Grade 7 2nd Semester (Software & Windows Setting)
Grade 7 2nd Semester (Software & Windows Setting)
7
Student Book
LED E •C •R
P L OM
CI SIB
EL SSI
ON
• R PRIN
IA ONA
PA
P
BL
ES
•
VIRTUOUS E TE
PERSON
• R E O NS
•C
S E CI O
R
E N I VE
EU
AR
HE
CT
C
US R
O DU R
R P
• P TRE
• EN
Grade 7
Introduction to Computer Science
1.1History of Computer
The First Generation
The Second Generation
The Third Generation
The Fourth Generation
The Fifth Generation
1.2 Characteristics of Computers
1.3 Classification of Computers
1.3.1Analog computers
1.3.2Digital Computers
1.4 Taking Care of Computer
1.5 Computer Applications
1.5.1Business
1.5.2Banking
1.5.3Insurance
1.5.4Education
1.5.5Marketing
1.5.6Health Care
1.5.7Military
1.5.8Communication
1.5.9Government
1.6 Functional Units
2. Hardware
2.1.1 Case
2.1.2 Power supply
2.1.3 Mainboard
2.1.4 CPU
2.1.5 System Buses
2.1.6 Expansion cards
2.1.7 Peripheral Connectors
2.1.8 Port
2.1.8.1Serial Port
2.1.8.2Parallel Port
2.1.8.3PS/2 Port
2.1.9Memory (RAM)
2.1.9.1Memory Capacity
2.1.9.2Conversion
2.2 Input Devices
2.3 Storage Device
2.4 Output Devices
3.Software
3.4 Operating System
3.4.1 Common Operating System
3.4.2 Computer Languages
4.Operating System
Control Panel
Access Items in Control Panel
Taskbar and Navigation Options
Taskbar
Start
Configure Power
Access Power Options
Choose What Power Button Does
Shutdown Settings
Create a Power Plan
Clock, Language and Region
Clock, Language and Region
Change Date
Change Time Zone
Add Additional Clock
Modify Mouse Settings
Ease of Access
Devices and Printers
Add a Device or Printer
Set a Default Printer
Printing Preferences
See What is Printing
Remove a Device
Unit
Keywords
A computer is an electronic device that is used to accept the data, process or manipulate the data,
and give the desired information so that people can understand.
Computers Humans
A computer never gets tired and can work Humans can only work continuously for a number of
continuously. hours.
Computers need electricity to work. Humans need food and water to work.
Computers perform arithmetic and logical operations A human performs mathematical and logical
very fast and without mistakes. operations slowly.
Computers have a limited storage capacity. The storage capacity of a human is very high.
Machine Machines are things that make our work easy or easier.
Data Processing The process of converting data into information is called data processing. Data is
the input and information is the output of the data processing system. Data processing consists of
different steps that are performed in a sequence.
DATA
PROCESSING
INFORMATION
8
Data Information
Information is correctly
Data is unstructured. organized, Processed, filtered,
and presented.
The Abacus, which emerged about 5000 years ago in Asia Minor and is still in use today, allows users
to make computations using a system of sliding beads arranged on a rack. Early merchants used
Abacus to keep trading transactions.
Abacus Pascaline
Blaise Pascal, a French mathematician invented the first mechanical machine, a rectangular brass
box, called Pascaline which could perform addition and subtraction on whole numbers. This was
in the seventeenth century. Colmar, a Frenchman invented a machine that could perform the four
basic arithmetic functions of addition, subtraction, multiplication and division. Colmar’s mechanical
calculator, “Arithmometer”, presented a more practical approach to computing. With its enhanced
versatility, the “Arithmometer” was widely used until the First World War, although later inventors
refined Colmar’s calculator, together with fellow inventors, Pascal and Leibniz, he helped define the
age of mechanical computation. Charles Babbage a British mathematician at Cambridge University
invented the first analytical engine or difference engine. This machine could be programmed by
instructions coded on punch cards and had mechanical memory to store the results.
For his contributions in this field Charles Babbage is known as ‘the father of modern digital
computer.
10
Some of the early computers included
Mark I This was the first fully automatic calculating machine. It was designed by Howard Aiken
of Harvard University in collaboration with IBM. This machine was an electronic relay computer.
Electromagnetic signals were used for the movement of mechanical parts. Mark I could perform the
basic arithmetic and complex equations. Although this machine was extremely reliable, it was very
slow (it took about 3-5 seconds per calculation) and was complex in design and large in size.
Atanasoff-Berry Computer (ABC) This computer developed by John Atanasoff and Clifford Berry
was the world’s first general purpose electronic digital computer. It made use of vacuum tubes for
internal logic and capacitors for storage.
ENIAC (Electronic Numeric Integrator and Calculator) The first all-electronic computer was
produced by a partnership between the US Government and the University of Pennsylvania. It was
built using 18,000 vacuum tubes, 70,000 resistors and 1,500 relays and consumed 160 kilowatts of
electrical power. The ENIAC computed at speed about thousand times faster than Mark I. However,
it could store and manipulate only a limited amount of data. Program modifications and detecting
errors were also difficult.
EDVAC In the mid 1940’s Dr. John von Neumann designed the Electronic Discrete Variable Automatic
Computer with a memory to store both program and data. This was the first machine which used
the stored program concept. It had five distinct units - arithmetic, central control, memory, input
and output. The key element was the central control. All the functions of the computer were co-
ordinate through this single source, the central control. The programming of the computers was done
in machine language
UNIVAC • I Remington Rand designed this computer specifically for business data processing
applications. The Universal Automatic Computer was the first general purpose commercially available
computer
11
The Second Generation
In the second-generation computers:
• Vacuum tube technology was replaced by transistorized technology,
• Size of the computers started reducing,
• Assembly language started being used in place of machine language,
• Concept of stored program emerged,
• High level languages were invented.
IBM 1401 was universally accepted throughout the industry and most large businesses routinely
processed financial information using second generation computers. The machine language was
replaced by assembly language. Thus, the long and difficult binary code was replaced with abbreviated
programming code which was relatively easy to understand.
The stored program concept and programming languages gave the computers flexibility to finally
be cost effective and productive for business use. The stored program concept implied that the
instructions to run a computer for a specific task were held inside the computer’s memory and could
quickly be modified or replaced by a different set of instructions for a different function. High level
languages like COBOL, FORTRAN and AL- GOL were dev eloped. Computers started finding vast and
varied applications. The entire software industry began with the second-generation computers.
This generation was characterized by the invention of Integrated Circuits (ICs). The 1C combined
electronic components onto a small chip which was made from quartz.
12
Later, even more components were fitted onto a single chip, called a semiconductor. This reduced
the size even further. The weight and power consumption of computers decreased and the speed
increased tremendously. Heavy emphasis was given to the development of software. Operating
systems were designed which allowed the machine to run many different programs at once. A
central program monitored and co-ordinate the computer s memory. Multiprogramming was made
possible, whereby the machine could perform several jobs at the same time. Computers achieved
speeds of executing millions of instructions per second. Commercial production became easier and
cheaper. Higher level languages like Pascal and Report Program Generator (RPG) were introduced
and applications-oriented languages like FORTRAN, COBOL, and PL/1 were developed.
