0% found this document useful (0 votes)
171 views11 pages

CC 101

For it students

Uploaded by

yzxramos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
171 views11 pages

CC 101

For it students

Uploaded by

yzxramos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

REVIEWER IN

INTRODUCTION IN
COMPUTING

What is Computer? Charles Babbage


- is a programmable device that stores, retrieves, and -A mathematician, philosopher, inventor and
processes data. The term "computer" was originally mechanical engineer, Babbage originated the
given to humans (human computers) who concept of a digital programmable computer.
performed numerical calculations using calculators, -Father of the computer
such as the abacus and slide rule. The term was later
given to a me mechanical device as they began Generations of Computer
replacing the human computers. Today's computers First Generation– It uses vacuum tubes
are electronic devices that accept data (input ), UNIVAC
process that data, produce output , and store – Universal Automatic Computer
(storage) the results ENIAC
– Electronic Numerical Integrator and Computer
Monitor EDVAC
-is an output device that displays information [n – Electronic Discrete Variable Automatic Computer
pictorial form. EDSAC
– Electronic Delay Storage Automatic Calculator
Types of Monitor Second Generation– It uses transistors
CRT– Cathode Ray Tube Third Generation– It uses Integrated circuits.
LED– Light Emitting Diode Fourth Generation– It uses Microprocessor
LCD– Liquid Crystal Display Fifth Generation– based on Artificial Intelligence

Computer Keyboard Components of Computer


-is one of the primary input devices used with a Software
computer. Similar to an electric typewriter, a – The application or programs installed on a
keyboard is composed of buttons that create letters, computer system.
numbers, and symbols, as well as other functions Examples:
Microsoft office
Computer Mouse MS Word
-is a handheld hardware input device that controls a MS Excel
cursor in a MS Power point
GUI (Graphical User Interface) Browsers:
Google Chrome
and can move and select text, icons, files, and Microsoft Edge
folders on your computer. Mozilla Firefox

System Unit Hardware


-Alternatively referred to as a box, main unit, and – The physical or tangible components of a
system box, a system unit is the case that contains computer system.
all the main parts of a computer. Below is a picture Examples: Hard Disk Drive Complementary Metal-
of a computer with each of the main components Oxide Semiconductor CD/DVD Drive Motherboard
that help make up a computer. Random Access Memory Etc. Peopleware - "User"
REVIEWER IN
INTRODUCTION IN
COMPUTING

World of Computers What are the disadvantages of using computers?


What is computer literacy (digital literacy)? Violation of Privacy Public Safety Impact on Labor
Current knowledge and understanding of Force Health Risks Impact on Environment
computers and their uses Computers are Networks and the internet
everywhere Information Processing Cycle What is a network? Collection of computers and
devices connected together, often wirelessly Used to
What is the information processing cycle? share Resources Hardware devices Software
Input programs Data Information Saves time and money
Process What is a server? server controls access to resources
Output on a network Clients, or workstations, request
Storage resources from the server
Communication What is the Internet? Worldwide collection of
Input Device networks that connects millions of businesses,
Hardware used to enter data and instructions. government agencies, educational institutions, and
Output Device individuals
Hardware that conveys information to one or more Why do users access the Internet? Communications
people Research and Information Shopping Banking and
System Unit investing Classes Entertainment Download Music
Case that contains the electronic components of the Share Information
computer that are used to process data Storage Networks and the internet
What is the Web? Billions of documents, called
What is storage? Holds data, instructions, and Web pages, available to anyone connected to the
information for future use Internet You can share information on a social
Storage media Physical material on which data, networking Web site or a photo sharing community.
instructions, and information are stored A Web site is a collection of related Web pages A
Storage device Records and retrieves items to and podcast is recorded audio stored on a Web site that
from storage media. can be downloaded
What is a USB flash drive? Portable storage device A Web page contains text, graphics, audio, video, and
Small and lightweight enough to be transported on links to other Web pages A blog consists of text-
a keychain or in a pocket The average USB flash stamped articles in a journal format.
drive can hold about 2 billion characters Computer Software.
What is a hard disk? Provides greater storage What is software? Consists of a series of instructions
capacity than a USB flash drive Most are housed that tells the computer what to do and how to do it
inside the system unit Advantages of using Also called a program
computers Computer Software
What are the advantages of using computers? What is a graphical user interface (GUI)? Allows you
Speed Storage Reliability Consistency to interact with the software using text, graphics,
Communications and visual images such as icons Controls how you
enter data and instructions and how the screen
displays information
REVIEWER IN
INTRODUCTION IN
COMPUTING

