CC 101
CC 101
INTRODUCTION IN
COMPUTING
PROTECT Your Computer, Your Family, and Yourself Unwanted e-mail, instant messages, and other online
The Internet A World of Opportunities Look what's communication A crime where con artists get your
at your fingertips A way to communicate with personal information and access your cash and/or
friends, family, colleagues. Access to information credit Identity Theft Hoaxes E-mail sent by online
and entertainment A means to learn, meet people, criminals to trick you into giving them money
and explore Online Security Versus Online Safety Your computer Turn on Windows Internet firewall.
Security: We must secure our computers with Use Microsoft Update to keep Windows up-to-date
technology in the same way that we secure the automatically.. Install and maintain antivirus
doors to our homes. Safety: We must act in ways software. Install and maintain Microsoft Windows
that help protect us against the risks that come with Defender. Your family Talk with your kids about what
Internet use. Primary Online Risks and Threats To they do online. Set clear rules for Internet use. Keep
Computers Viruses Wornis Trojans Spyware To personal information private. Use family safety
Families Cyberbullies. File-sharing abuses Invasion of settings in Microsoft software. Yourself Practice
privacy Disturbing content Predators To Personal Internet behavior that lowers your risk. Manage your
Information Online fraud and phishing Hoaxes personal information carefully. Use anti-phishing and
iruses/Worms Software programs designed to Windows XP SP2, Windows Live, and Microsoft
invade your computer, and copy, damage, or delete Outlook. Four Steps to Help Protect Your Computer
your data. Trojans Viruses that pretend to be helpful Turn on Windows Internet firewall Use Microsoft
programs while destroying your data, damaging Update to keep Windows up-to-date automatically
your computer, and stealing your personal Install and maintain antivirus software. Install and
information. Spyware Software that tracks your maintain antispyware software Turn on Windows
online activities or displays endless ads. Primary Internet Firewall An Internet firewall helps create a
Online Risks for Children Cyberbullies Both children protective barrier between your computer and the
and adults may use the Internet to harass or Internet. Use Automatic Updates to Keep Software
intimidate other people. File-share Abuse Up-to-date Install all updates as soon as they are
Unauthorized sharing of music, video, and other files available Automatic updates provide the best
may be illegal, and download malicious software protection Install and Maintain Antivirus Software
Disturbing Content If kids explore unsupervised, Antivirus software helps to detect and remove
they could stumble upon images or information you computer viruses before they can cause damage. For
may not want them exposed to. Predators These antivirus software to be effective, you must keep it
people use the Internet to trick children into up-to-date. Install and Maintain Antispyware
meeting with them in person. Invasion of Privacy If Software Use antispyware software, like Microsoft
kids fill out online forms, they may share Windows Defender, so unknown software cannot
information you don't want strangers to have about track your online activity and potentially steal your
them or your family. Primary Threats to Personal information. Other Ways to Help Protect Your
Online Safety Phishing E-mail sent by online Computer Back up your files regularly. Read Web site
criminals to trick you into going to fake Web sites privacy statements Close pop-ups using red "X" Think
and revealing personal Information Spam before you click Back up Your Files Save to CD/DVD, a
USB drive, or other external source
REVIEWER IN INTRODUCTION IN
COMPUTING COMPUTER
SECURITY
List of Modules
Back Typically at the back of the computer, you will
1. Parts of a Computer
find:
2. The Mouse & Keyboard
1. Fan
3. Window Management and Basic Applications
2. Power Plug Connector– Provides electricity to the
4. Introducing the Internet
computer
5. Common Computer Actions
3. Headphone Connector
6. Using Email
4. Microphone Connector
l 7. Putting it all Together
5. Keyboard Connector
1. Parts of a Computer
6. Mouse Connector
The main components include:
7. Monitor Connector
System Unit
8. USB Connectors – Used to connect devices like a
Monitor
flash drive to the computer.