The third-generation computers made use of ‘Integrated Circuits that had 10- 20 components on each
chip, this was Small Scale Integration (SSI). The Fourth Generation realized Large Scale Integration
(LSI) which could fit hundreds of components on one chip and Very Large-Scale integration
(VLSI) which squeezed thousands of components on one chip. The Intel 4004 chip, located all the
components of a computer (central processing unit, memory, input and output controls) on a single
chip and microcomputers were introduced. Higher capacity storage media like magnetic disks were
developed. Fourth generation languages emerged and applications software’s started becoming
popular.
Computer production became inexpensive and the era of Personal Computers (PCs) commenced. In
1981, IBM introduced its personal computer for use in office, home and schools. In direct competition,
the Macintosh was introduced by Apple in 1984. Shared interactive systems and user-friendly
environments were the features of these computers. As the computers started becoming more and
more powerful, they could be linked together or networked to share not only data but also memory
space and software. The networks could reach enormous proportions with local area networks. A
global web of computer circuitry, the Internet, links the computers worldwide into a single network
of information.
The characteristics of computers that have made them so powerful and universally useful are speed,
accuracy, diligence, versatility, and storage capacity. Let us discuss them briefly.
14
Digital Computer Analog Computer
• Small Computers
1) Microcomputers
Microcomputers are generally referred to as Personal Computers (PCs). They have smallest
memory and less power. They are widely used in day-to-day applications like office automation,
and professional applications, ex. PCAT, Pentium etc.
• Hybrid Computers Hybrid Computers are a combination of Analog and Digital computers. They
combine the speed of analog computers and accuracy of digital computers. They are mostly used in
specialized applications where the input data is in an analog form i.e. measurement. This is converted
into digital form for further processing. The computers accept data from sensors and produce output
using conventional input/output devices.
15
• Mini Computers Mini computers are more powerful than the microcomputers. They have higher
memory capacity and more storage capacity with higher speeds. These computers are mainly used
in process control systems. They are mainly used in applications like payrolls, financial accounting,
Computer aided design etc. ex. VAX, PDP-11.
•Mainframe Computers Main frame computers are very large computers which process data at
very high speeds of the order of several million instructions per second. They can be linked into a
network with smaller computers, microcomputers and with each other. They are typically used in
large organizations, government departments etc. ex. IBM4381, CDC.
• Super Computers A super computer is the fastest, most powerful and most expensive computer
which is used for complex tasks that require a lot of computational power. Super computers have
multiple processors which process multiple instructions at the same time. This is known as parallel
processing. These computers are widely used in very advanced applications like weather forecasting,
processing geological data etc. ex. CRAY-2, NEC - 500, PARAM.
Super Computer
Mainframe Computer
• Payroll calculations
• Budgeting
• Sales Analysis
• Financial forecasting
• Managing employee’s database
• Maintenance of stocks etc.
1.5.2 Banking
Today banking is almost dependent on computers.
Banks provide the following facilities:
17
1.5.3 Insurance
Insurance companies are keeping all records up-to-date with the help of computers. The insurance
companies, finance houses and stock brooking firms are widely using computers for their
concerns. Insurance companies are maintaining a database of all clients with information showing:
1.5.4 Education
The computer has provided a lot of facilities in the education system.
• The computer provides a tool in the education system known as CBE (Computer Based
Education). CBE involves control, delivery, and evaluation of learning.
• The computer education is rapidly increasing the graph of a number of computer students.
• There are number of methods in which educational institutions can use computer to educate
the students.
• It is used to prepare a database about the performance of a student and analysis is carried out
on this basis.
1.5.5 Marketing
In marketing, the uses of computers are the following:
Advertising: With computers, advertising professionals create art and graphics, write and revise copy,
and print and disseminate ads with the goal of selling more products.
At Home Shopping: Home shopping has been made possible through use of computerized catalogues
that provide access to product information and permit direct entry of orders to be filled by the
customers.
18
1.5.6 Health Care
Computers have become important part in hospitals, labs, and dispensaries. The computers are
being used in hospitals to keep the record of patients and medicines. It is also used in scanning and
diagnosing different diseases. ECG, Ultrasounds and CT scans etc. are also done by computerised
machines. Some major fields of health care in which computers are used are:
• Diagnostic System - Computers are used to collect data and identify cause of illness.
• Lab-diagnostic System - All tests can be done and reports are prepared by computer.
• Patient Monitoring System - These are used to check patient›s signs for abnormality such as
in Cardiac Arrest, ECG etc.
• Pharma Information System - Computer checks Drug-Labels, Expiry dates, harmful drug’s
side effects etc.
• Surgery: Nowadays, computers are also used in performing surgery.
1.5.7 Military
Computers are largely used in defence. modern tanks, missiles, weapons etc. Military also employs
computerised control systems. Some military areas where a computer has been used are:
• Missile Control
• Military Communication
• Military Operation and Planning
• Smart Weapons
1.5.8 Communication
Communication means to convey a message, an idea, a picture or speech that is received and
understood clearly and correctly by the person for whom it is meant for. Some main areas in this
category are:
• E-mail
• Chatting
• Usenet
• Video-conferencing
1.5.9 Government
Computers play an important role in government. Some major fields in this category are:
• Budgets
• Sales tax department
• Income tax department
• Computerization of voter’s lists
• Computerization of driving licensing system
• Computerization of Identity card
• Weather forecasting
19
1.6 Functional Units
A computer is an electronic device that we use in our daily life for communication, Education, space
technology, press or publishing, Entertainment, Engineering, design, Finance, Banking, Military,
Medical, etc. A computer system consists of mainly four basic units; namely input unit, storage unit,
central processing unit, and output unit. The Central Processing unit further includes an Arithmetic
logic unit and a control unit.
Program
& DATA
Input Storage Output
Unit Unit Unit
Results
Control
Unit
Central
Processing
Unit
Arithmetic
logic Unit
1) Input Unit: This unit is used for entering data and programs into the computer system by
the user for processing.
2) Storage Unit: The storage unit is used for storing data and instructions before and after
processing.
3) Output Unit: The output unit is used for storing the result as output produced by the
computer after processing.
4) Processing: The task of performing operations like arithmetic and logical operations is
called processing. The Central Processing Unit (CPU) takes data and instructions from the
storage unit and makes all sorts of calculations based on the instructions given and the type
of data provided. It is then sent back to the storage unit. CPU includes Arithmetic logic unit
(ALU) and control unit (CU)
• Arithmetic Logic Unit All calculations and comparisons, based on the instructions provided, ar
carried out within the ALU. It performs arithmetic functions like addition, subtraction, multiplica
tion, division and also logical operations like greater than, less than and equal to etc.
• Control Unit Controlling of all operations like input, processing and output are performed by
control unit. It takes care of step-by-step processing of all operations inside the computer.
