4 Operate A Personal Computer-Practical
4 Operate A Personal Computer-Practical
This unit describes the performance outcomes, skills and knowledge required to start up a personal
computer or business computer terminal; to correctly navigate the desktop environment; and to use
a range of basic functions.
Introduction
A computer is an electronic device that manipulates information. It can store, retrieve, and process
data. You can use a computer to type documents, send emails, and surf the internet. You can also
use it to handle spreadsheets, accounting, database management, presentations and more.
A personal computer is small enough to be convenient for use by people at work or home.
Personal computing devices come in a range of shapes and sizes that can cater for the different
needs of people in various situations. Deciding on which device is best for you means
understanding the capabilities of each device and which device best fits the way in which you will
use it
Operating a personal computer is a fairly straightforward task if you carefully follow some basic
processes.
OBJECTIVES
Dear learner; after completing this chapter you will be able to
Start computer or log on according to user procedures
Adjust workspace, furniture and equipment to suit user ergonomic requirements
Ensure work organisation meets organisational and occupational health and safety
(OHS) requirements for computer operation
Identify basic functions and features using system information
Navigate and manipulate desktop environment
Open, close and access features by selecting correct desktop icons
Open, resize and close desktop windows by using correct window functions and roles
Create shortcuts from the desktop, if necessary, with assistance from appropriate persons
Organize files using basic directory and folder structures
Move folders/subfolders and files using cut and paste, and drag and drop techniques
Save folders/subfolders and files to appropriate media where necessary
Print information
Shut-down computer according to user procedures
1
1. Start computer, system information and features
Section 1 – Prepare to Use a Personal Computer.
1.1Adjust workspace, furniture and equipment to suit user ergonomic requirements
Ergonomic requirements mayinclude:
o avoiding radiation from computer screens
o chair height, seat and back adjustment
o document holder
o footrest
o keyboard and mouse position
o lighting
o noise minimization
o posture
o screen position
o workstation height and layout
What are your options?
Computing devices fall into four main categories: desktop computers, laptop/notebook computers,
tablet computers and smart phones.
Desktop computers
Where could I use one? They are set up in a single
fixed location. Once they
have been set up they are
not very portable.
What can they do? Desktop computers offer very fast computing along with
large displays which make them your best option for:
● creating and editing audio or video
● editing documents, desktop publishing or
spreadsheets
● anything requiring a large screen and powerful
processing.
When could I use one? Desktop computers are always plugged into a power source,
meaning that you can rely on them to always be ready
for use.
2
Laptop/notebook computers
Where could I use one? Multiple locations, for example
home, work or a cafe.
Laptop/notebook computers
offer a good compromise
between speed and portability.
Notebook computers come in a
variety of sizes with standard
screens ranging from 13–17 inches.
What can Email, web browsing, viewing photos, watching video and managing
they do? calendars.
Document creation and editing; however tablet word processing
applications have limited functionality compared to their desktop
equivalents.
Many tablets have GPS (global positioning) built in and can help you
with maps and directions.
The applications that are made for desktop PC’s and laptops generally
don’t work on tablet computers and vice versa.
Tablets generally use a touch screen interface, using your finger or a
stylus for input. Text input is usually done through a simulated
keyboard on the touchscreen, rather than a physical keyboard.
Due to their small size (commonly 10 inches), tablet computers have
limited processing power and as such cannot run complicated
programs.
Tablet computers are usually very fast to switch on, making them
3
great for quickly looking something up on the internet or reading an
email.
When could I use Tablet computers run from internal batteries that require
one? charging after between 8–10 hours of use.
Some tablet computers require you to have a desktop
computer or laptop to set them up initially.
4
Other things to consider
When you’ve decided on the type of device to purchase, consider the following issues before
making your final choice.
Support network
Your support network consists of the warranty support options from the device provider, but also
the support that your network of friends and family can provide. Consider both of these when
making your decision.
Cost of ownership
In addition to the initial purchase price of the device, there may also be costs of ownership
involved.
● Are there any ongoing fees or charges? For example, smartphones are often sold on a
contract that has a monthly fee attached. Are there fees for downloading data from the
internet?
● Out of the box, most devices offer limited features requiring you to buy specific applications
(e.g. a word processing application).
● Applications developed for tablet and smartphone devices are generally cheaper than their
desktop and laptop equivalents, but often offer less features.
Upgrades
As a general rule, desktop computers will have components (screen, memory, storage) that will be
able to the upgraded and expanded at a later date.
Most notebook computers allow the storage and memory to be upgraded, but very
little else.
It is generally not possible to upgrade tablet and Smartphone devices after purchase, meaning that
you must replace the entire device if any part of it fails. For this reason, consider your
manufacturer warranty options when purchasing either tablet or Smartphone devices.
Speed and portability
The image below compares the speed of various computing devices with their portability. It shows
that as the size of the device decreases, so does its speed and power.
Servers
A server is a computer or other device that is set up to store and make content such as websites,
files and programs available to other computers or devices.
