0% found this document useful (0 votes)
70 views

Computer Essentials - English version

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views

Computer Essentials - English version

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 74

ICDL

COMPUTER
ESSENTIALS
English Version

ICDL DIGITAL STUDENT


ICDL – Computer Essentials
ICDL Programme: ICDL Digital Student

ICDL - International Certification of Digital Literacy - is the new name for the ECDL programme, reflecting
the global nature of digital skills, the rapid evolution of technology and, especially, reaffirms the program’s
international value and our work to improve its quality. Through this program, AICA highlights its “cultural
mission” as a non-profit association that has accompanied the Italian ICT story since its origins.
ICDL Digital Student is a set of modules designed for those who begin to develop their digital skills; it is a
proposal dedicated to the educational context to promote the conscious use of digital technologies.
The ICDL Computer Essentials Manual is oriented to the acquisition of basic computer concepts on hardware,
software, networks and data security, and to the development of basic skills for the use of personal computers,
such as creating and managing files and folders, and allows you to prepare for the achievement of the “ECDL / ICDL
Computer Essentials - Basic Concepts for Using Personal Computer” certification.
Although this manual introduces concepts that are independent of a particular operating system, practical
examples refer to the Microsoft Windows proprietary environment.
For the manual relating to open source platforms see the Social Library area of the AICA Digital Academy in
which there are “Open source resources” available; teaching materials in digital form released with licenses
that allow their reuse, modification and distribution.

Author: Mario R. Storchi

Translation: Camilla Manna, Stefan Kostrzewki, Enrico M. Storchi

Copyright © 2020 AICA – Associazione Italiana per l’Informatica e il Calcolo Automatico & Edizioni Manna s.r.l.

www.aicanet.it, www.icdl.it, www.aicadigitalacademy.it

CE-1
Table of Contents

Preface............................................................................................... 5
1 Computers and Devices.................................................................. 7
1.1 ICT...........................................................................................................................7
1.1.1 Define the term Information and Communication Technology (ICT)................................................ 7
1.1.2 Identify different types of ICT services/uses like: Internet services, mobile technology,
office productivity applications.......................................................................................................... 7
1.2 Hardware................................................................................................................8
1.2.1 Define the term hardware. Identify the main types of computers like: desktops, laptops, tablets.
Identify the main types of devices like: smartphones, media players, digital cameras.................... 8
1.2.2 Define the terms processor, Random Access Memory (RAM), storage. Understand their
impact on performance when using computers and devices........................................................... 8
1.2.3 Identify the main types of integrated and external equipment like: printers, screens, scanners,
keyboards, mouse/trackpad, webcam, speakers, microphone, docking station.............................. 9
1.2.4 Identify common input/output ports like: USB, HDMI..................................................................... 15
1.3 Software and Licensing.......................................................................................16
1.3.1 Define the term software and distinguish between the main types of software like: operating
systems, applications. Know that software can be installed locally or available online.................. 16
1.3.2 Define the term operating system and identify some common operating systems for
computers and devices.................................................................................................................. 16
1.3.3 Identify common examples of applications like: office productivity, communications,
social networking, media, design, mobile applications................................................................... 17
1.4 Start Up, Shut Down.............................................................................................20
1.4.1 Start a computer and log on securely using a user name and password....................................... 20
1.4.2 Log off, shut down, restart a computer using an appropriate routine............................................. 22

2 Desktop, Icons, Settings.............................................................. 23


2.1 Desktop and Icons................................................................................................23
2.1.1 Outline the purpose of the desktop and the task bar...................................................................... 23
2.1.2 Identify common icons like those representing: files, folders, applications, printers, drives,
shortcuts/aliases, recycle bin/wastebasket/trash........................................................................... 24
2.1.3 Select and move icons................................................................................................................... 25
2.1.4 Create, rename, move, delete a shortcut/alias............................................................................... 25
2.2 Using Windows.....................................................................................................26
2.2.1 Identify the different parts of a window: title bar, menu bar, toolbar, ribbon, status bar,
scroll bar......................................................................................................................................... 26
2.2.2 Open, collapse, expand, restore down, maximise, resize, move, close a window......................... 27
2.2.3 Switch between open window........................................................................................................ 28
2.3 Tools and Settings................................................................................................29
2.3.1 Use available help functions........................................................................................................... 30
2.3.2 View the computer’s basic system information: operating system name and version
number, installed RAM................................................................................................................... 31
2.3.3 Change desktop configuration settings: date and time, volume settings, background, resolution......... 31

CE-2
ICDL MODULE COMPUTER ESSENTIALS TABLE OF CONTENTS CE-3

2.3.4 Change, add, remove keyboard language. Change default language........................................... 34


2.3.5 Shut down a non-responding application....................................................................................... 35
2.3.6 Install, uninstall an application........................................................................................................ 36
2.3.7 Connect a device (USB flash drive, digital camera, media player) to a computer. Disconnect
a device using an appropriate routine............................................................................................ 37
2.3.8 Capture a full screen, active window.............................................................................................. 38

3 Outputs......................................................................................... 39
3.1 Working with Text................................................................................................39
3.1.1 Open, close a word processing application. Open, close files....................................................... 39
3.1.2 Enter text into a document............................................................................................................. 40
3.1.3 Copy, move text within a document, between open documents. Paste a screen capture
into a document.............................................................................................................................. 41
3.1.4 Save and name a document.......................................................................................................... 42
3.2 Printing.................................................................................................................42
3.2.1 Install, uninstall a printer. Print a test page..................................................................................... 42
3.2.2 Set the default printer from an installed printer list......................................................................... 44
3.2.3 Print a document from a word processing application.................................................................... 44
3.2.4 View, pause, restart, cancel a print job........................................................................................... 44

4 File Management.......................................................................... 45
4.1 Introducing Files and Folders..............................................................................45
4.1.1 Understand how an operating system organises drives, folders, files in a hierarchical structure.
Navigate between drives, folders, sub-folders, files....................................................................... 45
4.1.2 Display file, folder properties like: name, size, location.................................................................. 46
4.1.3 Change view to display files and folders like: tiles, icons, list, details............................................ 47
4.1.4 Identify common file types like: word processing, spreadsheet, presentation, portable
document format (pdf), image, audio, video, compressed, executable files.................................. 47
4.1.5 Open a file, folder, drive................................................................................................................. 49
4.1.6 Recognise good practice in folder, file naming: use meaningful names for folders and files
to help with searching and organisation......................................................................................... 49
4.1.7 Create a folder................................................................................................................................ 49
4.1.8 Rename a file, folder...................................................................................................................... 50
4.1.9 Search for files by properties: all or part of file name using wildcards if necessary,
content, date modified.................................................................................................................... 50
4.1.10 View list of recently used files........................................................................................................ 52
4.2 Organising Files and Folders...............................................................................52
4.2.1 Select individual, adjacent, non-adjacent files, folders................................................................... 52
4.2.2 Sort files in ascending, descending order by name, size, type, date modified............................... 53
4.2.3 Copy, move files, folders between folders, drives.......................................................................... 54
4.2.4 Delete files, folders to the recycle bin/wastebasket/trash and restore to original location............. 54
4.2.5 Empty the recycle bin/wastebasket/trash....................................................................................... 55
4.3 Storage and Compression....................................................................................56
4.3.1 Identify the main types of storage media like: internal hard disk, external hard disk, network drive,
CD, DVD, Blu-ray Disc, USB flash drive, memory card, online file storage................................... 56
CE-4 TABLE OF CONTENTS ICDL MODULE COMPUTER ESSENTIALS

4.3.2 Identify file size, folder size, storage capacity measurements like: KB, MB, GB, TB..................... 57
4.3.3 View available space on a storage device..................................................................................... 57
4.3.4 Understand the purpose of file, folder compression....................................................................... 58
4.3.5 Compress files, folders................................................................................................................... 58
4.3.6 Extract compressed files, folders to a location on a drive.............................................................. 58

5 Networks....................................................................................... 59
5.1 Network Concepts................................................................................................59
5.1.1 Define the term network. Outline the purpose of a network: to share, access data and
devices securely............................................................................................................................. 59
5.1.2 Define the term Internet. Identify some of its main uses like: World Wide Web (WWW), VoIP,
e-mail, IM........................................................................................................................................ 59
5.1.3 Define the terms intranet, virtual private network (VPN) and identify their main uses................... 61
5.1.4 Understand what transfer rate means. Understand how it is measured: bits per second (bps),
kilobits per second (kbps), megabits per second (mbps), gigabits per second (gbps)................... 62
5.1.5 Understand the concepts of downloading from, uploading to a network........................................ 62
5.2 Network Access...................................................................................................62
5.2.1 Identify the different options for connecting to the Internet like: phone line, mobile phone,
cable, wi-fi, wi-max, satellite........................................................................................................... 62
5.2.2 Define the term Internet Service Provider (ISP). Identify important considerations when
selecting an internet subscription option like: upload speed, download speed and quota, cost.... 63
5.2.3 Recognise the status of a wireless network: protected/secure, open............................................ 64
5.2.4 Connect to a wireless network....................................................................................................... 65

6 Security and Well-Being................................................................ 66


6.1 Protecting Data and Devices...............................................................................66
6.1.1 Recognise good password policies like: create with adequate length, adequate character
mix, do not share, change regularly............................................................................................... 66
6.1.2 Define the term firewall and outline its purpose............................................................................. 67
6.1.3 Understand the purpose of regularly backing up data to a remote location................................... 67
6.1.4 Recognise the importance of regularly updating software like: anti-virus, application,
operating system software............................................................................................................. 67
6.2 Malware................................................................................................................68
6.2.1 Understand the term malware. Identify different types of malware like: virus, worm, Trojan,
spyware.......................................................................................................................................... 68
6.2.2 Be aware how malware can infect a computer or device............................................................... 69
6.2.3 Use anti-virus software to scan a computer................................................................................... 70
6.3 Health and Green IT.............................................................................................70
6.3.1 Recognise ways to help ensure a user’s well-being while using a computer or device like:
take regular breaks, ensure appropriate lighting and posture........................................................ 70
6.3.2 Recognise computer and device energy saving practices: turning off, adjusting automatic
shutdown, backlight, sleep mode settings...................................................................................... 72
6.3.3 Recognise that computers, devices, batteries, printer cartridges and paper should be recycled.......... 72
6.3.4 Identify some options available for enhancing accessibility like: voice recognition software,
screen reader, screen magnifier, on-screen keyboard, high contrast............................................. 72
Preface

Digital skills are necessary for your personal and professional life. ICDL has created a certification program
approved all around the world, structured according to the interests and needs of students, workers and
members of the public in general, who want to use digital tools and their applications in a conscious and
appropriate way.
This manual refers to the ICDL Digital Student area, characterized by a set of modules intended for
school-aged students, particularly those in elementary and middle school. In particular, the ICDL Computer
Essentials manual will guide you in the understanding of the main concepts about hardware, software,
security data networks, how to create and manage files and folders, as explained in the ICDL Computer
Essentials syllabus.
The term Computer Essentials refers to the basic skills required to use a personal computer and to know
the features present in the most common operating systems.
In particular, through this module students will achieve sufficient knowledge to navigate the Microsoft
Windows platform and to use its basic functions to manage directories and files [www.microsoft.com/
it-it/windows]. Notice that although this module is based on Microsoft Windows 10, the same concepts
are present in other versions of Windows (Windows 8, Windows 7, Windows Vista, Windows XP, …), the
operating systems of the UNIX family [opengroup.org/unix], the Linux family [www.linuxfoundation.org],
operating systems such as Unix-Like [www.unixportal.net/sistemi-unix-like], Mac OS [www.apple.com/it/
macos] and the operating system Ubuntu [www.ubuntu-it.org].
The majority of these platforms have similar features and it is pretty easy to use a program in any one of
the systems.
The Digital Agenda for Europe defines digital skills and literacy development as one of its main pillars and
promotes the implementation of long-term strategies for the growth of electronic skills and digital literacy.
Italy has a national strategy, in alignment with the scoreboard of the Digital Agenda for Europe.
ICT provides a series of tools necessary to fully take advantage of the opportunities offered by a digital
society. As a result, it is very important to have skills on Computer Essentials.

Successful candidates will be able to:


l Understand key concepts relating to ICT, computers, devices and software.
l Start up and shut down a computer.
l Work effectively on the computer desktop using icons, windows.
l Adjust the main operating system settings and use built-in help features.
l Create a simple document and print an output.
l Know about the main concepts of file management and be able to efficiently organise files and folders.
l Understand key storage concepts and use utility software to compress and extract large files.

CE-5
CE-6 PREFACE ICDL MODULE COMPUTER ESSENTIALS

l Understand network concepts and connection options, and be able to connect to a network.
l Understand the importance of protecting data and devices from malware and of backing up data.
l Recognise considerations relating to green IT, accessibility and user health.

The “AICA Digital Academy” Staff

©2020 AICA & Edizioni Manna


1 Computers and Devices
1.1 ICT
1.1.1 Define the term Information and Communication Technology (ICT)
The everyday use of smartphones, computers, tablets or other electronic devices allows you to perform
actions that are only possible thanks to information technology. Even other numerous actions you do
without using electronic devices are facilitated by information technology: for example, when a barcode
communicates to the cashier what you have purchased, its price and any promotions; when you ask for a
certificate from your district, school or other authority; when you buy a product with a credit card; when you
withdraw money from an ATM; when you make a travel booking, and thousands of other cases.
All these actions are part of Information and Communications Technology which is the science of
using computers, other electronic devices and their technologies to store, process and transmit
information.

1.1.2 Identify different types of ICT services/uses like: Internet services, mobile technology,
office productivity applications
The services and applications of ICT are numerous. Among them, there are many based on the
Internet;
l E-commerce (“e” stands for “electronic”) is the buying and selling of goods and services via the internet,
it is now possible to purchase almost every kind of product or service online (for example insurances);
l E-banking enables bank customers to do numerous operations via the internet, without having to
physically go into a bank;
l E-government consists of services that the public administration offers to citizens via the internet, for
example: requests for certificates or the sending of tax returns;
l E-learning is a term for learning techniques based on the use of electronic equipment or the internet.
New technologies have increased the possibility for creativity and interactivity between students. This
can be particularly useful for some disciplines where utilising tools, such as simulations, can improve
students’ understanding;
l Smart working can be available for all occupations in which the output can be sent in digital form. This
offers the possibility for people to work from home in situations where people have limited mobility: in
health or weather emergencies; people who have a handicap or who have children to take care of, etc.
In recent years, the spread of smartphones and tablets, digitalisation of telephones and the use of wireless
data transmission has enabled the use of ICT services and applications based on mobile technologies that
are almost akin to PC’s. It is possible to use the Internet everywhere – on the street, on the train or in the
car – to check e-mails, use GPS etc.
Additionally, there are also office productivity applications linked to ICT that facilitate the creation,
storage and exchange of documents, the sending of mail, and the updating of activities and calendars.

CE-7
©2020 AICA & Edizioni Manna
CE-8 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

1.2 HARDWARE
1.2.1 Define the term hardware. Identify the main types of computers like: desktops,
laptops, tablets. Identify the main types of devices like: smartphones, media
players, digital cameras
The term hardware describes the physical parts of computers and electronic devices generally, e.g.:
circuit boards, keyboard, screen etc. Sometimes the term hardware is also used also other devices linked
to a computer: printer, scanner, etc.
Computers used in homes, schools, and offices are called personal computer or, in short form, PC’s.
There are several types:
l Until around 10 years ago desktop computers were the most commonly used type of computer. These
are composed of a case containing the electronic components of the computer, to which the monitor,
keyboard and speakers are linked.
l Laptop computers, also called portable or notebook computers, spread successively and are a
single device containing all the electronic components, keyboard and screen. They weight, generally,
between one or two kilos and have a similar performance to desktop computers.
l Lighter still are tablets, which allow you to use apps and to operate the device simply by touching the
screen.
Smartphones are cell phones that allow you to connect to the internet and to use numerous app; these
also typically have touchscreens.
Multimedia players are electronic devices that are able to save and reproduce a large number of songs,
and often photos and videos too, with an extremely reduced size and weight compared to carrying CDs
or DVDs.
Another common device is the digital camera, which acquires and saves pictures to a memory card, from
which you can save, modify and share them via Internet.