20
21
Unit
Hardware
Keywords
20
23
2. Hardware
Hardware is the physical parts of a computer are called hardware. In here we will examine four
groups of hardware: System Units, Input devices, Output devices, and Storage devices.
2.1 System Unit All of the main components of a computer are grouped in the system unit. The sys-
tem unit includes the computer system’s mainboard, expansion card (video card, sound card, net-
work card, etc.), Power supply, and items such as hard disk, CD ROM drives, etc.
2.1.1 Case The case is the metal and plastic box that contains the system unit (mainboard, power sup-
ply, hard drives, cooling equipment). It protects the system from the outside world and helps to keep
the system unit components cool.
2.1.2 Power supply The power supply is an electrical device that transforms the standard electricity
supply. Personal computer power supplies are measured in watts. They usually range from about 50
watts to 500 watts.
New days we used the UPS (Uninterruptible Power Supply) which is primarily used as a backup pow-
er source for the computer. It can keep the computer running for a while so a user can save work can
properly shut down the computer when the power goes out.
2.1.3 Mainboard The mainboard (also called as motherboard or system board) is the biggest board
inside your system unit. The CPU, BIOS, and Chipset are normally situated on your mainboard along
with all the other electronic components. The well-known motherboard manufacturers are Asus Tek,
Intel, Giga Byte, and Micro-Star International.
2.1.4 CPU The CPU (Central Processing Unit) is one of the most important components inside your
computer. It is like the brain of your computer because it performs all the computer calculations. CPU
speed is measured in gigahertz (GHz) and has an important effect on the overall speed of your com-
puter. The main CPU manufacturers today are Intel (8086, 80486, Pentium, Pentium Pro, Pentium-II,
Pentium-III, and Pentium-IV processors), AMD (K6/2 and Athlon processors), Motorola (68000 and
PowerPC G4 processors), VIA (C3 1 GigaPro processor), and TI.
CPU
POWER SUPPLY
Mainboard
CASE
24
2.1.5 System Buses A system bus is a single computer bus that connects the major components of
a computer system, combining the functions of a data bus to carry information, an address bus to
determine where it should be sent, and a control bus to determine its operation. The technique was
developed to reduce costs and improve modularity, and although popular in the 1970s and 1980s,
more modern computers use a variety of separate buses adapted to more specific needs.
2.1.6 Expansion cards An expansion card (also called as internal card, add-on, interface adapter) is
an electronic board added in a desktop computer to provide or expand features not offered by the
motherboard. Some types of expansion cards: Video card, Sound card, Network card, TV card, Video
processing card, Modems, Host adapter, Interface adapter cards.
2.1.7 Peripheral Connectors The motherboard have multiple connectors attached to the side for con-
necting peripheral or input/output devices. Examples: Serial ports, parallel ports, Keyboard/ Mouse
ports, Audio ports, USB ports, and Network ports.
2.1.8 Port A Port is a physical docking point using which an external device can be connected to the
computer and also be a programmatic docking point through which information flows from a pro-
gram to a computer or over the internet.
2.1.9 Memory (RAM) Memory is defined as the place or locations where the data is stored.
Memory is classified into two parts:
25
A. Primary (Main) like Read Only Memory (ROM), Random Access Memory (RAM), and Programma-
ble Read Only Memory (PROM).
B. Secondary (Auxiliary) like Floppy disk, Hard disk, CD, Magnetic tape…etc.
Characteristics of Secondary Memory
RAM ROM
Users can write the data The user cannot write the data
into the Ram into the ROM
The contents of the RAM are The contents of the ROM are not
lost when the computer is off lost when the computer is off
C. Cache Memory Cache memory is a very high-speed semiconductor memory which can speed up
CPU. It acts as a buffer between the CPU and main memory. It is used to hold those parts of data and
program which are most frequently used by CPU. The parts of data and programs are transferred
from disk to cache memory by operating system, from where CPU can access them.
Advantages
26
Disadvantages
The memory unit consisting of 8 bits is called 1 BYTE, and each character used in computers is ex-
pressed as 1 byte. In this way, 256 (28) different characters can be encoded. The encoding of charac-
ters is done according to an international standard called ASCII code.
A 01000001
1 Byte = 8 bits
1 KB (Kilobyte) = 1024 bytes
1 MB (Megabyte) = 1024 KB
1 GB (Gigabyte) = 1024 MB
1 TB (Terabyte) = 1024 GB
Question How many bytes does the phrase “Mustafa Kamal” contain? (How many bits is it?)
Question How many bits and how many bytes does the word “I am healthy” contain?
27
1 Bit Binary Digit 1024 Alphabytes 1 Kryatbytes
4 Bit 1 Nibble 1024 Kryatbytes 1 Amosbyte
8 Bit 1 Byte 1024 Amosbyte 1 Pectrolbytes
1024 Bytes 1 Kilobytes 1024 Pectrolbytes 1 Bolgerbytes
1024 Kilobytes 1 Megabytes 1024 Bolgerbytes 1 Sambobytes
1024 Megabytes 1 Grigabyles 1024 Sambobytes 1 Quesabytes
1024 Gigabytes 1 Terabytes 1024 Quesabytes 1 Kinsabytes
1024 Terabytes 1 Petabytes 1024 Kinsabytes 1 Rutherbytes
1024 Petabytes 1 Exabytes 1024 Rutherbytes 1 Dubnibytes
1024 Evabytes 1 Zettabytes 1024 Dubnibytes 1 Seaborgbytes
1024 Zettabytes 1 Yottabytes 1024 Seaborgbytes 1 Bohrbytes
1024 Yottabytes 1 Brontobytes 1024 Bohrbytes 1 Hassiubytes
1024 Brontobytes 1 Geopbytes 1024 Hassiubytes 1 Meitnerbytes
1024 Geopbytes 1 Saganbytes 1024 Meitnerbytes 1 Darmstadbytes
1024 Saganbytes 1 Pijabytes 1024 Darmstadbytes 1 Roentbytes
1024 Pijabytes 1 Alphabytes 1024 Roentbytes 1 Coperbyte
2.1.9.2 Conversion
Number System: is a way to represent numbers in computer architecture. There are four different
types of the number system, such as:
A binary number system is one of the four types of number system. In computer applications, where
binary numbers are represented by only two symbols or digits, i.e. 0 (zero) and 1(one). The binary
numbers here are expressed in the base-2 numeral system. Each digit in this system is said to be a bit.
For example, (101)2 is a binary number.
In Algebra, decimals are one of the types of numbers, which has a whole number and the fractional
part separated by a decimal point. The dot present between the whole number and fraction’s part is
called the decimal point. For example, 34.5 is a decimal number. Here, 34 is a whole number part and
5 is the fractional part.
7
30 + 4 +
10
34.7 = P
P
Decimal Number P
P
P
P
P
28
3. Hexadecimal number system (base-6)
The hexadecimal Number System is one type of number representation technique, in which the value
of base is 16. That means there are only 16 symbols or possible digit values, there are 0, 1, 2, 3, 4, 5, 6,
7, 8, 9, A, B, C, D, E, F.