Mouse
9. Network Port (for Internet access)
Keyboard
Connections
Keyboard
If USB is used, you can plug into any available USB
The Computer Keyboard has all the letters in the
port. The USB port is rectangular, and fits in only one
alphabet, the numbers, keys for punctuation, and
way. (Try flipping it around if it doesn't slide in
some special keys.
easily.) For the monitor, keyboard, and mouse, if USB
isn't used, the connections are color coded; both the
The Keyboard
cord and the connector will be the same color. For
Some of the most important special keys on the
example the connector on the end of the monitor
keyboard are:
cord is blue; it plugs-in to the blue connector on the
Shift. Used to change lower case letters to upper
back of the computer.
case letters, or to select the punctuation mark at the
USB can also be used to connect other devices,
top of the key. To use the shift key, press and hold it
including:
down while striking the key with the letter or
Web camera
punctuation you want.
Printer
Enter. Used to send the cursor to the next line or
Phone (e.g. for transferring photos)
execute a command or operation
External storage devices the USB port and can be
Caps Lock. Puts the keyboard into a mode where
used for extra storage or moving large files
every letter is UPPER CASE. If you tap it a second
between computers.
time, it will take it out of Caps Lock mode. There is a
light on keyboard showing if you are in Caps Lock
One very important additional component is a surge
mode
protector to prevent damage to the computer
Backspace. When typing, it will delete the last
caused by electrical power surges. Sensitive
character you typed, or the character to the left of
electronic computer components can easily be
the insertion point. It will also delete all selected
damaged by the power surges generated by storms.
characters if you have some selected
Never connect the computer directly to the wall
Delete. When typing, it will delete the character to
outlet – always connect it first to a surge protector.
the right of the insertion point. It will also delete all
selected characters if you have some selected. Ctrl
Desktop
& Alt. These are keys used in combination with other
Desktop Background – The Desktop Background is
keys to perform keyboard shortcuts. Tab. When
the picture that fills the monitor screen.
typing, will move the cursor to the next tab stop. On
a pop-up or web form, it will move to the next field.
Icons –
Windows. This will open the start screen. If you tap
Icons are the small pictures representing files or
it again, it will close the start screen.
programs.
Esc. This can sometimes be used to cancel an
action. For example if you start to rename a file, and
Task Bar –
decide you want to go back to the way it was, you
The Task Bar is found at the bottom of the desktop
can hit the Esc key. The arrow keys on to the right of
screen. The Task Bar shows what programs are
the keyboard can move the cursor in a document.
running on the computer and provides access to all
of the programs and files on your computer, as well
as information on the status of the computer.
REVIEWER IN INTRODUCTION IN
COMPUTING COMPUTER
SECURITY
Application Software
Application software is the programs installed on the
computer that let us do things we find useful. For
example if you wanted to write a letter you would
need a word processing program. Microsoft Word is
an example of word processing application software.
Dropbox is an application that can be used for
storing and sharing files on an internet-cloud
computer. Some application software comes
installed on the computer. Additional software can
be purchased/downloaded and installed at any time.
REVIEWER IN INTRODUCTION IN
COMPUTING COMPUTER
SECURITY
Connections
Keyboard
If USB is used, you can plug into any available USB
The Computer Keyboard has all the letters in the
port. The USB port is rectangular, and fits in only one
alphabet, the numbers, keys for punctuation, and
way. (Try flipping it around if it doesn't slide in
some special keys.
easily.) For the monitor, keyboard, and mouse, if USB
isn't used, the connections are color coded; both the
The Keyboard
cord and the connector will be the same color. For
Some of the most important special keys on the
example the connector on the end of the monitor
keyboard are:
cord is blue; it plugs-in to the blue connector on the
Shift. Used to change lower case letters to upper
back of the computer.
case letters, or to select the punctuation mark at the
USB can also be used to connect other devices,
top of the key. To use the shift key, press and hold it
including:
down while striking the key with the letter or
Web camera
punctuation you want.