1.2.2 Define the terms processor, Random Access Memory (RAM), storage. Understand
their impact on performance when using computers and devices
The processor is a fundamental component of computers and of electronic devices generally. It
enables the execution of calculations and controls how apps function. It is made of silicon (a particularly
suitable material for electronic circuits) and is the size of one or two square centimetres. On it there
are diodes, circuits and millions of transistors. It is also called the CPU (“Central Processing Unit”) or
microprocessor.
The processor speed is one of the main, but not the only, elements used to evaluate the power of a
computer or a device. It is calculated using a kind of internal clock, which emits a regular signal, a kind of
beat.
The frequency of the clock is measured in hertz (Hz.). Hertz correspond to a beats per second, so, a
hypothetical computer working to the speed of one hertz would be able to do just a single elementary
operation (e.g. an addition) per second.
Modern PC’s and electronic devices emit millions of beats per second, indicated by the term Megahertz
(MHz), or more often billions of beats per second, indicated by the term Gigahertz (GHz) and are able to
perform millions or billions of elementary operations per second.
The term “memory” of a computer refers to a device able to save the data necessary for the computer
(or other electronic device) and the applications present in it to function.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-9
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

There are two kinds of memory:


l RAM that the computer uses when it processes data;
l Mass storage, which is used to permanently save large quantities of data.

The RAM (acronym of “Random Access Memory”) is the hardware used to temporarily save data during
operation, for example: app instructions and documents you are working on. This data is deleted when
the computer is switched off and for that reason is called “volatile memory”. RAM size is measured in
Megabytes and Gigabytes. The latest generation of computers generally have 4, 8 or 16 Gigabytes of
RAM, while it is lower in other devices such as tablets or smartphones.
The term mass storage refers to the devices that can be used to save data (documents, applications,
pictures, sounds, other kinds of files) until the user decides to delete them. The main types of mass storage
are hard disks, pen-drives, memory cards, CDs and DVDs.
The size of the RAM and the mass storage also affect the performance of a computer or device.
Generally, the larger the RAM and mass storage, the faster the performance.

1.2.3 Identify the main types of integrated and external equipment like: printers, screens,
scanners, keyboards, mouse/trackpad, webcam, speakers, microphone, docking
station
In essence, a computer can be defined as a device that:
1. Receives data (input).
2. Processes the received data;
3. Communicates the result of the processing (output).
For example:
1. Type into a computer connected to the Internet a word or a phrase to perform a search (input);
2. The computer does the search (processing);
3. The result is shown on the desktop (output).
Thus, a computer or a similar electronic device (e.g. a tablet) receives data from input peripherals,
processes them and provides new data through the output peripherals. Let us examine the most
important of these peripherals (external equipment), which may be integrated in our computer or device,
or connected to them by cables or wirelessly.
Printer – This allows people to print texts and pictures on paper. There are two basic categories of printers:
Impact and non-impact printers. The most widespread within the first types are dot matrix printers, while
within the second type the most common are laser and inkjet printers.
Dot matrix printers use a mechanical writing head consisting of a given number of needles that strike an
inked band placed between the head and the paper. These kinds of printers are still used in some offices
but very rare inside peoples’ homes.

©2020 AICA & Edizioni Manna


CE-10 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

Inkjet printers are the best solution (taking into account quality and price) for those who print on average
a few dozen pages per month. Therefore, they are very popular. They spray microscopic jets of ink onto
the paper to produce the text or image that you want. Like dot matrix printers, the higher the number of ink
jets, the better the quality of the print. Inkjet printers are almost all capable of printing colours. The cheaper
models use two cartridges, one containing three basic colours (cyan, magenta and yellow) in order to
obtain different colours, and another one specifically for black. This it is called “four-color process” (due to
the four colours used, including the black). There are more expensive models that use more cartridges and
colours. These produce a better print quality as well as economic savings as when one colour is exhausted
you only have to change one cartridge. As a result, when shopping for an inkjet printer, it is important to
get more information about the cartridge prices and durability in addition to the cost of the printer itself.

Laser printers use a laser beam to store the words or pictures to be printed on a magnetic roller. During
its movement the roller passes over a toner (consisting of a black or coloured powder) which is thus
transferred to the paper and permanently fixed thanks to the application of heat. This is the reason why
freshly printed sheets feel warm. Laser printers have a high print quality, they are fast and have a cost
per copy that is generally lower compared to inkjet printers. However, they are more expensive. For this
reason, they are used mostly inside offices, connected via network in order to use one printer from multiple
PC’s.
The screen (also called monitor) - This is the main output peripheral of computers and devices. It is
integrated in laptops, smartphones and tablets, while it is external in desktop computers. The screen size
is measured in inches, every inch is equals to 2.54 centimetres, therefore, a 19 inch monitor has a diagonal
of 48.26 centimetres.
Similar to a mosaic which is formed by hundreds or thousands of pieces, the screen of
a computer is divided into thousands of points, each called a pixel. The
total number of visible pixels determines the resolution of
the screen. For example, a screen with a 1366x768
resolution is able to display more than one million
pixels (the product of the multiplication 1366x768).
The higher the resolution is, the smaller the images
and fonts become, which renders the image sharper.
Moreover, it makes it possible to view a larger area of
the document on which you are working.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-11
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

The traditional external monitors - which used the cathode ray tube and were therefore called CRT -
now are no longer sold. They have been replaced by liquid crystal displays or LCD. LCD monitors
are compact and aesthetically pleasing, since they are only a few centimetres thick. In addition, LED
versions are also brighter and produce less eyestrain than conventional monitors, thanks to the absence
of electromagnetic radiation.
In tablets, smartphones and other portable devices (including some types of notebook), the screen is a
touchscreen, i.e. it is sensitive to the touch. In this case, it is - at the same time - an input and output
peripheral, because it allows a person to both enter data (by typing on a virtual keyboard that appears on
the screen) and view the results. You can also get external monitors with touchscreens.
Scanner – These allow you to take information from a sheet of paper and enter it into a computer. Drawings,
pictures, photos, text pages, can all be transformed into a digital format compatible with electronic devices.
The most common scanners have a flat surface, similar to copiers, but are smaller. They light up the page
to be digitalized (that must first be placed on the scanner glass, just as in a copier) with a kind of lamp that
stores the colour reflected during the passage. Many printers have an integrated scanner.

It is possible to use the camera of smartphones and tablets to read barcodes and QR-Codes (meaning
“Quick Response Code”). Barcodes are present on many products, QR-Codes are square codes which
appear generally on books, magazines, etc. that, when viewed with the device camera, automatically open
a web page, start a video, etc.

Keyboard – This is the main piece of equipment through which a person can enter data into a desktop or
laptop by typing on the letter, number and symbol keys. There are different types of keyboards, depending
on the country: for example, the so-called “QWERTY” keyboard is commonly used worldwide, taking
its name from the first six letters that appear on the keyboard (it is usually in the third row from the top).
Standard keyboards for desktop computers usually have 104 buttons, but there are also many keyboards
with a higher number of buttons, used for example to connect to the Internet or to regulate the volume of
the speakers.

©2020 AICA & Edizioni Manna


CE-12 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

In general, each button is associated with two characters that correspond to the upper- and lower-case
letters of the alphabet. On a few keys there are two symbols: The lower one is obtained by pressing the
button, the upper by pressing the Shift button and the button at the same time. When three symbols
are represented on a button, the third symbol can be selected by pressing the button Alt Gr on certain
keyboards.
For some buttons, it is useful to know their location on the keyboard and their function:
Esc (short form of Escape): Is the first button on the top left, useful to interrupt an operation or to
undo a choice.

l The function buttons (from F1 to F12): They are useful to do numerous operations: for example, to
open, close, print a document, or start an app guide; these buttons are becoming used less and less.
 ab: Located at the left end of the keyboard and displaying two arrows: one directed
T
towards the left, the other to the right). In text processing applications (e.g. Word) it moves
the text an established amount of space to the right; in spreadsheets (such as Excel) it
moves the cursor horizontally from cell to cell. The cursor is the blinking vertical line that
allows you to pinpoint the exact place where any text you type will be entered.
 ackspace is located just above the Enter button, and is generally an arrow pointing left;
B
this deletes the previous character (i.e. what is to the left of the cursor).

l Ins (short form of “Insert”): this allows you to switch between the insert mode (by which the characters
you type appear between the existing ones) to the overwrite mode (typed characters gradually replace
the existing ones). If inadvertently pressed it is necessary to press it another time to deactivate it.
l Del (Short form of “Delete”): This deletes the following character (i.e. what is to the right of the blinking
cursor); if it is pressed after selecting a file or folder (i.e. a group of files), it deletes them.
l Enter: The enter key is usually the largest one on the keyboard. It commands the computer to execute
an order (e.g. to open or close an application, save a file, print, etc.); when it is used in word processors
(e.g. Word) it starts a new paragraph. Another Enter button, smaller in size but with the same features,
is located on the right of the numeric keypad, which will be dealt with shortly.
l Caps Lock: Often pictured as a padlock, allows you to write using only upper-case characters; general-
ly, when it is pressed, an LED is switched on.
The space bar is located at the bottom centre of the keyboard. It is a much longer button than the others
and it is used to create spaces between words. In order to type faster this button should be pressed with
the thumbs.
 he numeric keypad is located on the right end of the keyboard. It is used to enter
T
numbers quickly and perform calculations. At the top of this keypad there is the
button Numb Lock, which starts and turns off the keypad itself; when it is pressed
an LED light is generally switched on to indicate that the keypad is in use. If the
LED is turned off, certain keys on the keypad will function as directional arrows to
move the cursor on the screen. The numeric keypad is usually not present in
laptops.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-13
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

l Ctrl (short form of “Control”): These are two buttons which are located at the bottom line of the keybo-
ard, they are usually pressed at the same time as other buttons to perform special functions.
l Alt (short form of “Alternate”) and Alt Gr.: Like the Ctrl keys, these are also located on the bottom line of
the keyboard and are used together with other keys for special functions. The Alt Gr button is used, for
example, to write the symbols usually placed at the bottom right of some keys (such as the “at” symbol
@ or the euro symbol €).
l Shift: these two buttons are located in the second-last row at the bottom of the keyboard (one to the left,
another one to the right) and that are generally represented with a big arrow. If one of these two buttons
is pressed simultaneously to other buttons, it allows to obtain capital letters or symbols.
l The four arrow keys are used to move the cursor; (they are used especially in videogames).

Other buttons are also used to move the cursor:


l Home (or ): This moves the cursor towards the beginning of the line in which the user is writing;
l Page Up (or Pag): This scrolls up by one page the document that is been viewed;
l Page Down (or Pag): This scrolls down by one page the document that is been viewed.

Other buttons that are rarely used:


l Scroll Lock: This allows you to scroll through the document on the screen, instead of moving the cursor.
When it is pressed an LED on the keyboard is usually switched on.
l Pause/Break: If you use Windows it generally has no effect; when computers worked with the DOS
operating system (see ref. 1.3.2) this key was used to stop the scrolling of a text on the screen.
l Print: This is used to copy what is on the screen to the Windows Clipboard, and then to copy this again
into other applications. When people used to work with DOS, the button allowed them to print everything
that was displayed on the screen.
In standard keyboards there are also two buttons dedicated to Windows.
l The first of them - usually called the Start key - is generally located in the lower left corner, between the
Ctrl and Alt buttons. It has the Windows logo and is used to activate the Start menu (i.e. the window
that appears by clicking on the Start button, which is in the lower left side of the screen). If it is pressed
simultaneously with other buttons it can activate certain commands; if pressed simultaneously with D,
it minimises all windows into icons and goes to the desktop.

l The second one (which is usually located between the Ctrl and Alt Gr buttons and depicts a sheet with
a small arrow) activates the so-called context menus or menu shortcuts, used in Windows and Office
programs. It is also called the Menu key.

©2020 AICA & Edizioni Manna


CE-14 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

Keyboard can be very different: not only for the number and type of buttons available, but also for the
sound the buttons produce when pressed and their resistance. In addition, wireless and ergonomic shaped
keyboards are very common.
In laptop keyboards, generally, the numeric keypad is not present in order to save space and some buttons
are smaller compared to PC keyboards.
Mouse - This is a kind of small box connected to the computer through a cable or wirelessly, for example
via Bluetooth. Moving the mouse over a smooth surface, the pointer (usually indicated by an arrow) is
moved on the screen; pressing one of the buttons on the mouse allows a series of commands to be issued.
More precisely, the left button is used for most common tasks, such as to select an object or to move it (by
holding the button while moving the mouse). The right button is used for more particular tasks, for example
to open a shortcut menu which will offer possibilities such as to start a selected app, to delete a file, to
change its name, etc.
“To click” is the verb used to indicate the action of pressing one of the mouse buttons (from the noise
produced by the pressing of the button: “click”). The term “double click” is used for the action of quickly
pressing the left mouse button twice. The double click is used to start applications, even if carried out on a
document associated with that application.
In the middle of many mice there is a scroll wheel which allows you to scroll up or down the contents of
a document (e.g. a web page) or a file list. Some mice have a third central button, which can be used
generally to perform some particular tasks (e.g. it can operate as double click).
Touchpad or trackpad – This is a small touch pad, usually in the form of a rectangle, present mainly on
laptops (see next fig.). This can replace the mouse and allows the cursor (i.e. the arrow that appears on
the screen) to be moved by moving your fingertip against the touchpad.

Webcam – This is a small camera connected to the computer or already integrated in it (especially in
laptops). It makes it possible, with the aid of a microphone (sometimes integrated in the webcam) and
thanks to an internet connection, to make video calls or use videoconferencing. In mobile devices such
as smartphones and tablets, there is usually a camera on the front that functions as a webcam. In order
to obtain good results in terms of image and audio quality a fast network connection is necessary as the
quantity of information required to send images and sounds is very high.
Speakers – These allow you to hear the sounds produced by the computer/device and to listen music.
They are integrated in mobile devices, while they are generally external in PCs. Modern PC audio cards
give great performance and the possibility to connect not just two speakers but whole musical systems
with five or more; this is also called Dolby Digital.
Microphone – This allows you to introduce sound into the device and then to modify it through appropriate
apps. When a computer is connected to the internet, the use of the microphone - often integrated with
headphones - allows you to communicate with other users connected to the internet. On mobile devices
it is usually integrated into the device, while in desktop computers it is external and is connected to the
appropriate input port of the sound card.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-15
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

Docking station – A platform to which you can connect a portable device such as notebook, tablet
or smartphone that allows you to recharge and connect multiple external devices (external speakers,
keyboard, mouse, desktop, printer, etc.) through a single connection port.

1.2.4 Identify common input/output ports like: USB, HDMI


To connect an external peripheral (i.e. another electronic device, such as a monitor, printer or webcam)
usually, communication cables are used which have to be inserted in special “ports” present on the device
and on the peripheral.
The most common communication port is the USB (“Universal Series Bus”), used to connect pen drives,
printers, mice, etc. It is preferred to others for many different reasons: It has a good transfer speed, it
allows you to connect devices to a computer that is already switched on, and it can also recharge some
peripherals such external hard disks, webcams, etc.
The HDMI port is even faster for data transmission (up to 10GB per second) and is used to transfer digital
audio and video signals in high definition; these are always present on modern TVs.
The Ethernet port, also called LAN, is a small rectangular connector, slightly bigger than a telephone
connector. It is usually used for high speed internet connections and to connect to a local network formed
of other computers.
The FireWire port reaches a higher data transfer speed than other ports. For this reason, it is used to
quickly acquire digital audio and video files, for example when connecting a digital camera to a PC.
The serial port permits connections at a very slow speed and as a result is used less and less. It has a
trapezoidal form and has generally 9 (or previously 25) pins. Nowadays it is generally used to connect
certain peripherals inside industrial systems and in scientific analysis.
The parallel port has a trapezoidal form and 25 small holes; it is also called LPT1 (Line Printer Terminal).
Is generally used to connect a printer or a scanner to the computer, however recent printers/scanners use
the USB port, therefore, new portable computers do not usually have this port anymore.

