Computer Essentials - English version
Computer Essentials - English version
COMPUTER
ESSENTIALS
English Version
ICDL - International Certification of Digital Literacy - is the new name for the ECDL programme, reflecting
the global nature of digital skills, the rapid evolution of technology and, especially, reaffirms the program’s
international value and our work to improve its quality. Through this program, AICA highlights its “cultural
mission” as a non-profit association that has accompanied the Italian ICT story since its origins.
ICDL Digital Student is a set of modules designed for those who begin to develop their digital skills; it is a
proposal dedicated to the educational context to promote the conscious use of digital technologies.
The ICDL Computer Essentials Manual is oriented to the acquisition of basic computer concepts on hardware,
software, networks and data security, and to the development of basic skills for the use of personal computers,
such as creating and managing files and folders, and allows you to prepare for the achievement of the “ECDL / ICDL
Computer Essentials - Basic Concepts for Using Personal Computer” certification.
Although this manual introduces concepts that are independent of a particular operating system, practical
examples refer to the Microsoft Windows proprietary environment.
For the manual relating to open source platforms see the Social Library area of the AICA Digital Academy in
which there are “Open source resources” available; teaching materials in digital form released with licenses
that allow their reuse, modification and distribution.
Copyright © 2020 AICA – Associazione Italiana per l’Informatica e il Calcolo Automatico & Edizioni Manna s.r.l.
CE-1
Table of Contents
Preface............................................................................................... 5
1 Computers and Devices.................................................................. 7
1.1 ICT...........................................................................................................................7
1.1.1 Define the term Information and Communication Technology (ICT)................................................ 7
1.1.2 Identify different types of ICT services/uses like: Internet services, mobile technology,
office productivity applications.......................................................................................................... 7
1.2 Hardware................................................................................................................8
1.2.1 Define the term hardware. Identify the main types of computers like: desktops, laptops, tablets.
Identify the main types of devices like: smartphones, media players, digital cameras.................... 8
1.2.2 Define the terms processor, Random Access Memory (RAM), storage. Understand their
impact on performance when using computers and devices........................................................... 8
1.2.3 Identify the main types of integrated and external equipment like: printers, screens, scanners,
keyboards, mouse/trackpad, webcam, speakers, microphone, docking station.............................. 9
1.2.4 Identify common input/output ports like: USB, HDMI..................................................................... 15
1.3 Software and Licensing.......................................................................................16
1.3.1 Define the term software and distinguish between the main types of software like: operating
systems, applications. Know that software can be installed locally or available online.................. 16
1.3.2 Define the term operating system and identify some common operating systems for
computers and devices.................................................................................................................. 16
1.3.3 Identify common examples of applications like: office productivity, communications,
social networking, media, design, mobile applications................................................................... 17
1.4 Start Up, Shut Down.............................................................................................20
1.4.1 Start a computer and log on securely using a user name and password....................................... 20
1.4.2 Log off, shut down, restart a computer using an appropriate routine............................................. 22
CE-2
ICDL MODULE COMPUTER ESSENTIALS TABLE OF CONTENTS CE-3
3 Outputs......................................................................................... 39
3.1 Working with Text................................................................................................39
3.1.1 Open, close a word processing application. Open, close files....................................................... 39
3.1.2 Enter text into a document............................................................................................................. 40
3.1.3 Copy, move text within a document, between open documents. Paste a screen capture
into a document.............................................................................................................................. 41
3.1.4 Save and name a document.......................................................................................................... 42
3.2 Printing.................................................................................................................42
3.2.1 Install, uninstall a printer. Print a test page..................................................................................... 42
3.2.2 Set the default printer from an installed printer list......................................................................... 44
3.2.3 Print a document from a word processing application.................................................................... 44
3.2.4 View, pause, restart, cancel a print job........................................................................................... 44
4 File Management.......................................................................... 45
4.1 Introducing Files and Folders..............................................................................45
4.1.1 Understand how an operating system organises drives, folders, files in a hierarchical structure.
Navigate between drives, folders, sub-folders, files....................................................................... 45
4.1.2 Display file, folder properties like: name, size, location.................................................................. 46
4.1.3 Change view to display files and folders like: tiles, icons, list, details............................................ 47
4.1.4 Identify common file types like: word processing, spreadsheet, presentation, portable
document format (pdf), image, audio, video, compressed, executable files.................................. 47
4.1.5 Open a file, folder, drive................................................................................................................. 49
4.1.6 Recognise good practice in folder, file naming: use meaningful names for folders and files
to help with searching and organisation......................................................................................... 49
4.1.7 Create a folder................................................................................................................................ 49
4.1.8 Rename a file, folder...................................................................................................................... 50
4.1.9 Search for files by properties: all or part of file name using wildcards if necessary,
content, date modified.................................................................................................................... 50
4.1.10 View list of recently used files........................................................................................................ 52
4.2 Organising Files and Folders...............................................................................52
4.2.1 Select individual, adjacent, non-adjacent files, folders................................................................... 52
4.2.2 Sort files in ascending, descending order by name, size, type, date modified............................... 53
4.2.3 Copy, move files, folders between folders, drives.......................................................................... 54
4.2.4 Delete files, folders to the recycle bin/wastebasket/trash and restore to original location............. 54
4.2.5 Empty the recycle bin/wastebasket/trash....................................................................................... 55
4.3 Storage and Compression....................................................................................56
4.3.1 Identify the main types of storage media like: internal hard disk, external hard disk, network drive,
CD, DVD, Blu-ray Disc, USB flash drive, memory card, online file storage................................... 56
CE-4 TABLE OF CONTENTS ICDL MODULE COMPUTER ESSENTIALS
4.3.2 Identify file size, folder size, storage capacity measurements like: KB, MB, GB, TB..................... 57
4.3.3 View available space on a storage device..................................................................................... 57
4.3.4 Understand the purpose of file, folder compression....................................................................... 58
4.3.5 Compress files, folders................................................................................................................... 58
4.3.6 Extract compressed files, folders to a location on a drive.............................................................. 58
5 Networks....................................................................................... 59
5.1 Network Concepts................................................................................................59
5.1.1 Define the term network. Outline the purpose of a network: to share, access data and
devices securely............................................................................................................................. 59
5.1.2 Define the term Internet. Identify some of its main uses like: World Wide Web (WWW), VoIP,
e-mail, IM........................................................................................................................................ 59
5.1.3 Define the terms intranet, virtual private network (VPN) and identify their main uses................... 61
5.1.4 Understand what transfer rate means. Understand how it is measured: bits per second (bps),
kilobits per second (kbps), megabits per second (mbps), gigabits per second (gbps)................... 62
5.1.5 Understand the concepts of downloading from, uploading to a network........................................ 62
5.2 Network Access...................................................................................................62
5.2.1 Identify the different options for connecting to the Internet like: phone line, mobile phone,
cable, wi-fi, wi-max, satellite........................................................................................................... 62
5.2.2 Define the term Internet Service Provider (ISP). Identify important considerations when
selecting an internet subscription option like: upload speed, download speed and quota, cost.... 63
5.2.3 Recognise the status of a wireless network: protected/secure, open............................................ 64
5.2.4 Connect to a wireless network....................................................................................................... 65
Digital skills are necessary for your personal and professional life. ICDL has created a certification program
approved all around the world, structured according to the interests and needs of students, workers and
members of the public in general, who want to use digital tools and their applications in a conscious and
appropriate way.
This manual refers to the ICDL Digital Student area, characterized by a set of modules intended for
school-aged students, particularly those in elementary and middle school. In particular, the ICDL Computer
Essentials manual will guide you in the understanding of the main concepts about hardware, software,
security data networks, how to create and manage files and folders, as explained in the ICDL Computer
Essentials syllabus.
The term Computer Essentials refers to the basic skills required to use a personal computer and to know
the features present in the most common operating systems.
In particular, through this module students will achieve sufficient knowledge to navigate the Microsoft
Windows platform and to use its basic functions to manage directories and files [www.microsoft.com/
it-it/windows]. Notice that although this module is based on Microsoft Windows 10, the same concepts
are present in other versions of Windows (Windows 8, Windows 7, Windows Vista, Windows XP, …), the
operating systems of the UNIX family [opengroup.org/unix], the Linux family [www.linuxfoundation.org],
operating systems such as Unix-Like [www.unixportal.net/sistemi-unix-like], Mac OS [www.apple.com/it/
macos] and the operating system Ubuntu [www.ubuntu-it.org].
The majority of these platforms have similar features and it is pretty easy to use a program in any one of
the systems.
The Digital Agenda for Europe defines digital skills and literacy development as one of its main pillars and
promotes the implementation of long-term strategies for the growth of electronic skills and digital literacy.
Italy has a national strategy, in alignment with the scoreboard of the Digital Agenda for Europe.
ICT provides a series of tools necessary to fully take advantage of the opportunities offered by a digital
society. As a result, it is very important to have skills on Computer Essentials.
CE-5
CE-6 PREFACE ICDL MODULE COMPUTER ESSENTIALS
l Understand network concepts and connection options, and be able to connect to a network.
l Understand the importance of protecting data and devices from malware and of backing up data.
l Recognise considerations relating to green IT, accessibility and user health.
1.1.2 Identify different types of ICT services/uses like: Internet services, mobile technology,
office productivity applications
The services and applications of ICT are numerous. Among them, there are many based on the
Internet;
l E-commerce (“e” stands for “electronic”) is the buying and selling of goods and services via the internet,
it is now possible to purchase almost every kind of product or service online (for example insurances);
l E-banking enables bank customers to do numerous operations via the internet, without having to
physically go into a bank;
l E-government consists of services that the public administration offers to citizens via the internet, for
example: requests for certificates or the sending of tax returns;
l E-learning is a term for learning techniques based on the use of electronic equipment or the internet.
New technologies have increased the possibility for creativity and interactivity between students. This
can be particularly useful for some disciplines where utilising tools, such as simulations, can improve
students’ understanding;
l Smart working can be available for all occupations in which the output can be sent in digital form. This
offers the possibility for people to work from home in situations where people have limited mobility: in
health or weather emergencies; people who have a handicap or who have children to take care of, etc.
In recent years, the spread of smartphones and tablets, digitalisation of telephones and the use of wireless
data transmission has enabled the use of ICT services and applications based on mobile technologies that
are almost akin to PC’s. It is possible to use the Internet everywhere – on the street, on the train or in the
car – to check e-mails, use GPS etc.
Additionally, there are also office productivity applications linked to ICT that facilitate the creation,
storage and exchange of documents, the sending of mail, and the updating of activities and calendars.