Printer
Enter. Used to send the cursor to the next line or
Phone (e.g. for transferring photos)
execute a command or operation
External storage devices the USB port and can be
Caps Lock. Puts the keyboard into a mode where
used for extra storage or moving large files between
every letter is UPPER CASE. If you tap it a second
computers.
time, it will take it out of Caps Lock mode. There is a
light on keyboard showing if you are in Caps Lock
One very important additional component is a surge
mode
protector to prevent damage to the computer
Backspace. When typing, it will delete the last
caused by electrical power surges. Sensitive
character you typed, or the character to the left of
electronic computer components can easily be
the insertion point. It will also delete all selected
damaged by the power surges generated by storms.
characters if you have some selected
Never connect the computer directly to the wall
Delete. When typing, it will delete the character to
outlet – always connect it first to a surge protector.
the right of the insertion point. It will also delete all
selected characters if you have some selected. Ctrl
Desktop
& Alt. These are keys used in combination with other
Desktop Background – The Desktop Background is
keys to perform keyboard shortcuts. Tab. When
the picture that fills the monitor screen.
typing, will move the cursor to the next tab stop. On
a pop-up or web form, it will move to the next field.
Icons –
Windows. This will open the start screen. If you tap
Icons are the small pictures representing files or
it again, it will close the start screen.
programs.
Esc. This can sometimes be used to cancel an
action. For example if you start to rename a file, and
Task Bar –
decide you want to go back to the way it was, you
The Task Bar is found at the bottom of the desktop
can hit the Esc key. The arrow keys on to the right of
screen. The Task Bar shows what programs are
the keyboard can move the cursor in a document.
running on the computer and provides access to all
of the programs and files on your computer, as well
as information on the status of the computer.
REVIEWER IN INTRODUCTION IN
COMPUTING COMPUTER
SECURITY
Connections
Keyboard
If USB is used, you can plug into any available USB
The Computer Keyboard has all the letters in the
port. The USB port is rectangular, and fits in only one
alphabet, the numbers, keys for punctuation, and
way. (Try flipping it around if it doesn't slide in
some special keys.
easily.) For the monitor, keyboard, and mouse, if USB
isn't used, the connections are color coded; both the
The Keyboard
cord and the connector will be the same color. For
Some of the most important special keys on the
example the connector on the end of the monitor
keyboard are:
cord is blue; it plugs-in to the blue connector on the
Shift. Used to change lower case letters to upper
back of the computer.
case letters, or to select the punctuation mark at the
USB can also be used to connect other devices,
top of the key. To use the shift key, press and hold it
including:
down while striking the key with the letter or
Web camera
punctuation you want.
Printer
Enter. Used to send the cursor to the next line or
Phone (e.g. for transferring photos)
execute a command or operation
External storage devices the USB port and can be
Caps Lock. Puts the keyboard into a mode where
used for extra storage or moving large files between
every letter is UPPER CASE. If you tap it a second
computers.
time, it will take it out of Caps Lock mode. There is a
light on keyboard showing if you are in Caps Lock
One very important additional component is a surge
mode
protector to prevent damage to the computer
Backspace. When typing, it will delete the last
caused by electrical power surges. Sensitive
character you typed, or the character to the left of
electronic computer components can easily be
the insertion point. It will also delete all selected
damaged by the power surges generated by storms.
characters if you have some selected
Never connect the computer directly to the wall
Delete. When typing, it will delete the character to
outlet – always connect it first to a surge protector.
the right of the insertion point. It will also delete all
selected characters if you have some selected. Ctrl
Desktop
& Alt. These are keys used in combination with other
Desktop Background – The Desktop Background is
keys to perform keyboard shortcuts. Tab. When
the picture that fills the monitor screen.
typing, will move the cursor to the next tab stop. On
a pop-up or web form, it will move to the next field.
Icons –
Windows. This will open the start screen. If you tap
Icons are the small pictures representing files or
it again, it will close the start screen.
programs.
Esc. This can sometimes be used to cancel an
action. For example if you start to rename a file, and
Task Bar –
decide you want to go back to the way it was, you
The Task Bar is found at the bottom of the desktop
can hit the Esc key. The arrow keys on to the right of
screen. The Task Bar shows what programs are
the keyboard can move the cursor in a document.
running on the computer and provides access to all
of the programs and files on your computer, as well
as information on the status of the computer.