In home or small office networks, sometimes one of the computers in the network is set up to be a
server for the other computers. A server on a home or small office network could be used to store
content such as videos so that all of the computers on the network can view them without having to
have their own copies.
Another example of a server is a web server. A web server stores websites and makes them
available to any computer on the internet – including yours.
5
What are the parts of a computer?
Your computer consists of various parts which work together. Most computers have the same basic
parts even if they look a little different. Even portable computing devices have the same basic
components, just in a more compact package.
System unit
The system unit is the heart of your computer system. It's usually a rectangular box which sits on
or under your desk and usually contains the following components.
● The central processing unit (CPU), sometimes called the ‘microprocessor’ or ‘chip’, which
acts as the ‘brain’ of your computer.
● Random access memory (RAM) is used by the CPU while it’s working. This memory is
erased when the computer is turned off.
● A hard disk drive, which stores all your programs, documents, music and video files. This
information is kept when your computer is turned off.
● A CD or DVD drive which reads media and data files stored on CDs and DVDs. A DVD
drive does everything a CD drive can, but also reads data and media from DVDs. Most
computers can also record information onto CDs and DVDs – this is called ‘writing’ or
‘burning’
● Ports are the sockets that allow all the other devices/peripherals to be connected to the
computer.
Monitor
The monitor is your computer’s screen. It looks very similar to a
television, but doesn’t have a TV tuner built in to it.
Most modern computers have LCD (liquid crystal display)
monitors because they are much slimmer and lighter than the older CRT
(cathode ray tube) monitors, but both can give excellent results.
Mouse
A mouse is a pointing device used to select and move items on your
computer screen. It’s called a mouse because it looks like one, with an oval
body and a tail-like connecting wire, although many newer models are
wireless.
A mouse usually has two or more buttons with a wheel in between them, which allows you to
scroll through pages of information.
The mouse controls the cursor.
A cursor or pointer is a symbol that appears on the screen that lets you select objects or text and
moves as you move your mouse or other pointing device.
6
When you’re pointing at objects on the screen like files or folders, the cursor looks like a small
arrow head:
When you’re working with text, the pointer looks like an I-beam:
When you’re hovering over a button or link that you can click on, the cursor changes into a
pointing finger:
Keyboard
A keyboard is used to type text on your computer. Like the keyboard on a typewriter, it has keys
for letters and numbers. It also has navigation that helps you move around the screen and several
keys that perform special functions.
Printer
A printer prints text and images from your computer screen onto paper. The two main types of
printers are inkjet printers and laser printers.
Inkjet printers are the most popular printers for the home because
they are cheap to buy. They can print in full colour and can produce
high-quality photographs especially when used with special paper.
However, they can have quite high running costs, and are therefore
not usually suitable for high volumes of printing.
Laser printers are faster, cheaper to run and well-suited to heavier use
in an office. Models are available which print in plain black or in
colour, although colour laser printers are more expensive to buy and run.
Speakers
Speakers allow you to listen to audio, such as music, online video or DVDs. They are sometimes
built into your desktop computer or laptop but higher quality speakers usually connect to your
system unit with cables.
Modem
A modem is a small box that connects your computer to the internet through a telephone line or
cable.
7
Webcam
A webcam is a small video camera that plugs into your computer and allows you to broadcast real-
time video over the internet. This is useful for making video calls, using instant messaging and
creating podcasts.
Many new laptops have webcams built in and they are commonly available as add-on devices for
desktop computers.
Peripheral devices
There are many other devices which can be connected to your computer which allow you to
expand the capability of your computer. These are called peripheral devices. The following
provides examples of the devices and a summary of what they can do.
MIDI keyboard
Allows you to compose, play
or other digital
and record music.
musical
instrument
8
Allows you to play DVDs.
DVD player
9
A consumer electronic device
that has the primary function
MP3 Player of storing, organising and
playing audio files.
USB dongles
A USB dongle is a small device that plugs into your computer’s USB port. While a ‘dongle’ can
refer to any small device, it often refers to just the small USB sticks that can connect your
computer to the internet.
USB dongles are used for two main reasons: to store files, and to connect to the internet and other
devices.
How is a USB dongle used to store files?
One main type of USB dongle is one that stores files. They are often referred to as a ‘USB
stick’, ‘flash drive’ or a ‘thumb drive’. They store files using a type of hardware called flash
memory.
A USB dongle that stores files is useful because you can save files onto it and then take
them with you. This makes it great for using computers that aren’t your own, such as those
at the library. It is also useful for transporting files between home and work.
How is a USB dongle used to connect to the internet and other devices?
A USB dongle is often used to replace cords by using wireless technology. USB dongles
can replace cords between your computer and components such as your keyboard, mouse
and printer. They can also connect your computer to other devices, such as your mobile
phone.
Some USB dongles can also connect your computer to the internet. They are most often
used to connect laptops to the internet because the dongles are easy to carry and don’t use
any cords. They connect to the internet by using the mobile phone network, which you will
need to pay for. Different types of wireless technology include infrared, 802.1 and
Bluetooth.
1.3 Start computer or log on according to user procedures
10
Connecting the computer to other computers and the internet
What is connectivity?
