0% found this document useful (0 votes)
3 views

Accessing And Using Internet

The document provides an overview of the Internet, including its definition, uses, and common terminology such as browsers, webpages, and protocols like HTTP. It explains how to connect to the Internet through various means, the role of Internet Service Providers (ISPs), and the importance of configuring browser settings for security and privacy. Additionally, it details the process of accessing and retrieving data from websites, including the functions of DNS servers and the rendering of web pages in browsers.

Uploaded by

Samuel Zewudu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Accessing And Using Internet

The document provides an overview of the Internet, including its definition, uses, and common terminology such as browsers, webpages, and protocols like HTTP. It explains how to connect to the Internet through various means, the role of Internet Service Providers (ISPs), and the importance of configuring browser settings for security and privacy. Additionally, it details the process of accessing and retrieving data from websites, including the functions of DNS servers and the rendering of web pages in browsers.

Uploaded by

Samuel Zewudu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 32

1.

1 Internet
:- A means of connecting a computer to any other computer anywhere
in the world via dedicated routers and servers.
● When two computers are connected over the Internet, they can send
and receive all kinds of information such as text, graphics, voice, video,
and computer programs.
Uses of the Internet:
 The Internet is used for many things such as e-mail, social
networking, job-hunting, getting the latest news, research,
listening to music, watching videos, getting driving
directions(map), reading online books and so much more.

1.1.1 COMMON TERMS YOU MIGHT HEAR AND WHAT THEY MEAN:

BROWSER:
 Is a free software package or mobile app that lets you view web
pages, graphics, and most online content? The most popular web
browsers include Chrome, Firefox, Microsoft Edge, and Safari, but
there are many others.
WEBPAGE:
 Is what you see in your browser when you are on the internet?
Think of the webpage as a Page in a magazine. You may see text,
photos, images, diagrams, links, advertisements and more on any
page you view.

HTTP:
 Is the protocol used to request and transmit files over the Internet
or other computer.
URL(Uniform Resource Locator) :
 In other words, the web address of internet pages and Files.
 The URL tells the browser exactly where to find the page. For
example, www.akronlibrary.org is the URL or web address to get
to the library‗s website.
*.com signifies the part of the URL that identifies what exactly that site
is part of i.e., institution, government, business, etc.
A) . com: generally, for commercial businesses
B) . net: network providers
C) . mil: military organizations
D) . gov: government organizations
E) . edu: educational organ
F) . org: non-profit organizations
###############
1.1.2 The need to search the Internet (how do we connect)
1) A computer with an Internet connection.
 The connection comes from an ISP or Internet Service
Provider. ISPs are usually phone or cable companies that
charge you a monthly fee for Internet access. Examples of
local ISPs are: TimeWarner Cable, Dish Network, Verizon,
EarthLink, Comcast. Or AT&T.
2) Cable: a connection through a cable modem using cable wires.
3) Satellite: a connection through a satellite. Can be affected by
weather.
4) 3G and 4G: devices connect to the internet wirelessly through
your providers network. Used for Devices such as smart phones,
tablets and laptops .
5) Anti-virus software: Programs that will help defend your
computer against harmful viruses that Can damage your hard
drive.
1.1.3 Web browsers
 Software programs that access webs rich content
 www portion of the Internet
 Popular web browsers
 Microsoft Internet Explorer
 Google chrome
 Mozilla Firefox
 Apple Safari
 Browsers:- are the easiest way of finding the information you
need.
# lists the most popular browsers as follow in terms of market share:
 Google Chrome (61.36 %) [
 it is a good choice for cell phones and tablets.
 Plus it works a bit better than Firefox on Android devices.
Chrome is also a good choice for Windows and Mac
computers. ]
 Mozilla Firefox (23.6 %) [
 Mozilla's Firefox is one of the fastest Internet web browsers.
 This browser is compatible with Mac and Windows operating
systems, and with Android and iOS cell phones and tablets. ]
 Internet Explorer MicrosoftEdge)(best for battery life)(8.0%)
 Compatibility issues for older Windows machines Microsoft
Edge comes standard with computers running the Windows
10 operating system, but it also works on both Android and
iOS cell phones.
 In some respects it's also a better proposition than Chrome
or Firefox. That's because Edge tends to use less memory
(RAM) so it will feel faster on older computers and tends to
use less power, which is important on a laptop. ]
 Safari (3.7 %) [
 Safari is one of the best choices for Mac devices because it is
designed specifically for Apple‘s machines.
 It connects quickly and loads full sites faster than any
macOS-compatible browser we tested.]
 Opera (1.6 %) [
 It‘s compatible with both Windows and Mac computers, and
works On iOS and Android mobile devices. ]

1.1.3 Basic Internet Terms and Terminology


I) ARPANET: The acronym stands for Advanced
Research Projects Agency Network. ARPA Of the
United States Department of Defense developed
ARPANET, Internet is the successor of ARPANET.
(The internet developed from software called the
ARPANET which the U.S military).
Ii) Internet Service Provider: A company, which provides users with
an access to the Internet.
 IP Address: It is a way of numerically identifying an entity on
a computer network.
 The Original addressing system known as IPv4, used 32 bit
addresses. With the growth of the Internet, IPv6 came to be
used wherein the addresses are composed of 128 bits.