Computer Software Program Mobile Computers and Mobile Devices


System software control or maintain the operations What are mobile devices? Small enough to carry in a
of the computer and its devices pocket Internet-enabled telephone is a "smart
Operating System (OS) is a set of programs that phone"
coordinates all activities among computer hardware Mobile Computers and Mobile Devices What is a
devices handheld computer? Small enough to fit in one
What is system software? Utility Programs allow the hand Used by mobile employees such as meter
user to perform maintenance-type tasks usually readers and delivery people.
related to managing a computer, its devices or its Mobile Computers and Mobile Devices
programs What is a personal digital assistant (PDA)? Provides
What is application software? Programs designed personal organizer functions Calendar Appointment
to make users more productive Word Processing book Address book Calculator Notepad Consoles
Spreadsheet Database Presentation Graphics What are game consoles? Mobile computing device
What is a programmer? Someone who develops designed for single-player or multiplayer video
software Programmer writes the instructions to games.
direct the computer to process data into What types of servers are there? A server controls
information access to network resources and provides centralized
storage. Mainframe Very powerful, expensive
Categories of Computers computer that supports thousands of connected
What are the categories of computers? users Supercomputer The fastest, most powerful,
Personal Computers (desktop) Mobile Computers most expensive computer. Used for applications
and Mobile Devices Game Consoles Servers requiring complex mathematical calculations
Mainframes Supercomputers Embedded Embedded Computers
Computers Personal Computers What is an embedded computer? A special-purpose
What are the two most popular styles of personal computer that functions as a component in a larger
computers. PC and compatibles use the Windows product
operating system Apple Macintosh usually uses the Elements of an Information System Hardware
Macintosh operating system (Mac OS X) Software Data People Procedures Examples of
What is a desktop computer? Computer Usage Personal finance management
Personal Computers Designed so all of the Web access What software is available for a home
components fit entirely on or under a desk or table user? Communications Entertainment Examples of
Mobile Computers and Mobile Devices Computer Usage What software is available for a
What is a notebook computer? Portable, small small office/home office (SOHO) user? Productivity
enough to fit on your lap Also called a laptop software Specialty software Web usage E-mail
computer Usually more expensive than a desktop
computer with equal capabilities.
Mobile Computers and Mobile Devices Computer Applications in Society What are some
What is a Tablet PC? Resembles a slate Allows you examples of computer applications in society?
to write on the screen using a digital pen Especially Education Finance Government Health Care Science
useful for taking notes Publishing Travel Manufacturing
REVIEWER IN INTRODUCTION IN
COMPUTING COMPUTER
SECURITY

PROTECT Your Computer, Your Family, and Yourself Unwanted e-mail, instant messages, and other online

The Internet A World of Opportunities Look what's communication A crime where con artists get your

at your fingertips A way to communicate with personal information and access your cash and/or

friends, family, colleagues. Access to information credit Identity Theft Hoaxes E-mail sent by online

and entertainment A means to learn, meet people, criminals to trick you into giving them money

and explore Online Security Versus Online Safety Your computer Turn on Windows Internet firewall.

Security: We must secure our computers with Use Microsoft Update to keep Windows up-to-date

technology in the same way that we secure the automatically.. Install and maintain antivirus

doors to our homes. Safety: We must act in ways software. Install and maintain Microsoft Windows

that help protect us against the risks that come with Defender. Your family Talk with your kids about what

Internet use. Primary Online Risks and Threats To they do online. Set clear rules for Internet use. Keep

Computers Viruses Wornis Trojans Spyware To personal information private. Use family safety

Families Cyberbullies. File-sharing abuses Invasion of settings in Microsoft software. Yourself Practice

privacy Disturbing content Predators To Personal Internet behavior that lowers your risk. Manage your

Information Online fraud and phishing Hoaxes personal information carefully. Use anti-phishing and