CE-7
©2020 AICA & Edizioni Manna
CE-8 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING
1.2 HARDWARE
1.2.1 Define the term hardware. Identify the main types of computers like: desktops,
laptops, tablets. Identify the main types of devices like: smartphones, media
players, digital cameras
The term hardware describes the physical parts of computers and electronic devices generally, e.g.:
circuit boards, keyboard, screen etc. Sometimes the term hardware is also used also other devices linked
to a computer: printer, scanner, etc.
Computers used in homes, schools, and offices are called personal computer or, in short form, PC’s.
There are several types:
l Until around 10 years ago desktop computers were the most commonly used type of computer. These
are composed of a case containing the electronic components of the computer, to which the monitor,
keyboard and speakers are linked.
l Laptop computers, also called portable or notebook computers, spread successively and are a
single device containing all the electronic components, keyboard and screen. They weight, generally,
between one or two kilos and have a similar performance to desktop computers.
l Lighter still are tablets, which allow you to use apps and to operate the device simply by touching the
screen.
Smartphones are cell phones that allow you to connect to the internet and to use numerous app; these
also typically have touchscreens.
Multimedia players are electronic devices that are able to save and reproduce a large number of songs,
and often photos and videos too, with an extremely reduced size and weight compared to carrying CDs
or DVDs.
Another common device is the digital camera, which acquires and saves pictures to a memory card, from
which you can save, modify and share them via Internet.
1.2.2 Define the terms processor, Random Access Memory (RAM), storage. Understand
their impact on performance when using computers and devices
The processor is a fundamental component of computers and of electronic devices generally. It
enables the execution of calculations and controls how apps function. It is made of silicon (a particularly
suitable material for electronic circuits) and is the size of one or two square centimetres. On it there
are diodes, circuits and millions of transistors. It is also called the CPU (“Central Processing Unit”) or
microprocessor.
The processor speed is one of the main, but not the only, elements used to evaluate the power of a
computer or a device. It is calculated using a kind of internal clock, which emits a regular signal, a kind of
beat.
The frequency of the clock is measured in hertz (Hz.). Hertz correspond to a beats per second, so, a
hypothetical computer working to the speed of one hertz would be able to do just a single elementary
operation (e.g. an addition) per second.
Modern PC’s and electronic devices emit millions of beats per second, indicated by the term Megahertz
(MHz), or more often billions of beats per second, indicated by the term Gigahertz (GHz) and are able to
perform millions or billions of elementary operations per second.
The term “memory” of a computer refers to a device able to save the data necessary for the computer
(or other electronic device) and the applications present in it to function.
The RAM (acronym of “Random Access Memory”) is the hardware used to temporarily save data during
operation, for example: app instructions and documents you are working on. This data is deleted when
the computer is switched off and for that reason is called “volatile memory”. RAM size is measured in
Megabytes and Gigabytes. The latest generation of computers generally have 4, 8 or 16 Gigabytes of
RAM, while it is lower in other devices such as tablets or smartphones.
The term mass storage refers to the devices that can be used to save data (documents, applications,
pictures, sounds, other kinds of files) until the user decides to delete them. The main types of mass storage
are hard disks, pen-drives, memory cards, CDs and DVDs.
The size of the RAM and the mass storage also affect the performance of a computer or device.
Generally, the larger the RAM and mass storage, the faster the performance.
1.2.3 Identify the main types of integrated and external equipment like: printers, screens,
scanners, keyboards, mouse/trackpad, webcam, speakers, microphone, docking
station
In essence, a computer can be defined as a device that:
1. Receives data (input).
2. Processes the received data;
3. Communicates the result of the processing (output).
For example:
1. Type into a computer connected to the Internet a word or a phrase to perform a search (input);
2. The computer does the search (processing);
3. The result is shown on the desktop (output).
Thus, a computer or a similar electronic device (e.g. a tablet) receives data from input peripherals,
processes them and provides new data through the output peripherals. Let us examine the most
important of these peripherals (external equipment), which may be integrated in our computer or device,
or connected to them by cables or wirelessly.
Printer – This allows people to print texts and pictures on paper. There are two basic categories of printers:
Impact and non-impact printers. The most widespread within the first types are dot matrix printers, while
within the second type the most common are laser and inkjet printers.
Dot matrix printers use a mechanical writing head consisting of a given number of needles that strike an
inked band placed between the head and the paper. These kinds of printers are still used in some offices
but very rare inside peoples’ homes.
Inkjet printers are the best solution (taking into account quality and price) for those who print on average
a few dozen pages per month. Therefore, they are very popular. They spray microscopic jets of ink onto
the paper to produce the text or image that you want. Like dot matrix printers, the higher the number of ink
jets, the better the quality of the print. Inkjet printers are almost all capable of printing colours. The cheaper
models use two cartridges, one containing three basic colours (cyan, magenta and yellow) in order to
obtain different colours, and another one specifically for black. This it is called “four-color process” (due to
the four colours used, including the black). There are more expensive models that use more cartridges and
colours. These produce a better print quality as well as economic savings as when one colour is exhausted
you only have to change one cartridge. As a result, when shopping for an inkjet printer, it is important to
get more information about the cartridge prices and durability in addition to the cost of the printer itself.
Laser printers use a laser beam to store the words or pictures to be printed on a magnetic roller. During
its movement the roller passes over a toner (consisting of a black or coloured powder) which is thus
transferred to the paper and permanently fixed thanks to the application of heat. This is the reason why
freshly printed sheets feel warm. Laser printers have a high print quality, they are fast and have a cost
per copy that is generally lower compared to inkjet printers. However, they are more expensive. For this
reason, they are used mostly inside offices, connected via network in order to use one printer from multiple
PC’s.
The screen (also called monitor) - This is the main output peripheral of computers and devices. It is
integrated in laptops, smartphones and tablets, while it is external in desktop computers. The screen size
is measured in inches, every inch is equals to 2.54 centimetres, therefore, a 19 inch monitor has a diagonal
of 48.26 centimetres.
Similar to a mosaic which is formed by hundreds or thousands of pieces, the screen of
a computer is divided into thousands of points, each called a pixel. The
total number of visible pixels determines the resolution of
the screen. For example, a screen with a 1366x768
resolution is able to display more than one million
pixels (the product of the multiplication 1366x768).
The higher the resolution is, the smaller the images
and fonts become, which renders the image sharper.
Moreover, it makes it possible to view a larger area of
the document on which you are working.
The traditional external monitors - which used the cathode ray tube and were therefore called CRT -
now are no longer sold. They have been replaced by liquid crystal displays or LCD. LCD monitors
are compact and aesthetically pleasing, since they are only a few centimetres thick. In addition, LED
versions are also brighter and produce less eyestrain than conventional monitors, thanks to the absence
of electromagnetic radiation.
In tablets, smartphones and other portable devices (including some types of notebook), the screen is a
touchscreen, i.e. it is sensitive to the touch. In this case, it is - at the same time - an input and output
peripheral, because it allows a person to both enter data (by typing on a virtual keyboard that appears on
the screen) and view the results. You can also get external monitors with touchscreens.
Scanner – These allow you to take information from a sheet of paper and enter it into a computer. Drawings,
pictures, photos, text pages, can all be transformed into a digital format compatible with electronic devices.
The most common scanners have a flat surface, similar to copiers, but are smaller. They light up the page
to be digitalized (that must first be placed on the scanner glass, just as in a copier) with a kind of lamp that
stores the colour reflected during the passage. Many printers have an integrated scanner.
It is possible to use the camera of smartphones and tablets to read barcodes and QR-Codes (meaning
“Quick Response Code”). Barcodes are present on many products, QR-Codes are square codes which
appear generally on books, magazines, etc. that, when viewed with the device camera, automatically open
a web page, start a video, etc.
Keyboard – This is the main piece of equipment through which a person can enter data into a desktop or
laptop by typing on the letter, number and symbol keys. There are different types of keyboards, depending
on the country: for example, the so-called “QWERTY” keyboard is commonly used worldwide, taking
its name from the first six letters that appear on the keyboard (it is usually in the third row from the top).
Standard keyboards for desktop computers usually have 104 buttons, but there are also many keyboards
with a higher number of buttons, used for example to connect to the Internet or to regulate the volume of
the speakers.
In general, each button is associated with two characters that correspond to the upper- and lower-case
letters of the alphabet. On a few keys there are two symbols: The lower one is obtained by pressing the
button, the upper by pressing the Shift button and the button at the same time. When three symbols
are represented on a button, the third symbol can be selected by pressing the button Alt Gr on certain
keyboards.
For some buttons, it is useful to know their location on the keyboard and their function:
Esc (short form of Escape): Is the first button on the top left, useful to interrupt an operation or to
undo a choice.
l The function buttons (from F1 to F12): They are useful to do numerous operations: for example, to
open, close, print a document, or start an app guide; these buttons are becoming used less and less.
ab: Located at the left end of the keyboard and displaying two arrows: one directed
T
towards the left, the other to the right). In text processing applications (e.g. Word) it moves
the text an established amount of space to the right; in spreadsheets (such as Excel) it
moves the cursor horizontally from cell to cell. The cursor is the blinking vertical line that
allows you to pinpoint the exact place where any text you type will be entered.
ackspace is located just above the Enter button, and is generally an arrow pointing left;
B
this deletes the previous character (i.e. what is to the left of the cursor).
l Ins (short form of “Insert”): this allows you to switch between the insert mode (by which the characters
you type appear between the existing ones) to the overwrite mode (typed characters gradually replace
the existing ones). If inadvertently pressed it is necessary to press it another time to deactivate it.
l Del (Short form of “Delete”): This deletes the following character (i.e. what is to the right of the blinking
cursor); if it is pressed after selecting a file or folder (i.e. a group of files), it deletes them.
l Enter: The enter key is usually the largest one on the keyboard. It commands the computer to execute
an order (e.g. to open or close an application, save a file, print, etc.); when it is used in word processors
(e.g. Word) it starts a new paragraph. Another Enter button, smaller in size but with the same features,
is located on the right of the numeric keypad, which will be dealt with shortly.
l Caps Lock: Often pictured as a padlock, allows you to write using only upper-case characters; general-
ly, when it is pressed, an LED is switched on.