Octal Number System is a type of number system that has a base of eight and uses digits from 0 to 7.
100010112
=1x27 + 0x26 + 0x25 + 0x24 + 1x23 + 0x22 + 1x21 + 1x20
=128 + 8 + 2 + 1
Starting at the binary point and working left, separate the bits into groups of three and replace each
group with the corresponding octal digit.
100010112 = 010 001 011 = 2138
Starting at the binary point and working left, separate the bits into groups of four and replace each
group with the corresponding hexadecimal digit.
100010112 = 1000 1011 = 8B16
29
D. Decimal to Binary Conversation
2 139 1
2 69 1
2 34 0
2 17 1
2 8 0
2 4 0
2 2 0
1
Replace each octal digit with the corresponding 3-bit binary string.
2138 = 010 001 011 = 100010112
Replace each hexadecimal digit with the corresponding 4-bit binary string.
8B16 = 1000 1011 = 100010112
ASCII, short for American Standard Code for Information Interchange, is a character encoding
standard that assigns unique numeric values to represent various characters, symbols, and control
codes. Developed in the 1960s, ASCII has become the cornerstone of digital communication, forming
the basis for most modern computing systems and communication protocols. Each character in
the ASCII character set is assigned a unique 7-bit binary code, resulting in a total of 128 possible
characters. These characters include the uppercase and lowercase letters of the English alphabet (A-
Z, a-z), numbers (0-9), punctuation marks, mathematical symbols, and various control codes.
Text Blue
Text B L U E
Binary addition is one of the binary operations. To recall, the term “Binary Operation” represents the
basic operations of mathematics that are performed on two operands.
Binary addition is much easier than decimal addition when you remember the following tricks or
rules. Using these rules, any binary number can be easily added. The four rules of binary addition are:
0+0=
0+1=
1+0=
1 + 1 = 10 (write «0» in the column and carry 1 to the next bit)
31
I. Binary Subtraction
Binary Subtraction is one of the four binary operations, where we perform the subtraction method
for two binary numbers (comprising only two digits, 0 and 1). This operation is similar to the basic
arithmetic subtraction performed on decimal numbers in Maths. Hence, when we subtract 1 from 0,
we need to borrow 1 from the next higher order digit, to reduce the digit by 1 and the remainder left
here is also 1.
The data or commands can be entered into the computer for processing are input devices. like:
keyboard, Mouse, scanner, gamepad, joystick, bar code reader, digital camera, Touch screen, light
pen, webcam, Microphone, etc.
2.2.1 Keyboard A keyboard is the primary input device used in all computers. Each character on a
keyboard has an ASCII value. Each character pressed is converted into a digital signal, which the
computer interprets. The keyboard has a group of switches like function keys, keypad, modifier
keys, alphanumeric keys, and special purpose keys.
Advantages
• Easy to enter the text material consisting of alphabets, numbers, and some special characters
<,>, *,+,-,/…..etc.
• The cost is very low.
Disadvantages
• Pointing
• Clicking
• Double-clicking
• Dragging
• Scrolling
32
Advantages
Disadvantages
2.2.3 Scanner A scanner is an input device that can electronically capture text or images such as
photographs, drawings, artwork, etc.
2.2.3 Scanner A scanner is an input device that can electronically capture text or images such as
photographs, drawings, artwork, etc.
2.2.4 Gamepad A gamepad is a type of game controller which can be held using both hands.
2.2.5 Joystick A joystick is an input device that is commonly used to play games.
2.2.6 Barcode Reader A barcode reader consists of a series of parallel adjacent vertical bars
of various thicknesses. These vertical bars printed or present on the product represent the
information of the product.
2.2.7 Digital Camera This is used for taking pictures and videos.
2.2.8 Touch screen A touch screen is a type of display screen that has a touch-sensitive transparent
panel covering the screen so that it can recognize the location of a touch on its surface.
2.2.9 Touchpad A touchpad is a device for pointing (controlling input positioning) on a computer
display screen. It is an alternative to the mouse. Originally incorporated in laptop computers,
touch pads are also being made for use with desktop computers. A touchpad works by sensing
the user’s finger movement and downward pressure.
33
2.2.10 Trackball A trackball is an input device used to enter motion data into computers or other
electronic devices.
It serves the same purpose as a mouse, but is designed with a moveable ball on the top, which
can be rolled in any direction.
2.2.11 Light Pen A light pen is an input device that utilizes a light-sensitive detector to select
objects on a display screen.
2.2.12 A light pen is a form of a light-sensitive wand used in conjunction with a computer’s
monitor. It allows the user to point to displayed objects or draw on the screen.
2.2.13 Webcam A webcam is essentially a small camera that is connected to a computer, either
directly or wirelessly, and gathers a series of images that are viewed in real-time on the computer
screen.
2.2.14 Microphone A microphone converts sound waves into electrical signals that can be
understood by your computer›s sound card.
2.2.15 Bar Code Readers A Bar Code Reader is a device used for reading bar-coded data (data in
the form of light and dark lines).
2.2.16 Magnetic ink character recognition (MICR) MICR can identify characters printed with a
special ink that contains particles of magnetic material. This device particularly finds applications
in the banking industry.
2.2.17 Optical mark recognition (OMR) Optical mark recognition, also called mark sense reader
is a technology where an OMR device senses the presence or absence of a mark, such as a pencil
mark. OMR is widely used in tests such as aptitude test.
34
2.3 Storage Device
A storage device is a hardware device designed to store and retrieve information. The storage device
is classified as a hard disk, SSD (Solid State Driver), USB, Floppy Card, Magnetic Taps, CD Disk, DVD
Disk, and Blu-ray Disk.
2.3.1 Hard disk A hard disk is also called a hard drive or fixed disk drive. A hard disk is a device
that stores digitally encoded data on rapidly rotating platters with magnetic surfaces. A hard disk
is made up of platters (Platters are rigid disks made of metal or plastic), Tracks (rings on each
surface), Sectors (Sections of each ring), Clusters (A set of two eight sectors grouped together is
called a cluster).
2.3.2 SSD (Solid State Driver) A SSD is a storage device that uses solid-state memory to store
data.
2.3.3 USB (Universal Serial Bus) A USB driver is a flash memory data storage device integrated
with a USB interface. The USB flash usually act as a portable hard drive. The storage capacity
of USB flash memories can be as large as 1 TB. The main advantage of USB flash is the speed of
operations and the breakdown less likely. The disadvantage of USB is capacity and cost.
2.3.4 Floppy Disk A floppy disk is also called a diskette. They are very slow compare to hard disk
or CD and hold smaller amounts of data.
2.3.5 Magnetic Taps The computer can read and write data on special cartridges of magnetic
tape. A magnetic tape cartridge looks like a music cassette.
2.3.6 CD (Compact Disc) Disk A CD is a type of optical disk capable of storing large amounts of
data up to 1 GB, although the most common size is 700 MB.
2.3.7 DVD (Digital Video Disk) DVD also called as Digital Versatile Disc, is an optical disc storage
media format. The DVD was invented and developed by Philips, Sony, Toshiba, and Time Warner.