Identity theft Spam anti-spam technology built into Windows Vista,

iruses/Worms Software programs designed to Windows XP SP2, Windows Live, and Microsoft

invade your computer, and copy, damage, or delete Outlook. Four Steps to Help Protect Your Computer

your data. Trojans Viruses that pretend to be helpful Turn on Windows Internet firewall Use Microsoft

programs while destroying your data, damaging Update to keep Windows up-to-date automatically

your computer, and stealing your personal Install and maintain antivirus software. Install and

information. Spyware Software that tracks your maintain antispyware software Turn on Windows

online activities or displays endless ads. Primary Internet Firewall An Internet firewall helps create a

Online Risks for Children Cyberbullies Both children protective barrier between your computer and the

and adults may use the Internet to harass or Internet. Use Automatic Updates to Keep Software

intimidate other people. File-share Abuse Up-to-date Install all updates as soon as they are

Unauthorized sharing of music, video, and other files available Automatic updates provide the best

may be illegal, and download malicious software protection Install and Maintain Antivirus Software

Disturbing Content If kids explore unsupervised, Antivirus software helps to detect and remove

they could stumble upon images or information you computer viruses before they can cause damage. For

may not want them exposed to. Predators These antivirus software to be effective, you must keep it

people use the Internet to trick children into up-to-date. Install and Maintain Antispyware

meeting with them in person. Invasion of Privacy If Software Use antispyware software, like Microsoft

kids fill out online forms, they may share Windows Defender, so unknown software cannot

information you don't want strangers to have about track your online activity and potentially steal your

them or your family. Primary Threats to Personal information. Other Ways to Help Protect Your

Online Safety Phishing E-mail sent by online Computer Back up your files regularly. Read Web site

criminals to trick you into going to fake Web sites privacy statements Close pop-ups using red "X" Think

and revealing personal Information Spam before you click Back up Your Files Save to CD/DVD, a
USB drive, or other external source
REVIEWER IN INTRODUCTION IN
COMPUTING COMPUTER
SECURITY

Use a Web-based backup service Think Before You


Do not click links in e-mail Treat others the way you
Click Be cautious with e-mail attachments and links.
want to be treated Stand up for yourself Respect
Only download files from Web sites you trust Read
other people's property Never go alone to meet an
Privacy Statements. Understand what you are
Internet "friend" in person Use Family Safety
getting before you agree to download or share your
Software Available in Windows Vista, Windows Live
personal Information Use the Red "X" to Close Pop-
OneCare Family Safety, Xbox 360 Helps parents
ups Always use the red "X" in the comer of a pop-up
manage the content their children view, what they
screen. Never click "yes," "accept," or even "cancel,"
do, and who they communicate with online Take
because it could be a trick that installs software on
Steps to Help Protect Your Personal Information
your computer. Take Steps to Help Protect Your
Practice Internet behavior that lowers your risk.
Family Talk with your kids about what they do
Manage your personal information carefully Use
online Set clear rules for Internet use Keep personal
technology to reduce nuisances, and raise the alarm
information private Use family safety software Talk
when appropriate Practice Internet Behaviors that
with Your Kids about Online Risks Talk frankly with
Help Reduce Your Risk Delete spam, don't open it Be
your kids about Internet risks, including Online
on the lookout for online scams Use strong
criminals. Inappropriate content Invasion of privacy
passwords. Manage Personal Information Carefully
Empower them by teaching them how their own
Do not share personal information in e-mail or
behavior can reduce those risks and help to keep
instant messages Use only secure and trusted Web
them safe when they are online Pay Attention to
sites Make sure you are where you think you are: Web
What Your Kids Do Online Keep the computer in a
sites can be faked Avoid financial transactions over
central area Get to know how your kids use the
wireless networks When in public, stay private Anti-
Internet Let your kids be the teacher Teach kids to
Phishing and Anti-Spam Technology Use Most e-mail
trust their Instincts Encourage them to report any
providers and programs, like Windows Live Hotmail'
problems Keep Personal Information Private Teach
and Microsoft Outlook', filter most spam Phishing
children to check with you before sharing personal
Filter in Internet Explorer' 7 helps to block and warn
information online Monitor your children's online
about suspicious sites If Your Identity is Stolen
activities Teach your children to report suspicious
Report it Follow up in writing. Change all passwords
activity Help children choose appropriate screen
Place fraud alert on credit reports Get a copy of your
names and e-mail addresses. Set Clear Rules for
credit report and ensure your account is marked
Internet Use Do not share files or open attachments
"fraud alert" and "victim's statement" How Does
Microsoft Help Improve Security and Safety?
Partnership