The space bar is located at the bottom centre of the keyboard. It is a much longer button than the others
and it is used to create spaces between words. In order to type faster this button should be pressed with
the thumbs.
he numeric keypad is located on the right end of the keyboard. It is used to enter
T
numbers quickly and perform calculations. At the top of this keypad there is the
button Numb Lock, which starts and turns off the keypad itself; when it is pressed
an LED light is generally switched on to indicate that the keypad is in use. If the
LED is turned off, certain keys on the keypad will function as directional arrows to
move the cursor on the screen. The numeric keypad is usually not present in
laptops.
l Ctrl (short form of “Control”): These are two buttons which are located at the bottom line of the keybo-
ard, they are usually pressed at the same time as other buttons to perform special functions.
l Alt (short form of “Alternate”) and Alt Gr.: Like the Ctrl keys, these are also located on the bottom line of
the keyboard and are used together with other keys for special functions. The Alt Gr button is used, for
example, to write the symbols usually placed at the bottom right of some keys (such as the “at” symbol
@ or the euro symbol €).
l Shift: these two buttons are located in the second-last row at the bottom of the keyboard (one to the left,
another one to the right) and that are generally represented with a big arrow. If one of these two buttons
is pressed simultaneously to other buttons, it allows to obtain capital letters or symbols.
l The four arrow keys are used to move the cursor; (they are used especially in videogames).
l The second one (which is usually located between the Ctrl and Alt Gr buttons and depicts a sheet with
a small arrow) activates the so-called context menus or menu shortcuts, used in Windows and Office
programs. It is also called the Menu key.
Keyboard can be very different: not only for the number and type of buttons available, but also for the
sound the buttons produce when pressed and their resistance. In addition, wireless and ergonomic shaped
keyboards are very common.
In laptop keyboards, generally, the numeric keypad is not present in order to save space and some buttons
are smaller compared to PC keyboards.
Mouse - This is a kind of small box connected to the computer through a cable or wirelessly, for example
via Bluetooth. Moving the mouse over a smooth surface, the pointer (usually indicated by an arrow) is
moved on the screen; pressing one of the buttons on the mouse allows a series of commands to be issued.
More precisely, the left button is used for most common tasks, such as to select an object or to move it (by
holding the button while moving the mouse). The right button is used for more particular tasks, for example
to open a shortcut menu which will offer possibilities such as to start a selected app, to delete a file, to
change its name, etc.
“To click” is the verb used to indicate the action of pressing one of the mouse buttons (from the noise
produced by the pressing of the button: “click”). The term “double click” is used for the action of quickly
pressing the left mouse button twice. The double click is used to start applications, even if carried out on a
document associated with that application.
In the middle of many mice there is a scroll wheel which allows you to scroll up or down the contents of
a document (e.g. a web page) or a file list. Some mice have a third central button, which can be used
generally to perform some particular tasks (e.g. it can operate as double click).
Touchpad or trackpad – This is a small touch pad, usually in the form of a rectangle, present mainly on
laptops (see next fig.). This can replace the mouse and allows the cursor (i.e. the arrow that appears on
the screen) to be moved by moving your fingertip against the touchpad.
Webcam – This is a small camera connected to the computer or already integrated in it (especially in
laptops). It makes it possible, with the aid of a microphone (sometimes integrated in the webcam) and
thanks to an internet connection, to make video calls or use videoconferencing. In mobile devices such
as smartphones and tablets, there is usually a camera on the front that functions as a webcam. In order
to obtain good results in terms of image and audio quality a fast network connection is necessary as the
quantity of information required to send images and sounds is very high.
Speakers – These allow you to hear the sounds produced by the computer/device and to listen music.
They are integrated in mobile devices, while they are generally external in PCs. Modern PC audio cards
give great performance and the possibility to connect not just two speakers but whole musical systems
with five or more; this is also called Dolby Digital.
Microphone – This allows you to introduce sound into the device and then to modify it through appropriate
apps. When a computer is connected to the internet, the use of the microphone - often integrated with
headphones - allows you to communicate with other users connected to the internet. On mobile devices
it is usually integrated into the device, while in desktop computers it is external and is connected to the
appropriate input port of the sound card.
Docking station – A platform to which you can connect a portable device such as notebook, tablet
or smartphone that allows you to recharge and connect multiple external devices (external speakers,
keyboard, mouse, desktop, printer, etc.) through a single connection port.
1.3.2 Define the term operating system and identify some common operating systems
for computers and devices
The software that controls the overall function of the hardware of the computer or electronic device is called
the software system, basic software, or, more often, operating system (short form: OS). It consists of a set
of basic programs that constitute the interface, i.e. the relationship between the user and the hardware.
The operating system controls all the resources of a computer or an electronic device: processor, memories,
any readers, CD/DVD burners and so on. It also contains some utilities that are used to perform basic
operations, such as the copying of storage media.
The first operating system to be widely adopted was MS-DOS (Microsoft Disk Operating System), or
simply DOS. It was a text-based system, that is to say, after turning on the computer, it displayed a black
and empty screen with the so-called prompt, which generally consisted of a flashing white dash after the
notice C: \> (see next fig.).
There were therefore no icons displayed (small images on which we can click to launch an application or
open a file) and all commands had to be typed from a keyboard, according to precise and quite difficult
rules. There were 6 versions of MS-DOS system. After the sixth one, the system was first integrated into
and then eventually replaced by the Windows operating system.
Many iterations of Windows have been created: 3.0, 3.1, 95, 98, NT, XP, Vista, 7, 8, and 10 are the most
successful and well-known versions.
The first Windows systems, the 3.x series (so called because numerous versions were developed, from
3.0 to 3.2) have not been used for many years now. However, they are important because they introduced
the system of icons. They were replaced by Windows 95, which introduced the so-called installation
wizard. Since then, the user has always been guided through the most complex processes in the use of
the computer.
Something very similar (and better in regard to certain aspects) had already been developed years before
by Apple with Mac OS. However, this operating system traditionally had a lower circulation than Windows,
even if Apple computers were, and still are, most used by those who work with graphics a lot (architectural
firms, graphic design studios, publishing houses, etc.) and also by the general public in certain countries
(e.g. USA).
Yet another operating system, which has an even lower rate of use is Linux; recognised as a symbol of
the idea of “free software.” In fact, its inventor, the Finn Linus Torvalds, distributed it around the world free
of charge, making sure that the basic instructions for this operating system were accessible to all. In this
way, any user could give his or her contribution to the improvement of the program. For this reason, there
are several versions of Linux. This method of free distribution of software is called “open source”. The
drawback of Linux, however, is that it is not very simple to use and, as a result, is preferred by expert users
only.
In contrast, the Android operating system has experienced a remarkable expansion. It was inspired by the
experience of Linux and, similarly, is also open source software. It was created by the American company
Google for mobile devices (Google is also the owner of the well-known search engine). The other widely
used operating system for mobile devices is iOS, used by Apple.
It is important to remember that applications written for one operating system do not work with others.
Nevertheless, different versions exist, especially for the most common applications, which are identical,
each intended for a different operating system.
There are also spreadsheets, which have a layout similar to the board game
“Battleship”: tables divided into boxes with grid references. In these boxes – called
cells – you can insert numbers, dates and other values to do complex calculations,
which can include mathematical, financial and commercial functions. The results
can be represented with charts and diagrams. Spreadsheets are commonly used
by professional workers that take care of office accounts, calculate estimates, etc.
The most used spreadsheet application is Excel, part of the Office suite.
Presentation apps are part of the Office suite, originally designed to create slides to
print on paper or to be projected using the computer. With the evolution of computers,
and the possibility to reproduce multimedia files, presentation software became
complete multimedia instruments; slides can now contain text, sounds, animations
and videos. The most common of these programs is Microsoft PowerPoint. An
entire ICDL chapter, Presentation, is dedicated to this topic.
In the Office suite there is typically a database that can save, order and process
a large quantity of data. Databases work like a phonebook, which reports names, phone numbers,
addresses and other information. Their usefulness lies in the fact that they can be consulted in just a few
seconds, in order to easily find and process (send, print, etc.) the data you want. Nowadays it is almost
impossible to work without databases, often they are created by external programmers for a specific
purpose. Microsoft Access is the database application present in the Office suite, but other products are
preferred for professional use. This type of applications is discussed inside the ICDL chapter Database or
Use of databases.
An application present in all computers, tablet and smartphones is the browser, which is the application
that allows you to use the Internet. The most commonly products are the ones by Microsoft: Edge and
Internet Explorer. Google Chrome and Mozilla Firefox are also very popular too.
Linked to the Internet connection is the application to send and receive messages through Internet, the
so-called e-mail: the most used applications are Mail by Windows and Google Mail or GMail. Many other
people use the e-mail service directly from their internet provider (Fastweb, Tiscali, Libero, etc.) or through
a social network.
The success of some famous social networks has brought millions of subscribers to their sites and they
have now created specific applications to use their services, such as: Facebook, Instagram and Twitter.
Browser and e-mail are widely explained in the ICDL chapter Online Essentials, while the social networks
are discussed in the chapter Online Collaboration.
Image processing applications are also very popular; these allow you to create or
modify photos, drawings and other types of images. Among the most common is Adobe
Photoshop, an ICDL chapter is dedicated to these applications: Image Editing. They are
widely used by professionals for tasks like multimedia enhancement or design work.
There are numerous applications dedicated to the multimedia editing, all intended for the modification
and creation of images, sounds, animations and videos. Many programs are designed for a public which
do not need a full range of professional tools. Some operating systems include applications able to create
or transform drawings, images, sounds, and short videos, and many of them are available for free or at a
low price. In the professional field, however, there are some programs that require expert knowledge to
fully utilise and are expensive.
The fast spread of mobile devices able to connect to the internet has led to an increase in applications
created for smartphones, tablets and other mobile devices. There are now thousands available,
sometimes derived from programs created for computers and then adapted for mobile devices that have
smaller screens, less powerful processors, etc. You can choose and install these apps online from the so-
called app markets such as the App Store from Apple and Google Play Store dedicated to devices running
their operating system Android.
Among the most popular applications there are video games. There are thousands of them: Action games,
simulations, puzzles, etc. Some of them (especially ones designed for children) exercise the logical abilities
and have an educational purpose.
1.3.4 Define the term End-User License Agreement (EULA). Recognise that software
must be licensed before use
The use of a software is regulated by a contract with the product company that you automatically agree
to when you use the application for the first time. The technical name of this contract is EULA (“End-User
License Agreement”). The contract is generally shown on the screen once you have installed the program
and you are obligated to press the button Accept to use it.
There are very commons rules: duplication (except for a personal use), spreading, modification and the
sale of the software are forbidden, and it is only possible to install the software on one device. You can use
the software only after you have accepted this contract.