©2020 AICA & Edizioni Manna


CE-16 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

1.3 SOFTWARE AND LICENSING


1.3.1 Define the term software and distinguish between the main types of software like:
operating systems, applications. Know that software can be installed locally or
available online
As human beings are formed by body and mind, computer and other devices are constituted by hardware
and software. We already explained (1.2.1) that the term hardware refers to the physical parts of the
device.
The software corresponds to a series of instruction which allow the device to do particular tasks. For
example, word processing software makes a computer similar to a typewriter, a game can simulate a race
car, etc. Without the software a device cannot be used, it would be like a DVD reader without a DVD inside
it. On the other hand, the software is also useless without the hardware, it would be like attempting to build
a bridge with an engineer but without workmen and materials.
As you shall see, there are two types of software: The operative systems and the applications (apps).
When you buy a computer or a similar device, both are already present inside it. More applications can be
installed from storage media (CD, DVD, memory card, pen drive) or downloaded from the internet.
Software programs can also operate directly from the internet. In this case you can use the so-called cloud
computing, which allows you to use the hardware or software resources on the internet. For example,
you can write a document without having installed the relative word processing program on the device, or
you can also open a saved file not present on the computer. The program and the file will be downloaded
and processed thought the Internet connection.

1.3.2 Define the term operating system and identify some common operating systems
for computers and devices
The software that controls the overall function of the hardware of the computer or electronic device is called
the software system, basic software, or, more often, operating system (short form: OS). It consists of a set
of basic programs that constitute the interface, i.e. the relationship between the user and the hardware.
The operating system controls all the resources of a computer or an electronic device: processor, memories,
any readers, CD/DVD burners and so on. It also contains some utilities that are used to perform basic
operations, such as the copying of storage media.
The first operating system to be widely adopted was MS-DOS (Microsoft Disk Operating System), or
simply DOS. It was a text-based system, that is to say, after turning on the computer, it displayed a black
and empty screen with the so-called prompt, which generally consisted of a flashing white dash after the
notice C: \> (see next fig.).
There were therefore no icons displayed (small images on which we can click to launch an application or
open a file) and all commands had to be typed from a keyboard, according to precise and quite difficult
rules. There were 6 versions of MS-DOS system. After the sixth one, the system was first integrated into
and then eventually replaced by the Windows operating system.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-17
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

Many iterations of Windows have been created: 3.0, 3.1, 95, 98, NT, XP, Vista, 7, 8, and 10 are the most
successful and well-known versions.
The first Windows systems, the 3.x series (so called because numerous versions were developed, from
3.0 to 3.2) have not been used for many years now. However, they are important because they introduced
the system of icons. They were replaced by Windows 95, which introduced the so-called installation
wizard. Since then, the user has always been guided through the most complex processes in the use of
the computer.
Something very similar (and better in regard to certain aspects) had already been developed years before
by Apple with Mac OS. However, this operating system traditionally had a lower circulation than Windows,
even if Apple computers were, and still are, most used by those who work with graphics a lot (architectural
firms, graphic design studios, publishing houses, etc.) and also by the general public in certain countries
(e.g. USA).
Yet another operating system, which has an even lower rate of use is Linux; recognised as a symbol of
the idea of “free software.” In fact, its inventor, the Finn Linus Torvalds, distributed it around the world free
of charge, making sure that the basic instructions for this operating system were accessible to all. In this
way, any user could give his or her contribution to the improvement of the program. For this reason, there
are several versions of Linux. This method of free distribution of software is called “open source”. The
drawback of Linux, however, is that it is not very simple to use and, as a result, is preferred by expert users
only.
In contrast, the Android operating system has experienced a remarkable expansion. It was inspired by the
experience of Linux and, similarly, is also open source software. It was created by the American company
Google for mobile devices (Google is also the owner of the well-known search engine). The other widely
used operating system for mobile devices is iOS, used by Apple.
It is important to remember that applications written for one operating system do not work with others.
Nevertheless, different versions exist, especially for the most common applications, which are identical,
each intended for a different operating system.

1.3.3 Identify common examples of applications like: office productivity,


communications, social networking, media, design, mobile applications
In the previous paragraphs we have seen that computers and electronic devices such as tablets and
smartphones are made up of physical parts, called hardware, controlled by an operating system that
“translates” the commands given by the users into instructions that can be understood by the computer.
This allows us to control the peripherals that are connected to devices as well as the operation of software
applications - more commonly known as programs, applications or apps - which consist of a series of
Instructions that let the computer perform the activities that we want: write a text, do calculations, store
data, draw, play games, etc.
There are thousands of different applications. The most used address the most common needs for offices:
word processing, calculations, presentation of products, storage, etc. For this reason, they are called office
applications, the most famous of which is are products by Microsoft.
Many of these applications are used also outside the workplace, specific chapters
of ICDL are dedicated to them. For example, word processors allow you to write,
correct and print anything from a small text to a book with hundreds of pages. There
are many different programs of word processing, the most used is Microsoft Word
which - as with other word processors – allows you not just to write any kind of
document but to also include charts and tables. An entire ICDL chapter is dedicated
to this program.
©2020 AICA & Edizioni Manna
CE-18 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

There are also spreadsheets, which have a layout similar to the board game
“Battleship”: tables divided into boxes with grid references. In these boxes – called
cells – you can insert numbers, dates and other values to do complex calculations,
which can include mathematical, financial and commercial functions. The results
can be represented with charts and diagrams. Spreadsheets are commonly used
by professional workers that take care of office accounts, calculate estimates, etc.
The most used spreadsheet application is Excel, part of the Office suite.
Presentation apps are part of the Office suite, originally designed to create slides to
print on paper or to be projected using the computer. With the evolution of computers,
and the possibility to reproduce multimedia files, presentation software became
complete multimedia instruments; slides can now contain text, sounds, animations
and videos. The most common of these programs is Microsoft PowerPoint. An
entire ICDL chapter, Presentation, is dedicated to this topic.
In the Office suite there is typically a database that can save, order and process
a large quantity of data. Databases work like a phonebook, which reports names, phone numbers,
addresses and other information. Their usefulness lies in the fact that they can be consulted in just a few
seconds, in order to easily find and process (send, print, etc.) the data you want. Nowadays it is almost
impossible to work without databases, often they are created by external programmers for a specific
purpose. Microsoft Access is the database application present in the Office suite, but other products are
preferred for professional use. This type of applications is discussed inside the ICDL chapter Database or
Use of databases.
An application present in all computers, tablet and smartphones is the browser, which is the application
that allows you to use the Internet. The most commonly products are the ones by Microsoft: Edge and
Internet Explorer. Google Chrome and Mozilla Firefox are also very popular too.
Linked to the Internet connection is the application to send and receive messages through Internet, the
so-called e-mail: the most used applications are Mail by Windows and Google Mail or GMail. Many other
people use the e-mail service directly from their internet provider (Fastweb, Tiscali, Libero, etc.) or through
a social network.
The success of some famous social networks has brought millions of subscribers to their sites and they
have now created specific applications to use their services, such as: Facebook, Instagram and Twitter.
Browser and e-mail are widely explained in the ICDL chapter Online Essentials, while the social networks
are discussed in the chapter Online Collaboration.
Image processing applications are also very popular; these allow you to create or
modify photos, drawings and other types of images. Among the most common is Adobe
Photoshop, an ICDL chapter is dedicated to these applications: Image Editing. They are
widely used by professionals for tasks like multimedia enhancement or design work.
There are numerous applications dedicated to the multimedia editing, all intended for the modification
and creation of images, sounds, animations and videos. Many programs are designed for a public which
do not need a full range of professional tools. Some operating systems include applications able to create
or transform drawings, images, sounds, and short videos, and many of them are available for free or at a
low price. In the professional field, however, there are some programs that require expert knowledge to
fully utilise and are expensive.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-19
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

The fast spread of mobile devices able to connect to the internet has led to an increase in applications
created for smartphones, tablets and other mobile devices. There are now thousands available,
sometimes derived from programs created for computers and then adapted for mobile devices that have
smaller screens, less powerful processors, etc. You can choose and install these apps online from the so-
called app markets such as the App Store from Apple and Google Play Store dedicated to devices running
their operating system Android.
Among the most popular applications there are video games. There are thousands of them: Action games,
simulations, puzzles, etc. Some of them (especially ones designed for children) exercise the logical abilities
and have an educational purpose.

1.3.4 Define the term End-User License Agreement (EULA). Recognise that software
must be licensed before use
The use of a software is regulated by a contract with the product company that you automatically agree
to when you use the application for the first time. The technical name of this contract is EULA (“End-User
License Agreement”). The contract is generally shown on the screen once you have installed the program
and you are obligated to press the button Accept to use it.
There are very commons rules: duplication (except for a personal use), spreading, modification and the
sale of the software are forbidden, and it is only possible to install the software on one device. You can use
the software only after you have accepted this contract.

1.3.5 Outline the types of software licenses: proprietary, open source, trial version,
shareware, freeware
You can install thousands of apps via the internet onto your device which have different terms of use.
Generally, software licenses can be divided into two categories: proprietary and open source. The EULA,
shareware and the freeware are types of proprietary licenses.
Shareware applications are granted for a limited period (e.g. a week or a month) or for a limited number
of uses. Sometimes they do not have all the functions of the complete application (which you have to buy);
other times they have all the functions but they will stop working after the trial period; there are also cases
in which they do not stop working but remind you that you must buy the product. In every case, once the
trial period is over, if you do not buy the software it is illegal to keep using it.
Freeware applications are totally free. The author of this type of
software has the copyright but they allow free use of it.
Shareware and freeware applications can be freely distributed; however,
it is forbidden to resell or modify them.
Demo applications are another type of freeware application: they are demonstration versions – and limited
in their functionalities – of a commercial software, often video games. There are also so-called Adware.
Free applications that contain advertisements or collect information on the websites visited by the user to
transmit this information for a targeted advertising.
Free software also have licenses, these are called open source applications, which can be modified
to improve or adapt them to specific needs by anyone. The most famous open source software is the
operating system Linux, but numerous other applications are also distributed in free form. Principally these
have so-called GNU licenses which are part of a project born in 1984 to create non-proprietary software.

©2020 AICA & Edizioni Manna


CE-20 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

1.4 START UP, SHUT DOWN


1.4.1 Start a computer and log on securely using a user name and password
To start up a computer you must use the power button, generally identifiable by the bright colour and the
symbol on it.
After pressing the button, a small coloured light (“LED”) will light up: this indicates that the hard drive has
started to rotate and that the central processing unit is starting to read the information, and to process and
present it on the screen.
You do not have to do anything in this phase. Sometimes some white text appear in a black field (this is the
“self-diagnostic” phase), then drawings, backgrounds, sounds and other things (in this phase the computer
starts the operating system, e.g. Windows, which allows other programs to function).
After this preparation phase, the system generally shows the accounts screen in which it is necessary to
input the username and the password, to perform the so-called login procedure.
If you are the only one that uses the computer, the username will appear already selected. If more people
use the computer, the most recent account that has logged in will appear (see next fig.).

At least one of the accounts corresponds to the so-called Administrator, a person that has the necessary
permits to modify any computer setting, and to install or delete applications. For personal computers you
are generally the administrator, whereas in situations where the computer has many users (in schools,
offices, etc.) the administrator will be a different person.
In addition to the Administrator accounts there are the standard user accounts. These are created for
users that use common applications and want to protect their account with a password; they will, however,
not be able to access to the administrator folders or to modify the system settings of the computer.
A username is associated to each Administrator and Standard User account, these can correspond to the
name of the user or to their e-mail address. The username is also called ID or User.
Unlike passwords, the username has no protective purpose (when you write it, the letters will appear
visible on the desktop, in contrast, when you write a password the letters will appear as asterisk’) but is
useful to recognize the person who is accessing the system.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-21
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

In previous Windows operating systems (e.g. the 7 and the 8) the account was local, which means the
username and the password were linked only to that specific computer. Now, with Windows 10 it is
advisable to use a Microsoft account.
It consists of a username and a password which allow you to access Microsoft services and software
independently from the device you are using: desktop computer, laptop, tablet, smartphone, etc. This
means that in all these devices you will always find your customized settings and that once you have
inserted your username and password to access Windows 10 once, you can access other Microsoft
services (as Skype, OneDrive, etc.) without repeating the procedure.
If you have already used Microsoft services such as OneDrive, Outlook.com, Xbox Live, Office 365 or
Skype, you probably already have an account.
If you do not have one or you do not remember it you must create a new one. The process to create a
Microsoft account is relatively simple and free: all you need is a valid e-mail address, which will become
your username.
The Microsoft account can be created during the installation of Windows 10, by clicking on the button Sign
Up from the access page, or by connecting to the webpage signup.live.com. In both cases, you will have
to use your e-mail address as the username and to choose a password. In addition, it will be necessary
to insert some personal information. At this point, you will receive a message from Microsoft with the
instructions to complete the account configuration.
Once you have chosen the account (by clicking on the name and inserting the password and pressing the
button Enter or by clicking on the arrow near the pane to insert the password) the desktop of Windows will
appear.
In the latest Windows versions, only the Recycle Bin icon appears on the desktop. All the other icons
which allow you to explore the computer are available from the button Start, which is on the lower left and
looks like the Windows logo.
The mouse cursor will appear at the centre, represented by a white arrow which, at the start, is accompanied
by a little rotating circle that indicates the necessity to wait a few seconds while the programs load. Once
the circle has disappeared you can start to use the computer.
Clicking on Start, a vertical menu will appear (see next fig.) which list in the left-hand column (from the top
down) the current account, links to Documents and Images and the commands Settings and Shut down.
The central columns list all the programs in alphabetic order, while the right part is the “real” Start menu
dedicated to apps and with animated boxes that you can modify or move.

©2020 AICA & Edizioni Manna


CE-22 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

1.4.2 Log off, shut down, restart a computer using an appropriate routine
If more than one account is in use on the computer, it is possible to log off from the account that is
being used at that moment and log in with a different account. To do this, first click on Start, then on the
Account button. Finally, from the drop-down menu that appears (see fig.), click on Sign out. The system will
disconnect and take you back to the user accounts home screen, from which you can choose the account
you want to access the system with again.

To completely switch the computer off you can perform a shut down. Close all the apps and windows and
return to the Start button. Click first on Start, then on the power icon, and finally on Shut Down (see next
fig.). If the computer is off, the restart procedure is the same as previously explained.
If you wish to power the computer down and immediately restart it (this is sometimes required to complete
the installation of some software), follow the same procedure as Shut Down but click on Restart instead
(see next fig.).

©2020 AICA & Edizioni Manna


2 Desktop, Icons, Settings

2.1 DESKTOP AND ICONS


2.1.1 Outline the purpose of the desktop and the task bar
The desktop, as we have already said (1.4.1), is the initial screen which appears after you have turned
on a computer or an electric device and that signals to you that the operating system is ready: Windows,
Android or other (see previous fig.).
To open a file, a folder or an app from the desktop, just click twice on the icon of the corresponding link.
If you are using a device with a touchscreen, just touch the icon once to start the app.
The toolbar runs along the bottom of the desktop and allows you to “shortcut” to various menus or files.
The toolbar has four main functions:
1. It provides access to various menus through the Start button;
2. It allows you to quickly start the apps or files whose icons are present in the bar;
3. If you are simultaneously using multiple apps it displays their icons and allows you to switch from one
app to another by clicking on them;
4. To the right it shows the current time and other icons which represent applications or utilities currently
used: For example, the volume control or the quality of a wireless signal.
In the toolbar of Windows 10 there are two new buttons:
l The Task View button opens a desktop in which there are the snaps of all the open apps. This screen
allows you to open multiple “virtual desktops” by using the button New Desktop, in order to better orga-
nize the programs (see next fig.).

CE-23
©2020 AICA & Edizioni Manna
CE-24 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

l The button Notifications (near the clock) opens the Notification Center which groups the system and
app messages, has a series of buttons to control the system: regulate the bright, activate or deactivate
functions such as Wifi, Bluetooth or geolocation, adjust settings such as tablet or plane mode, etc. (see
next fig.).