The capacity of a DVD is 4.7 up to 8.5 GB.
2.3.8 Blu-Ray The Blu-ray disk is a high-density optical storage medium. The Blu-ray format was
developed to display high-definition video (HD) and store large amounts of data by the Blu-ray
disc Association. The capacity of Blu-ray is up-to 25 GB.
35
2.4 Output Devices
Output devices are peripheral devices that output information that has been held or generated within
a computer. Because most information from a computer is output in either a visual or auditory format,
the most common output devices are the monitor, Speakers and headphones, Printer, and Plotter.
2.4.1 Monitor A monitor or computer screen is a very common type of output device. A computer
monitor is a display adapter that displays information processed by the computer›s video card.
There are two main types of monitors: CRT (Cathode Ray Tube) and LCD (Liquid Crystal Display).
2.4.2 Printer A printer is an output device that prints text and computer generate images onto a
paper or onto another physical medium. There are different printers are available: Ink-jets Printers,
Laser printers, Impact Printers.
2.4.3 Plotter A plotter is an output device similar to a printer, but for larger images. Plotters use
either pens or electrostatic charges to line art, rather than raster graphics as with other printers.
2.4.4 Speakers A speaker is an output device that plays sound generated by the computer’s
sound card. The speaker is attached to the sound card by a cable or may Bluetooth. There are
many types of speakers are available: Floor-standing, Bookshelf, In-wall, subwoofer.
36
2.4.5 Headphones A headphone is a pair of speakers worn over or in the ears so only the wearer
can hear the sound. Headphones are useful for cancelling the noise in the environment or listening
to music or watching movies with mobile devices.
37
Unit
Software
In this unit, we will;
Explain what are the system software and application software,
types of operating systems, what are the utility programs and
programming languages.
Keywords
38
39
Software
A program is a set of instructions given to the computer to perform some specific task or activity.
The set of programs that does the specific jobs are called software. Computer Software gives
instructions that make computer hardware work. Using the software, a computer can receive the
data, store the data, manipulate the data, and output the data in the correct order and format.
Software is classified into two parts: System Software and Application Software
System Software
A Collection of programs that help the user to interact with hardware components efficiently. The
system software control and manage the hardware because directly interact with hardware. For
example: Compiler, operating system etc.
Application Software
A Collection of programs written for a specific application such as MS Word, MS Excel, payroll,
banking, Reservation of ticket etc.
Collection of programs that help the user Collection of programs written for a specific
to interact with hardware components effi- application such as payroll, banking, reserva-
ciently. tion of ticket etc.
System software control and manage the Application software uses the services of the
hardware. system software to interact with hardware
components.
Directly interact with hardware. Interact with hardware using system calls
provided by various system software.
Utility Programs
Utility software is a kind of system software designed to help analyze, Configure, Optimize and
maintain the computer. There are different utility applications are available like Disk Checkers,
Disk Cleaners, Disk Space Analyzers, Disk Partitions, back up, Antivirus Software’s etc.
40
Software
Antivirus: A virus can be defined as a malicious program that attaches itself to a host program
and makes multiple copies of itself, slowing down, corrupting or destroying the system. A soft-
ware that assists the OS in providing virus free environment to the users is called antivirus. An
anti-virus scans the system for any virus and if detected, gets rid of it by deleting or isolating it.
It can detect many types of virus like boot virus, Trojan, worm, spyware, etc. When any external
storage device like USB drive is attached to the system, anti-virus software scans it and gives an
alert if a virus is detected. You can set up your system for periodic scans or scan whenever you
feel the need. A combination of both the techniques is advisable to keep your system virus free.
File management tools: As you know, file management is an important function of operating
systems as all data and instructions are stored in the computer in form of files. Utility software
providing regular file management tasks like browse, search, update, preview, etc. are called file
management tools. Windows Explorer in Windows OS, Google desktop, Directory Opus, Double
Commander, etc. are examples of such tools.
Disk Cleanup: Disk cleanup tools assist users in freeing up disk space. The software scans hard
disks to find files that are no longer used and frees up space by deleting them.
Disk Defragmenter: Disk defragmenter is a disk management utility that increases file access
speeds by rearranging fragmented files on contiguous locations. Large files are broken down into
fragments and may be stores in non-contiguous locations if contiguous ones are not available.
When such files are accessed by the user, access speed is slow due to fragmentation. Disk defrag-
menter utility scans the hard disk and tries to assemble file fragments so that they may be stored
in contiguous locations.
Backup: Backup utility enables backing up of files, folders, databases or complete disks. Backups
are taken so that data may be restored in case of data loss. Backup is a service provided by all
operating systems. In stand-alone systems, backup may be taken in the same or different drive. In
case of networked systems backup may be done on backup servers.
Operating System
An operating system is defined as an integrated set of programs that manage the various resourc-
es and operations of a computer system. The operating system acts as an interface between the
humans and the computer. The operating system ensures the smooth and efficient operation of
a computer. It hosts several applications that run on a computer and handles the operations of
computer hardware.
Users and application programs access the services offered by the operating systems, using sys-
41
tem calls and application programming interfaces. Users interact with operating systems through
Command Line Interfaces (CLIs) or Graphical User Interfaces known as GUIs. In short, the oper-
ating system enables user interaction with computer systems by acting as an interface between
users or application programs and the computer hardware.
Kernel is the core of an operating system, it manages (memory, files, and other devices), main-
tains (time and date), Start applications and manages system resources. Shell provides direct
communication interface between the user and the kernel.
Mac OS: Backup utility enables backing up of files, folders, databases or complete disks. Backups
are taken so that data may be restored in case of data loss. Backup is a service provided by all
operating systems. In stand-alone systems, backup may be taken in the same or different drive. In
case of networked systems backup may be done on backup servers.
Google Android: Android from Google is the most popular operating system in the world. It›s
mainly used on tablets and smartphones. It also runs on devices made by other manufacturers.
Users have access to numerous mobile applications available on the Google Play Store.
Apple iOS: Apple iOS from Apple is used on smartphones and tablets manufactured by the same
company. Users of this system have access to hundreds of applications. The operating system
offers strong encryption capabilities to control unauthorized access to users› private data.
Linux: Created by the Finnish programmer Linus Torvalds, Linux is today developed by program-
mer collaborators across the world who submit tweaks to the central kernel software. Linux is
popular with programmers and corporate servers. It is available for free online.
42
Software
Computer Languages
Computer language refers to a formal language designed to communicate instructions to a com-
puter. It provides a way for humans to interact with machines by expressing computational tasks
and algorithms in a structured and unambiguous manner. Computer languages are essential for
programming and software development, enabling the creation of various applications, operating
systems, and digital systems.
There are numerous computer languages, each with its own syntax, semantics, and purpose.
Some of the widely used programming languages include:
Machine Language: A machine language consists of the numeric codes for the operations that
a particular computer can execute directly. The codes are strings of 0s and 1s, or binary dig-
its (“bits”), which are frequently converted both from and to hexadecimal (base 16) for human
viewing and modification. Machine language instructions typically use some bits to represent
operations, such as addition, and some to represent operands, or perhaps the location of the next
instruction. Machine language is difficult to read and write, since it does not resemble conven-
tional mathematical notation or human language, and its codes vary from computer to computer.