By partnering with non-governmental organizations,


other technology companies, and governments
worldwide to help keep people safe online.
Technology By developing software products and
tools that increase security and safety, helping
people minimize their risk online and make
informed choices. Guidance By providing useful
guidance that helps people understand online risks
and what actions they can take.
REVIEWER IN INTRODUCTION IN
COMPUTING COMPUTER
SECURITY

List of Modules
Back Typically at the back of the computer, you will
1. Parts of a Computer
find:
2. The Mouse & Keyboard
1. Fan
3. Window Management and Basic Applications
2. Power Plug Connector– Provides electricity to the
4. Introducing the Internet
computer
5. Common Computer Actions
3. Headphone Connector
6. Using Email
4. Microphone Connector
l 7. Putting it all Together
5. Keyboard Connector
1. Parts of a Computer
6. Mouse Connector
The main components include:
7. Monitor Connector
 System Unit
8. USB Connectors – Used to connect devices like a
 Monitor
flash drive to the computer.
 Mouse
9. Network Port (for Internet access)
 Keyboard

The system unit contains the processor (CPU),


Computer Components
memory, and storage. When comparing computers,
System Unit
these are often the numbers that are thrown around.
Inside the system unit are the printed circuit
The internal memory is used to hold an image of
boards, memory, disk, and fans that make the
programs and data being used while the computer is
computer work.
running. The hard disk is used to store programs and
information that is kept when the computer is
Front
turned off so it is always available.
On the outside of the system unit you will find lights,
buttons and connectors. Each model of computer
Monitor
will look slightly different, but just like a car, every
The monitor is a TV like device used to display text
computer will have a way to perform the functions
and graphics. The monitor, like the System Unit,
you need. Connectors are used to plug into power,
requires an AC power connection and has an on/off
computer components (monitor, keyboard, mouse),
button. In general, the monitor will turn itself into
and other devices you will use to help your
low-power mode when the computer is inactive or
computer do useful things. Typically at the front of
turned off, so the power button on the monitor does
the computer, you will find:
not usually have to be turned off.
1. USB Connectors – Used to connect devices like a
flash drive to the computer.
Mouse
2. Power Button – Used to turn the computer on (this
The mouse is a pointing device used to point and
is not used to turn the computer off).
select items that appear on the monitor. The class
Following are examples of power buttons
will focus on details of mouse usage in the next
3. Headphone Connector – Used to attach
session.
headphones to the computer.
4. Microphone Connector – Used to attach a
Keyboard
microphone to the computer.
The keyboard is used for entering letters, numbers,
5. CD/DVD Drive Bay – Internal CD/DVD drive would
and punctuation.
be installed here.
REVIEWER IN INTRODUCTION IN
COMPUTING COMPUTER
SECURITY