2.1.2 Identify common icons like those representing: files, folders, applications,
printers, drives, shortcuts/aliases, recycle bin/wastebasket/trash
Icons can represent apps, files, folders and many other objects, such as the hard disk, the CD and
DVD reader, the printer, etc. Some icons are created by the operating system and by the apps, other can
be added by the user for a better use of the computer.
As we already said in the previous ref, if you want to “activate” what is represented by an icon, you must
put on it the cursor and click two times; if the screen is touchscreen just touch the icon once with your
finger. The result you will obtain is the same. If the icon depicts a folder (represented by a yellow icon),
therefore a “container” for other objects, a window will open where there are other icons that demonstrate
the content of that folder.
Alternatively, if the icon represents an application (e.g. Word) or a file linked to an application (e.g. a .doc
file created with Word), it will launch the software in question and you will be able to write, draw, etc.
In the latest Windows versions, the only icon on the desktop after the installation of the operating system
is the Recycle Bin. This is essentially a folder in which the files and folders that have been deleted are
collected.
By clicking first on the Start button and then on Computer, a window will open, in which different computer
storage drives are listed (hard drives, CD-RW, flash drive, external hard drives, etc.; see next fig.).

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-25
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS, OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

The subdivision of units depends from the computer you are using. In desktop computers, for example,
there may also be the icon of a Floppy disk (A:).
The letter C: identifies the hard disk, while the letter D: is generally assigned to the CD and DVD drive.
This subdivision can be different if there are two or more hard disks. In older computer sometimes a
second hard disk was installed to increase the memory; nowadays, computers generally have one hard
disk, but sometimes it is divided into sections, with a process called partition, to improve data ordering and
functionality.
It is increasingly common for an SSD (“Solid State Drive”) to be present in place of a hard disk. These use
a solid memory to save data, compared to hard disks which use rotating magnetic disks. The absence of
mechanical parts offers numerous advantages: they do not produce noise and vibrations, consume less
energy and generate less heat.
If you want to see the content of your hard disk or SSD double click on the disk (e.g. C:) and a window will
open in which you can see the content, subdivided into folders and files.
The next letter will be, generally, assigned to the CD and DVD reader, followed by other connected units
(e.g. pen drives, memory cards or external hard disks) indicated by ascending letters (E, F, etc.).
The icon which represents a printer allows you to see all the current print processes, and the properties
of the printer.
There are also links to apps or files frequently used on the desktop.

2.1.3 Select and move icons


To select an icon just click on it once: the icon will be highlighted to confirm the selection.
To move an icon (on the desktop or in a folder), click on it and hold the left mouse button down. You can
now move the mouse to drag the icon to the desired position, then release the button. This operation is
called “drag and drop”.
It is possible to use the operating system to arrange the icons in order: click with the right button of the
mouse on a point in which there are no icons; a menu will appear in which you can choose Sort by to see
a submenu with a choice of orders; by Name, Size, Item Type, Date modified (see next fig.).

If you choose View and then Auto Arrange icons, each icon on the desktop will be transposed into columns.

2.1.4 Create, rename, move, delete a shortcut/alias


If you frequently use an app, you can add it to the Start menu or to the toolbar. To create a shortcut/alias
just select it with a click and select Pin to Start.
To delete a shortcut, just click on it with the right button and choose, from the menu, the option Unpin
from Start or Unpin from tollbar. Deleting the shortcut will not delete the file linked to it.

©2020 AICA & Edizioni Manna


CE-26 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

It is also possible to create or delete shortcuts to documents or files with the same procedures: if the
file requires the use of an app (e.g. Excel to view a spreadsheet), the app will be automatically launched
and the file opened.
Once you have created the shortcut, you can move it by using the drag and drop technique: click on the
object to move it, drag it and release the button where you want to put it.
Additionally, it is possible to put a link to any file or folder onto the desktop. In Documents click with the
right mouse button on the element for which you want to create the shortcut and choose Send to/Desktop
(shortcut) from the menu.

2.2 USING WINDOWS


2.2.1 Identify the different parts of a window: title bar, menu bar, toolbar, ribbon, status
bar, scroll bar
When you open an app, a file or a folder, they are shown in a “window” where the app starts up or files
and folders displayed. The “container”, i.e. the window, is important too and is divided into multiple parts
(see next fig.).

From the top, there is the title bar, containing the folder or program name.
Beneath it, there is the menu bar, with the headings File, View, etc. By clicking on these some menu will
open, in which you will find a series of commands that allow you to perform functions such as: create new
folders, delete them, move, etc.
Beneath the menu bar there is the toolbar, which has elements that, if pressed, allow you to instruct the
system to do a particular action.
In the Office Suite apps (Word, Excel, PowerPoint, etc.), the menu and the toolbar are substituted by a
multifunction bar (see next fig.).

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-27
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

The lower border of the windows is called the status bar, because is where a series of messages about
your operations will appear there.
If the window size exceeds the size of the screen, then on the right side and/or on the lower edge, you will
see what are called sliding boxes, and two opposing arrows, the scroll bars. These mean you can slide
the content of the window itself by using the cursor on the arrows or moving the scroll box by clicking and
holding on them and then dragging.
Alternatively, you can use the so-called navigation keys (Page Up, Page Down, Home, End, etc.), or the
direction arrows to scroll through the contents of the window that is active at that moment. Many mice are
provided with a scroll wheel between the two buttons, which allows you to scroll through the contents of
the windows without having to use the vertical scroll bar.

2.2.2 Open, collapse, expand, restore down, maximise, resize, move, close a window
On the top right part of the windows there are, generally, three buttons representing a horizontal line,
a square and an X. By clicking on the line the window will be minimised to an icon; it will remain open but
not visible apart from the icon and name in the status bar.
By clicking on the X the window will be closed. Clicking on the square, the window will increase in size to
fill the screen (known as maximise) and the square will be transformed in two squares.
Clicking again on the two squares, will restore the previous window size.
To adjust the size of a window that does not occupy the whole desktop with more precision you can also
use the “border” of it. If you move the cursor over one of the window borders, the it will assume the form of
a double horizontal arrow. At that point, by holding the left mouse button, you can drag the window border
to the desired size.
Many windows have special corners that, if dragged, simultaneously modify the height and the width.
Try to put the mouse cursor on one of these four corners and you will see it assume the form of a double
oblique arrow. Drag the window with the mouse to modify its size.
If you want, you can simultaneously see all the open windows on the desktop. Click with the right mouse
button on any point on the taskbar without icons. A menu will appear (see next fig.) which allows you to
arrange all the windows horizontally (Show windows side by side) or vertically (Show window stacked), or
to overlay them (Cascade windows), or to reduce them to icons (Show Desktop).

©2020 AICA & Edizioni Manna


CE-28 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

To move a window just click in the title bar with the left mouse button and, by holding the button, move it
to a new position and then release the button.
Clicking with the right button on a folder containing other folders will open a menu from which you can
choose Expand. The same operation can be done by clicking twice on the folder. Once expanded, the
folder is represented with a tree structure, in which the indents represent the subfolders (see next fig.).

Near every closed folder there is an arrow pointed to the right , clicking on it opens the folder to show its
contents. Near the open folders there are arrows pointed downward that indicate the folder is open. If
one or more subfolders contain other subfolders, these first appear with the sign and can be clicked on
to open them and see the further folders, while folders containing only files do not have either sign.
If the folder you have opened does not contains what you are searching for, you can close it again. By
clicking on the sign the folder will be closed and again the sign . If a folder has no other subfolders but
only files, selecting it with a mouse click will show you the content in the right pane.

2.2.3 Switch between open windows


The viewing method of windows is similar to that used for web pages. To switch between a window to
another you should double click on the corresponding icon, while you can go back to the previous choice
by clicking on the arrows which are to the left, in the toolbar.
If you have multiple apps simultaneously open, you can pass from one to another without closing them. If,
for example, you are writing a letter and you need to take data from another document (e.g. an Excel file),
you can open it and the file names will appear in the taskbar.
As we already explained (2.1.1), in Windows 10 there is the button Task View which allows you to see all
the opened applications.
To switch from a document to another, in addition, it is possible to (although not during ICDL exams) use the
keyboard, by pressing the key combination Alt and Tab (usually represented with two arrows). A window
will appear with the apps icons which you are using in that moment. You can switch from one to another by
pressing the Alt button and then the Tab button; release these buttons to open the corresponding window.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-29
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

If you desire to work with more windows displayed, you should right click in the taskbar and from the menu
(see next fig.) choose one of the options: Cascade windows, Show window stacked, Show window side
by side, etc.

In all cases, it is possible to modify this and work only one window at the time.

2.3 TOOLS AND SETTINGS


With previous Windows versions, to manage the operating system you had to use the Control Panel.
Windows 10 maintains this feature but makes the users use the pane Settings (see next fig.) as it is more
intuitive (thanks to icons) and also usable with touchscreen devices.

©2020 AICA & Edizioni Manna


CE-30 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

Especially useful for the management of the computer is the search box, which is to the right of the Start
button. Depending on the version installed, it can also appear as a button representing a magnifying glass,
clicking on it opens the search box.
When you start to type something inside it, Windows tries to understand what you are searching for and
propose different solutions, for example: a function, program or a file present inside the computer, or the
result of a search made on the Internet, etc.
The search function tries to adapt to your need and provide immediate answers. For example, by writing in
the search box a mathematical operation, the computer will perform the calculation, or by writing “weather”
and the name of a city, it will provide you the weather reports.
If during the installation process of Windows 10 you activated the option Cortana, to the right of the search
box a microphone icon will appear.
Clicking on the microphone icon (if, of course, you have a microphone integrated or connected to the
device you are using) you can indicate your search by using your voice. The answers can also be given
by voice by the assistant.

2.3.1 Use available help functions


The search box (or button) to the right of the Start button has taken
the place of the Windows Guide available in previous versions.
Type in the box one or more words of the element you are searching
for and the potential options will appear immediately (see left fig.).
After you found what you were searching for, click on it to see the
required information.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-31
UTILIZZO
COMPUTERSDELL’APPLICAZIONE
AND DEVICES DESKTOP,
CREAZIONE
ICONS,
DI UNSETTINGS
DOCUMENTO
OUTPUTS
FORMATTAZIONE
FILE MANAGEMENT
OGGETTI STAMPA
NETWORKS
UNIONE PREPARAZIONE
SECURITY ANDDELLA
WELL-BEING
STAMPA

2.3.2 View the computer’s basic system information: operating system name and
version number, installed RAM
Before you install new applications or peripherals, it is sometimes necessary to view the basic information
of your computer, to verify compatibility.
Click on Start > Settings (the icon represented by a gear) > System > About to see a series of information,
such as: the operating system and its version, the quantity of RAM memory available and the type of
processor (see next fig.).

2.3.3 Change desktop configuration settings: date and time, volume settings,
background, resolution
To modify the date and time, you must click on Start > Settings > Time & Language to open the date
and time window (see next fig), in which there are automatic settings to adjust the time using the internet.

©2020 AICA & Edizioni Manna


CE-32 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

To manually modify the clock or the calendar you should deactivate automatic time setting (the sliders will
appear grey) and then click on the button Change. The window Change date and time (see next fig.) will
appear, in which you can make your choices and confirm them by clicking on the button Change.

To modify the audio volume just click on the speaker icon which is in the taskbar, to the left of the clock,
and then move the scrolling device to the right, to increase the volume, or to the left, to decrease the
volume (see next fig.). Near the scrolling device there is an icon which represents a speaker; clicking on it
you can deactivate (the so-called “mute”) or reactive the audio.

The window System (Start > Settings > System) allows you to modify the display settings by clicking (if not
already selected) on Display, first choice in the left column. The window that appear (see next fig.) allows
you to adjust some basic settings, such as: the text sizes, the display orientation, and brightness.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-33
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

By clicking on Advanced display settings, it is possible to modify the screen resolution. Windows
automatically chooses the optimal settings for the display, but you can modify them with the box Resolution
and by choosing one of the available options (see next fig.).

To change the desktop background, you must open the window Personalisation – clicking on Start >
Settings > Personalisation – where you can select a different background for the display between the
default options or from images on the computer by using the button Browse.

©2020 AICA & Edizioni Manna


CE-34 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

2.3.4 Change, add, remove keyboard language. Change default language


When you buy a computer, the keyboard is set with the language of your country. But computers are
used worldwide and for this reason the operating system has to take into account multiple languages; the
possibilities that the system offers you are many, from the Cyrillic characters to Chinese ideograms. More
likely, you could often have the need to use both French and Italian languages, for example.
Firstly, you need to add the new desired language, by using the section Date & Time which you can open
with Start > Settings > Date & Time and Language. In the left column click on Language and then, to the
right, on Add a preferred language (highlighted in yellow in the next fig.) to select it.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-35
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

Once the installation is complete, in the taskbar, right before the clock there is the language bar, by clicking
on it you will find the languages that you can select with a double click.

To delete a language from the keyboard just repeat the previous process for adding it and select the
button Remove.

2.3.5 Shut down a non-responding application


If an application does not respond, you can use the Task Manager to find and close an application that
does not answer.
To start Task Manager, press simultaneously the buttons Ctrl Alt Del (remember that you cannot use key
combination during ICDL exams) or right click on an empty space of the Windows taskbar and choose Task
Manager. Unless the operating system has totally stopped, an option list will appear (see next fig.) where
you can click on Task Manager.

At this point the window Task Manager will appear (see next fig.) with a list of all the applications open at
the moment. You must choose the program that is not functioning and click on the button End task.

©2020 AICA & Edizioni Manna


CE-36 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

2.3.6 Install, uninstall an application


Computer applications are distributed via the internet or sold in memory support devices such as CDs
and DVDs. To install an app means to perform a procedure that will allow you to use the software on your
computer. When you install it, you are generally helped by instructions that communicate with you via
messages that appear on the desktop.
The installation process does not consist of copying the software onto the computer, rather configurations
required to make it usable. Even if the application is to be installed in a particular folder, not all the files
will be placed in that folder, they will be distributed across different areas of the hard disk. For this reason,
when you decide to remove the app, deleting the icon or the folder won’t be enough to full remove it, you
must uninstall the program.
To install an app, you should follow the installation program instructions and proceed step by step. The
program sometimes asks you to choose the type of installation; the most commonly used are:
l Standard (or Classic, Normal, etc.): Is generally the preferred method and is normally used by the majo-
rity of user.
l Custom: Allows you to manually choose the application components to install (e.g. some particular
utilities of the Office suite). Generally, it asks to confirm which components of the application must be
installed.
l Minimal (or Portable): If the program is installed on an old portable computer it could be useful to cho-
ose this option, as it reduces the number of components to install.
Remember that when you install new software, it is preferable to close all other applications.
When you install an application saved on a CD or DVD, the installation process starts automatically
when you insert the disk. If not, you must manually search for the installation file inside the CD folders.
Generally, this file is named Setup or Install. You must double click on it and follow the instructions.
To install an application from the Internet you must click on the link to the app. At that point a window
will open with two choices:
l Open or Install to install the app immediately;
l Save to memorize the installation file on your computer and to install the application another time.

Many browsers protection systems ask you to confirm the download.


Additionally, with some operating systems it is also necessary to confirm the installation (see next fig.).

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-37
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

If you do not use an app, you can uninstall it. Open the window App & Features by clicking on Start >
Settings > Apps (see next fig.). The system will list the installed programs. If you cannot find the app you
are looking for, write the name in the search box Search this list or change the order to see the app list in
(size, name, installation date) or if you want to see the apps of a particular drive.
Select the application to delete and then click on the button Uninstall. In the next fig, for example, the
program Google Earth Pro is about to be uninstalled. The system will ask for a confirmation.

In some cases, the uninstall program notices that some files are in common with other apps and it is not
necessary to remove them. In other cases, there is the possibility that the system will ask you if you want
to remove files that are not commonly used. If this happens it is better to follow the system instructions and,
if you are not sure, to not delete these files.

2.3.7 Connect a device (USB flash drive, digital camera, media player) to a computer.
Disconnect a device using an appropriate routine
We already said (1.2.4) that USB ports are the most commonly used method to connect other devices to a
computer. Some of these devices (e.g. keyboards, mice) have a USB cable always connected, other (e.g.
USB flash drives) have an integrated connector, while the majority of other devices (e.g. digital cameras,
media players, etc.) must be connected to a USB cable first in order to be used.
In all cases, the first time that you connect a device to a USB port, Windows automatically starts to
search for the necessary driver for that device, meaning the necessary instructions for the computer to
link to the device. In some cases, it you have to install the driver manually (some devices are sold with a
CD included containing the software), in other cases the device may be not compatible with the Windows
version the computer is running, particularly if it is a very old device.
In every case, Windows signals the installation process with pop-up messages.
If there is no message, make sure that the device is:
l Correctly connected: The USB plug must be inserted all the way in;
l Turned on: Some devices have switches that you must turn on before you connect them;
l Correctly powered: Some devices (e.g. webcams or external disks) require a different power source
and must be connected to transformers or batteries.