Computers have many different parts, called components, that all need to be connected so that they
can work together.
Some of these components are inside the computer and the computer can’t function without a lot
of them. They are like its ‘organs’, they all do something different and important. Different
components inside of a computer include the motherboard, processor and hard drive. These and all
of the components that are inside the computer are called internal components.
Other components are ones that you see every time you use the computer, such as the keyboard,
mouse and monitor. These and all of the components that are outside of the computer are called
external components or peripheral devices.
Computers and other devices such as mobile phones can also be connected to each other so that
they can work together. Unlike the ‘components’ above, the computers and other devices that can
work on their own without being connected to each other are called stand alone devices.
Connecting stand alone devices together is called networking.
External components and stand alone devices can be connected to a computer with cables or
wirelessly. In the following sections we will look into how you can connect external components
to a computer using both of these methods.
Connectivity using cables
A cable can connect an external component with a computer so that they can work together. To do
this, the cable needs to be plugged into the external component at one end and into a port on the
computer at the other end.
There are different types of ports for different types of cables, so when plugging your cables in,
you will need to make sure they match. This is actually fairly straightforward, as most cables will
only fit into the ports that they are meant for. Some ports on your computer will also be colour
coded or have a symbol next to the port to tell you what the port is for.
We will look into how different parts of a computer and other devices are commonly connected to
a computer below. We will look into common AV (audio/video) connections to connect monitors,
speakers and headphones. We will also look into common connections for keyboards, mouses,
internet, printers and other devices.
Connecting a monitor
There are a few different types of monitors that have their own types of ports.
Many monitors will use a VGA port, especially the older ones. These ports have 15 holes in them,
arranged into three rows of five holes each. They are often colour coded blue. Most computers will
have one or two of these ports.
Some newer monitors will use a DVI port. A DVI port gives a better quality picture than a VGA
port. These ports have 24 holes in them, arranged into three rows of eight holes each. They are
often colour coded either white or off white.
Another type of port that some newer monitors will use is a HDMI port. A HDMI port gives a
better quality picture than a DVI port. These ports look a bit like a USB port, but have the two
bottom corners cut off.
Connecting a keyboard and mouse
Most new computers will connect keyboards and mouses using a USB port. A USB port is small
and rectangular. Most computers will have between two and six of
11
these ports, sometimes with one or two of them at the front for easy access. They often have the
USB symbol next to them (pictured left).
Some older computers have ports for older keyboards and mouses, called a PS/2 port. A PS/2 port
is small and round.
Since the PS/2 ports are the same shape and size for both the keyboard and mouse, they are usually
colour coded so you can tell them apart. The keyboard port is colour coded purple and the mouse
port is colour coded green. They also often have a small picture of a keyboard and a mouse next to
the right ports.
Connecting speakers and a microphone
There are small, round jacks on a computer to connect your speakers or headphones and a
microphone. Most headphones, such as those that are used for portable audio devices, will fit into
one of these jacks. Sometimes these jacks will be on the front of the computer for easy access.
Since the ports are the same shape and size for both the speakers/headphones and microphone,
they are usually colour coded so you can tell them apart. The speaker/headphone port is colour
coded green and the microphone port is colour coded pink. They also often have a small picture of
a speaker/headphones and a microphone next to the right ports.
Connecting the device to the internet
Most broadband internet connections will connect to a computer using an Ethernet port. An
Ethernet port is small and rectangular and is a bit larger than a USB port. Ethernet cables are often
colour coded blue. Sometimes the port will light up once the cable is plugged in.
Some older computers have a dial-up modem built into them, which gives them a telephone port.
A telephone cable can be plugged straight into this port to connect to dial-up internet.
Connecting a printer
Most new printers will connect to a computer using a USB connection.
Some older printers will connect to a computer using a printer port, also known as a parallel port.
A parallel port is long and rectangular, with 25 holes arranged into two rows. They are often colour
coded pink.
Connecting other devices
A lot of other devices, such as digital cameras, will connect to a computer using a USB port.
Sometimes if the device is small enough, such as a USB dongle, it will plug into the port directly,
without a cable in between.
There are a few other ports that look similar to USB ports that will also connect some other
devices, such as a FireWire port. A FireWire port looks a bit like a USB port, but has the two right
hand side corners cut off.
Connectivity using wireless technologies
Often external components are made so that they can connect to a computer using wireless
technologies. The two most common types of wireless technologies used for this purpose are
infrared and Bluetooth.
Networks
A network is when two or more devices are connected to each other and ‘communicating’
(transferring data, sharing peripherals, etc.). Computers and other devices can be connected
together with cables or, if they are wireless devices, they can be connected wirelessly.
A network can be as small as having your computer and your mobile phone connected to each
other, and can be as big as the internet – the largest network in the world.
12
Modems and routers are the two main types of devices that make up a network.
Modems
A modem is a device that is used to connect one computer to the internet.
The type of modem that you will need to use depends on the type of internet connection you have.
The most common type of internet connection is ADSL and you will need a DSL modem for this.