Assembly Language: Assembly language is one level above machine language. It uses short
mnemonic codes for instructions and allows the programmer to introduce names for blocks of
memory that hold data. One might thus write “add pay, total” instead of “0110101100101000” for
an instruction that adds two numbers. Assembly language is designed to be easily translated into
machine language. Although blocks of data may be referred to by name instead of by their ma-
chine addresses, assembly language does not provide more sophisticated means of organizing
complex information. Like machine language, assembly language requires detailed knowledge of
internal computer architecture. It is useful when such details are important, as in programming a
computer to interact with peripheral devices (printers, scanners, storage devices, and so forth).
43
of a computer’s internal architecture. C, along with its descendant C++, remains one of the most
common languages.
C++ Programming Language: The C++ language, developed by Bjarne Stroustrup at AT&T in the
mid-1980s, extended C by adding objects to it while preserving the efficiency of C programs. It
has been one of the most important languages for both education and industrial programming.
Large parts of many operating systems were written in C++. C++, along with Java, has become
popular for developing commercial software packages that incorporate multiple interrelated ap-
plications. C++ is considered one of the fastest languages and is very close to low-level languages,
thus allowing complete control over memory allocation and management. This very feature and
its many other capabilities also make it one of the most difficult languages to learn and handle on
a large scale.
C# Language: C# (pronounced C sharp like the musical note) was developed by Anders Hejlsberg
at Microsoft in 2000. C# has a syntax similar to that of C and C++ and is often used for developing
games and applications for the Microsoft Windows operating system.
Structure Query Language: SQL is a language for specifying the organization of databases (col-
lections of records). Databases organized with SQL are called relational because SQL provides
the ability to query a database for information that falls in a given relation. For example, a query
might be “find all records with both last name Smith and city New York.” Commercial database
programs commonly use an SQL-like language for their queries.
Java Programming Language: In the early 1990s Java was designed by Sun Microsystems, Inc.,
as a programming language for the World Wide Web (WWW). Although it resembled C++ in
appearance, it was object-oriented. In particular, Java dispensed with lower-level features, in-
cluding the ability to manipulate data addresses, a capability that is neither desirable nor useful
in programs for distributed systems. In order to be portable, Java programs are translated by a
Java Virtual Machine specific to each computer platform, which then executes the Java program.
In addition to adding interactive capabilities to the Internet through Web “applets,” Java has been
widely used for programming small and portable devices, such as mobile telephones.
Python Programming Language: The open-source language Python was developed by Dutch
programmer Guido van Rossum in 1991. It was designed as an easy-to-use language, with fea-
tures such as using indentation instead of brackets to group statements. Python is also a very
compact language, designed so that complex jobs can be executed with only a few statements.
In the 2010s, Python became one of the most popular programming languages, along with Java
and JavaScript.
44
Unit
4
Operating System
Keywords
46
Introduction
The operating system works as the intermediate between the user and
the machine. In this unit you will learn how to use different sections of
the system and get familiar with variety parts of the windows operating
system like change power options, clock and languages, modify mouse
setting and more.
47
1. Control Panel
This area is the central location from which aspects of the Windows 10 operating system can be
managed. There are three views that can be used to display items in the Control Panel.
• Category – In this view, Control Panel items are divided into eight categories. Links to the most
common tasks are available under the category name.
• Large Icons – When this option is selected, the All Control Panel Items window will display.
A list of all the Control Panel items will display.
• Small Icons - When this option is selected, the All Control Panel Items window will display.
A list of all the Control Panel items will display.
The most common tasks within each category are listed below the category name. Within the Control
Panel category, clicking the subcategory opens that item’s window; clicking a task jumps to a specific
command center available from the item’s window.
• All Control Panel Items Window – This option can be used when you are not certain of the
specific name of an item. To display this list of items, click either Small Icons or Large Icons in the
View by list. This list is located in the upper-right corner of the Control Panel. When the Control
Panel item is located, double-click on the item.
• Windows Search Box – This option is the simplest method of opening a Control Panel item. The
Search Box appears to the right of the Start Menu. When the item is input, a list of items matching
the word or phrase will appear at the top of the Start Menu. Click the item to open the window or
dialog box for that item.
48
3. Taskbar and Navigation Options
This area is used to make changes as to how items appear on the Taskbar or the Start Menu.
• In the Search box to the right of the Start Button input Control Panel.
• Click the Control Panel link at the top of the Start Menu.
• Select the location for the Taskbar on the screen. The options are Left, Right, Bottom, or Top
50
Software
Microsoft Windows 10
To open the Start menu which contains all your apps, settings, and files do either of the following:
51
Change your desktop background image
1. Select Start > Settings > Personalization > Background.
2. Select Picture, Solid color, Slideshow, or Windows Spotlight (to see a new image from around
the world every day).
52
Software
- Select Windows spotlight for beautiful photography that displays automatically. Windows Spot-
light updates daily with images from around the globe, and it also shows tips and tricks for get-
ting the most out of Windows.
If you don’t see the Windows spotlight image when you’re signing in, select Start > Settings >
Personalization > Lock screen. Check that the toggle for Show lock screen background picture on
the sign-in screen is turned on.
- Select Picture, then select a recent image, or select Browse photos, select the photo you want to
use, and select Choose picture.
- Select Slideshow, then select Browse, select the folder you want to use, and select Choose this
folder. If you see folders listed that you don’t want included in the slideshow, select Remove next
to that folder.
Tip: To test if the lock screen is working correctly, press Windows logo key + L to lock your device.
The selected background should appear on the lock screen.
Themes
A theme is a combination of desktop background pictures, window colors, and sounds. To get a
theme, expand one of the categories below, select a link for the theme, and then select Open. This
saves the theme to your PC and puts it on your desktop. Personalize your PC to learn more.
53
Fonts
In Settings, click “Personalization,” then select “Fonts” in the left sidebar. On the right pane, find
the font that you want to set as the default and click the font name.
If you have difficulty seeing the text on your computer, you can increase the font size. Increasing
the font size will also increase the size of icons and other items on your desktop.
54
Software
In the Taskbar settings, scroll to see the options for customizing, sizing, choosing icons, battery
information and much more.
55
Change the taskbar location
Typically, the taskbar is at the bottom of the desktop, but you can also move it to either side or the
top of the desktop. When the taskbar is unlocked, you can change its location. Press and hold (or
right-click) any empty space on the taskbar and select Taskbar settings.
1. Scroll down to Taskbar location on screen, and then select Left, Top, Right, or Bottom.
1. Press and hold (or right-click) any empty space on the taskbar, then select Taskbar settings >
Combine taskbar buttons.
2. Select from the list:
- Always, hide labels. This is the default setting. Each app appears as a single, unlabeled button,
even when multiple windows for that app are open.