©2020 AICA & Edizioni Manna


CE-38 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

Before you disconnect a device containing data (e.g. USB pen drives, external hard disks, memory
cards, etc.) you must be sure that the computer has stopped transferring data from or to the device. If the
connected device is a storage device, on the lower right of the taskbar there is the icon Hardware Safe
Remove.
By clicking on this icon, a list of the connected devices is shown: click on the device you want to remove
and wait for the message “It is safe to remove the hardware”.

2.3.8 Capture a full screen, active window


Sometimes it can be necessary or useful to capture a screenshot. The fastest way consists of using the
button Prt Scr. By pressing it the desktop image will be copied to the Windows Clipboard and can be used
with an image processing program (for example, Paint) to be saved as an image.
If there are multiple windows on the screen and you want to capture an image of one of them, click on it
to make the window active. At this point simultaneously press the button Prt Scr and the button Alt and
repeat the procedure of saving and coping.
Windows 10 has the app Capture and Note that allows you to acquire an image of the entire desktop
or a part of it, and to highlight, annotate or send it via e-mail. To start it, press simultaneously the button
Windows and S. The app Snipping Tool has similar features, which is in the folder Windows Accessories
(Start > Windows Accessories > Snipping Tool).

©2020 AICA & Edizioni Manna


3 Outputs
3.1 WORKING WITH TEXT
3.1.1 Open, close a word processing application. Open, close files
Windows has two-word processing applications: Notepad and WordPad. Note that the commonly used
Microsoft Office program Word is not included as standard with the Windows operating system.
Notepad is useful to read short text files or txt. files. To open it, from Start, choose Windows Accessories
> Notepad; or use the search box.
Once you have opened the application (see next fig.), you can start to write, using the button Enter to
wrap the words. The app does not have many features: from the menu Format it is possible to choose to
automatically wrap words or to select another type of font. In the menu Edit there are the text commands
Cut, Copy, Paste and Delete.

If you already have a text file, you can open it from Notepad by clicking on File, then on Open (or pressing
simultaneously the buttons Ctrl and F12) to search inside the computer for it or the connected peripherals.
Once you have found it, you can open it by double clicking or by, first, right clicking and then selecting
Open.
To close the file, you have to close the application too. By clicking on the button X at the top right of the
title bar, or by clicking on File and then on Exit or pressing together the buttons Alt and F4. If you made
changes to the file, the program will ask you if you want to save them or not. Choose Save or Don’t Save,
or. click on the button Cancel to go back to the document without closing the application.

CE-39

©2020 AICA & Edizioni Manna


CE-40 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

WordPad is a word processing program with many features, which allows you to create documents by
choosing between different types of fonts, colours, sizes, and so on (see next fig.). To open it, from Start,
choose Windows Accessories > WordPad or start to write “WordPad” in the search box until it appears in
the results list.

If you want to open an already existing file, you must click on the tab File from the menu (highlighted in
yellow in the next fig.) and then on Open, or simultaneously press the buttons Ctrl and F12. In both cases,
the window Open will open, in which you can search for the file inside the computer or the connected
peripherals, then you can open it with a double click.
The procedure to close a file in WordPad or the entire app is the same: click on the button Close, click on
the tab File and then on Exit, or simultaneously press the button Alt and F4. You will also receive a notice
to save any changes you have made.

3.1.2 Enter text into a document


Once a new or already existing document has opened – with any word processing application - you can
start to write.
The point of the document where there is a vertical blinking bar is called the text cursor or point of inserting,
because the text you write will be inserted from that point. While you write, the blinking cursor will move to
the right with the text.
Unless you are using Notepad, when you reach the end of a line the new text will be automatically wrapped,
and the cursor will move to the line below. You only need to press the Enter button if you want to manually
interrupt a paragraph.
On the right side of the window there is the Vertical scrolling bar; it works exactly as all the other window
scroll bars (2.2.1). You can click on the arrows at the top or bottom to move step by step or you can drag
the box to reach a particular point of the document.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-41
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

3.1.3 Copy, move text within a document, between open documents. Paste a screen
capture into a document
To copy some text in a document, you must select the part you want to copy, by putting the cursor at the
beginning of the text you want to copy and then, by holding the left mouse button, dragging the cursor to
the end of the text to be selected. The selected text will appear highlighted in light blue if you are using the
standard setting of Windows (see next fig.).

After you have selected the part you want, choose the command Copy. In WordPad and other word
processing applications there is a button which has an icon of two sheets, in Notepad you can find it by
opening the menu Edit. Put the cursor in the point in where you want.
Alternatively, after you have selected the text, right click on any point of the selection; a menu will open
in which there is the command Copy. After selecting copy, click on the corresponding point in which you
intend to make the text appear and then choose the command Paste.
To move text, firstly selected it, then choose the command Cut (represented by a pair of scissors in word
processing programs, while is in the menu Modify of Notepad). Put the cursor on the point you want to
insert the text and choose Paste.
Or, once you have selected the text, right click on any point and a menu will open in which you can find the
command Cut. After putting the cursor in the desired location, right click again and choose Paste.
In addition, is possible to copy or move text using so-called keyboard shortcuts:
l Ctrl and C to Copy
l Ctrl and X to Cut
l Ctrl and V to Paste

There is another, less known, method: Once you have selected the text, you can copy it by
holding the Ctrl button while you drag the selection where you desire. If you hold the Shift button,
the text will be cut and pasted where you release the button. The advantage of this method is that it
does not delete the eventual content of the Windows Clipboards.
With the same procedures, it is possible to copy and move text between open documents, by selecting
the document where you want to work to copy or move text after you have first selected it.
It is also possible to copy an image of the display into a document. We already saw (ref. 2.3.8) that by
pressing the Print Screen button everything that is on the display in that moment is saved to the Windows
Clipboard. Just open a word processing document and choose the command Paste; the display image will
appear in the document.

©2020 AICA & Edizioni Manna


CE-42 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

3.1.4 Save and name a document


Once you have finished writing or during a break, to not lose the document, you must “save it”; a term that
indicates the registration of a file to a mass memory drive (hard disk, USB pen-drive, memory card, etc.).
To save a file created with Notepad or WordPad, for example, you must click on File, in the menus bar
and, from the menu, choose Save. If it is the first time the document is being saved the window Save As
will appear (see next fig.).

In the field File name, write the file name; it can be long up to 256 characters, it is best to use something
that accurately describes the document without being excessively long, as explained at the ref. 4.1.6. In the
left pane the folder in which the file will be saved is highlighted. By default, Documents will be highlighted,
but, if you prefer, you can select another folder. Once you have chosen the name and the folder in which
save the file, click on the button Save. The next time you want to save the document, pressing the button
Save will save the file directly to the same location; if you wish to save it to a new location or change the
file name at any point, you can follow the save as procedure again.

3.2 PRINTING
3.2.1 Install, uninstall a printer. Print a test page
If you want to connect a new printer to your computer you must install it, as with all new peripheral
devices. For it to work correctly, the printer (as with other peripherals such as scanners and webcams)
must exchange information with the computer following specific procedures that are applicable to that
model of printer.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-43
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

Modern operating systems have automized procedures that recognize and automatically install most
common peripherals. So, when a new printer is turned on and connected, the computer automatically
starts the install procedure, which has already been discussed in ref. 2.3.7.
If there are issues with automatic installation it is possible to proceed using manual installation. Open
the menu Start and choose Settings > Devices > Printers & scanners > Add a printer or a scanner (see
next fig.).

The computer will start a search for new connected devices. If the computer does not find the right printer,
click on “The print that I want isn’t listed” to manually install the device (see next fig.).

©2020 AICA & Edizioni Manna


CE-44 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

You must indicate if the printer you want to connect to is a local printer, meaning that it is only connected
to your computer, or if it is a network printer, meaning a printer connected to other computers too (as in
offices), or if it is connected wirelessly.
Once you have made your choice and indicated the connection system, a printers list will be shown.
Choose the one that you desire, and the installation procedure will start automatically. By clicking on the
button Driver Disk, you can use to use support data provided with the printer (generally a CD).
After the installation is complete it is advisable to print a test page to verify the printer is functioning
correctly. You can start the procedure from the window Printers & scanners by selecting the printer with a
click and then choosing Manage and then Print a test page.
If you do not use the printer, you can uninstall it by opening the window Printers & scanners, selecting the
printer and then clicking on the button Remove.

3.2.2 Set the default printer from an installed printer list


If a computer is connected to more than one printer – as can happen in offices – it can be necessary to
change the default printer.
To modify the default printer, open the window Printers & scanners which lists all the printers used at
that moment, click on the desired printer and then on Set as default.

3.2.3 Print a document from a word processing application


To print a document with a word processing application, such as Notepad, start the app, open or write
a document and choose Print from the menu File.
The window Print will be shown in which it is possible to choose the printer to use, which pages to print,
the number of copies, etc.

3.2.4 View, pause, restart, cancel a print job


When you start to print a document while something else is being printed, a “print job” of the document
is created, essentially creating a queue of files to print. To see this print job, open the window Printers
& scanners, click on the current printer and choose open print job. The corresponding window will be
displayed showing the various files that have been sent for printing and their status.
You can pause, restart or cancel a print job by selecting it with a mouse click from the list and then
opening the menu Document, where there are various options:
l Pause to interrupt the document print;
l Resume to resume an interrupted print;
l Restart to restart the print;
l Cancel to cancel the print operation.

The same options that are available from the menu appear by right clicking on the files in the print job list.
Alternatively, it is possible to open the printer window and manage the print jobs by clicking on the printer
icon which appears in the taskbar at the bottom right of the desktop, while a print is ongoing.

©2020 AICA & Edizioni Manna


4 File Management
4.1 INTRODUCING FILES AND FOLDERS
4.1.1 Understand how an operating system organises drives, folders, files in a
hierarchical structure. Navigate between drives, folders, sub-folders, files
To understand the structure of a disk unit (e.g. an internal or external hard disk or a USB pen-drive)
and how the operating system represents the information contained in it, imagine the disk unit as a library
where the books in it (files) are arranged on shelves (folders). If books are subdivided by topic there will
be a shelf for novels, a shelf for school books and so on. If each shelf is signed with a label indicating its
contents, you will have a functional and tidy structure to find books.
The operating system uses a similar method: the folders (shelves) contain files (books), but – unlike the
example - a folder can contain other folders and files in a “chain” that can be very long. The schematic
diagram in the next fig. helps to illustrate how a disk unit is organised.
In reality the configuration is far more complex, but the schematic gives an idea of the file system structure,
or how an operating system organises the disk units, folders and files into a hierarchical structure.

CE-45
©2020 AICA & Edizioni Manna
CE-46 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

As you can see in the previous fig., folders have an entire name, while files have a name and a suffix,
separated by a full stop (.). The file suffix, also called extension, indicates the type of file, meaning if it is
a file produced by a particular application (such as the extensions docx, xlsx, pptx, etc.) or if it is a system
file (extensions dll, drv, sys, etc.) necessary to the functioning of the system.
The suffix or extension was the only method to identify files with the MS-DOS system, nowadays you can
also recognize different files from their icons: a light blue W for files made with Word (.docx & .doc), two
gears for some system files (.dll), etc.
There are multiple methods to see the contents of a computer, one of the fastest ways is to use the app
File Explorer, normally present in the taskbar. If it is not there, click on Start, then on Windows System and
then on File Explorer.
A hierarchical structure will appear in which you can move between drives, folders, subfolders and files.
As mentioned in (2.2.2) it is possible to show or the subfolders. By clicking on the arrow next to a closed
folders you can see the subfolders; by clicking on an arrow pointing downward next to an opened folders
you will hide the subfolders.
To find a file or a folder you should remember that the operating system uses this hierarchical structure. Start
from the main folder (C: or Documents or other) and open the folders step by step until you find what you are
looking for. As we already said, each folder can contain other folders, that in turn can contain more folders.

4.1.2 Display file, folder properties like: name, size, location


To display the name, size, position (or path) and other features of a file or a folder right click on it
and then choose the last option from the menu: Property. A window will open containing different tabs, the
most important information is displayed in the tab General (see next fig.).

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-47
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

4.1.3 Change view to display files and folders like: tiles, icons, list, details
Folder contents can be displayed in different ways; by clicking on the tab View a window will open
which allows you to choose between eight options: Titles, Medium-sized icons, List, Small Icons, Content,
Details (see next fig.).

The same options are available by right clicking on an empty point of a folder and then choosing the option
View from the menu (see next fig.).

The first four options (Extra large icons, Large icons, Medium icons, Small icons) display the content
preview in icons of the different sizes. These are useful for folders that contain images or music.
Other options allow you to simultaneously display more files and more of their information (sizes, date of
creation, etc.).

4.1.4 Identify common file types like: word processing, spreadsheet, presentation,
portable document format (pdf), image, audio, video, compressed, executable files
When you scroll through the contents of a computer is useful to be able to identify file types. If, for
example, you are searching for a spreadsheet, you can identify it thanks to its icon or extension.
As discussed in ref 4.1.1, the extension was the method used with MS-DOS system to associate the file
with the program that can open it. Nowadays, Windows systems do not need to show the file extension.
You can show or hide them by clicking on the tab View when you are in the File Explorer window, then
selecting the last button on the right, Options. In the window that opens, you must choose the tab View
and scroll through the menu to find the tick box (√) for the option Hide Extensions for known file types

©2020 AICA & Edizioni Manna


CE-48 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

(see next fig.). By ticking this box and clicking on the button Apply to folders all file extensions will be
hidden.

In the next fig. there is a table of the main icons and their file extensions:

Multimedia files, meaning those who reproduce images (the main extensions of these files are .bmp .jpg
.gif. tif), music (.wav .mp3) and video (.avi .mpg .mp4) are represented with different icons depending on
the application associated to that type of file.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-49
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

Often the generic icon is substituted with a file content preview. If the file is an image you will see a
thumbnail of the image, if it is a mp3 file you will see the album cover, if it is a pdf document you will see a
thumbnail of the first page and so on. In the next fig. you can see from left to right the icons of an image,
a video, a pdf file and a mp3 file.

Executable files have different extensions, the most common is .exe, but there are also .bat, .com, and
many more.

4.1.5 Open a file, folder, drive


To open a file, a folder or a drive, simply double click on it. The double click also allows you to start
the application associated to a file. For example, by clicking twice on a file that represents an image, an
application for viewing images will open.
If you have difficulties performing the double click operation, you can also click once with the right button
and then – from the rapid choice menu that appear – click with the left button on the option Open (that
appear in bold).
If you are using a touchscreen device, such as a tablet or smartphone, one touch will be enough to open
the element.

4.1.6 Recognise good practice in folder, file naming: use meaningful names for folders
and files to help with searching and organisation
When you need to give a name to a file or a folder it is better to choose a name that makes it simple to
find it and to remember its contents.
The chosen name must be descriptive. For example, if you write a letter to cancel an insurance policy,
a good name could be “insurance cancel letter”, while it is better to avoid names that are too generic such
as “letter”, “cancel” or “insurance”.
Additionally, even though Windows allows you to use up to 256 character, it is better to avoid long
names. For example, a file name like; “letter to the insurance in which I communicate my intention to not
renew it for the next year” is unnecessarily long.
Remember that it is possible to use spaces and symbols, with the following exceptions, which cannot be
included in a file name: / \ ? : ; ″ < > * |

4.1.7 Create a folder


To create a folder just right click on any folder and choose New and then, from the menu, Folder. The
system will create a new folder immediately, with the provisory name “New folder”; simply write the name
you desire to give to it and press Enter to rename it.

©2020 AICA & Edizioni Manna


CE-50 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

If you repeat the same process after you have opened the new folder, you can create one or more
subfolders. These have a “cascade” process which has no limits; however, it is better to not abuse this
and create an excessive number of subfolders.
If the menu bar is shown, it is also possible to create folders by first clicking on Home and then on New
Folder.