III) Cyberspace: This term coined by William Gibson, is used to refer to


the computer networks Connected to each other and the content they
host. It is often used to refer to the Internet.
IV) WWW: It is a collection of interlinked documents that are
accessible over the Internet. It Consists of millions of web
pages that contain text, images, voice and videos.

V) Website: A website is a set of web pages consisting of


text, audio and video. Web servers Host websites.

VI) Cache: Web browsers maintain a cache of recently visited


web pages. Some of them use an external proxy web
cache, which is a server program through which web
requests pass. This enables the browsers to cache
frequently visited pages. Even search engines make
available already indexed web pages through their caches.

VII) HTTP: Hypertext Transfer Protocol, abbreviated as HTTP,


is a communications protocol used for the transfer of
information over the Internet.
VIII) Web Cookie: Also known as an HTTP cookie, it is piece of
text that is exchanged between the web client and the
web server. It is sent by the web server to the web client
and returned unchanged by the client each time it
accesses the server.
IX) Session: It is an exchange of information between a
computer and its user. It’s established for a certain period
of time after which it ends.

1.2.2 Setting up Internet Option


A. Configuring Home page
 A home page is generally the main page that a visitor navigating
to a website from a web search engine will see, and it may also
serve as a landing page to attract visitors.
 The home page is used to facilitate navigation to other pages on
the site by providing links.
# For example, a news website may present headlines and first
paragraphs of top stories, with links to full articles.

B. Configuring location of temporary files


 Temporary Internet Files are a folder on Microsoft Windows
which serves as the browser Cache for Internet Explorer to cache
pages and other multimedia content, such as video and audio
Files, from websites visited by the user.
 This allows such websites to load more quickly the next time they
are visited.
 The Temporary Internet Files cache can be useful in certain
situations. For example, if no Internet Connection is available,
previously cached websites are still available offline.

1.2.3 Configuring privacy and security level


 Optimizing your browser‘s settings is a critical step in using the
Internet securely and Privately.
 Today‘s popular browsers include built-in security features, but
users often fail to Optimize their browser‘s security settings on
installation.
 Failing to correctly set up your browser‘s Security features can put
you at a higher risk for malware infections and malicious attacks.

******……..*******…….*****…….******…….******…….******

1.2 Adjusting display/view mode


 Window Internet Explorer has dramatically improved support for
established and emerging industry standards, such as HTML5,
Cascading Style Sheets (CSS), Level 3 (CSS3), and Scalable Vector
Graphics (SVG).
 By default, Internet Explorer properly displays Webpages
designed to support these standards
 Internet Explorer supports a display mode called Compatibility
View, which displays web pages as if they were viewed by an
earlier version of the browser.

1.3.1 Modifying Toolbars


Introduction to toolbars
 A browser toolbar is a toolbar that resides within a browser's
window.
 All major web browsers provide support to browser toolbar
development as a way to extend the browser's GUI and
functionality.
 Browser toolbars are specific to each browser, which means that a
toolbar working on a browser does not work on another one.
 All browser toolbars must be installed in the Corresponding
browser before they can be used, and require updates when new
versions are Released

I. Developing a toolbar

 The programming language and development tools behind a


browser toolbar vary from one browser To another.
# In Internet Explorer 5 or later toolbars may be created as
browser extensions written in C# or C++.
# In Firefox, Chrome, Safari and Opera the logic behind the
toolbar is written in JavaScript.
# In Firefox, Chrome, Safari and Opera toolbar styling is done
though CSS.

II. Native vs. injected toolbars


 Some major browsers (Internet Explorer and Firefox) enable the
creation of native toolbars i.e.,
# Examples of native toolbars are
Google Toolbar and Stumble upon Toolbar.
 Native toolbars use browser-specific code to create the same
toolbar for each different browser version.

 Some toolbar developers use a different approach and make


the browser extension inject a JavaScript file in every web
page visited by the user. All major browsers support
injected toolbars.
 The code in this file inserts the toolbar as a part of the DOM in
every web page. (The Document Object Model is the data representation of
the objects that comprise the structure and content of a document on the web.
 DOM represents an HTML document in memory and how to use APIs to create
web content and applications.)
 (((The Document Object Model (DOM) is a programming interface
for web documents. It represents the page so that programs can
change the document structure, style, and content.))
 Injected toolbars use essentially the same JavaScript code to draw
the toolbar for each different browser version.