Connections
Keyboard
If USB is used, you can plug into any available USB
The Computer Keyboard has all the letters in the
port. The USB port is rectangular, and fits in only one
alphabet, the numbers, keys for punctuation, and
way. (Try flipping it around if it doesn't slide in
some special keys.
easily.) For the monitor, keyboard, and mouse, if USB
isn't used, the connections are color coded; both the
The Keyboard
cord and the connector will be the same color. For
Some of the most important special keys on the
example the connector on the end of the monitor
keyboard are:
cord is blue; it plugs-in to the blue connector on the
 Shift. Used to change lower case letters to upper
back of the computer.
case letters, or to select the punctuation mark at the
USB can also be used to connect other devices,
top of the key. To use the shift key, press and hold it
including:
down while striking the key with the letter or
Web camera
punctuation you want.
Printer
 Enter. Used to send the cursor to the next line or
Phone (e.g. for transferring photos)
execute a command or operation
External storage devices the USB port and can be
 Caps Lock. Puts the keyboard into a mode where
used for extra storage or moving large files
every letter is UPPER CASE. If you tap it a second
between computers.
time, it will take it out of Caps Lock mode. There is a
light on keyboard showing if you are in Caps Lock
One very important additional component is a surge
mode
protector to prevent damage to the computer
 Backspace. When typing, it will delete the last
caused by electrical power surges. Sensitive
character you typed, or the character to the left of
electronic computer components can easily be
the insertion point. It will also delete all selected
damaged by the power surges generated by storms.
characters if you have some selected
Never connect the computer directly to the wall
 Delete. When typing, it will delete the character to
outlet – always connect it first to a surge protector.
the right of the insertion point. It will also delete all
selected characters if you have some selected.  Ctrl
Desktop
& Alt. These are keys used in combination with other
Desktop Background – The Desktop Background is
keys to perform keyboard shortcuts.  Tab. When
the picture that fills the monitor screen.
typing, will move the cursor to the next tab stop. On
a pop-up or web form, it will move to the next field.
Icons –
 Windows. This will open the start screen. If you tap
Icons are the small pictures representing files or
it again, it will close the start screen.
programs.
 Esc. This can sometimes be used to cancel an
action. For example if you start to rename a file, and
Task Bar –
decide you want to go back to the way it was, you
The Task Bar is found at the bottom of the desktop
can hit the Esc key. The arrow keys on to the right of
screen. The Task Bar shows what programs are
the keyboard can move the cursor in a document.
running on the computer and provides access to all
of the programs and files on your computer, as well
as information on the status of the computer.
REVIEWER IN INTRODUCTION IN
COMPUTING COMPUTER
SECURITY

Desktops and Laptops


Hardware vs. Software
Everything we have looked at so far in this module is
A laptop computer:
called computer hardware.
 Combines the system unit, monitor, keyboard and
Hardware is the things you can see and touch, like
mouse into one unit
the monitor and keyboard.
 Instead of a mouse, a touchpad is often provided:
Software is what allows the computer to do things
 May contain built in speakers, microphone and
with the hardware. You may hear software referred
web camera
to as “programs”.
 Is smaller in size and weight
There are two types of software:
 Is portable
 Operating System  Application Operating System
Can run on AC or battery power. Note that the
lifetime of the battery is typically shorter than of the
Operating System software tells the computer what
laptop.
to do and how to do it. The operating system
 Typically cost more than a desktop computer
coordinates the interaction between the keyboard,
 Due to density and issues with heat and dust,
mouse and computer. Operating System software
often do not last as long as a desktop computer
comes installed on the computer. Windows is an
example of operating system software. It includes all
the programs that work with the hardware and
make it possible for the application programs to use
the mouse, monitor, disk, and USB devices.

Application Software
Application software is the programs installed on the
computer that let us do things we find useful. For
example if you wanted to write a letter you would
need a word processing program. Microsoft Word is
an example of word processing application software.
Dropbox is an application that can be used for
storing and sharing files on an internet-cloud
computer. Some application software comes
installed on the computer. Additional software can
be purchased/downloaded and installed at any time.
REVIEWER IN INTRODUCTION IN
COMPUTING COMPUTER
SECURITY

Connections
Keyboard
If USB is used, you can plug into any available USB
The Computer Keyboard has all the letters in the
port. The USB port is rectangular, and fits in only one
alphabet, the numbers, keys for punctuation, and
way. (Try flipping it around if it doesn't slide in
some special keys.
easily.) For the monitor, keyboard, and mouse, if USB
isn't used, the connections are color coded; both the
The Keyboard
cord and the connector will be the same color. For
Some of the most important special keys on the
example the connector on the end of the monitor
keyboard are:
cord is blue; it plugs-in to the blue connector on the
 Shift. Used to change lower case letters to upper
back of the computer.
case letters, or to select the punctuation mark at the
USB can also be used to connect other devices,
top of the key. To use the shift key, press and hold it
including:
down while striking the key with the letter or
Web camera
punctuation you want.
Printer
 Enter. Used to send the cursor to the next line or
Phone (e.g. for transferring photos)
execute a command or operation
External storage devices the USB port and can be
 Caps Lock. Puts the keyboard into a mode where
used for extra storage or moving large files between
every letter is UPPER CASE. If you tap it a second
computers.
time, it will take it out of Caps Lock mode. There is a
light on keyboard showing if you are in Caps Lock
One very important additional component is a surge
mode
protector to prevent damage to the computer
 Backspace. When typing, it will delete the last
caused by electrical power surges. Sensitive
character you typed, or the character to the left of
electronic computer components can easily be
the insertion point. It will also delete all selected
damaged by the power surges generated by storms.
characters if you have some selected
Never connect the computer directly to the wall
 Delete. When typing, it will delete the character to
outlet – always connect it first to a surge protector.
the right of the insertion point. It will also delete all
selected characters if you have some selected.  Ctrl
Desktop
& Alt. These are keys used in combination with other
Desktop Background – The Desktop Background is
keys to perform keyboard shortcuts.  Tab. When
the picture that fills the monitor screen.
typing, will move the cursor to the next tab stop. On
a pop-up or web form, it will move to the next field.
Icons –
 Windows. This will open the start screen. If you tap
Icons are the small pictures representing files or
it again, it will close the start screen.
programs. 
 Esc. This can sometimes be used to cancel an
action. For example if you start to rename a file, and
Task Bar –
decide you want to go back to the way it was, you
The Task Bar is found at the bottom of the desktop
can hit the Esc key. The arrow keys on to the right of
screen. The Task Bar shows what programs are
the keyboard can move the cursor in a document.
running on the computer and provides access to all
of the programs and files on your computer, as well
as information on the status of the computer.
REVIEWER IN INTRODUCTION IN
COMPUTING COMPUTER
SECURITY