4.1.8 Rename a file, folder


To rename a files or folder just double click inside the name area, beneath the icon, and the name will
appear with a light blue background. At that point, you can write the new name (the old one will be deleted
automatically) and then press Enter.
If you desire to keep a part of the old name, after the first two click wait a second and then click again. The
cursor (I) will appear, at that point you can delete parts of the old name by pressing the button Backspace
(generally represented by an arrow pointed to the left) and add new text. At the end, confirm the changes
by pressing Enter.
This is just one of the methods you can use. On the desktop, in File Explorer or in any folders, you can right
click on the file or folder that you want to change name, then choose the option Rename from the menu.
Or, once you have selected the file by clicking on it, you can press the button F2 to highlight and modify
the name. Additionally, it is possible to rename files or folders by selecting them and then choosing the tab
Home in which you will find the button Rename.

4.1.9 Search for files by properties: all or part of file name using wildcards if necessary,
content, date modified
As was already explained (4.1.1), the computer memory is organized in a hierarchal structure based on
folders, subfolders and files. Often, you will need to search for a particular file that you do not remember
the location of.
Write the complete or partial file name in the search box to the right of the button Start to see the results
(see next fig.).

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-51
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

Windows by default saves files into personal folders (Documents, Images, Music, etc.) which allows search
results to appear almost instantly.
Once you have found the file you were searching for you can open it (if it is an app or a document created
with an app) by double clicking on its name.
The search function is principally based on the file name, for this reason you must remember at least
part of the name. If you search, for example, for a file named “Stone” the system will find it, along with other
files with similar names such as “The stone age”. Simply select the file you are searching for to open it.
If you cannot find the file or you are not satisfied with the results, you can extend the search by clicking on
one of the options that appear above the search box: All, App, Documents, E-mail, Data, Settings, Music,
People, Video).
Other search features are offered by the app File Explorer (which icon is in the taskbar; you can also start
it from Start > Windows System > File Explorer) which has a Search pane in the top right where you can
write the term or terms of your search. The options in the tab Search (see next fig.) can be useful to filter
the results by their proprieties: type, sizes, etc.

If you want to start the search directly from a folder, just click in the search field (in the top right) and
then on the search filter you want to use.
If you do not remember the file name, you can replace some letters with the so-called jolly characters.
For example, if you do not remember if the name is “vacation” or “vacations”, you can insert a jolly character
(in this case the question mark “ ? “) in place of “n” or “ns”. Therefore, the search term would be “vacatio?”.
An asterisk can be used as a substitute for a part of or an entire file name or extension, remembering
that the name and the extension must be always separated by a point. If you write *.* it will stands for “all
the files and all the extensions name”, practically all the computer files. *.doc will indicate any file with
the doc extension, meaning files made with Word, while *.jpg will find all the photos with the jpeg format.
Searching vacation* will find all the files named “vacation”, regardless of the app they were created in.

©2020 AICA & Edizioni Manna


CE-52 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

4.1.10 View list of recently used files


By right clicking on a program icon in the taskbar, the files related to that app which have been recently
used will be shown. In the next fig. the recently opened files with Word are shown.

4.2 ORGANISING FILES AND FOLDERS


4.2.1 Select individual, adjacent, non-adjacent files, folders
To select a file or a folder simply click on it, you can verify if the object is selected because it will assume
the light blue colour (see next fig.).

To select groups of files or folders there are different methods.


If, for example, you want to select a series of adjacent files, click on the first file, then hold the Shift
button on the keyboard (generally represented with a big arrow) and click on the last file of the series that
you want to select.
If you desire to select a series of non-adjacent files, you must keep holding the Ctrl button on the
keyboard and select the files, one by one, with the mouse.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-53
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

If, instead, you want to select all the contents of a window, click on the menu Home and then choose
Select All. If the menu bar is not shown, you can obtain the same result by simultaneously pressing the
Ctrl and A buttons.

4.2.2 Sort files in ascending, descending order by name, size, type, date modified
In the multifunction bar (File, Home, Share, View) click first on View and then on Sort By and a menu will
appear offering the option to sort the files based on Name, Date Modified, Type and other characteristic
(see next fig.). From the same menu you can choose to sort in either Ascending or Descending order. The
last option, Choose columns…, allows you to choose which details of the files to display in the list.

If you have chosen the view Details, you can obtain similar results just by clicking on the column headers.
Clicking, for example, on Size the files contained in the folder will be listed in ascending order. If you click
again on Size the order will change to descending, i.e. from the biggest file to the smallest. Similar results
can be obtained by clicking on any other column header: Name, Date Modified, Type, Size, etc.
In the same view, you can click on the arrow which appears after the name of each columns to find further
specific ways to sort the files (see next fig.).

©2020 AICA & Edizioni Manna


CE-54 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

4.2.3 Copy, move files, folders between folders, drives


There are various methods available in Windows to copy files or folders:
l Using the scroll-down menus, meaning opening various menus and clicking on the chosen command.
l Using the buttons (or icons), which have the same function of the scroll-down menus. They have the
advantage of being faster, provided you know the buttons. The system will help you with this as when
you put the cursor on the button, after a second, a brief description will appear.
l Using the right mouse button: right click on a file or a folder and a scroll-down menu will appear in
which you will find the most common options, for example Copy and Paste.
l Using the so-called “keyboard shortcuts” which allow you to give a command pressing two buttons
simultaneously. For example, Ctrl and C for the command Copy and Ctrl and V to Paste.
The choice of method depends on your familiarity with the use of the computer. For now, use the scroll-
down menus, as they are used during the ICDL exams.
To copy a file from a folder to another, firstly select it then click on the tab Home and choose Copy. Open
the folder where you want to copy the file and, from the tab Home, choose Paste.
The buttons method is not often used to copy files, it is more useful within apps. Using the right mouse
button is simple and fast: right click on the file to be copied and choose Copy from the menu. Then open
the folder where you want to paste the file, right click on an empty space and choose the option Paste.
To copy more files or folders the technique is the same, just select them by using the methods explained
in ref. 4.2.1.
The commands used to move files or folders can be given with the same methods explained for the
copy:
l Using the scroll-down menu, meaning opening various menu and clicking on the chosen command;
l Using the buttons (or icons);
l Using the right mouse button and the options Cut and Paste;
l Using the “keyboard shortcuts” which are Ctrl and X to Cut and Ctrl and V to Paste;
l Using the drag and drop method of clicking on a file or folder and holding the button. Then you can
move the mouse to drag the element to the desired position.
To move a file from one folder to another, first of all select it, then click on the tab Home and choose Cut.
Then, open the folder you want to move the file to and, from the tab Home, choose Paste.
When you move a file, the buttons technique is also not commonly used. It is better to remember the
method of using the right mouse button. Right click on the file and from the menu choose Cut. Open the
folder that you want to put the element in and right click on an empty area, then choose Paste.
To move more files or folders the techniques remain the same, select them with the methods explained in
ref. 4.2.1.

4.2.4 Delete files, folders to the recycle bin/wastebasket/trash and restore to original
location
To delete files or folders select the element with a click and then press the Del button.
You can simultaneously delete groups of files or folders with the same technique.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-55
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

If you prefer, you can also delete files using only the mouse. Drag the file or folder icon on the Recycle Bin
icon, or right click on the file and, from the menu, choose Delete (see next fig.). Additionally, if the menu
bar is shown, select the file and then choose the option Delete from the File tab.

In all cases, files are not permanently deleted, but moved to the Recycle Bin from which you can restore
them if you wish.
To restore deleted files or folders, from the Desktop, double click on the Recycle Bin icon. The Recycle
Bin is similar to other normal folders; when you open it, you will see the files and folders previously deleted
along with their previous position (if the option Details is selected) (see next fig.).

If you choose the option Restore all items (indicated by the cursor in the previous fig.) all the Recycle
Bin files will go back to their previous position. If you want to restore specific files select them using the
previously described methods and then click on Restore the selected items in the toolbar.

4.2.5 Empty the recycle bin/wastebasket/trash


Once you have opened the Recycle bin and you are sure that the files inside it are not necessary anymore,
you can permanently delete them by clicking on the button Empty Recycle Bin in the toolbar (see previous
fig.). It is also possible to empty the Recycle Bin by using the command Empty Recycle Bin from the tab
Manage, or by choosing Empty Recycle Bin from the menu that appears after you have right clicked on the
icon Recycle Bin on the desktop.
After emptying the recycle bin you won’t be able to restore the files without using certain, specific apps.

©2020 AICA & Edizioni Manna


CE-56 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

4.3 STORAGE AND COMPRESSION


4.3.1 Identify the main types of storage media like: internal hard disk, external hard disk,
network drive, CD, DVD, Blu-ray Disc, USB flash drive, memory card, online file
storage
The term storage media refers to the devices on which data is recorded until the user decides to delete
it. We can compare the most commonly used storage media in terms of their speed, cost and capacity to
store data. As a reminder, the capacity of these devices is determined by using the byte (and its multiples:
Kilobyte, Megabyte, Gigabyte, etc.) as a unit of measurement.
l Hard disk - This is the main unit of fixed memory used to store information. There are hard disks that
are internal to a PC and others that are external and can be connected to a computer or other electronic
device, usually via the USB port. The hard disk is normally called the C: drive, if there are several hard
disks in the PC, they are usually assigned the following letters (D, E, etc.). The same designation occurs
when a hard disk of large capacity is divided into partitions, namely it is divided into individual units that
will behave as independent drives, even though they are physically on a single disc.
l USB flash drives (or pen drives) - These storage devices are small and very easy to transport and are
increasingly becoming cheaper with ever-growing capacities.
l Memory Cards - These are the main external storage medium of many mobile devices: tablets, smar-
tphones, digital cameras, etc. They usually resemble postage stamps and can be inserted into the va-
rious devices. In addition, like USB drives, they are cheap and able to provide more and more storage
space all the time. There are several types of them, the most common being the Secure Digital (abbre-
viation: SD), particularly its smallest format, the micro-SD card.
l CD-RW (or rewritable CD) and DVD-RW (or rewritable DVD) - These are removable storage media
that allow the user to write, erase and rewrite data. They can contain up to 700 and 4,500 Megabytes
respectively. Since they are read by a laser beam, they should not be subjected to demagnetization
(e.g. do not put magnets anywhere close to them). It is also necessary to be careful not to scratch the
underside of the disc, otherwise it may become useless. CDs and DVDs are mostly used to store me-
dium-sized files such as movies, presentations, small databases, etc.
l Blue-Ray Disc- They are small discs of hard plastic material that, thanks to a special laser reading
system, can store up to 54 gigabytes of data; the equivalent of about ten films. This technique takes its
name from the fact that the laser beam that reads the data on the disk is blue, not red like that of tradi-
tional readers for CDs and DVDs.
l Online file storage - Some internet sites offer the opportunity to save files in their memory spaces,
there are both free and paid services available. Saving a file in online file storage allows the user not
only to access it even when their own computer is not available (any device connected to the Internet
can give access to the file), but it also allows friends and acquaintances to access it provided they know
the web address and password. Moreover, saving files to online drives also allows the user to keep a
backup copy of the file, which can be used in case of damage or loss of the original one. There are,
however, some associated risks: hackers might access your files by bypassing the protection offered by
the password, or a site that offers free space could later change its trade policy and seek subscription
payment for you to maintain access to your files.
l Network drive - When several computers or other electronic devices are connected to each other as a
“network” (e.g. in some offices), hard disks or other storage devices can be connected to the network,
rather than just a single computer, so that they can be accessed from any PC in the network. This is
especially useful for the sharing of resources.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-57
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

4.3.2 Identify file size, folder size, storage capacity measurements like: KB, MB, GB, TB
To execute calculations, we are used to using the decimal system, which represent numbers through ten
symbols that go from 0 to 9. When the first computers were created, a system in base 2 was chosen,
meaning based on only two numbers, and resultingly is called a binary system.
Each digit – 0 or 1 – is called a bit (“BInary digiT”) and a sequence of eight bits gives the computer the
possibility to identify any character: Letter, number or symbol. So, the fundamental unit measure of the
computer memory is formed by a sequence of eight bits, which is equal to a single character and is called
a byte.
1024 bytes form a Kilobyte (short form: KB, to not confuse with Kilobit, abbreviated to Kb), 1024 Kilobytes
form a Megabyte (abbreviated to MB) and 1024 Megabytes form a Gigabyte (abbreviated to GB), which
therefore constitutes more than a billion of bytes. Then, there is the Terabyte (abbreviated in TB) which
corresponds to 1024 Gigabytes or thousands of billions of bytes.
It is important to remember these measurement units as they are commonly used in computing. The byte
(and its multiples) is used to denote the memory capacity of a hard disk.

Because you cannot have a perception of these measures in the real world (such as for a kilo, a litre etc.),
let us say that an A4 sheet occupies, more or less, 3 KB, so a manual such as the one you are reading
occupies almost 2000 KB. Consequently, in 2 MB (the equivalent to 2000 KB) you can store a manual
like this, and in 1 GB you could store 500 manuals. It is important to note that we are talking about sheets
containing text only; when there are pictures, sound or videos in the file they occupy significantly more
space.

4.3.3 View available space on a storage device


While you are saving data on a storage device (USB pen-
drive, memory card, etc.) its capacity is reducing. To view
the available space on a storage device you must:
l Connect it to the computer (or to another electronic
device such as a tablet);
l Right click on the icon that represents the storage device
(for example in File Explorer);
l Choose Properties to display the window in which there
is a numeric and graphic representation of the used and
available space (see right fig.).

©2020 AICA & Edizioni Manna


CE-58 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

4.3.4 Understand the purpose of file, folder compression


Due to the increasing of file sizes, you may need to compress some of them. In fact, while a text file
of hundreds of A4 pages is not bigger than a megabyte, if you insert multimedia contents into the same file
its size increases dramatically.
To help with transferring files or folders from one computer to another a method was developed that allows
you to temporarily reduce the file size to move or send it, and then restore it back to its original size. File
compression offers another advantage: a program can be constituted of hundreds of different files, if you
compress all them you can obtain a single file containing all the others.
In Windows there is already a compression program, but there are other apps available that can also
provide file compression. The most commonly used are WinRAR and WinZip, which compress files and
folders into various formats, principally .zip and .rar.
A compressed file will have a smaller size compared to the original but you will not be able to immediately
open it with the app that has created it (Word, Excel, etc.), it must first be decompressed by Windows or
another app and then can be opened as normal.
A second, important use of the file compression is for sending files via e-mail and for file
transmission over the Internet in general. When you attach a file to an e-mail, the time of transmission
essentially depends on two factors: the connection speed and the size of the object to transfer.
Since the connection speed is dependent on external factors, before you send a file via Internet it can be
useful to compress it, to reduce the transmission time. Files that are created with Office (.doc, .xls, etc.)
can be compressed, it is also possible with some types of image and audio files (.bmp, .wav, etc.), while
others are already in a compressed format (.jpg, .mp3, etc.).

4.3.5 Compress files, folders


Compressing files or folders is an operation that requires a few simple commands. Right click on the file
or the folder to compress and, from the menu that appears, choose Send to. From the next sub-menu to
pop-up select Compress Folder. A folder with a zipper will appear.
It is also possible to use the button Zip which is in the tab Share.

4.3.6 Extract compressed files, folders to a location on a drive


Extracting compressed files or folder is an easy operation too. Once you have found the element to
expand, right click on it and choose Extract all from the menu; then choose the folder that the files will be
extracted to. Once you have clicked on the button Extract, the decompressed files will appear in the folder
you have chosen.

©2020 AICA & Edizioni Manna


5 Networks
5.1 NETWORK CONCEPTS
5.1.1 Define the term network. Outline the purpose of a network: to share, access data
and devices securely
The term network stands for a system of connection between two or more computers or other
electronic devices.
If you need to connect computers that are a short distance apart (e.g. in the same flat or building), usually
connection cables can be used to make a so-called LAN (Local Area Network), meaning a private network
of computers and devices limited to a particular area (e.g. a classroom, an office, a small company).
The most common technology for these networks is called Ethernet. In a LAN network there is often a
principal and more powerful computer, called server, that can put part of its resources to the other devices
connected to the network, called clients.
The advantage of a LAN network is that it facilitates the sharing of resources. It can, for example, be
enough to have one printer connected to the server to print all the documents of the other client devices.
Additionally, you only need to put a document onto one of the devices to make it usable for all the others
connected to the network.
When the distance between the computers is high and requires the crossing of public streets, another
means of connection is needed. The most common of these means is the telephone line, using a device
called a modem (5.2.1).
If the connection is made without wires it is called WLAN (Wireless Local Area Network). Generally, WLANs
are protected by a password to avoid unauthorized people accessing secure data and resources. In
some public places (bar, hotel, airport, etc.) there are public WLANs that anyone can use.
As mentioned before, electronic devices connected to a network can communicate with each other by
exchanging all types of information. Moreover, various types of computers can be connected to a network,
thus we can request information from computers that have huge databases.
In the same way a computer network connects universities in the same countries, there are also networks
that connect universities in foreign countries, and then still other networks that connect municipalities,
companies, libraries, etc. Therefore, in many cases, there is a network that connects other networks. This
is known as WAN.