1.3.5 Outline the types of software licenses: proprietary, open source, trial version,
shareware, freeware
You can install thousands of apps via the internet onto your device which have different terms of use.
Generally, software licenses can be divided into two categories: proprietary and open source. The EULA,
shareware and the freeware are types of proprietary licenses.
Shareware applications are granted for a limited period (e.g. a week or a month) or for a limited number
of uses. Sometimes they do not have all the functions of the complete application (which you have to buy);
other times they have all the functions but they will stop working after the trial period; there are also cases
in which they do not stop working but remind you that you must buy the product. In every case, once the
trial period is over, if you do not buy the software it is illegal to keep using it.
Freeware applications are totally free. The author of this type of
software has the copyright but they allow free use of it.
Shareware and freeware applications can be freely distributed; however,
it is forbidden to resell or modify them.
Demo applications are another type of freeware application: they are demonstration versions – and limited
in their functionalities – of a commercial software, often video games. There are also so-called Adware.
Free applications that contain advertisements or collect information on the websites visited by the user to
transmit this information for a targeted advertising.
Free software also have licenses, these are called open source applications, which can be modified
to improve or adapt them to specific needs by anyone. The most famous open source software is the
operating system Linux, but numerous other applications are also distributed in free form. Principally these
have so-called GNU licenses which are part of a project born in 1984 to create non-proprietary software.
At least one of the accounts corresponds to the so-called Administrator, a person that has the necessary
permits to modify any computer setting, and to install or delete applications. For personal computers you
are generally the administrator, whereas in situations where the computer has many users (in schools,
offices, etc.) the administrator will be a different person.
In addition to the Administrator accounts there are the standard user accounts. These are created for
users that use common applications and want to protect their account with a password; they will, however,
not be able to access to the administrator folders or to modify the system settings of the computer.
A username is associated to each Administrator and Standard User account, these can correspond to the
name of the user or to their e-mail address. The username is also called ID or User.
Unlike passwords, the username has no protective purpose (when you write it, the letters will appear
visible on the desktop, in contrast, when you write a password the letters will appear as asterisk’) but is
useful to recognize the person who is accessing the system.
In previous Windows operating systems (e.g. the 7 and the 8) the account was local, which means the
username and the password were linked only to that specific computer. Now, with Windows 10 it is
advisable to use a Microsoft account.
It consists of a username and a password which allow you to access Microsoft services and software
independently from the device you are using: desktop computer, laptop, tablet, smartphone, etc. This
means that in all these devices you will always find your customized settings and that once you have
inserted your username and password to access Windows 10 once, you can access other Microsoft
services (as Skype, OneDrive, etc.) without repeating the procedure.
If you have already used Microsoft services such as OneDrive, Outlook.com, Xbox Live, Office 365 or
Skype, you probably already have an account.
If you do not have one or you do not remember it you must create a new one. The process to create a
Microsoft account is relatively simple and free: all you need is a valid e-mail address, which will become
your username.
The Microsoft account can be created during the installation of Windows 10, by clicking on the button Sign
Up from the access page, or by connecting to the webpage signup.live.com. In both cases, you will have
to use your e-mail address as the username and to choose a password. In addition, it will be necessary
to insert some personal information. At this point, you will receive a message from Microsoft with the
instructions to complete the account configuration.
Once you have chosen the account (by clicking on the name and inserting the password and pressing the
button Enter or by clicking on the arrow near the pane to insert the password) the desktop of Windows will
appear.
In the latest Windows versions, only the Recycle Bin icon appears on the desktop. All the other icons
which allow you to explore the computer are available from the button Start, which is on the lower left and
looks like the Windows logo.
The mouse cursor will appear at the centre, represented by a white arrow which, at the start, is accompanied
by a little rotating circle that indicates the necessity to wait a few seconds while the programs load. Once
the circle has disappeared you can start to use the computer.
Clicking on Start, a vertical menu will appear (see next fig.) which list in the left-hand column (from the top
down) the current account, links to Documents and Images and the commands Settings and Shut down.
The central columns list all the programs in alphabetic order, while the right part is the “real” Start menu
dedicated to apps and with animated boxes that you can modify or move.
1.4.2 Log off, shut down, restart a computer using an appropriate routine
If more than one account is in use on the computer, it is possible to log off from the account that is
being used at that moment and log in with a different account. To do this, first click on Start, then on the
Account button. Finally, from the drop-down menu that appears (see fig.), click on Sign out. The system will
disconnect and take you back to the user accounts home screen, from which you can choose the account
you want to access the system with again.
To completely switch the computer off you can perform a shut down. Close all the apps and windows and
return to the Start button. Click first on Start, then on the power icon, and finally on Shut Down (see next
fig.). If the computer is off, the restart procedure is the same as previously explained.
If you wish to power the computer down and immediately restart it (this is sometimes required to complete
the installation of some software), follow the same procedure as Shut Down but click on Restart instead
(see next fig.).
CE-23
©2020 AICA & Edizioni Manna
CE-24 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING
l The button Notifications (near the clock) opens the Notification Center which groups the system and
app messages, has a series of buttons to control the system: regulate the bright, activate or deactivate
functions such as Wifi, Bluetooth or geolocation, adjust settings such as tablet or plane mode, etc. (see
next fig.).
2.1.2 Identify common icons like those representing: files, folders, applications,
printers, drives, shortcuts/aliases, recycle bin/wastebasket/trash
Icons can represent apps, files, folders and many other objects, such as the hard disk, the CD and
DVD reader, the printer, etc. Some icons are created by the operating system and by the apps, other can
be added by the user for a better use of the computer.
As we already said in the previous ref, if you want to “activate” what is represented by an icon, you must
put on it the cursor and click two times; if the screen is touchscreen just touch the icon once with your
finger. The result you will obtain is the same. If the icon depicts a folder (represented by a yellow icon),
therefore a “container” for other objects, a window will open where there are other icons that demonstrate
the content of that folder.
Alternatively, if the icon represents an application (e.g. Word) or a file linked to an application (e.g. a .doc
file created with Word), it will launch the software in question and you will be able to write, draw, etc.
In the latest Windows versions, the only icon on the desktop after the installation of the operating system
is the Recycle Bin. This is essentially a folder in which the files and folders that have been deleted are
collected.
By clicking first on the Start button and then on Computer, a window will open, in which different computer
storage drives are listed (hard drives, CD-RW, flash drive, external hard drives, etc.; see next fig.).
The subdivision of units depends from the computer you are using. In desktop computers, for example,
there may also be the icon of a Floppy disk (A:).
The letter C: identifies the hard disk, while the letter D: is generally assigned to the CD and DVD drive.
This subdivision can be different if there are two or more hard disks. In older computer sometimes a
second hard disk was installed to increase the memory; nowadays, computers generally have one hard
disk, but sometimes it is divided into sections, with a process called partition, to improve data ordering and
functionality.
It is increasingly common for an SSD (“Solid State Drive”) to be present in place of a hard disk. These use
a solid memory to save data, compared to hard disks which use rotating magnetic disks. The absence of
mechanical parts offers numerous advantages: they do not produce noise and vibrations, consume less
energy and generate less heat.
If you want to see the content of your hard disk or SSD double click on the disk (e.g. C:) and a window will
open in which you can see the content, subdivided into folders and files.
The next letter will be, generally, assigned to the CD and DVD reader, followed by other connected units
(e.g. pen drives, memory cards or external hard disks) indicated by ascending letters (E, F, etc.).
The icon which represents a printer allows you to see all the current print processes, and the properties
of the printer.
There are also links to apps or files frequently used on the desktop.
If you choose View and then Auto Arrange icons, each icon on the desktop will be transposed into columns.
It is also possible to create or delete shortcuts to documents or files with the same procedures: if the
file requires the use of an app (e.g. Excel to view a spreadsheet), the app will be automatically launched
and the file opened.
Once you have created the shortcut, you can move it by using the drag and drop technique: click on the
object to move it, drag it and release the button where you want to put it.
Additionally, it is possible to put a link to any file or folder onto the desktop. In Documents click with the
right mouse button on the element for which you want to create the shortcut and choose Send to/Desktop
(shortcut) from the menu.
From the top, there is the title bar, containing the folder or program name.
Beneath it, there is the menu bar, with the headings File, View, etc. By clicking on these some menu will
open, in which you will find a series of commands that allow you to perform functions such as: create new
folders, delete them, move, etc.
Beneath the menu bar there is the toolbar, which has elements that, if pressed, allow you to instruct the
system to do a particular action.
In the Office Suite apps (Word, Excel, PowerPoint, etc.), the menu and the toolbar are substituted by a
multifunction bar (see next fig.).
The lower border of the windows is called the status bar, because is where a series of messages about
your operations will appear there.
If the window size exceeds the size of the screen, then on the right side and/or on the lower edge, you will
see what are called sliding boxes, and two opposing arrows, the scroll bars. These mean you can slide
the content of the window itself by using the cursor on the arrows or moving the scroll box by clicking and
holding on them and then dragging.
Alternatively, you can use the so-called navigation keys (Page Up, Page Down, Home, End, etc.), or the
direction arrows to scroll through the contents of the window that is active at that moment. Many mice are
provided with a scroll wheel between the two buttons, which allows you to scroll through the contents of
the windows without having to use the vertical scroll bar.
2.2.2 Open, collapse, expand, restore down, maximise, resize, move, close a window
On the top right part of the windows there are, generally, three buttons representing a horizontal line,
a square and an X. By clicking on the line the window will be minimised to an icon; it will remain open but
not visible apart from the icon and name in the status bar.
By clicking on the X the window will be closed. Clicking on the square, the window will increase in size to
fill the screen (known as maximise) and the square will be transformed in two squares.
Clicking again on the two squares, will restore the previous window size.
To adjust the size of a window that does not occupy the whole desktop with more precision you can also
use the “border” of it. If you move the cursor over one of the window borders, the it will assume the form of
a double horizontal arrow. At that point, by holding the left mouse button, you can drag the window border
to the desired size.
Many windows have special corners that, if dragged, simultaneously modify the height and the width.
Try to put the mouse cursor on one of these four corners and you will see it assume the form of a double
oblique arrow. Drag the window with the mouse to modify its size.
If you want, you can simultaneously see all the open windows on the desktop. Click with the right mouse
button on any point on the taskbar without icons. A menu will appear (see next fig.) which allows you to
arrange all the windows horizontally (Show windows side by side) or vertically (Show window stacked), or
to overlay them (Cascade windows), or to reduce them to icons (Show Desktop).
To move a window just click in the title bar with the left mouse button and, by holding the button, move it
to a new position and then release the button.