 Each approach( native & injected) has advantages and


disadvantages for the different stakeholders.
# From the user's perspective:
 Native toolbars present faster load times, since
 injected toolbars must wait for the DOM to be created in
order to insert the toolbar in it.
# From the developer's perspective:
 Injected toolbars allow for shorter development times &
allow for an easier toolbar update policy.
# From the toolbar owner's perspective:
 Injected toolbars consume requests (to download the
JavaScript code that inserts the toolbar in every page), while
 native toolbars consume no such requests.

 Another way to simplify the task of developing a toolbar for


different browsers is to rely on a cross browser extension
development framework.
 Example(some framework):- Toolbar Studio supports IE, Firefox.

1.3.2 Accessing and retrieving data from particular site


# Accessing and Retrieving Site Data
 For most people nowadays, using the internet involves accessing
information or entertainment, Viewing products and services, or
using social media platforms to keep in touch with friends.
 It may seem that visiting a webpage merely involves entering the
URL in the address Bar, but that‘s just the start of a more
complicated process.
 In a split second the browser makes Contact with globally
distributed web servers, requests stored data packages, and then
assemble the Webpage from the information contained in the
packages.
# how this process Works and which steps are taken?
A. From URL to IP address [computer language](through DNS SERVER)
 ((( The Domain Name System (DNS) Server is a server that is specifically
used for matching website hostnames (like example.com)to their
corresponding Internet Protocol or IP addresses. )))
 The easiest way to access a website is to write the desired address
into the address bar located in the browser. This address is known
as a Uniform Resource Locator (URL), and every webpage can be
reached with its own individual URL (web address).

■ Example of a webpage URL:


 The World Wide Web (WWW) :- is a system of electronically
stored hypertext documents.
The hypertext transfer protocol (HTTP) is used in the World
Wide Web in order to transfer webpage data from the web server
to the browser.
URLs are generally comprised of letters, meaning that people
can easily remember them.
On the other hand, Computers work with combinations of
numbers (known as IP addresses) to find A server on the internet.
 An additional step is required in order to access content from the
web Browser.
 This step requires translating a webpage‘s URL into the
corresponding IP address.
 The Task is carried out by DNS servers, which are responsible for
managing the Domain Name System.

b. DNS server: a directory for IP addresses


 When a web address is entered into the search bar of the browser,
the browser looks for the requested domain in its cache. If it‘s not
there, it requests the operating system‘s DNS server to find the
required IP address.
 By default, the internet access provider sets the address of its own
DNS server there.
 The IP addresses of sites that have already been visited are
usually stored in the operating system‘s or the browser‘s DNS
cache.
 This cache keeps IP addresses at hand for future visits to the
website. This lightens the load of the DNS server and speeds up
the webpage‘s Loading time.

c. The router as a link between computer and server


 The router requests data from the Internet and distributes it to
networking devices such as desktop computers, laptops and
tablets.
 The Router is required as a link since the devices in the home
network communicate with each other using local IP addresses.
 The network Addresses are then translated with a process known
as Network Address Translation (NAT), With Modern IPv6
internet connections.

D. Data exchange via HTTP


 When the IP address of the chosen webpage is identified, the
browser requests the relevant data for the page from the
appropriate web server. This request takes place via HTTP in the
form of data packet, which contains all the information the web
server needs in order to deliver the webpage data.
 The browser communicates the IP address of the chosen
webpage, and provides information on the operating system,
itself, and the device on which the webpage should be Displayed.
 The server sends a data packet to the web browser with all the
information required for the page. If the server can‘t find the
webpage at the requested address, it sends a 404 error Code
(webpage not found).

E. Page rendering in web browsers


 Incoming data packets from the internet are finally forwarded
from the router to the computer on which the webpage is being
accessed.
 Web pages generally comprise of HTML, CSS, and JavaScript files,
Whose lines of code contain detailed information about how the
webpage should be presented.
While HTML documents define the structure and controls of a
webpage, the design information Is specified in Cascading Style Sheets
(CSS files). Elements that help user interaction on the Webpage are
usually implemented with JavaScript.

