your mind
with trashy information, your value system will soon suffer degradation.
17
5 new
19
20
21
Anti Virus
Security
22
Anti Virus
Security
23
ou already know that many people use the Internet in a wrong way. Stay
away from them! There are, however, a lot of fantastic resources which you
can access instantly from your own home. Those include online libraries and
encyclopedias.
24
Chapter 9
To err is human, but
human erorr ist nothing
to what a computer can
do if it tries...
25
f you are looking for information to help you write your homework on
any subject, all you need to do is type a few key words and thousands of
results from all around the world will appear on your screen. If you dont
want to spend weeks on separating the useless information, you should
learn how to use the system of filters which are included in all good search
engines. This will help you get the information you need a lot faster.
27
emember Adam said his dad A lot of people think that when
theyre surfing the net, they are anonymous, but they are wrong!
Every server administrator can easily find out the IP address of your
computer.
28
That alone should cause you to be very wise when using your computer.
Because each IP number is different, the Police can catch people who
break the law on the Internet.
ralia
t
s
u
ussia
A
R
,
,
h
g
t
r
r
u
e
mith, P w, St. Petersb nd
S
m
a
d
7.82 A rys Kuznieco Warsaw, Pola
3
.
4
2
.
3
IP 20 0.32.86 Bo
wicz, na
e
i
k
r
u
T
5
l
i
IP 217.1 79.194 Karo Shanghai, Ch .A .
,
.S
.1
IP 83.2 .128.38 Li Qin rey, Denver, U dia
G
2
In
IP 119.6 .195 Johnatan arg, Mumbai, , Germany
0
a
G
d
IP 208.8 .68.8 Shamira hke, Dortmun Aires, Argentin
0
sc
s
IP 203.9 .91 Dietrich Je Arvelo, Bueno
2
iz
IP 79.22 8. 47.10 Beatr
2
IP 190.2
SSL Verification
33
When you purchase products online using your credit card, you have to
make sure to check two things:
does the online shopping site have a secure transaction certificate
(which means that the web site address begins with https://), in other
words, is the sites data encrypted?
does the bank that issued your credit card offer cancellation
of payments made to dishonest online vendors?
B
A
N
K
34
35
Why they
ask for
my password
36
37
38
nternet chatting can be great, but there are many perverted men or
women who try to gain the trust of people they want to hurt. They woo
their victims with sweet talking messages and slowly gain their trust by
telling them all kinds of compliments and nice things. Once they have
succeeded in making themselves harmless and trustworthy, they do what
they can to extract seemingly unimportant details which will help them learn
who their victims are and where they live. With time, they suggest meeting
somewhere in town. If this happened to you and you agreed to meet, you
could lose your life or be abducted, and your family would go through the
nightmare of losing their child or being blackmailed. Many young girls have
been kidnapped in this way and used for terrible things. No one ever
heard of them again. Police statistics describe tens of thousands of such
cases. Remember, never chat with strangers.
41
YOU WIN!
SCORE: 3 1 8 2 3 8 9 4
42
There are very few good games. The overwhelming majority of games
available on the market right are full of brutality and violence. The
manufacturers of these games claim that they are harmless and actually
help teens to release aggression. That is a lie! They do stimulate
aggression and cause permanent changes in the young peoples minds.
player 1
44
k.o.
player 2
45
46
47
ou have most likely heard of people called PIRATES. In the old days,
criminals who managed to run from law formed bands of pirates and traveled
the worlds seas attacking cargo ships to pillage goods. They did this for profit
having no regard for other peoples ownership. They sold the stolen goods
at special markets in their bases at the prices which were far below the
true value.
48
49
oday, the situation is not much different. When we surf the sea of the
Internet, we also bump into contemporary pirates who steal other peoples
goods and sell them from their bases (or servers) for a much cheaper price.
Sometimes they send their agents to public markets so that they can sell
illegal movies, computer programs or music CDs.
Remember: these people are criminals, and purchasing goods from them
is called profiteering and its punishable by law. If one of your friends is
a minor and he or she buys stolen goods, please tell them that their parents
will be punished for what they are doing. Its the law.
n order for your computer to work properly, you have to take care of its
hygiene, just like you care for the hygiene of your body. To do that, you
should check the available updates for your computer system and the
programs you use at least once a week. These updates are like vaccination
shots which make your hardware more resilient.
DISC CLEANING
SYSTEM UPDATE
52
53
ust like it is important to keep our house clean, because then everything
can be found easily and quickly, we should keep our disc in order. At least
once a month use a disc defragmenting program. This program will arrange
DEFRAGMENTATION
54
the data on the disc in such a way, that the computer will have a faster
access to it and work better. Thanks to dividing the system into partitions,
the defragmentation is even more effective.
EMPTYING
THE GARBAGE
CAN
56
just like before it broke down. This will take a lot less time and is much safer.
You should always make a copy of an image of each partition separately.
If a virus attacks your system, all you will have to do is reinstall the system
partition only. Your data will be safe. That is one of the benefits of dividing
your system into partitions.
57
ow, that we are at the end, I would like you to realize one important thing.
Your computer and the Internet in themselves are neither good nor bad.
Theyre just part of todays technology. The way you will use them will show
58
what kind of person you are. I hope you will not disappoint me. I would
very much like to be proud of who you are.
59
60