Clicking with the right button on a folder containing other folders will open a menu from which you can
choose Expand. The same operation can be done by clicking twice on the folder. Once expanded, the
folder is represented with a tree structure, in which the indents represent the subfolders (see next fig.).
Near every closed folder there is an arrow pointed to the right , clicking on it opens the folder to show its
contents. Near the open folders there are arrows pointed downward that indicate the folder is open. If
one or more subfolders contain other subfolders, these first appear with the sign and can be clicked on
to open them and see the further folders, while folders containing only files do not have either sign.
If the folder you have opened does not contains what you are searching for, you can close it again. By
clicking on the sign the folder will be closed and again the sign . If a folder has no other subfolders but
only files, selecting it with a mouse click will show you the content in the right pane.
If you desire to work with more windows displayed, you should right click in the taskbar and from the menu
(see next fig.) choose one of the options: Cascade windows, Show window stacked, Show window side
by side, etc.
In all cases, it is possible to modify this and work only one window at the time.
Especially useful for the management of the computer is the search box, which is to the right of the Start
button. Depending on the version installed, it can also appear as a button representing a magnifying glass,
clicking on it opens the search box.
When you start to type something inside it, Windows tries to understand what you are searching for and
propose different solutions, for example: a function, program or a file present inside the computer, or the
result of a search made on the Internet, etc.
The search function tries to adapt to your need and provide immediate answers. For example, by writing in
the search box a mathematical operation, the computer will perform the calculation, or by writing “weather”
and the name of a city, it will provide you the weather reports.
If during the installation process of Windows 10 you activated the option Cortana, to the right of the search
box a microphone icon will appear.
Clicking on the microphone icon (if, of course, you have a microphone integrated or connected to the
device you are using) you can indicate your search by using your voice. The answers can also be given
by voice by the assistant.
2.3.2 View the computer’s basic system information: operating system name and
version number, installed RAM
Before you install new applications or peripherals, it is sometimes necessary to view the basic information
of your computer, to verify compatibility.
Click on Start > Settings (the icon represented by a gear) > System > About to see a series of information,
such as: the operating system and its version, the quantity of RAM memory available and the type of
processor (see next fig.).
2.3.3 Change desktop configuration settings: date and time, volume settings,
background, resolution
To modify the date and time, you must click on Start > Settings > Time & Language to open the date
and time window (see next fig), in which there are automatic settings to adjust the time using the internet.
To manually modify the clock or the calendar you should deactivate automatic time setting (the sliders will
appear grey) and then click on the button Change. The window Change date and time (see next fig.) will
appear, in which you can make your choices and confirm them by clicking on the button Change.
To modify the audio volume just click on the speaker icon which is in the taskbar, to the left of the clock,
and then move the scrolling device to the right, to increase the volume, or to the left, to decrease the
volume (see next fig.). Near the scrolling device there is an icon which represents a speaker; clicking on it
you can deactivate (the so-called “mute”) or reactive the audio.
The window System (Start > Settings > System) allows you to modify the display settings by clicking (if not
already selected) on Display, first choice in the left column. The window that appear (see next fig.) allows
you to adjust some basic settings, such as: the text sizes, the display orientation, and brightness.
By clicking on Advanced display settings, it is possible to modify the screen resolution. Windows
automatically chooses the optimal settings for the display, but you can modify them with the box Resolution
and by choosing one of the available options (see next fig.).
To change the desktop background, you must open the window Personalisation – clicking on Start >
Settings > Personalisation – where you can select a different background for the display between the
default options or from images on the computer by using the button Browse.
Once the installation is complete, in the taskbar, right before the clock there is the language bar, by clicking
on it you will find the languages that you can select with a double click.
To delete a language from the keyboard just repeat the previous process for adding it and select the
button Remove.
At this point the window Task Manager will appear (see next fig.) with a list of all the applications open at
the moment. You must choose the program that is not functioning and click on the button End task.
If you do not use an app, you can uninstall it. Open the window App & Features by clicking on Start >
Settings > Apps (see next fig.). The system will list the installed programs. If you cannot find the app you
are looking for, write the name in the search box Search this list or change the order to see the app list in
(size, name, installation date) or if you want to see the apps of a particular drive.
Select the application to delete and then click on the button Uninstall. In the next fig, for example, the
program Google Earth Pro is about to be uninstalled. The system will ask for a confirmation.
In some cases, the uninstall program notices that some files are in common with other apps and it is not
necessary to remove them. In other cases, there is the possibility that the system will ask you if you want
to remove files that are not commonly used. If this happens it is better to follow the system instructions and,
if you are not sure, to not delete these files.
2.3.7 Connect a device (USB flash drive, digital camera, media player) to a computer.
Disconnect a device using an appropriate routine
We already said (1.2.4) that USB ports are the most commonly used method to connect other devices to a
computer. Some of these devices (e.g. keyboards, mice) have a USB cable always connected, other (e.g.
USB flash drives) have an integrated connector, while the majority of other devices (e.g. digital cameras,
media players, etc.) must be connected to a USB cable first in order to be used.
In all cases, the first time that you connect a device to a USB port, Windows automatically starts to
search for the necessary driver for that device, meaning the necessary instructions for the computer to
link to the device. In some cases, it you have to install the driver manually (some devices are sold with a
CD included containing the software), in other cases the device may be not compatible with the Windows
version the computer is running, particularly if it is a very old device.
In every case, Windows signals the installation process with pop-up messages.
If there is no message, make sure that the device is:
l Correctly connected: The USB plug must be inserted all the way in;
l Turned on: Some devices have switches that you must turn on before you connect them;
l Correctly powered: Some devices (e.g. webcams or external disks) require a different power source
and must be connected to transformers or batteries.
Before you disconnect a device containing data (e.g. USB pen drives, external hard disks, memory
cards, etc.) you must be sure that the computer has stopped transferring data from or to the device. If the
connected device is a storage device, on the lower right of the taskbar there is the icon Hardware Safe
Remove.
By clicking on this icon, a list of the connected devices is shown: click on the device you want to remove
and wait for the message “It is safe to remove the hardware”.
If you already have a text file, you can open it from Notepad by clicking on File, then on Open (or pressing
simultaneously the buttons Ctrl and F12) to search inside the computer for it or the connected peripherals.
Once you have found it, you can open it by double clicking or by, first, right clicking and then selecting
Open.
To close the file, you have to close the application too. By clicking on the button X at the top right of the
title bar, or by clicking on File and then on Exit or pressing together the buttons Alt and F4. If you made
changes to the file, the program will ask you if you want to save them or not. Choose Save or Don’t Save,
or. click on the button Cancel to go back to the document without closing the application.
CE-39
WordPad is a word processing program with many features, which allows you to create documents by
choosing between different types of fonts, colours, sizes, and so on (see next fig.). To open it, from Start,
choose Windows Accessories > WordPad or start to write “WordPad” in the search box until it appears in
the results list.
If you want to open an already existing file, you must click on the tab File from the menu (highlighted in
yellow in the next fig.) and then on Open, or simultaneously press the buttons Ctrl and F12. In both cases,
the window Open will open, in which you can search for the file inside the computer or the connected
peripherals, then you can open it with a double click.
The procedure to close a file in WordPad or the entire app is the same: click on the button Close, click on
the tab File and then on Exit, or simultaneously press the button Alt and F4. You will also receive a notice
to save any changes you have made.
3.1.3 Copy, move text within a document, between open documents. Paste a screen
capture into a document
To copy some text in a document, you must select the part you want to copy, by putting the cursor at the
beginning of the text you want to copy and then, by holding the left mouse button, dragging the cursor to
the end of the text to be selected. The selected text will appear highlighted in light blue if you are using the
standard setting of Windows (see next fig.).
After you have selected the part you want, choose the command Copy. In WordPad and other word
processing applications there is a button which has an icon of two sheets, in Notepad you can find it by
opening the menu Edit. Put the cursor in the point in where you want.
Alternatively, after you have selected the text, right click on any point of the selection; a menu will open
in which there is the command Copy. After selecting copy, click on the corresponding point in which you
intend to make the text appear and then choose the command Paste.
To move text, firstly selected it, then choose the command Cut (represented by a pair of scissors in word
processing programs, while is in the menu Modify of Notepad). Put the cursor on the point you want to
insert the text and choose Paste.
Or, once you have selected the text, right click on any point and a menu will open in which you can find the
command Cut. After putting the cursor in the desired location, right click again and choose Paste.
In addition, is possible to copy or move text using so-called keyboard shortcuts:
l Ctrl and C to Copy
l Ctrl and X to Cut
l Ctrl and V to Paste
There is another, less known, method: Once you have selected the text, you can copy it by
holding the Ctrl button while you drag the selection where you desire. If you hold the Shift button,
the text will be cut and pasted where you release the button. The advantage of this method is that it
does not delete the eventual content of the Windows Clipboards.
With the same procedures, it is possible to copy and move text between open documents, by selecting
the document where you want to work to copy or move text after you have first selected it.
It is also possible to copy an image of the display into a document. We already saw (ref. 2.3.8) that by
pressing the Print Screen button everything that is on the display in that moment is saved to the Windows
Clipboard. Just open a word processing document and choose the command Paste; the display image will
appear in the document.
In the field File name, write the file name; it can be long up to 256 characters, it is best to use something
that accurately describes the document without being excessively long, as explained at the ref. 4.1.6. In the
left pane the folder in which the file will be saved is highlighted. By default, Documents will be highlighted,
but, if you prefer, you can select another folder. Once you have chosen the name and the folder in which
save the file, click on the button Save. The next time you want to save the document, pressing the button
Save will save the file directly to the same location; if you wish to save it to a new location or change the
file name at any point, you can follow the save as procedure again.
3.2 PRINTING
3.2.1 Install, uninstall a printer. Print a test page
If you want to connect a new printer to your computer you must install it, as with all new peripheral
devices. For it to work correctly, the printer (as with other peripherals such as scanners and webcams)
must exchange information with the computer following specific procedures that are applicable to that
model of printer.
Modern operating systems have automized procedures that recognize and automatically install most
common peripherals. So, when a new printer is turned on and connected, the computer automatically
starts the install procedure, which has already been discussed in ref. 2.3.7.
If there are issues with automatic installation it is possible to proceed using manual installation. Open
the menu Start and choose Settings > Devices > Printers & scanners > Add a printer or a scanner (see
next fig.).
The computer will start a search for new connected devices. If the computer does not find the right printer,
click on “The print that I want isn’t listed” to manually install the device (see next fig.).