5.1.2 Define the term Internet. Identify some of its main uses like: World Wide Web
(WWW), VoIP, e-mail, IM
The internet can be defined as a set of computer networks spread worldwide and connected through
telephone lines and other means of transmission, so that they can communicate with each other to receive
and send data.
Every day, hundreds of millions of people worldwide use the internet for business or leisure. There are
many reasons why people use the internet: to communicate with other people through so-called social
networks or e-mail; to play games; to find information for their work; to read the latest news; to do research;
to buy products; to check their bank account; to download applications; to pay bills, to find information
about schools and universities; to translate a text from one language into another; to organize trips, etc. In
a way it can be said that only the imagination can set limits on the ways the Internet can be used. We can,
however, identify some of its main uses.
CE-59
©2020 AICA & Edizioni Manna
CE-60 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

Anyone who lived through - as the author of this book did - the exciting adventure of connecting to the
internet in its early days, knows that the internet then was very different from what it is today. Initially it was
only black and white texts; the introduction of colour, animation and sound was only made possible by the
invention (in 1992) and the spread (since the mid-nineties) of the World Wide Web.
The meaning itself of World Wide Web refers to the fact that if lines
connected all the computers to the network it would look like an
enormous spider web surrounding the whole Earth. The World Wide
Web is often referred to in other ways: Web or WWW (from the letters of
World Wide Web). The difference between the internet and the World
Wide Web is the fact that the internet is a set of connected networks,
while the WWW is a technique that facilitates the organization of texts
and hypertexts present in the network through links.
There are billions of documents, illustrations, sounds, and animations on the Internet that can provide
useful material for study, work or just to have fun. The problem is that these documents, illustrations and
sounds are scattered on hundreds of millions of web pages. It is impossible to look at them all to find what
you need; that would take thousands of years!
For this reason, there are particular Internet sites, called search engines, which allow you to easily find
information. Search engines are comparable to big lists of billions of web pages that you can search
though like an archive.
Electronic mail allows you to send and receive messages through the Internet. These messages can
have any sizes: you could write only “Hello” or send to another person a letter with thousands of pages.
You can also attach audio, pictures or other files to your messages.
You may ask “what are the advantages of doing this through the Internet”? There are two mains advantages:
speed and cost. If you need to send a message to a person that is very far from you, sending a message
via e-mail will cost you only a few seconds and a few cents.
If the person you sent the message to it is not connected to the internet at that moment, there is no
problem. When they reconnect, the computer will signal that there is a new message in the mailbox.
At that point, the person will be able to read it and to see any attachments (sounds, photos, videos, etc)
and to decide to respond or delete the message.
E-mail offers other advantages, such as the possibility to send a message to many people simultaneously
and to receive the message in any part of the world. The spread of e-mail has been so great that not only
companies, but also the public, prefer to send messages through it.
Of course, there are also disadvantages, such as receiving undesired e-mails (called spam) and the
possibility of receiving viruses or other dangerous elements. To use e-mail a computer must be connected
to the internet and you must have an e-mail address.
To send an e-mail you need to know the recipient’s address.
An e-mail address is composed by two parts separated by an “at” sign (@), for example: [email protected]
in which name indicates the person, while server.com indicates the name of the domain.
Generally, you will know this address because the person to whom you want to send the message told
you or you found it on a web page; on many internet sites the e-mail addresses of the authors are shown.
Remember that it is also possible to send and receive e-mails through smartphones, tablets and other
electronic devices.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-61
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

The term instant messaging (abbreviated as IM) refers to a system


that allows the users to send and receive short messages knowing
that the receiver is currently logged on to the internet. By using one of
the many applications available for Instant Messaging (e.g. Windows
Messenger or Yahoo Messenger), or by directly using messaging
applications built into social media (e.g. Facebook and Google+), you
are able to view a box displayed on your screen (known as a contact
list) that shows who of your contacts is currently connected to the net.
It is possible to chat, send or receive files, and speak by videoconference
using a webcam with one or more people that are online. This is different
from an e-mail conversation as it is a live conversation, and unlike the
chat function it is not open to all, but only to your own contacts.
VoIP (from “Voice over Internet Protocol”) is a technology that uses the internet (or a similar private network)
to make phone calls. The voice of a person speaking, which is an analogue signal, is converted into a
digital format to travel through the network and is then converted back to analogue when it is transmitted
to the other party. The spread of VoIP is increasing, because it offers significant savings compared to
traditional methods used for phone calls, while offering excellent audio quality (provided that a broadband
connection is fast enough).
Telephone companies themselves are increasingly adopting this technology to convey their calls, because
the data is transmitted like all other data that travels over the Internet, making it unnecessary to pass
through the traditional telephone switchboards and therefore lowering the costs.

5.1.3 Define the terms intranet, virtual private network (VPN) and identify their main uses
In many companies, computers are connected to each other through an internal network, called an Intranet,
which uses the same technology as the internet to allow employees located in different offices to work
together on the same project or document at the same time. An intranet usually allows the users to access
the internet as well, while the contrary is not possible. A kind of access filter (called a firewall, which will be
discusses in detail in ref. 6.1.2) or other measures are used to prevent unauthorized people from spying
on the company’s data or spreading computer viruses.
Another type of network that uses internet technology is the extranet. Extranets are different from the
intranet as they are not restricted to employees of the same company or companies belonging to the same
group, but are open to other people such as suppliers or customers who have access to a limited part of
the business information.
The most common technology used to access to an extranet is a VPN (from “Virtual Private Network”)
that allows people to use the internet to connect to the site that accesses the extranet, where users
typically have to identify themselves with a user name and password. After doing this, a secure and private
connection is established, on which the extranet resources are available.
In order to better understand the differences between the internet, intranet and extranet we can give a
concrete example using the network services offered by any bank:
l Those who are not customers of a bank can still access the bank site and get information on services
available, interest charged, etc. via the internet;
l Those who are customers of that bank have a password that allows them to perform many operations
online. In this case they access to an extranet through a VPN;
l Those who are employees of that bank can access the checking accounts of customers to provide infor-
mation or carry out transactions on behalf of the customer. In this case the network that the employee
is using is an intranet.

©2020 AICA & Edizioni Manna


CE-62 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

5.1.4 Understand what transfer rate means. Understand how it is measured: bits per
second (bps), kilobits per second (kbps), megabits per second (mbps), gigabits
per second (gbps)
The data transfer rate (or connection speed) is measured in bps (abbreviation of “Bits Per Second”) and
its multiples
l Kbps which has one thousand bps;
l Mbps which has approximately a million bps;
l Gbps which has approximately a billion bps.

You can also write these three bps multiples like this: kbit/s, mbit/s, gbit/s.
The bps and its multiples can be compared to miles per hour travelled by car, also because this serves
as a reminder that the speed of communication depends not only on the modem (the car), but also on the
telephone line (the road which can be narrow or wide, free or busy); for this reason the transfer speed is
sometimes called bandwidth.

5.1.5 Understand the concepts of downloading from, uploading to a network


Each network is based on the principle of transferring data from one computer (or other electronic device)
to another, regardless of the physical distance the data needs to travel.
When data is transferred from a computer network to your PC this is known as the downloading of data.
This is what happens, for example, when we download a file from the Internet.
The opposite process, when you transfer data from your PC to a network of computers, it is known as
uploading data. This is what happens when you upload a picture of yourself, a video or even a simple
text message onto the internet.

5.2 NETWORK ACCESS


5.2.1 Identify the different options for connecting to the Internet like: phone line, mobile
phone, cable, wi-fi, wi-max, satellite
It has already been mentioned (in 5.1.1) that the most common method for connecting computers far away
from each other is the phone line, sometimes even with sub oceanic cables. The most used phone line
to connect computer is the so-called PSTN (“Public Switched Telephone Network”) which use the normal
phone cable present in almost all houses.
It is with this cable that the majority of connections to the Internet happen. Your computer, using the phone
line, is connected to an internet provider. It is through the provider’s computer, that is constantly connected
to the Internet, that you have access to the network.
The connection between your computer and the provider is possible thanks to a modem, a device that
transmits data using the phone lines.
The most used connection through phone lines is ADSL that, using a normal phone cable, reaches
transmission speeds that range from 1 to 25 Mbit/s (equal to 1000000 bits per second). ADSL modems use
high frequencies to send and receive data, this leaves the frequencies used for normal phone conversations
free, making it possible to use the internet and the phone at the same time.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-63
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

More efficient connection systems are made using the optical fibres, which consent downloading speeds
up to hundreds of mbps. An optical fibre line is made of hundreds of glass strands and the signal is
transmitted with a light beam. The main benefits consist in the overcoming of problems related to the
resistance that a metal has during the electric current passage: In fact, inside the optical fibre cables the
signal does not meet any resistance because it is a light beam. The disadvantages of this technology are
the higher cost and fragility of the optical fibres compared to the traditional metal cables (principally in
brass). Optical fibres cables are principally present inside big cities, due to their high installation costs (the
so-called “wiring”).
To connect to the Internet in places without phone a line or if you are not at home it is possible to use a
mobile phone. Depending on the technology used, the internet connection speed can reach 2 Mbit/s with
the 3G systems (“G” stands for “Generation”), up to 10 Mbit/s with 4G systems and even more with 5G
technologies. These stated speeds are never reached in reality, this is also the case for connections via
normal phone lines.
In some cases, special cables, installed by professionals, are used to give users extremely high connection
speeds.
The spread of laptops and then tablets has occurred in parallel with the spread of WLAN. Typically they
are used in individual homes, but there are also wireless networks in public places such as universities,
hotels, shops, etc. The speed of this type of connection is generally equal to 54 or 108 Mbit/s.
For the most isolated places, which are not reached by either ADSL or optical fibres, satellite connections
offer another alternative. In fact, it is possible to connect computers (and
therefore also to connect to the internet) using satellites, through normal
parabolic antenna that receive signals transmitted by satellites in orbit
around the planet. The major limitation of this technology is that it only
offers a fast connection for computers receiving data; if a computer has
to transmit information, it still needs to use a traditional telephone line.
There is one type of satellite connection that allows both transmission and
reception, however it is very expensive, therefore it is not appropriate for
the average user.
Finally, there is another wireless connection, WiMax, that allows broadband connections in areas in which
telephone operators do not find it worthwhile to create new optical fibre networks, for example in less
populated areas and in the mountains. The transmission rate is around 10-20 Mbps, although it can
theoretically reach 100 Mbps, transmitted up to 100 km away. While normal wi-fi transmitters cover an area
of a few tens of meters, the signals sent by Wi-Max repeaters can reach tens of kilometres.

5.2.2 Define the term Internet Service Provider (ISP). Identify important considerations
when selecting an internet subscription option like: upload speed, download
speed and quota, cost
An Internet Service Provider or ISP is a company that allows internet connections through a subscription.
It is to one of their computers (called servers, that are permanently connected to the Internet), that our
computers, tablets, smartphones or other devices connect to through the modem in order to go online.
Since the spread of the Internet has multiplied the number of subscription packages on offer, it is necessary
to know how to evaluate the different costs in relation to the services offered. In addition to connecting
to the internet, ISPs also offer users one or more email accounts, web spaces to publish a personal
website, and other services connected to the Internet such as inclusion of your web page in their search
engines, etc. The two basic factors to consider when choosing an Internet subscription are the speed of
the connection and any limitation on the amount of data that can be downloaded.

©2020 AICA & Edizioni Manna


CE-64 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

Each Internet provider must specify in its offers:


l What is the maximum download speed with which data from the Internet can be downloaded and if
there is a minimum guaranteed speed.
l What is the maximum upload speed with which data to the Internet can be uploaded and if there is a
minimum guaranteed speed.
l If there are limits to the amount of data that can be downloaded. Most subscriptions based on con-
nections to a home telephone line have a flat rate. In contrast, mobile phone connections are often limi-
ted by the amount of data that can be downloaded. If the user goes beyond the limits, the download
speed is limited or they have to pay more for the extra connections. It should not be forgotten that by
surfing on the Internet, the amount of data needed to be downloaded varies greatly based on what is
displayed. A video, for example, can require hundreds of times the data than that required to display the
page of an online newspaper.

5.2.3 Recognise the status of a wireless network: protected/secure, open


If you are using an electronic device (notebook, tablet, smartphone, etc.) that has a WiFi card correctly
installed and turned on, or a device connected to a wireless adaptor (for example a desktop computer to
whom is connected a WiFi pen-drive), you can display a list of the wireless networks available.
The fastest way is to click on the wireless icon which appears in the Windows taskbar (near the clock), this
is usually at the top of the screen of tablets and smartphones. The icon will be different depending on the
operating system and device you are using, but is generally similar to one of the four represented in the
next fig.

With Windows, for example, after you have clicked on the icon the window Network & Internet settings will
open with a list of the available connections (see next fig.).

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-65
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

For some networks, called protect or secured, you need a password to connect to them. There are also
open networks which allow anyone to connect, but it is worth remembering that the other users could be
able to capture your personal information while you are connected.

5.2.4 Connect to a wireless network


To connect to an available wireless network just click on the one you want in the Network & Internet
Settings list, and then on Connect (see next fig.).

If it is a protect network, you will be asked for a password (see next fig.). With more recent routers it is also
possible to connect by pressing a button on the device, which is usually labelled “WPS”.

©2020 AICA & Edizioni Manna


6 Security and Well-Being

6.1 PROTECTING DATA AND DEVICES


The spread of computer systems has led companies to entrust a huge amount of data to computers and
networks. Some of this data is of particular importance to the companies themselves, while other data
must remain confidential due to it containing personal information about employees or customers. For
these reasons any company, regardless of its size, needs to worry about managing security issues relating
to electronically processed data. These problems are mainly due to the possibility that unauthorized people
might access that data, and that data might be lost because of carelessness, malfunctions, viruses, or
other reasons.
Among the main rules to follow in order to avoid these and other similar risks, a security policy relating to
the management of sensitive data must be adopted. Necessary measures must be taken to prevent the
loss of this data (as a result of accidents, theft, damage, destruction) or its modification (especially when
the information is confidential). To avoid this, it is necessary to make periodic backups of data (6.1.3) and
use monitoring procedures to trace the people who have had access to confidential data.
Additionally, procedures for reporting security issues must be prepared, so that if someone suspects
that there is damage or improper use of confidential information, the necessary countermeasures can
be activated immediately. Finally, employees need to know their responsibilities regarding data security.
They must be educated to ensure the attentive and confidential use of information, starting from the use
of passwords.
For the general public, the rapid spread of computers, smartphones and tablets has also led to the
recording of lots of personal data (information, documents, photos, etc..) on these devices. The importance
of this is often only discovered when the device is broken or, even worse, stolen. In these cases, therefore,
it is essential to know and respect the basic rules for data protection.

6.1.1 Recognise good password policies like: create with adequate length, adequate
character mix, do not share, change regularly
There are applications that are able to decrypt passwords. To reduce this risk, it is prudent to avoid using
passwords that correspond to:
l Personal data (own or family name or date of birth, phone numbers, license plate of car, etc.);
l Predictable sequences (such as “123456”, “000000”, “password”, “qwerty”, “hello”, etc.).
l Commonly used words (“butterfly”, “secret”, etc.).

It is best to use at least eight characters and both lower- and upper-case letters for a password, as well
as numbers and possibly symbols (e.g. “M@rio673” or “3nr1c0*!”, etc.). Another good habit is to change
passwords periodically. Finally, it goes without saying that it is not recommended tell a password to anyone!
Also remember it well, and avoid writing it down somewhere obvious, like on the back of a mouse pad or
on a piece of paper attached to the screen!
Some applications and sites allow people to store their password so that it is automatically inserted on
the next use. However, this option should only be chosen if you are sure that you are the only person that
uses your computer.
Another good habit is to change passwords every three months, for example depending on the seasons,
and it is especially important not to use the same password for all the services you need to access.