Another common type of internet connection is cable. An older type of internet connection is dial-
up which needs a different type of modem. Dial-up is being superseded by ADSL because ADSL
is much faster.
Routers
A router is a device that is used to connect more than one computer to the internet.
If you only had one computer or device to connect to the internet, then you would only need a
modem. However, many households and small offices now have more than one computer or
device that they would like to connect to the internet. In this case, you need to use a router. A
router acts like a double adapter for your internet connection.
Most routers now have a modem built in so you only need to buy the one device.
There are two other devices that are simpler versions of routers called hubs and switches. Both
hubs and switches are devices that allow you to connect computers to each other so that they can
share data. Switches are faster and more secure than hubs, however they are also more expensive.
13
position Sit up straight and avoid slouching.
Change your sitting position frequently to reduce strain and encourage
circulation.
Screen Adjust the position of your screen after you have adjusted your chair.
Position your screen so that the top of the screen is at eye level. If you have a
very large screen you might want it a little higher. You can raise the screen
using a solid platform such as a keyboard riser or a phone book.
Place the screen about arm’s length away from you.
Position the screen at right angles to light sources to avoid glare or reflections
If possible, place your screen so that you can look past it into the distance.
Use a document stand to hold any papers you need to refer to regularly at the
computer and position it as close to your screen as possible.
Keyboard Position the keyboard directly in front of you and close to you so that you don’t
have to reach for it.
Adjust the keyboard height so that your shoulders are relaxed, your forearms
are horizontal or dropping slightly onto the keyboard and your wrists and hands
are straight.
If you have a wrist rest, do not rest your hands on it while typing
Mouse Place your mouse as close as possible to the keyboard so that you don’t have to
reach for it.
Rest your forearm on the desk when using the mouse.
Don’t grip the mouse firmly but rest your hand on it lightly as if you were
simply resting your hand on the desk.
Don’t use a wrist pad to elevate your wrist as they are proven to increase the
risk of hand injuries.
Place your fingers flat on the mouse buttons so you click the buttons with your
pads not your fingertips.
Think about learning to use the mouse with the opposite hand to the one you
usually use. This may seem unnatural at first, but it allows you to write and
mouse at the same time and reduces strain on your preferred hand.
Telephone If you make frequent or long calls while working think about using a headset.
Don’t cradle the phone between your shoulder and your ear.
Laptop Laptops (or notebook computers) are convenient and portable but they often
have small screens and keyboards, and can lead to poor posture.
If you use a laptop regularly, here are a few tips:
● Instead of relying on the trackpad or a tiny mouse, use the same kind of
mouse you would use on a full size computer and carry it with you.
● If working at a desk for long periods, raise the laptop screen to the ideal
height and plug in a standard keyboard.
● If you have a larger, separate monitor, set that at the ideal height and use
it instead of your laptop’s screen. Better still – try using both screens as
an ‘extended desktop’.
Taking Look away from your screen regularly and try to focus on something in the
14
breaks distance for a few seconds. When you are constantly looking at something
close to you it is good for your eyes to focus on something further away, from
time to time.
Take regular breaks every 30 minutes or so. Get up, have a stretch a walk or a
drink. This helps rest your eyes and hands.
Don’t spend your break reading emails or looking at web pages.
Lighting Ensure that the lighting in the room where you use the computer is set at an
appropriate level to reduce strain on your eyes.
Safe lifting Some components of the computer may be heavy to lift. Make sure that you use
safe lifting procedures to reduce strain on your back.
Overuse It can be fun and rewarding to use a computer, but make sure that you restrict
the amount of time that you spend in front of the screen to maintain a healthy
lifestyle balance.
When the computer is turned on the display screen will light up on the monitor. Once it has
finished loading, it may show a welcome screen that asks you to log in.
Logging in
Logging in, also known as ‘signing in’, is used to check that you are actually the person that is
supposed to be using the computer or the account. It improves the security of your computer and
accounts by making sure that only you, or the people you give permission to, can use them.
Logging in is not limited to turning on your computer, you may also need to log into your email
account, social networking account, cloud computing account
and so on.
The most commonly used method for logging onis a username and password. Your username is
the name that you use on the computer or account. Each username has one password that must be
typed in correctly for the person to be able to use the computer or account. You should keep your
password secret and make it hard for other people to guess.
If you do not already have an account or password, your facilitator will provide you with the
information necessary to log in.
Two other methods of logging in that you might encounter are fingerprint scanners and smartcards.
These provide an extra level of security and are rarely used in basic computing.
Fingerprint scanners
A fingerprint scanner lets you log in to your computer or account by using your fingerprint rather
than a username and password. This makes the computer or account very secure because
everyone’s fingerprints are different.
Some computers, particularly laptops, have a fingerprint scanner built in that you can use. You can
also buy fingerprint scanners that plug into your computer.
Smartcards
A smartcard lets you log in to your computer or account by using a unique card, much like a credit
card, rather than a username and password. This makes the computer or account secure because
15
only you should have the card. However, it is less secure than using fingerprints because your card
might get lost or stolen.