You must indicate if the printer you want to connect to is a local printer, meaning that it is only connected
to your computer, or if it is a network printer, meaning a printer connected to other computers too (as in
offices), or if it is connected wirelessly.
Once you have made your choice and indicated the connection system, a printers list will be shown.
Choose the one that you desire, and the installation procedure will start automatically. By clicking on the
button Driver Disk, you can use to use support data provided with the printer (generally a CD).
After the installation is complete it is advisable to print a test page to verify the printer is functioning
correctly. You can start the procedure from the window Printers & scanners by selecting the printer with a
click and then choosing Manage and then Print a test page.
If you do not use the printer, you can uninstall it by opening the window Printers & scanners, selecting the
printer and then clicking on the button Remove.
The same options that are available from the menu appear by right clicking on the files in the print job list.
Alternatively, it is possible to open the printer window and manage the print jobs by clicking on the printer
icon which appears in the taskbar at the bottom right of the desktop, while a print is ongoing.
CE-45
©2020 AICA & Edizioni Manna
CE-46 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING
As you can see in the previous fig., folders have an entire name, while files have a name and a suffix,
separated by a full stop (.). The file suffix, also called extension, indicates the type of file, meaning if it is
a file produced by a particular application (such as the extensions docx, xlsx, pptx, etc.) or if it is a system
file (extensions dll, drv, sys, etc.) necessary to the functioning of the system.
The suffix or extension was the only method to identify files with the MS-DOS system, nowadays you can
also recognize different files from their icons: a light blue W for files made with Word (.docx & .doc), two
gears for some system files (.dll), etc.
There are multiple methods to see the contents of a computer, one of the fastest ways is to use the app
File Explorer, normally present in the taskbar. If it is not there, click on Start, then on Windows System and
then on File Explorer.
A hierarchical structure will appear in which you can move between drives, folders, subfolders and files.
As mentioned in (2.2.2) it is possible to show or the subfolders. By clicking on the arrow next to a closed
folders you can see the subfolders; by clicking on an arrow pointing downward next to an opened folders
you will hide the subfolders.
To find a file or a folder you should remember that the operating system uses this hierarchical structure. Start
from the main folder (C: or Documents or other) and open the folders step by step until you find what you are
looking for. As we already said, each folder can contain other folders, that in turn can contain more folders.
4.1.3 Change view to display files and folders like: tiles, icons, list, details
Folder contents can be displayed in different ways; by clicking on the tab View a window will open
which allows you to choose between eight options: Titles, Medium-sized icons, List, Small Icons, Content,
Details (see next fig.).
The same options are available by right clicking on an empty point of a folder and then choosing the option
View from the menu (see next fig.).
The first four options (Extra large icons, Large icons, Medium icons, Small icons) display the content
preview in icons of the different sizes. These are useful for folders that contain images or music.
Other options allow you to simultaneously display more files and more of their information (sizes, date of
creation, etc.).
4.1.4 Identify common file types like: word processing, spreadsheet, presentation,
portable document format (pdf), image, audio, video, compressed, executable files
When you scroll through the contents of a computer is useful to be able to identify file types. If, for
example, you are searching for a spreadsheet, you can identify it thanks to its icon or extension.
As discussed in ref 4.1.1, the extension was the method used with MS-DOS system to associate the file
with the program that can open it. Nowadays, Windows systems do not need to show the file extension.
You can show or hide them by clicking on the tab View when you are in the File Explorer window, then
selecting the last button on the right, Options. In the window that opens, you must choose the tab View
and scroll through the menu to find the tick box (√) for the option Hide Extensions for known file types
(see next fig.). By ticking this box and clicking on the button Apply to folders all file extensions will be
hidden.
In the next fig. there is a table of the main icons and their file extensions:
Multimedia files, meaning those who reproduce images (the main extensions of these files are .bmp .jpg
.gif. tif), music (.wav .mp3) and video (.avi .mpg .mp4) are represented with different icons depending on
the application associated to that type of file.
Often the generic icon is substituted with a file content preview. If the file is an image you will see a
thumbnail of the image, if it is a mp3 file you will see the album cover, if it is a pdf document you will see a
thumbnail of the first page and so on. In the next fig. you can see from left to right the icons of an image,
a video, a pdf file and a mp3 file.
Executable files have different extensions, the most common is .exe, but there are also .bat, .com, and
many more.
4.1.6 Recognise good practice in folder, file naming: use meaningful names for folders
and files to help with searching and organisation
When you need to give a name to a file or a folder it is better to choose a name that makes it simple to
find it and to remember its contents.
The chosen name must be descriptive. For example, if you write a letter to cancel an insurance policy,
a good name could be “insurance cancel letter”, while it is better to avoid names that are too generic such
as “letter”, “cancel” or “insurance”.
Additionally, even though Windows allows you to use up to 256 character, it is better to avoid long
names. For example, a file name like; “letter to the insurance in which I communicate my intention to not
renew it for the next year” is unnecessarily long.
Remember that it is possible to use spaces and symbols, with the following exceptions, which cannot be
included in a file name: / \ ? : ; ″ < > * |
If you repeat the same process after you have opened the new folder, you can create one or more
subfolders. These have a “cascade” process which has no limits; however, it is better to not abuse this
and create an excessive number of subfolders.
If the menu bar is shown, it is also possible to create folders by first clicking on Home and then on New
Folder.
4.1.9 Search for files by properties: all or part of file name using wildcards if necessary,
content, date modified
As was already explained (4.1.1), the computer memory is organized in a hierarchal structure based on
folders, subfolders and files. Often, you will need to search for a particular file that you do not remember
the location of.
Write the complete or partial file name in the search box to the right of the button Start to see the results
(see next fig.).
Windows by default saves files into personal folders (Documents, Images, Music, etc.) which allows search
results to appear almost instantly.
Once you have found the file you were searching for you can open it (if it is an app or a document created
with an app) by double clicking on its name.
The search function is principally based on the file name, for this reason you must remember at least
part of the name. If you search, for example, for a file named “Stone” the system will find it, along with other
files with similar names such as “The stone age”. Simply select the file you are searching for to open it.
If you cannot find the file or you are not satisfied with the results, you can extend the search by clicking on
one of the options that appear above the search box: All, App, Documents, E-mail, Data, Settings, Music,
People, Video).
Other search features are offered by the app File Explorer (which icon is in the taskbar; you can also start
it from Start > Windows System > File Explorer) which has a Search pane in the top right where you can
write the term or terms of your search. The options in the tab Search (see next fig.) can be useful to filter
the results by their proprieties: type, sizes, etc.
If you want to start the search directly from a folder, just click in the search field (in the top right) and
then on the search filter you want to use.
If you do not remember the file name, you can replace some letters with the so-called jolly characters.
For example, if you do not remember if the name is “vacation” or “vacations”, you can insert a jolly character
(in this case the question mark “ ? “) in place of “n” or “ns”. Therefore, the search term would be “vacatio?”.
An asterisk can be used as a substitute for a part of or an entire file name or extension, remembering
that the name and the extension must be always separated by a point. If you write *.* it will stands for “all
the files and all the extensions name”, practically all the computer files. *.doc will indicate any file with
the doc extension, meaning files made with Word, while *.jpg will find all the photos with the jpeg format.
Searching vacation* will find all the files named “vacation”, regardless of the app they were created in.
If, instead, you want to select all the contents of a window, click on the menu Home and then choose
Select All. If the menu bar is not shown, you can obtain the same result by simultaneously pressing the
Ctrl and A buttons.
4.2.2 Sort files in ascending, descending order by name, size, type, date modified
In the multifunction bar (File, Home, Share, View) click first on View and then on Sort By and a menu will
appear offering the option to sort the files based on Name, Date Modified, Type and other characteristic
(see next fig.). From the same menu you can choose to sort in either Ascending or Descending order. The
last option, Choose columns…, allows you to choose which details of the files to display in the list.
If you have chosen the view Details, you can obtain similar results just by clicking on the column headers.
Clicking, for example, on Size the files contained in the folder will be listed in ascending order. If you click
again on Size the order will change to descending, i.e. from the biggest file to the smallest. Similar results
can be obtained by clicking on any other column header: Name, Date Modified, Type, Size, etc.
In the same view, you can click on the arrow which appears after the name of each columns to find further
specific ways to sort the files (see next fig.).
4.2.4 Delete files, folders to the recycle bin/wastebasket/trash and restore to original
location
To delete files or folders select the element with a click and then press the Del button.
You can simultaneously delete groups of files or folders with the same technique.
If you prefer, you can also delete files using only the mouse. Drag the file or folder icon on the Recycle Bin
icon, or right click on the file and, from the menu, choose Delete (see next fig.). Additionally, if the menu
bar is shown, select the file and then choose the option Delete from the File tab.
In all cases, files are not permanently deleted, but moved to the Recycle Bin from which you can restore
them if you wish.
To restore deleted files or folders, from the Desktop, double click on the Recycle Bin icon. The Recycle
Bin is similar to other normal folders; when you open it, you will see the files and folders previously deleted
along with their previous position (if the option Details is selected) (see next fig.).
If you choose the option Restore all items (indicated by the cursor in the previous fig.) all the Recycle
Bin files will go back to their previous position. If you want to restore specific files select them using the
previously described methods and then click on Restore the selected items in the toolbar.
4.3.2 Identify file size, folder size, storage capacity measurements like: KB, MB, GB, TB
To execute calculations, we are used to using the decimal system, which represent numbers through ten
symbols that go from 0 to 9. When the first computers were created, a system in base 2 was chosen,
meaning based on only two numbers, and resultingly is called a binary system.
Each digit – 0 or 1 – is called a bit (“BInary digiT”) and a sequence of eight bits gives the computer the
possibility to identify any character: Letter, number or symbol. So, the fundamental unit measure of the
computer memory is formed by a sequence of eight bits, which is equal to a single character and is called
a byte.
1024 bytes form a Kilobyte (short form: KB, to not confuse with Kilobit, abbreviated to Kb), 1024 Kilobytes
form a Megabyte (abbreviated to MB) and 1024 Megabytes form a Gigabyte (abbreviated to GB), which
therefore constitutes more than a billion of bytes. Then, there is the Terabyte (abbreviated in TB) which
corresponds to 1024 Gigabytes or thousands of billions of bytes.
It is important to remember these measurement units as they are commonly used in computing. The byte
(and its multiples) is used to denote the memory capacity of a hard disk.