CE-66
©2020 AICA & Edizioni Manna
ICDL MODULE COMPUTER ESSENTIALS SECTION CE-67
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

You must not to communicate your password to friends, parents, administrators or other people because
you would risk that they then tell it to other people. If it is absolutely essential to communicate your
password to someone else, remember to change it soon after.
Finally, be sure that no one is looking at you when you write a password. Experts have been known to find
passwords with little cameras.

6.1.2 Define the term firewall and outline its purpose


A firewall is a safety system that tries to make it impossible for outsiders to access data contained
in a device connected to the Internet or to spread computer viruses.
A firewall can be either software or hardware. Firewall applications are increasingly being used also by the
general public, especially by those who are connected to the Internet for several hours per day. Common
operating systems usually already have internal software of this kind, likewise, ADSL modem-routers often
also have an integrated firewall system.
The firewall blocks intrusion attempts, preventing the computer from responding to external instructions.
It must be said that not all of these attempts have negative aims and that, in any case, a firewall does not
guarantee the user one hundred percent protection from professional hackers with malicious intentions.

6.1.3 Understand the purpose of regularly backing up data to a remote location


The term backup refers to backup copies of files (documents, programs, etc.) that are stored on removable
media (e.g. a pen drive, external hard drives, CDs, DVDs), so that the data can be recovered in the case
of loss or damage to the main device. One of the most frequently occurring problems is damage, total or
partial, to the hard disk. Everything that was stored on the damaged sectors of the hard disk could be lost.
Other risks are due to malware (malicious software), software malfunction and, above all, human error.
It is important to store the backup in a different place than the one in which the computer is located, in
case there are exceptional circumstances such as theft, fire or building collapse. The frequency of backups
should be even greater if you use laptops. Notebooks are more exposed to failure due to accidental falls
or collisions and are more likely to be lost or stolen.
Other electronic devices can also suffer accidents, e.g. tablets, smartphones and mobile phones. For the
first two devices it is advisable to copy of your personal data onto a computer, i.e. perform a data transfer.
In the case of mobile phones, it is advisable to write the phone numbers that have been saved on the
phone in an electronic document or in traditional telephone book.
In any case, it is important to realize that the increasing capacity, convenient cost, and power of electronic
devices means that they often contain a lot of important personal data: phone numbers, photos and videos,
notes, emails and documents. The importance and secrecy of these is sometimes only realized when the
device is broken, or has been lost or stolen.

6.1.4 Recognise the importance of regularly updating software like: anti-virus,


application, operating system software
The computer world is evolving, every day new software is released. Malware is no exception to this rule,
new types of malware appear every day.
When new malware appears, experts at antivirus companies produce new instructions and software
changes to resist them.

©2020 AICA & Edizioni Manna


CE-68 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

Of course, if you do not connect to the malware producers’ site, the operating system or the application
will not encounter the new malware, avoiding getting it on your computer or electronic device. However if
you wish to keep using your device as normal, the best, and easiest, thing to do is leave the system to
automatically install updates while the device is connected to the Internet, without disturbing you
while you are using the device.

6.2 MALWARE
6.2.1 Understand the term malware. Identify different types of malware like: virus, worm,
Trojan, spyware
Not so many years ago, when newspapers and the media talked about computer viruses, people thought
of new diseases that are able to harm humans too. Today, the situation is different, and almost everybody
knows that a cyber-virus consists of a small program created to do damage to a computer and to spread
inside it.
Over the years, other malicious software have appeared and today we talk about malware (“MALicious
softWARE”) as a general term for any type of software able to take information or create damages. This
includes not only viruses, but worms, Trojans, spywares, and more.
Worms spread primarily via e-mail. In fact, when a device has been infected by a worm, it begins to send
e-mails automatically to all the contacts in the address book whenever the device is connected to the
internet, without the user noticing.
A copy of the worm is attached to each of these messages. If the person who receives that message
opens the attachment, which is likely given that they will recognise the sender, their own device will also be
infected. Through this continuous multiplication, the malware occupies more and more space in the device
memory, slowing down performance.
Trojans or Trojan horses are so-called because their strategy resembles that used in the Greek legend
by Ulysses to penetrate the city of Troy by hiding in a huge wooden horse.
Trojans penetrate a computer hidden in other programs and begin
to gather confidential information about the user (e.g. user ID,
passwords and other codes such as those of credit cards used to
make purchases via the internet) and then send this information
to Hackers (the people that create malware) while the computer is
connected to the Internet.
Some trojans allow the hacker to check the device where the malware
is installed via the internet. They can view the entire contents of the
user´s device, and copy, modify or delete information. In some cases, the attacker can even control what
happens in the house of the owner of the computer if a microphone or a webcam is connected and turned
on. Of course, this in only possible when the device is connected to a network.
Less dangerous is so-called spyware, which consists of files that, while you are online. secretly transmit
data concerning you (e.g. the type of web sites you have visited) to external computers, which process
this data and send advertising messages according to your habits and preferences. For example, if you
frequently visit sites about the world of cars, when you connect to other sites you will see advertising
messages appear for the purposes of selling cars or products related to them.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-69
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

“Hybrid” versions of malware are also frequent: for example there are some trojans that install a program
on the computers of the unfortunate “victims” which then stores all characters typed on the keyboard and
transmits them, as long as there is a continuous connection to the Internet, to the hacker who sent the
malware.
The damage caused by malware can be of varied: theft and transmission of data stored on the device,
the appearance of undesired images, error messages, slow operation, failure of certain apps, etc. Often,
without a specific antivirus program, it is difficult to understand if the damage is caused by malware or a
problem caused by a software or hardware malfunctioning.
In some cases, the only way to use the device again is to delete (to format) the entire contents of the
internal memory and reinstall all the apps and documents by copying them external backup. This can
represent a serious problem for those who don’t habitually backup their data.

6.2.2 Be aware how malware can infect a computer or device


Just like biological viruses - that infect our body by penetrating into it - computer viruses and malware
can usually only infect a computer by entering from the outside. To understand what the mode of
transmission may be, you must remember that a computer or device is connected to input and output
peripherals.
Communication channels with the outside world, especially inputs, are the ways in which malware can
penetrate a computer or device. They are mainly:
l Connection to a network, particularly the internet;
l E-mail messages;
l Externals memory drives (pen drives, CDs and DVDs).

Pen drives are widely used to transfer text files or other documents from one computer to another. If
you transfer files from one computer to another frequently, the likelihood that malware from an infected
computer contaminates yours or another computer is increased. CDs and DVDs can also produce an
infection, infected files burned and then copied from one computer to another can cause the same result,
as can software of uncertain origin. Other external memory units (e.g. external hard drives) and documents
that have been stored for a long time can be the cause of a contamination if they have been previously
infected.
Today there is a greater risk of infection due to the widespread use of the internet, and networks in general,
transferring large volumes of information with increasing speed. Browsing the internet from one site to
another, you download several megabytes of information onto your computer and the greater the amount
of data, the greater is the risk.
At present, however, the most common source of malware infection is e-mail, in particular attachments.
Often, without our knowledge, malware will send infected messages to all names associated with our email
addresses (e.g. Windows Mail or Outlook).
The first thing that you can do to prevent this is not to open messages from unknown senders or messages
without subjects. In particular, it is important not to open any attachments with the extensions .exe, .com,
.bat, .vbs, .scr or .pif; and not to click on any links in these messages. However, this precaution only serves
to limit the damage. One solution may be to check mail directly on the website of the email provider and
to delete (including from the Recycle Bin) suspicious messages. However, without a good antivirus that is
constantly updated, the probability that your PC could be attacked by malware is still very high.

©2020 AICA & Edizioni Manna


CE-70 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

6.2.3 Use anti-virus software to scan a computer


An antivirus application is necessary for any computer. Recent operating systems, such as Windows
8, come with integrated antivirus software, as do some for other devices such as tablets and smartphones.
Default settings in antivirus applications are usually already configured to automatically manage:
l Scans (i.e. the analysis) of the initial start-up of the computer;
l Scans of a file when it is opened with an application;
l Scans of removable media (USB drives, memory cards, CDs, DVDs, etc.);
l Computer protection while browsing the internet;
l Scans of e-mail messages and their attachments;
l The automatic updating of the application at regular intervals, while the computer is connected to the
Internet.
It is also possible to undertake a manual scan of the device to check if there is any malware, by clicking
on the Scan command. By selecting a disk, folder or file you can perform specific scans to check their
integrity.
Use the command Scan or Scan for viruses after you have selected the disk, the folder or the file you want
to control. Often, once you have installed it on the computer, the antivirus can be started from the menu
that appears when you right click on a disk, a folder or a file by choosing the relevant option.
After the scan, if there is any malware, the antivirus will indicate the type and suggest which procedure to
follow to make your computer safe: disinfect, quarantine or delete files.
These options depend on the malware type:
l Disinfect: the program is able to eliminate the virus from the infected file and return the file as it was
before the infection.
l Quarantine: the program is not able to disinfect the virus, so it places it in a protected folder while wai-
ting for the manufacturer of the antivirus to download an update that allows the elimination of that kind
of virus
l Delete: the program is not capable of performing the first two operations, as a result the only solution is
to delete the file.

6.3 HEALTH AND GREEN IT


6.3.1 Recognise ways to help ensure a user’s well-being while using a computer or
device like: take regular breaks, ensure appropriate lighting and posture
As computers and other electronic devices are ever-present in the modern workplace, it is important to
follow some basic rules to avoid harming yourself through incorrect positioning or awkward movements.
Back, neck, and arm ache, eyes soreness, and headache are all common occurrences for people who
spend long periods of time using computers.
If you work with a computer for many hours, take regular breaks of ten minutes for every hour of work to
avoid eye fatigue. Stand up and walk for a while, relaxing the neck and back muscles. Raise your eyes
from the display every ten minutes to look at other objects in the room, e.g. look at your fingers or out of
a window.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-71
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

Pay attention to lighting. Ideally have a window to your side without the sunlight directly falling on the
screen. Windows should have curtains or blinds to avoid glare. Angling the display also reduces glare, if
you can see your reflection in the display then the lighting is not correct.
Adjust the brightness and contrast of the screen so that the text and the images are easy to see; however,
do not to have them at their maximum as this can damage the eyes and wears out the screen. To reduce
glare, it is generally preferable to choose light backgrounds and dark characters. The screen should be
frequently cleaned as it attracts dust, which in the long run makes it hard to see, as well as meaning that
fingerprints can mark the screen.
The chair you use should be height adjustable and preferably equipped with armrests to support the
elbows too. Your back should not be held up straight but not stiff. The spine should always be supported
and the back of the seat should be just below the shoulders. A footrest can be useful to prevent those who
have short legs from sitting too far forward on the chair so they can touch the ground with their feet. It is not
essential that the chair can swivel, but if it can, you should avoid twisting your back to answer the phone
or to pick up an object that is not in front of you. While using a computer or another device, try not to cross
your legs, because this causes an unnatural twisting of your spine.
The keyboard of a desktop computer should be at the same level as the elbows. It is best to raise up
the retractable stands that are generally found on the bottom of most keyboards. When you type on the
keyboard, your arms should hang softly from the shoulders with your forearms parallel to the floor. It is not
necessary to rest your wrists while typing, but some people find it comfortable to use a palm rest. You can
purchase latex palm rests that are cheap and functional.
The mouse should be close to the keyboard and at the same height, to avoid having to stretch your arm
too much in order to use it.
Finally, it is important to remember that for using computers in the workplace, there are clear safety
standards that oblige employers to ensure the health of their employees. For example, this includes the use
of good quality computer equipment, a maximum number of hours that can be spent in front of a computer,
controlling the brightness and ventilation in the working environment, respecting the rules concerning
posture and distance from the monitor, and regular eye examinations, which must be free for employees.
Unfortunately, too many companies - especially smaller ones - do not respect these rules.

©2020 AICA & Edizioni Manna


CE-72 SECTION ICDL MODULE COMPUTER ESSENTIALS
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

6.3.2 Recognise computer and device energy saving practices: turning off, adjusting
automatic shutdown, backlight, sleep mode settings
When computer work is interrupted for a few minutes, it is advisable to put the PC into sleep mode. This
puts the computer into a state comparable to that of a TV when it is turned off via the remote control, and
allows you to quickly resume the job at the appropriate time by pressing the power button. Hibernation
is different from sleep; while the computer stays turned on when it is in sleep mode, in hibernation the
computer stores the state in which the computer is and restores it when the computer is turned on again.
This allows you to continue your work on the computer exactly from where you left it, all without having
consumed unnecessary electricity. Computers can be set to automatically turn off the screen, go into sleep
or hibernation mode, or be completely shut down after a certain time interval of inactivity. This not only
protects the environment but is economical too. In battery powered mobile devices, such as notebooks,
tablets and smartphones, energy conservation is crucial for increasing battery duration, and therefore
the usefulness of the device. For notebooks the same method as described for computers can also be
applied. In tablets and smartphones, which generally are always or almost always left switched on, it is
necessary to adjust the screen brightness (preferably setting it to automatically adjust to the brightness of
the environment) and setting the screen to shut off after a short period of inactivity, preferably 30 seconds
or a minute.

6.3.3 Recognise that computers, devices, batteries, printer cartridges and paper should
be recycled
The spread of electronic devices means it is essential to know the basic rules for using them correctly, not
only for the preservation of our health but also for the environment. The intelligent use of electronic devices
contributes, in fact, to reducing pollution and energy consumption.
For example, you should use both sides of the paper when printing. You can change both the cartridges
of ink jet printers and the toner cartridges used in laser printers when they run out; although in the latter
case to prevent damage to the printer it may be best to rely on a professional rather than to do it yourself.
Before printing a document, it is also good to ask yourself whether printing it is really necessary, or if
keeping just the electronic version is sufficient, especially if you plan to change it later.
When you want to throw away a computer, electronic device, or their rechargeable batteries because
they are no longer functioning or repairable, it is important to follow the recycling rules of the area you live
in. There are companies that specialize in the disposal of electronic goods and others that try to restore
devices so they can be given to charities or to recover certain materials for recycling.

6.3.4 Identify some options available for enhancing accessibility like: voice recognition
software, screen reader, screen magnifier, on-screen keyboard, high contrast
To facilitate the use of computers for people who have physical limitations (the disabled, the aged, etc.),
there are a number of types of software available that improve accessibility.

©2020 AICA & Edizioni Manna


ICDL MODULE COMPUTER ESSENTIALS SECTION CE-73
COMPUTERS AND DEVICES DESKTOP, ICONS, SETTINGS OUTPUTS FILE MANAGEMENT NETWORKS SECURITY AND WELL-BEING

With the help of voice recognition software, the computer, tablet or smartphone microphone can be used
to issue commands to the device or to dictate texts that the device writes on the screen, without the need
to use the keyboard. Although the computer can sometimes make errors in interpreting the words spoken
into the microphone, this software is becoming increasingly widespread and are now integrated into some
common applications, such as the Google search engine.
Screen readers read the text shown on the screen out loud; this is not only essential for people with visual
problems but is also useful to all who may want to listen to the contents of the screen instead of reading it.
The latest operating systems already include programs that promote accessibility. You can find them,
for example, in Windows 7 (in the subfolder Ease of Access located in Accessories) and Windows 8 (in
Windows Ease of Access, which you can access by choosing All apps):
l Vocal assistant: This reads the text displayed on the screen;
l Ease of Access Center: This configures the accessibility programs allowing the computer to be
adapted to the user’s needs. It also allows the user to select the function high contrast that increases
the contrast of colours of texts and images to make them more visible;
l Screen magnifier: This magnifies the part of the screen where the mouse cursor is positioned, benefiting
people with visual problems;
l Windows Speech Recognition: This allows the users to give voice commands and dictate text.
l On-Screen Keyboard: This allows the user to type something without using the traditional keyboard
but by clicking on keys that appear on the screen. This application is useful to people who, because of
a disability, cannot press buttons but can use pointing devices such as a mouse or touchscreen.

©2020 AICA & Edizioni Manna

You might also like