Some computers, particularly laptops, have a smart card reader built in that you can use. You can
also buy smart card readers that plug into your computer.
Learning activity: Turning on your computer
1. Locate and press the On/Power button on your computer.
2. Wait for the computer to start up or ‘boot up’ – the monitor will display the booting
up screen.
3. If there is an account on the computer that requires a username and password to be
entered, this request will appear after the computer has booted up. Your facilitator
will be able to provide the information necessary to log in.
4. Enter this information and click log in and your computer should be ready to use.
Wait until everything is loaded – until you see a screen with a background image and
icons. It’s important not to try to use any of the icons until the computer has finished
starting up because that will make it take longer. The more applications and data on your
computer, the longer it takes to boot up.
Once you have entered your name and password and clicked on the log in button a new screen will
appear and you will see a number of small pictures/symbols called icons – this is called the
desktop and these icons can be moved around using the mouse (manipulated) to suit your
requirements.
Icons
Icons are small pictures on your computer’s desktop which represent objects on your computer like
programs, documents or folders.
Icons are found throughout your computer, in your Start menu, on your desktop and in folders.
They can display in different sizes, depending on where they are found.
16
in older versions of Microsoft Windows Computer is called My Computer; however the
functions of this application are the same.
Keyboard and mouse
In order to use applications on the computer you will need to be able to use the basic function of
the mouse and the keyboard. If you have not used a mouse or keyboard before or are not confident
in their use there are programs that allow you to practice these skills.
Shut down
It is important to close and save all applications that you have been using and then use the Shut
Down icon (found in the Start menu) to turn off your computer. If you just turn it off with the
power button you may lose data or corrupt the data.
After you have shut the computer down you can switch off the power of the computer and any
other peripheral devices.
To shut down your computer, click on Shut Down in the Start menu at the bottom left of your
screen.
17
The colour setting lets you change how close to red, blue and green the colours on the screen will
look. This is usually set at maximum for all three colours.
Mouse settings
You can adjust the settings of the speed and buttons on your mouse.
One of the button settings that you can change is the speed at which you need to double click. If
you are finding you are having problems double clicking, slowing this speed down can help while
you are getting used to it.
If you are left-handed, you can also choose to swap what the left and right mouse
buttons do.
You can change the speed of your mouse by changing its ‘pointer’ settings. This will change how
much the pointer on the screen moves whenever you move the actual mouse.
These changes can be made using the Accessibility Wizard in the Control Panel, which is found
in the Start menu. There are many accessibility options that you can customise here that will help
you use your computer
while you’re starting out.
18
5. Click OK to save the settings you have selected.
19
Operating systems and compatibility
An operating system (OS) is the foundation software installed on your computer which manages
and runs all further software applications and external hardware peripherals (printers, storage
devices, etc.).The operating system is the tool through which all the functions of the computer are
accessed.
Examples of popular modern operating systems are Linux, Mac OS X, UNIX and Windows. Every
operating system varies greatly in its appearance and functionality. The way they look and behave
is referred to as the ‘interface’ – the space between the user and the computer data.
It is important to know what operating system you use for many reasons. Your operating system,
including which version you use, will dictate the kind of software applications you can install and
run on your computer. If anything ever goes wrong with you computer hardware or software, the
IT technician will ask what Operating System you are using.
You can find out which operating system is on your computer by right-clicking on Computer or
My Computer on the desktop or in the Start menu, and selecting Properties.
20
● Programs that allow you to access and find things on the internet such as search engines.
● Programs that allow you to manage computer, power and security such as anti-virus
software.
● Applications that allow you to play video and music such as Windows Media Player and
iTunes.
You can tell what applications are available on your computer by going to the Control Panel in
the Start menu and selecting Programs (in Windows 7) or Add or Remove Programs (in older
versions of Windows).
21
Click and drag
22
1. Position your mouse pointer
over the file.
Section summary
At the end of this section you should know how to:
alter computer and power management settings
23
add and remove applications
navigate and manipulate the desk top
use basic mouse and keyboard skills.
Section 3 – Use Basic Applications and Programs
Terminology
The terminology used for computer operations is often similar to those used in other environments
because the activities are similar.
Folders
A folder on a computer is similar to a folder in a filing cabinet. They can store any kind of file
including documents, pictures and videos, which can be added, moved, renamed and deleted. You
can organise the files in your folders however you like, but you should try to organise and name
them according to their content.
Saving
Saving a document allows you to name it and store it. Documents are usually saved into folders.
When you create a document you will be prompted to name and save it before you close it. If you
don’t save it there is a chance that all the data you have entered will not be available for future use.
Menus
Just like a menu in a restaurant, a menu on your computer is a list of options which you can choose
from.
To save space on your screen, a menu isn’t open all the time; instead each menu is usually
represented by a button that drops down when clicked on. An example of such a button is shown
below.
When you click on a menu title the menu opens and the available options drop down. You can then
select an option by clicking on it with your mouse’s left button, as shown below.
Windows
A window is a virtual box on the screen which is surrounded by borders. When you open
programs, applications, files and folders, they display the contents and functions available.