In this digital age, we define a computer as an


electronic device that accepts user data input
and processes them through its algorithms or set of
instructions known as programs to produce the
desired or meaningful output commonly known
as information. But how about if we want to
retrieve the information, that’s where the Storage
comes in. This device stores the data or
information either temporary or permanent. While
the feedback indicates the element of control
that should be a real-time response from output to
the input process
REVIEWER IN INTRODUCTION IN
COMPUTING COMPUTER
SECURITY

Connections
Keyboard
If USB is used, you can plug into any available USB
The Computer Keyboard has all the letters in the
port. The USB port is rectangular, and fits in only one
alphabet, the numbers, keys for punctuation, and
way. (Try flipping it around if it doesn't slide in
some special keys.
easily.) For the monitor, keyboard, and mouse, if USB
isn't used, the connections are color coded; both the
The Keyboard
cord and the connector will be the same color. For
Some of the most important special keys on the
example the connector on the end of the monitor
keyboard are:
cord is blue; it plugs-in to the blue connector on the
 Shift. Used to change lower case letters to upper
back of the computer.
case letters, or to select the punctuation mark at the
USB can also be used to connect other devices,
top of the key. To use the shift key, press and hold it
including:
down while striking the key with the letter or
Web camera
punctuation you want.
Printer
 Enter. Used to send the cursor to the next line or
Phone (e.g. for transferring photos)
execute a command or operation
External storage devices the USB port and can be
 Caps Lock. Puts the keyboard into a mode where
used for extra storage or moving large files between
every letter is UPPER CASE. If you tap it a second
computers.
time, it will take it out of Caps Lock mode. There is a
light on keyboard showing if you are in Caps Lock
One very important additional component is a surge
mode
protector to prevent damage to the computer
 Backspace. When typing, it will delete the last
caused by electrical power surges. Sensitive
character you typed, or the character to the left of
electronic computer components can easily be
the insertion point. It will also delete all selected
damaged by the power surges generated by storms.
characters if you have some selected
Never connect the computer directly to the wall
 Delete. When typing, it will delete the character to
outlet – always connect it first to a surge protector.
the right of the insertion point. It will also delete all
selected characters if you have some selected.  Ctrl
Desktop
& Alt. These are keys used in combination with other
Desktop Background – The Desktop Background is
keys to perform keyboard shortcuts.  Tab. When
the picture that fills the monitor screen.
typing, will move the cursor to the next tab stop. On
a pop-up or web form, it will move to the next field.
Icons –
 Windows. This will open the start screen. If you tap
Icons are the small pictures representing files or
it again, it will close the start screen.
programs. 
 Esc. This can sometimes be used to cancel an
action. For example if you start to rename a file, and
Task Bar –
decide you want to go back to the way it was, you
The Task Bar is found at the bottom of the desktop
can hit the Esc key. The arrow keys on to the right of
screen. The Task Bar shows what programs are
the keyboard can move the cursor in a document.
running on the computer and provides access to all
of the programs and files on your computer, as well
as information on the status of the computer.

You might also like