Because you cannot have a perception of these measures in the real world (such as for a kilo, a litre etc.),
let us say that an A4 sheet occupies, more or less, 3 KB, so a manual such as the one you are reading
occupies almost 2000 KB. Consequently, in 2 MB (the equivalent to 2000 KB) you can store a manual
like this, and in 1 GB you could store 500 manuals. It is important to note that we are talking about sheets
containing text only; when there are pictures, sound or videos in the file they occupy significantly more
space.
5.1.2 Define the term Internet. Identify some of its main uses like: World Wide Web
(WWW), VoIP, e-mail, IM
The internet can be defined as a set of computer networks spread worldwide and connected through
telephone lines and other means of transmission, so that they can communicate with each other to receive
and send data.
Every day, hundreds of millions of people worldwide use the internet for business or leisure. There are
many reasons why people use the internet: to communicate with other people through so-called social
networks or e-mail; to play games; to find information for their work; to read the latest news; to do research;
to buy products; to check their bank account; to download applications; to pay bills, to find information
about schools and universities; to translate a text from one language into another; to organize trips, etc. In
a way it can be said that only the imagination can set limits on the ways the Internet can be used. We can,
however, identify some of its main uses.
CE-59
©2020 AICA & Edizioni Manna
CE-60 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING
Anyone who lived through - as the author of this book did - the exciting adventure of connecting to the
internet in its early days, knows that the internet then was very different from what it is today. Initially it was
only black and white texts; the introduction of colour, animation and sound was only made possible by the
invention (in 1992) and the spread (since the mid-nineties) of the World Wide Web.
The meaning itself of World Wide Web refers to the fact that if lines
connected all the computers to the network it would look like an
enormous spider web surrounding the whole Earth. The World Wide
Web is often referred to in other ways: Web or WWW (from the letters of
World Wide Web). The difference between the internet and the World
Wide Web is the fact that the internet is a set of connected networks,
while the WWW is a technique that facilitates the organization of texts
and hypertexts present in the network through links.
There are billions of documents, illustrations, sounds, and animations on the Internet that can provide
useful material for study, work or just to have fun. The problem is that these documents, illustrations and
sounds are scattered on hundreds of millions of web pages. It is impossible to look at them all to find what
you need; that would take thousands of years!
For this reason, there are particular Internet sites, called search engines, which allow you to easily find
information. Search engines are comparable to big lists of billions of web pages that you can search
though like an archive.
Electronic mail allows you to send and receive messages through the Internet. These messages can
have any sizes: you could write only “Hello” or send to another person a letter with thousands of pages.
You can also attach audio, pictures or other files to your messages.
You may ask “what are the advantages of doing this through the Internet”? There are two mains advantages:
speed and cost. If you need to send a message to a person that is very far from you, sending a message
via e-mail will cost you only a few seconds and a few cents.
If the person you sent the message to it is not connected to the internet at that moment, there is no
problem. When they reconnect, the computer will signal that there is a new message in the mailbox.
At that point, the person will be able to read it and to see any attachments (sounds, photos, videos, etc)
and to decide to respond or delete the message.
E-mail offers other advantages, such as the possibility to send a message to many people simultaneously
and to receive the message in any part of the world. The spread of e-mail has been so great that not only
companies, but also the public, prefer to send messages through it.
Of course, there are also disadvantages, such as receiving undesired e-mails (called spam) and the
possibility of receiving viruses or other dangerous elements. To use e-mail a computer must be connected
to the internet and you must have an e-mail address.
To send an e-mail you need to know the recipient’s address.
An e-mail address is composed by two parts separated by an “at” sign (@), for example: [email protected]
in which name indicates the person, while server.com indicates the name of the domain.
Generally, you will know this address because the person to whom you want to send the message told
you or you found it on a web page; on many internet sites the e-mail addresses of the authors are shown.
Remember that it is also possible to send and receive e-mails through smartphones, tablets and other
electronic devices.
5.1.3 Define the terms intranet, virtual private network (VPN) and identify their main uses
In many companies, computers are connected to each other through an internal network, called an Intranet,
which uses the same technology as the internet to allow employees located in different offices to work
together on the same project or document at the same time. An intranet usually allows the users to access
the internet as well, while the contrary is not possible. A kind of access filter (called a firewall, which will be
discusses in detail in ref. 6.1.2) or other measures are used to prevent unauthorized people from spying
on the company’s data or spreading computer viruses.
Another type of network that uses internet technology is the extranet. Extranets are different from the
intranet as they are not restricted to employees of the same company or companies belonging to the same
group, but are open to other people such as suppliers or customers who have access to a limited part of
the business information.
The most common technology used to access to an extranet is a VPN (from “Virtual Private Network”)
that allows people to use the internet to connect to the site that accesses the extranet, where users
typically have to identify themselves with a user name and password. After doing this, a secure and private
connection is established, on which the extranet resources are available.
In order to better understand the differences between the internet, intranet and extranet we can give a
concrete example using the network services offered by any bank:
l Those who are not customers of a bank can still access the bank site and get information on services
available, interest charged, etc. via the internet;
l Those who are customers of that bank have a password that allows them to perform many operations
online. In this case they access to an extranet through a VPN;
l Those who are employees of that bank can access the checking accounts of customers to provide infor-
mation or carry out transactions on behalf of the customer. In this case the network that the employee
is using is an intranet.
5.1.4 Understand what transfer rate means. Understand how it is measured: bits per
second (bps), kilobits per second (kbps), megabits per second (mbps), gigabits
per second (gbps)
The data transfer rate (or connection speed) is measured in bps (abbreviation of “Bits Per Second”) and
its multiples
l Kbps which has one thousand bps;
l Mbps which has approximately a million bps;
l Gbps which has approximately a billion bps.
You can also write these three bps multiples like this: kbit/s, mbit/s, gbit/s.
The bps and its multiples can be compared to miles per hour travelled by car, also because this serves
as a reminder that the speed of communication depends not only on the modem (the car), but also on the
telephone line (the road which can be narrow or wide, free or busy); for this reason the transfer speed is
sometimes called bandwidth.
More efficient connection systems are made using the optical fibres, which consent downloading speeds
up to hundreds of mbps. An optical fibre line is made of hundreds of glass strands and the signal is
transmitted with a light beam. The main benefits consist in the overcoming of problems related to the
resistance that a metal has during the electric current passage: In fact, inside the optical fibre cables the
signal does not meet any resistance because it is a light beam. The disadvantages of this technology are
the higher cost and fragility of the optical fibres compared to the traditional metal cables (principally in
brass). Optical fibres cables are principally present inside big cities, due to their high installation costs (the
so-called “wiring”).
To connect to the Internet in places without phone a line or if you are not at home it is possible to use a
mobile phone. Depending on the technology used, the internet connection speed can reach 2 Mbit/s with
the 3G systems (“G” stands for “Generation”), up to 10 Mbit/s with 4G systems and even more with 5G
technologies. These stated speeds are never reached in reality, this is also the case for connections via
normal phone lines.
In some cases, special cables, installed by professionals, are used to give users extremely high connection
speeds.
The spread of laptops and then tablets has occurred in parallel with the spread of WLAN. Typically they
are used in individual homes, but there are also wireless networks in public places such as universities,
hotels, shops, etc. The speed of this type of connection is generally equal to 54 or 108 Mbit/s.
For the most isolated places, which are not reached by either ADSL or optical fibres, satellite connections
offer another alternative. In fact, it is possible to connect computers (and
therefore also to connect to the internet) using satellites, through normal
parabolic antenna that receive signals transmitted by satellites in orbit
around the planet. The major limitation of this technology is that it only
offers a fast connection for computers receiving data; if a computer has
to transmit information, it still needs to use a traditional telephone line.
There is one type of satellite connection that allows both transmission and
reception, however it is very expensive, therefore it is not appropriate for
the average user.
Finally, there is another wireless connection, WiMax, that allows broadband connections in areas in which
telephone operators do not find it worthwhile to create new optical fibre networks, for example in less
populated areas and in the mountains. The transmission rate is around 10-20 Mbps, although it can
theoretically reach 100 Mbps, transmitted up to 100 km away. While normal wi-fi transmitters cover an area
of a few tens of meters, the signals sent by Wi-Max repeaters can reach tens of kilometres.
5.2.2 Define the term Internet Service Provider (ISP). Identify important considerations
when selecting an internet subscription option like: upload speed, download
speed and quota, cost
An Internet Service Provider or ISP is a company that allows internet connections through a subscription.
It is to one of their computers (called servers, that are permanently connected to the Internet), that our
computers, tablets, smartphones or other devices connect to through the modem in order to go online.
Since the spread of the Internet has multiplied the number of subscription packages on offer, it is necessary
to know how to evaluate the different costs in relation to the services offered. In addition to connecting
to the internet, ISPs also offer users one or more email accounts, web spaces to publish a personal
website, and other services connected to the Internet such as inclusion of your web page in their search
engines, etc. The two basic factors to consider when choosing an Internet subscription are the speed of
the connection and any limitation on the amount of data that can be downloaded.
With Windows, for example, after you have clicked on the icon the window Network & Internet settings will
open with a list of the available connections (see next fig.).
For some networks, called protect or secured, you need a password to connect to them. There are also
open networks which allow anyone to connect, but it is worth remembering that the other users could be
able to capture your personal information while you are connected.
If it is a protect network, you will be asked for a password (see next fig.). With more recent routers it is also
possible to connect by pressing a button on the device, which is usually labelled “WPS”.
6.1.1 Recognise good password policies like: create with adequate length, adequate
character mix, do not share, change regularly
There are applications that are able to decrypt passwords. To reduce this risk, it is prudent to avoid using
passwords that correspond to:
l Personal data (own or family name or date of birth, phone numbers, license plate of car, etc.);
l Predictable sequences (such as “123456”, “000000”, “password”, “qwerty”, “hello”, etc.).
l Commonly used words (“butterfly”, “secret”, etc.).
It is best to use at least eight characters and both lower- and upper-case letters for a password, as well
as numbers and possibly symbols (e.g. “M@rio673” or “3nr1c0*!”, etc.). Another good habit is to change
passwords periodically. Finally, it goes without saying that it is not recommended tell a password to anyone!
Also remember it well, and avoid writing it down somewhere obvious, like on the back of a mouse pad or
on a piece of paper attached to the screen!
Some applications and sites allow people to store their password so that it is automatically inserted on
the next use. However, this option should only be chosen if you are sure that you are the only person that
uses your computer.
Another good habit is to change passwords every three months, for example depending on the seasons,
and it is especially important not to use the same password for all the services you need to access.