Because your computer can perform several functions at the same time, you will often have
24
multiple windows open at the same time. You can move windows around the screen and change
their shape and size by stretching them at their sides or corners.
This picture shows two windows. One contains a program and the other shows the contents of the
computer. You will see that on window is sitting in front of the other. If you were to click on the
window, you would bring it to the front.
25
Learning activity: Altering files and folders
In this exercise you will open a folder and a file inside the folder, make some minor
changes to it and save it with another name. Your facilitator will advise which
document to open and which folder it is located in.
1. Go to the Start menu.
2. Click on My Documents.
4. Select the document/file that you wish to edit by double clicking on it.
This opens the document.
5. Place your curser in the spot that you would like to add to and type what you 26
wish to add.
Don’t confuse these windows with Microsoft Windows – the operating system. If you see
Windows written with a capital ‘W’ and the trademark logo (™), then it’s actually referring to the
operating system Microsoft Windows which may be running on your computer.
Understanding the internet
The internet is a vast collection of millions of computers all over the world that are joined together
by telephone lines, cables or satellite links. The computers may belong to universities, government
agencies, businesses or private individuals but no person, organisation or government actually
owns the internet.
When you connect to the internet you can access news, opinions, discussions, music, video clips
and all kinds of other information that is on the other networks. It’s like having access to a massive
library – much larger than any other library on the world and growing rapidly each day.
The World Wide Web
The World Wide Web, or simply ‘the web’, is part of the internet. The web is a collection of
millions of pages of information, sound files and video files. The web links documents and files to
each other through a series of hyperlinks. These hyperlinks allow users to navigate to other web
documents and files. A hyperlink is a clickable element on a webpage that takes you to another
page or file on the internet. Hyperlinks are most commonly found in text, this is called hypertext.
Hypertext is traditionally blue, so you can see which references will direct you to another page.
The web is one of a number of services which work over the internet. Some of the others are:
Email
user network (USENET) newsgroups
instant messaging (IM)
file transfer protocol (FTP)
Internet relay chat (IRC).
Each of these services has its own unique language, called a ‘protocol’. For example, the protocol
used by the web is called HTTP (for Hypertext Transfer Protocol).
How does it work?
Information is sent between these computer networks in small ‘packets’ of data using the correct
protocol. If the information being sent is large, like a video file for example, it might be broken up
into many data packets. Those packets may travel through numerous cables and computers in the
global network before they get to their destination and are reassembled into the original file.
What you need
To connect to the internet you need:
● a computer, tablet or internet-capable mobile phone
27
● a modem, which is a device that connects your computer to the internet
● an account with an Internet Service Provider (ISP)
Accessing the web
After you have turned your computer on and established an internet connection you will need to
use a web browser to access the internet.
A web browser is a program on your computer, smartphone or tablet computer that allows you to
visit websites as long as you have an active internet connection. Every web page you visit runs
through your web browser.
There are several popular web browsers including:
● Internet Explorer from Microsoft
● Firefox from Mozilla
● Chrome from Google
● Safari from Apple
● Opera
These browsers look a little different and have slightly different features, but they all work in a
similar way. If you have are running windows on your PC or laptop, it will already have Internet
Explorer installed. If your computer is an Apple it will already have Safari installed.
All the web browsers are free so you can download a different browser and try it out
if you like.
To visit a website you will need to enter the URL or address of the site into the address bar.URL is
the technical term for a web address. It stands for Universal Resource Locator.
The address bar
The address bar is the space at the top of your web browser which shows the address of the web
page currently displayed and allows you to type in the address of a website that you’d like to visit.
Below is a picture of a web browser, showing the location of the address bar.
Online navigation
Navigating a website is finding your way around it. A website is made up of pages that you can
navigate between, similar to the pages of a book. There will be a series of links that allow you to
navigate around the website.
Whilst there are different web browsers, with different layouts and designs, they all work in a
similar way.
28
All web browsers have a toolbar, which usually appears above the address bar. The way buttons on
this toolbar will look depends on which browser you are using.
The search engine goes and looks up your search terms in its catalogue, very much like the one in
your library. We call an electronic catalogue a ‘database’. The search engine then displays a list of
links to sites on the Web which match what you’re looking for. These are called ‘search results’.
The search engine may give you several thousand results. The most popular and the best matches
will be at the top of the list, but you may still have to look through a lot of information before you
find what you want.
29
Search engines are constantly cataloguing the Web, sending out little programs to find and analyse
websites by following links. These programs are sometimes called spiders, crawlers or bots.
Search engines are owned by different companies who are in competition with each other, so they
keep the exact workings of their systems secret.
Tips for better search results
Here are some tips which will save you time by refining your search results. Let’s say you want to
buy books in Adelaide.
● Use more precise words – instead of just typing ‘books’, try ‘bookshops Adelaide’.
● Use double quotation marks to search for a specific phrase “best bookshop in Adelaide” will
give you many people’s opinions about where to shop.
● Don’t use too many words – avoid typing in full questions, as every word will be searched
for. Just use the key words instead.