- When taskbar is full. This setting shows each window as an individual, labeled button. When the
taskbar becomes crowded, apps with multiple open windows collapse into a single app button.
Select the button to see a list of the windows that are open.
- Never. This setting shows each window as an individual, labeled button and never combines
them, no matter how many windows are open. As more apps and windows open, buttons get
smaller, and eventually the buttons will scroll.
If you use multiple displays, you can make a different choice for your extra displays.
If you want to show more of your apps on the taskbar, you can show smaller versions of the but-
tons.
1. Press and hold (or right-click) any empty space on the taskbar, select Taskbar settings , and
then select On for Use small taskbar buttons.
2. Select Off to return to the larger taskbar buttons.
56
Software
active alarm that will notify you at the time you set. This feature is turned on by default, but you
can make sure it’s on (or turn it off).
1. Press and hold (or right-click) any empty space on the taskbar, and select Taskbar settings .
2. Scroll down to Show badges on taskbar buttons and set the toggle as desired.
Use the Peek feature to take a quick look at what’s on your desktop behind all the open windows.
1. Press and hold (or right-click) any empty space on the taskbar, select Taskbar settings , and
then turn on Use Peek to preview the desktop when you move your mouse to the Show desktop
button at the end of the taskbar.
2. Move the mouse pointer over (or press and hold) the far-right edge of the taskbar to see the
desktop.
3. To restore the view of all your open windows, move the pointer away or press and hold the edge
one more time.
You can hide the taskbar based on whether you’re in desktop mode or tablet mode.
1. Press and hold (or right-click) any empty space on the taskbar and select Taskbar settings.
2. Turn on either automatically hide the taskbar in desktop mode or automatically hide the task-
bar in tablet mode (or both).
57
Display night light
Your display emits blue light—the kind of light you see during the day—which can keep you up at
night. To help you get to sleep, turn on the night light and your display will show warmer colors
at night
that are easier on your eyes. Night light isn’t available if your device uses certain drivers (Display
Link or Basic Display).
58
Software
Turn on Bluetooth
After you’ve checked that your Windows 10 PC supports Bluetooth, you’ll need to turn it on.
Here’s how:
In Settings: Select Start > Settings > Devices > Bluetooth & other devices, and turn on Bluetooth.
1. Select the Start button, then select Settings > Devices > Printers & scanners > Add a printer or
scanner.
2. Wait for it to find nearby printers, then choose the one you want to use, and select Add device.
If you want to remove the printer later, just highlight it and select Remove.
3. If you don’t see your printer, try to fix the problem by using the steps in Fix printer connection
and printing problems in Windows.
59
Install a printer in Windows
When you connect a printer or scanner to your PC or add a new printer or all-in-one device to
your home network, you can usually start printing right away. Windows supports most printers,
so you probably won’t have to install special printer software. Additional printer drivers and sup-
port might be available if you update Windows.
Accounts in windows
Windows allows adding multiple user account to use the same device, enabling each user to have
their own settings, documents, and applications.
For example, parents can have their own accounts with administrative privileges to manage set-
tings and install software, while children can have standard accounts with parental controls en-
abled to monitor and limit their usage. This ensures that each family member has a personalized
60
Software
experience with their own files, settings, and appropriate access levels, while also keeping family
members’ data private and secure from each other.
For personal and work or school use, having separate user accounts can help maintain a clear
boundary between personal files and activities and those related to work or school. For instance,
a user might have one account with personal emails, social media, and leisure applications, and
another account with work or school emails, productivity software, and access to professional or
educational resources. This separation not only helps in organizing and focusing on the task at
hand but also adds an extra layer of security by keeping sensitive work or school data compart-
mentalized.
a. If the person you’re adding already has a Microsoft account, enter the email address.
b. If the person you’re adding doesn’t have a Microsoft account, you can use their email address
to create one. Enter the email address that person uses most frequently and select Sign up for a
new email address.
c. If you select the option I don’t have this person’s sign-in information, you can sign up for a new
email address and create a new Microsoft account. If you want to create a local account, select the
option Add a user without a Microsoft account
61
Sign-in options
Windows Hello
Windows Hello is a more personal and secure way to sign in to your Windows device. Instead of
using a password, with Windows Hello you can sign in using facial recognition, fingerprint, or a
PIN.
These options help make it easier and safer to sign into your PC because your PIN is only associ-
ated with one device, and it’s backed up for recovery with your Microsoft account.
You can use the Settings app to configure and manage Windows Hello.
1. In the Settings app on your Windows device, select Accounts > Sign-in options or use the fol-
lowing shortcut:
2. Under Ways to sign in, you have three choices to sign in with Windows Hello:
• Select Facial recognition (Windows Hello) to set up facial recognition sign-in with your PC’s
infrared camera or an external infrared camera.
• Select Fingerprint recognition (Windows Hello) to set up sign-in with a fingerprint reader.
• Select PIN (Windows Hello) to set up sign-in with a PIN.
A security key is a hardware device - usually in the form of a little USB key - that you can use
instead of your username and password to sign in on the web. Since it’s used in addition to a fin-
gerprint or PIN, even if someone has your security key, they won’t be able to sign in without the
PIN or fingerprint that you create.
Security keys are usually available for purchase from retailers that sell computer accessories.
To set up a security key,
1. Go to Start > Settings > Accounts > Sign-in options,
2. Select Security Key.
62
Software
63
o Confirming the gestures
Dynamic lock
Windows can use devices that are paired with your PC to help detect when you’re away and lock
your PC shortly after your paired device is out of Bluetooth range. This makes it more difficult for
someone to gain access to your device if you step away from your PC and forget to lock it.
1. On your Windows 10 PC, select Start > Settings > Accounts > Sign-in options.
2. Under Dynamic lock, select the Allow Windows to automatically lock your device when you’re
away check box.
3. Use Bluetooth to pair your phone with your PC.
Once they’re paired, take your phone with you when you walk away, and your PC will automati-
cally lock a minute or so after you’re out of Bluetooth range.
Language in windows
You can add an input language in Settings. Adding an input language lets you set a language-pref-
erence order for websites and apps. It also lets you change your keyboard language.
1. Select Start > Settings > Time & Language > Language.
2. Under Preferred languages, select the language that contains the keyboard you want, and then
select Options.
64
Software
3. Select Add a keyboard and choose the keyboard you want to add. If you don’t see the keyboard
you want, you may have to add a new language to get additional options. If this is the case, go on
to step 4.
4. Return to the Language settings page and select Add a language.
5. Choose the language you want to use from the list, and then select Next.
6. Review any language features you want to set up or install and select Install.
65
1. Choose the Wi-Fi network you want, then select Connect.
2. Type the network password, and then select Next.
3. Choose Yes or No, depending on the type of network you’re connecting to and if you want your
PC to be discoverable by other PCs and devices on the network.
Status
The Status section of the Network & Internet tab shows your current connection status -- wheth-
er you’re connected to the Internet, and through which network. From this screen, you can View
your network properties to see your IP address, set up a Homegroup (more info on how to do this
here), and troubleshoot your connection using the Network troubleshooter.