CE-66
©2020 AICA & Edizioni Manna
ICDL MODULE COMPUTER ESSENTIALS SECTION CE-67
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING
You must not to communicate your password to friends, parents, administrators or other people because
you would risk that they then tell it to other people. If it is absolutely essential to communicate your
password to someone else, remember to change it soon after.
Finally, be sure that no one is looking at you when you write a password. Experts have been known to find
passwords with little cameras.
Of course, if you do not connect to the malware producers’ site, the operating system or the application
will not encounter the new malware, avoiding getting it on your computer or electronic device. However if
you wish to keep using your device as normal, the best, and easiest, thing to do is leave the system to
automatically install updates while the device is connected to the Internet, without disturbing you
while you are using the device.
6.2 MALWARE
6.2.1 Understand the term malware. Identify different types of malware like: virus, worm,
Trojan, spyware
Not so many years ago, when newspapers and the media talked about computer viruses, people thought
of new diseases that are able to harm humans too. Today, the situation is different, and almost everybody
knows that a cyber-virus consists of a small program created to do damage to a computer and to spread
inside it.
Over the years, other malicious software have appeared and today we talk about malware (“MALicious
softWARE”) as a general term for any type of software able to take information or create damages. This
includes not only viruses, but worms, Trojans, spywares, and more.
Worms spread primarily via e-mail. In fact, when a device has been infected by a worm, it begins to send
e-mails automatically to all the contacts in the address book whenever the device is connected to the
internet, without the user noticing.
A copy of the worm is attached to each of these messages. If the person who receives that message
opens the attachment, which is likely given that they will recognise the sender, their own device will also be
infected. Through this continuous multiplication, the malware occupies more and more space in the device
memory, slowing down performance.
Trojans or Trojan horses are so-called because their strategy resembles that used in the Greek legend
by Ulysses to penetrate the city of Troy by hiding in a huge wooden horse.
Trojans penetrate a computer hidden in other programs and begin
to gather confidential information about the user (e.g. user ID,
passwords and other codes such as those of credit cards used to
make purchases via the internet) and then send this information
to Hackers (the people that create malware) while the computer is
connected to the Internet.
Some trojans allow the hacker to check the device where the malware
is installed via the internet. They can view the entire contents of the
user´s device, and copy, modify or delete information. In some cases, the attacker can even control what
happens in the house of the owner of the computer if a microphone or a webcam is connected and turned
on. Of course, this in only possible when the device is connected to a network.
Less dangerous is so-called spyware, which consists of files that, while you are online. secretly transmit
data concerning you (e.g. the type of web sites you have visited) to external computers, which process
this data and send advertising messages according to your habits and preferences. For example, if you
frequently visit sites about the world of cars, when you connect to other sites you will see advertising
messages appear for the purposes of selling cars or products related to them.
“Hybrid” versions of malware are also frequent: for example there are some trojans that install a program
on the computers of the unfortunate “victims” which then stores all characters typed on the keyboard and
transmits them, as long as there is a continuous connection to the Internet, to the hacker who sent the
malware.
The damage caused by malware can be of varied: theft and transmission of data stored on the device,
the appearance of undesired images, error messages, slow operation, failure of certain apps, etc. Often,
without a specific antivirus program, it is difficult to understand if the damage is caused by malware or a
problem caused by a software or hardware malfunctioning.
In some cases, the only way to use the device again is to delete (to format) the entire contents of the
internal memory and reinstall all the apps and documents by copying them external backup. This can
represent a serious problem for those who don’t habitually backup their data.
Pen drives are widely used to transfer text files or other documents from one computer to another. If
you transfer files from one computer to another frequently, the likelihood that malware from an infected
computer contaminates yours or another computer is increased. CDs and DVDs can also produce an
infection, infected files burned and then copied from one computer to another can cause the same result,
as can software of uncertain origin. Other external memory units (e.g. external hard drives) and documents
that have been stored for a long time can be the cause of a contamination if they have been previously
infected.
Today there is a greater risk of infection due to the widespread use of the internet, and networks in general,
transferring large volumes of information with increasing speed. Browsing the internet from one site to
another, you download several megabytes of information onto your computer and the greater the amount
of data, the greater is the risk.
At present, however, the most common source of malware infection is e-mail, in particular attachments.
Often, without our knowledge, malware will send infected messages to all names associated with our email
addresses (e.g. Windows Mail or Outlook).
The first thing that you can do to prevent this is not to open messages from unknown senders or messages
without subjects. In particular, it is important not to open any attachments with the extensions .exe, .com,
.bat, .vbs, .scr or .pif; and not to click on any links in these messages. However, this precaution only serves
to limit the damage. One solution may be to check mail directly on the website of the email provider and
to delete (including from the Recycle Bin) suspicious messages. However, without a good antivirus that is
constantly updated, the probability that your PC could be attacked by malware is still very high.
Pay attention to lighting. Ideally have a window to your side without the sunlight directly falling on the
screen. Windows should have curtains or blinds to avoid glare. Angling the display also reduces glare, if
you can see your reflection in the display then the lighting is not correct.
Adjust the brightness and contrast of the screen so that the text and the images are easy to see; however,
do not to have them at their maximum as this can damage the eyes and wears out the screen. To reduce
glare, it is generally preferable to choose light backgrounds and dark characters. The screen should be
frequently cleaned as it attracts dust, which in the long run makes it hard to see, as well as meaning that
fingerprints can mark the screen.
The chair you use should be height adjustable and preferably equipped with armrests to support the
elbows too. Your back should not be held up straight but not stiff. The spine should always be supported
and the back of the seat should be just below the shoulders. A footrest can be useful to prevent those who
have short legs from sitting too far forward on the chair so they can touch the ground with their feet. It is not
essential that the chair can swivel, but if it can, you should avoid twisting your back to answer the phone
or to pick up an object that is not in front of you. While using a computer or another device, try not to cross
your legs, because this causes an unnatural twisting of your spine.
The keyboard of a desktop computer should be at the same level as the elbows. It is best to raise up
the retractable stands that are generally found on the bottom of most keyboards. When you type on the
keyboard, your arms should hang softly from the shoulders with your forearms parallel to the floor. It is not
necessary to rest your wrists while typing, but some people find it comfortable to use a palm rest. You can
purchase latex palm rests that are cheap and functional.
The mouse should be close to the keyboard and at the same height, to avoid having to stretch your arm
too much in order to use it.
Finally, it is important to remember that for using computers in the workplace, there are clear safety
standards that oblige employers to ensure the health of their employees. For example, this includes the use
of good quality computer equipment, a maximum number of hours that can be spent in front of a computer,
controlling the brightness and ventilation in the working environment, respecting the rules concerning
posture and distance from the monitor, and regular eye examinations, which must be free for employees.
Unfortunately, too many companies - especially smaller ones - do not respect these rules.
6.3.2 Recognise computer and device energy saving practices: turning off, adjusting
automatic shutdown, backlight, sleep mode settings
When computer work is interrupted for a few minutes, it is advisable to put the PC into sleep mode. This
puts the computer into a state comparable to that of a TV when it is turned off via the remote control, and
allows you to quickly resume the job at the appropriate time by pressing the power button. Hibernation
is different from sleep; while the computer stays turned on when it is in sleep mode, in hibernation the
computer stores the state in which the computer is and restores it when the computer is turned on again.
This allows you to continue your work on the computer exactly from where you left it, all without having
consumed unnecessary electricity. Computers can be set to automatically turn off the screen, go into sleep
or hibernation mode, or be completely shut down after a certain time interval of inactivity. This not only
protects the environment but is economical too. In battery powered mobile devices, such as notebooks,
tablets and smartphones, energy conservation is crucial for increasing battery duration, and therefore
the usefulness of the device. For notebooks the same method as described for computers can also be
applied. In tablets and smartphones, which generally are always or almost always left switched on, it is
necessary to adjust the screen brightness (preferably setting it to automatically adjust to the brightness of
the environment) and setting the screen to shut off after a short period of inactivity, preferably 30 seconds
or a minute.
6.3.3 Recognise that computers, devices, batteries, printer cartridges and paper should
be recycled
The spread of electronic devices means it is essential to know the basic rules for using them correctly, not
only for the preservation of our health but also for the environment. The intelligent use of electronic devices
contributes, in fact, to reducing pollution and energy consumption.
For example, you should use both sides of the paper when printing. You can change both the cartridges
of ink jet printers and the toner cartridges used in laser printers when they run out; although in the latter
case to prevent damage to the printer it may be best to rely on a professional rather than to do it yourself.
Before printing a document, it is also good to ask yourself whether printing it is really necessary, or if
keeping just the electronic version is sufficient, especially if you plan to change it later.
When you want to throw away a computer, electronic device, or their rechargeable batteries because
they are no longer functioning or repairable, it is important to follow the recycling rules of the area you live
in. There are companies that specialize in the disposal of electronic goods and others that try to restore
devices so they can be given to charities or to recover certain materials for recycling.
6.3.4 Identify some options available for enhancing accessibility like: voice recognition
software, screen reader, screen magnifier, on-screen keyboard, high contrast
To facilitate the use of computers for people who have physical limitations (the disabled, the aged, etc.),
there are a number of types of software available that improve accessibility.
With the help of voice recognition software, the computer, tablet or smartphone microphone can be used
to issue commands to the device or to dictate texts that the device writes on the screen, without the need
to use the keyboard. Although the computer can sometimes make errors in interpreting the words spoken
into the microphone, this software is becoming increasingly widespread and are now integrated into some
common applications, such as the Google search engine.
Screen readers read the text shown on the screen out loud; this is not only essential for people with visual
problems but is also useful to all who may want to listen to the contents of the screen instead of reading it.
The latest operating systems already include programs that promote accessibility. You can find them,
for example, in Windows 7 (in the subfolder Ease of Access located in Accessories) and Windows 8 (in
Windows Ease of Access, which you can access by choosing All apps):
l Vocal assistant: This reads the text displayed on the screen;
l Ease of Access Center: This configures the accessibility programs allowing the computer to be
adapted to the user’s needs. It also allows the user to select the function high contrast that increases
the contrast of colours of texts and images to make them more visible;
l Screen magnifier: This magnifies the part of the screen where the mouse cursor is positioned, benefiting
people with visual problems;
l Windows Speech Recognition: This allows the users to give voice commands and dictate text.
l On-Screen Keyboard: This allows the user to type something without using the traditional keyboard
but by clicking on keys that appear on the screen. This application is useful to people who, because of
a disability, cannot press buttons but can use pointing devices such as a mouse or touchscreen.