● Put a minus sign in front of terms you don’t want to search for. If you want to leave out
shops owned by the Shonky Bookshop Company, you could put ‘-shonky’ in your search
terms.
● If you’re only looking for pictures, click on the ‘Images’ link at the top or left of the search
engine page.
● If you still can’t find what you want, try to think of another way of putting it. Instead of
searching for ‘footy scores’, try ‘AFL results’.
Assessing a search
With so much information available, it’s important to think about search results and the quality of
the information in them, and be careful what you read.
Let’s say you want to find out about treatments for back pain and you search for ‘medicine back
pain’. The results may contain articles by doctors, advertisements from pharmacology companies,
personal opinions by sufferers and wild claims about untested miracle cures. How can you tell
which information is useful to you?
An excellent approach is to think about:
● Currency – Is the information up to date?
● Reliability – Is the information mostly opinion? Is it balanced? Are there references and
sources for any claims made?
● Authority – Who wrote the information? What are their credentials? Are they reputable? Are
there advertisements on the website?
● Purpose/point of view – Is the information intended as opinion, fact or advertising?
30
Learning activity: How to search the internet
In this exercise you will conduct a basic search on the internet for a website that explains how
to search the internet.
1. Choose which search engine you would like to use (Google, Yahoo, Bing, etc.)
2. In the text box, type ‘how to search the internet’.
3. Click on the Search button and a screen will appear with a list of websites that the search
engine has matched to your query.
31
4. Open the top result, by clicking on the blue title, to determine whether it
contains the sort of information you are looking for.
32
Malware Malware is short for malicious software. This is the term used to describe any website, file
or program that is designed to cause harm to your computer or yourself. They are each
designed for different purposes, ranging from simple pranks to larger criminal activity,
such as identity fraud. A common effect of malware is slowing down your computer or
your internet connection.
Different types of malware include computer viruses, spyware and adware.
Security Malware can be installed on your computer through your web browser. These
flaws malicious programs often take advantage of security flaws in the more popular web
browsers such as Internet Explorer.
Security flaws are weaknesses in programs that can be exploited to cause harm. Older
versions of browsers are more at risk because they have security flaws that are well
known, but haven’t been fixed.
Scripts Malicious programs are often written as scripts. Scripts are programs that are run
on websites. Types of scripts include ActiveX, Java and JavaScript. Most scripts
are legitimate and do useful things, so a lot of web browsers are set up so they
automatically run any scripts that are on the website that you are visiting, without
asking you first. This means that scripts that are malware might be able to
automatically run on your computer without you knowing.
Pop ups Pop ups are additional web browser windows, usually containing advertisements,
that appear on your screen when you visit certain websites. Many pop ups are not
legitimate and will contain malware or be an attempt at phishing.
Cookies Cookies are small files that are saved to your computer by websites. It is how
websites ‘remember’ information you have given them, such as your username.
Like scripts, most cookies are legitimate and do useful things, so a lot of web
browsers are set up so they automatically save cookies on your computer, without
asking you first.
Cookies by themselves are not harmful. However, the information that they hold
about you might be used by people trying to steal your personal details. Each
cookie might only store a little bit of information, but together they can tell
someone a lot about the websites you have been visiting.
33
Email Malware can be installed on your computer through email attachments.
attachments Email attachments are the files that are sent with emails that you can
open and save onto your computer. Like scripts and cookies, most email
attachments are legitimate and do useful things, only some are malware.
Often, when malware sent through email is opened, it will replicate itself
and send itself onto the people that are in your address book. This means
that they can spread to a lot of people very quickly.
Spam Spam is basically junk email. It is unsolicited bulk mail from senders
that you do not know, usually trying to sell a product.
Spam by itself is not much of a threat, but it may contain threats such as
malware or be an attempt at phishing.
Phishing Phishing is a play on the word ‘fishing’. Phishing refers to any online
communication made by a scammer that tries to trick you into giving up
your personal details such as your password or credit card details. They
are then usually used for criminal activities such as identity fraud.
Phishing is often done through fake websites or emails. The websites and
emails are set up so they look like a legitimate business or person that
will at some point ask you to enter your personal details.
Hackers A hacker is a person who uses or makes changes to your computer
without your permission. Hackers often use tools such as malware and
methods such as phishing to conduct their activities.
Hackers do this for different purposes, ranging from simple pranks to
larger criminal activity such as identity fraud.
Identity Identity fraud is when another person uses your personal information
fraud without your permission for their own personal gain or to cause harm.
Tools such as malware and methods such as phishing are often used to
steal personal information for this purpose.
Now that we have covered some of the common threats to your
computer security, we will look into some ways that you can protect
yourself from these threats.
Managing computer security
Just as hackers can use a range of tools and methods to create threats to your computer security,
you can use a range of tools and methods to protect your computer and yourself from these threats.
Firewalls
A firewall is a program that can be installed on your computer that helps to make sure that hackers
cannot access your computer and helps to make sure that only safe internet content is allowed onto
your computer.
You should always have a firewall running while you are on the internet so you are always
protected.