Wi-Fi
At the top of the Wi-Fi section, there’s a toggle that lets you turn your Wi-Fi on or off. There are
multiple ways to turn Wi-Fi on and off (from the Action Center, for example), but it’s helpful that
Microsoft has included this toggle here.
Ethernet
The Ethernet section appears if you’re connected to a network via Ethernet, and is similar to the
Wi-Fi section. Here, you’ll see the network you’re connected to -- click on it, and you’ll be able to
see the network’s properties (IPv4 address, physical address, and so on) as well as the option to
make your PC discoverable to other PCs on the same network.
Airplane Mode
The Airplane mode section will only appear if you’re using a computer (or tablet) with built-in
wireless network radios, such as Wi-Fi and Bluetooth. This section has a simple toggle for Air-
plane mode, which turns off all wireless communication, as well as specific toggles for the differ-
ent radios (in my case, Wi-Fi and Bluetooth, but some tablets will also show cellular data).
Data usage
The Data usage section shows a breakdown of your data usage from the last 30 days (how much
data you’ve used from each source) in the form of a donut graph. This section is mostly useful for
tablet users who get their data from multiple sources, including Wi-Fi and cellular networks -- as
66
Software
you can see, I’m using a wired Ethernet connection, so this graph doesn’t tell me much. For more
details on which apps are using data, click Usage details under each source.
VPN
Here you can add a VPN by clicking Add a VPN connection. You’ll be able to designate VPN pro-
vider, connection name, server name/address and sign-in information. You can also toggle some
VPN Advanced Options -- choose whether to allow VPN connections to run over metered net-
works, or to run while you’re roaming (i.e. using cellular data).
Dial-up
The Dial-up section is, oddly, the only network section that appears even if you don’t have a via-
ble dial-up connection. The Wi-Fi section doesn’t appear on computers without Wi-Fi, while the
Ethernet section doesn’t appear on computers without an Ethernet jack, but the Dial-up section
appears on both.
Mobile hotspot
Turn your Windows 10 PC into a mobile hotspot by sharing your Internet connection with other
devices over Wi-Fi. You can share a Wi-Fi, Ethernet, or cellular data connection. If your PC has a
cellular data connection and you share it, it will use data from your data plan.
1. Select Start , then select Settings > Network & Internet > Mobile hotspot.
2. For Share my Internet connection from, choose the Internet connection you want to share.
3. If desired, select Edit > enter a new network name and password > Save.
4. Turn on Share my Internet connection with other devices.
5. To connect on the other device, go to the Wi-Fi settings on that device, find your network name,
select it, enter the password, and then connect.
Proxy
PC Settings > Network > Proxy. Here, you can use an automatic proxy, or you can manually set up
your proxy by entering in the IP address (domain name) and port of your proxy server. Using a
proxy server lets you do a variety of things, such as hiding your IP address or accessing websites
that aren’t available in your country.
67
Security features in Windows 10
Windows 10 includes a number of built-in features to keep your computer safe from viruses, mal-
ware, and more. You can learn more about some of the most important features below.
User Account Control
User Account Control warns you when a program or user attempts to change your computer’s
settings. Your screen will be temporarily locked until an Administrator can confirm the changes.
This helps to protect your computer against malicious software and accidental changes. User Ac-
count Control also allows you to decide how often you’ll receive these warnings.
Windows Security
Windows Security, formerly known as Windows Defender, provides antivirus and malware pro-
tection for your computer. In addition to scanning your computer for potentially harmful applica-
tions, Windows Security provides real-time protection, double-checking each file or application
you open without slowing down your computer.
68
Software
Windows Firewall
By default, Windows will protect your Internet connection with Windows Firewall. A firewall
prevents unauthorized access from external connections and helps protect your network from
threats that could harm your computer.
Updating Windows
In order to keep your computer secure, Microsoft will automatically provide regular updates to
your computer. These include important security updates, as well as new features. You can also
check for updates manually and choose when they’ll be installed. To do this, open the Settings
app, then choose Updates & security. Then, click Check for updates.
To pause updates:
In some cases, the new features introduced in an update won’t work correctly. If you’d prefer not
to receive these features right away, you can pause them. This won’t prevent updates from being
installed eventually, but it does mean you won’t receive them immediately upon release. This way,
69
if there are any problems with a future update your computer is less likely to be affected.
1. From the Update & Security settings, select Advanced options.
3. Your Windows updates will be paused until the selected date. Note that you’ll continue to re-
ceive important security updates from Microsoft automatically.
70
Software
If you ever need to recover lost files or reset your copy of Windows, you’ll use the options in the
Recovery settings.
1. Select the Start button, then select Settings > Update & Security > Recovery .
2. Under Reset this PC, select Get started and then choose from the options and/or settings in the
table below.
71
Option What it does
Keep my files > Change settings > Prein- - Reinstalls Windows 10 and keeps your per-
stalled apps On sonal files.
- Removes apps you installed.
- Removes changes you made to settings.
- Restores any apps your PC manufacturer
installed.
Keep my files > Change settings > Prein- - Reinstalls Windows 10 and keeps your per-
stalled apps Off sonal files.
- Removes apps you installed.
- Removes changes you made to settings.
- Removes any apps your PC manufacturer
installed.
Remove everything
Notes: - Remove everything > Change settings gives you two options.
- Data erasure On removes files and cleans the drive. If you’re planning to donate, recy-
cle, or sell your PC, use this option. This might take an hour or two, but it makes it harder
for other people to recover files you’ve removed.
- Data erasure Off just removes files. It takes less time, but is less secure.
If you can’t open Settings, you can reset your PC from the sign-in screen. Here’s how:
1. Press Windows logo key + L to get to the sign-in screen, and then restart your PC by pressing the Shift
key while you select the Power button > Restart in the lower-right corner of the screen.
2. Your PC will restart in the Windows Recovery Environment (WinRE) environment.
3. On the Choose an option screen, select Troubleshoot > Reset this PC, and then choose one of the op-
tions in the previous table.
72
Quiz
Quiz
1- Windows is a(n) ________ created by Microsoft.
a) word processor
b) operating system
c) web browser
d) computer
4- Let’s say you’re having trouble locating a file on your computer. Which of the following are good places
to look for the file? Select all that apply.
a) The screensaver
b) Default folders like My Documents
c) The Recycle Bin
d) The Downloads folder
5- If you want to move a window, you can click and drag the ________.
a) Start button
b) Close button
c) taskbar
d) top of the window
6- Suppose you have several windows open on your desktop, but some of them are hidden behind other
windows. What is the easiest way to switch to one of the hidden windows?
a) Click the icon on the taskbar
b) Press Ctrl+Alt+Delete on your keyboard
c) Close all programs and reopen them one-by-one
d) Press your computer’s Power button
7- True or False:
When you move a file to the Recycle Bin, it will be immediately deleted from your computer.
True
False
8- When you double-click a file on the desktop, it will open in the ________.
a) default application for that file type
73
b) most recently-opened application
c) Control Panel
d) Start menu
9- True or False:
You can only have one user account on a Windows computer.
True
False
74