Antivirus programs
An antivirus program is used to protect against malware. It does this in two main ways – by
preventing it from being downloaded onto your computer and by removing it from your computer
if it was already present.
You should check any files that you have downloaded with an antivirus program before you open
it and you should run the antivirus program over the whole computer at least once a week.
Software updates
You should keep your web browser and operating system up to date by installing updates
whenever they are made available. Updates will often fix known security flaws in your web
browser or operating system, so this is an effective method to help prevent malware from running.
You should also ensure that you have the most recent version of the web browser that is available.
You can find out what the most recent version of your preferred web browser is by going to its
website.
34
What else can I do?
You should always be careful when giving anyone your personal information or entering it into
any website, especially very sensitive information such as your password or credit card details.
Remember that the website that you are visiting or the email you are replying to may be a phishing
scam or otherwise harmful, so check carefully that it is legitimate before entering your details.
Now that you know some of the common threats to your computer security and some ways in
which you can protect yourself from these threats you can apply these to your everyday internet
usage to have a safer experience.
Use a generic and non identifying email address. Using your name in your email address may give
online ‘friends and ‘contacts’ access to more information about you than you want.
Keep your passwords private. If you share your password others can pretend to be you online.
Make your password hard to guess – use a mixture of letters, numbers and symbols.
To help you identify if a website or email is legitimate check the web address or the email address.
A fake website may have:
● suspicious looking web address
● Misspelt business names e.g. Fcaebook or Faceboook.If an email contains a link to a website
you can check the link before you click by holding the cursor over the link the web address
of the website will be displayed. Check that it is a proper looking web address.
Section summary
At the end of this section you should know how to:
recognise and use basic terminology
use email
search the internet
be aware of threats to computer security and how to prevent them.
35
Section 4 – Use Basic Peripheral Devices
Peripheral devices were identified and discussed in Section 1. In this section we will be using a
printer, an external storage device and an audio-visual device (digital camera).
Printers
Printer settings specify information about how a document is going to be printed and which printer
to use (if there is more than one available).
These can include:
● the cartridge type
● the layout
● the number of copies
● the orientation
● the paper size.
Learning activity: Printing
In this exercise you will use printer settings to print a document.
1. Go to the document you altered in My Documents from the learning activity ‘Altering
files and folders’.
2. Open the document by double clicking on it.
3. Go to the File menu at the top left of the screen – click on it to open it and
select Print.
4. Click on the down arrow next to the text box at the top of the window to show the
printers that are available.
36
5. Highlight the printer you wish to use. The printer at the top of the list is the default
printer. This is the printer that will be used if another isn’t selected.
7. In the number of copies either type in the number you require or use the arrow button at
the side of the text box.
8. Click on Properties at the top right hand side of the Print settings box.
9. Under Orientation on the bottom right select Portrait and under DocumentOptions
select Printon both sides.
10. Click on OK at the bottom which takes you back to the Print settings page
and press OK again. Your document will now print.
37
Audio-visual devices
Audio-visual devices were discussed in Section 1 of this Workbook. In this section we will look at
connecting a digital camera and downloading the images stored on it. The process for doing this
will vary greatly depending on the specific device you are connecting to the computer.
In this chapter we will be looking at connecting a digital camera, which is just one of the many
digital audio-visual devices that can be connected to a computer. The process for connecting the
digital camera available in you training environment will depend on the equipment you have
available.
38
External hard drives
External hard drives are a popular backup method because they hold a lot of information and are
relatively cheap for their capacity. They are just like the hard drive in your computer, but they
come in a separate box and connect to your computer with a USB cable.
Portable hard drives come in large range of capacities. External portable hard drives of 500MB to
1 Terabyte (TB) are becoming increasingly common and the cost of these larger capacities is
constantly decreasing.
Desktop hard drives come in larger capacities of over 1TB and require external
power supplies.
Pros They have a larger capacity than CD-Rs and DVD-Rs. They are relatively cheap.
Cons Even the portable ones are not very rugged, and being carried about or being
continually turned on and off make them prone to failure.
Tips Don’t buy a huge drive even if it seems good value. It’s just more data to lose if
something goes wrong. You’re better off buying two smaller drives to have two
backups. Look for hard drives that have 3 year warranties. Portable drives may be
more when it comes to knocks or bumps but are also more expensive.
39
your training environment. In this example we have used a USB Flash Drive. The
process will vary depending on the kind of device and computer you are using.
1. Connect the external storage device using the USB cable.
2. You will be asked what you want Windows to do. For this exercise, select Open
folder to view files.
This shows the files we have on our external storage device (in this example there are
no files stored on the device).
40
5. Close My Documents using the white cross in the red square at the top right of
the window.
6. In the window for the storage device, select Paste from the Edit menu. Your
document will be copied to the device.
The amount of time this process takes will vary depending on the size of the file. When
it has been copied over, the file will be visible in the window for the storage device.
7. Close the Storage Device window.
8. Safely remove the device by clicking on the storage device icon at the right hand
bottom of the screen, as shown below.
Section summary
At the end of this section you should know how to connect and use:
a printer
an external storage device
an audio-visual device.
41