1.3 Loading image


 Understanding the capabilities of your modem, computer and
browser will help you to make an informed decision. (while
loading your image)
I. Modem Speed
 ( Modem :- is a device connecting your home to your internet service
provider (ISP) through a physical connection. The modem translates the data
from your ISP into a format that your home network devices can use.)
 (What is the difference between a router and a modem?
A modem connects your home network to your internet service
provider (ISP), while a router allows all your wired and wireless
devices to use that connection simultaneously and communicate
with each other.)))
 The latest modems on the market would normally be installed to
run at the fastest speed Possible, for example 115200 bits per
second(11.5 MB/sec).
 Having a fast modem connected to your computer Will download
images quickly. If a slower speed modem is connected to your
computer, then Images will be downloaded at a much slower rate.
 The bandwidth of your Internet connection is dependent on the
speed of your modem. if the bandwidth is small it will not be able
to download images very quickly.
 Make sure that you have adequate storage area for image file and
the bandwidth is large enough to transfer the image file.
II. Computer speed and capacity
 The speed and capacity of your computer also affects the speed at
which images are loaded.
 If the computer's speed is slow and the capacity is minimal, it may
be better to turn off multimedia features such as pictures, sounds
and videos in order to speed up the delivery and display of web
page information.

III. Browser Capabilities


 To display web page details as quickly as possible, consideration
should be given to the types of browsers available.
 Browsers such as Microsoft Internet Explorer and Netscape
Navigator are referred to as graphical browsers as they are able
to display graphics, colors and multimedia Features.
 When a web site is visited, the details of that web page are stored
in the browser’s cache. Web pages Stored to be read offline are
also stored in the cache.
 Microsoft Internet Explorer’s cache is labeled ‘Temporary
Internet Files’ whereas Netscape Navigator stores its cache in the
program folder. This speeds up the display of pages that are
visited frequently because the Web page details are accessed
from the cache instead of from the web.
1.4.2 Uniform Resource Locator (URL)
 Each website is located at a unique global address called a
Uniform Resource Locator (URL).
 When you know the address of a web site it is much easier to
locate.
 Referencing the Uniform Resource Locator URL allows you to jump
directly to that page at that URL regardless of where You currently
are on the web.

■ URL‘s specify three pieces of information needed to retrieve a


document:
 The protocol to be used
 The server address and port to which to connect
 The path to the information
 The format for a URL is: Protocol://server-name: port/path.
For example, http://home.netscape.com/welcome/html

 When a web site is displayed on the screen, it is possible to access


the links that are contained within that site.
 Clicking on a link (or tabbing to the link and pressing Enter) will
take you to another section of the web site, a Web page related to
the site or even to a different web site.

 A link- is a connection from one web resource to another.


 A link has two ends – called anchors and a direction.
 The link starts at the “source” anchor and Points to the
“destination” anchor, which may be any Web resource
 Example:- an image, a video clip, a sound bite, a program, an
HTML document, an element within an HTML document, etc.
1.5 Deleting Cookies and Browsing History
 A cookie, also known as an HTTP cookie, web cookie, or browser
cookie,
 is used for an origin Website to send state information to a user’s
browser and for the browser to return the state Information to the
origin site.
 The state information can be used for authentication,
identification of a user session, user’s Preferences, shopping cart
contents, or anything else that can be accomplished through
storing text data.
 Cookies are not software, can’t be programmed, can’t carry
viruses, and can’t install Malware on the host computer.
 However, they can be used by spyware to track user’s browsing
Activities.
 The need to delete cookies
 Cookies could also be stolen by hackers to gain access to a
victim’s web account.
UNIT TWO: SEARCH INTERNET(ENGINES)

 A search engine is a tool we use to find websites and information


on the Internet.
 (Is also a program that searches for Items online that correspond
to keywords or characters specified by internet users.)

Common search engines

 The most commonly used search engines include:


I. Google
II. Yahoo
III. MSN
IV. Bing
V. AltaVista
vi. Netscape

A. Differences between search engines

# There are a huge variety of search engines.


 Most search engines explore most of the computers connected To
the Internet.
 However, some search engines‘ are really a search of a particular
site, or perhaps a group Of sites.
 Some specialist search engines are based on specific topic areas.
For example,
 Web Wombat was the Original Australian search engine.
When you use this search engine you will find your results
listed in Order of relevance to Australia.
 Lexplore — specialises in information related to international
law.
 Travelocity — specialises in information related to travel.
 Hotwire — specialises in information related to computer and
communications technology.

B. Searching information on the internet

 In order to use a search engine, you must first locate the search
engine on the Internet by typing in the URL of the search engine
you wish to use.
 A search bar will appear and you type your expression into the
bar.
 You might click on the Search button on the toolbar of your
browser and this will take you to a search engine screen to allow
you to enter your search expression.
 Note: if you use the Search button, your browser may randomly
generate which search engine to use for your search.

1.2. GETTING STARTED USING GOOGLE CHROME

# What is Google?

 Google is the most popular search engine on the Internet.


 Google is easy to use, And also more effective than the average
search engine, making it easier to find what you are looking for.
 Google is also home to a variety of features such as Google Maps,
Google Drive, Google Docs, Images, Gmail, Calendar, Translate,
and much more.

2.2 Searching the World Wide Web

 To begin searching the World Wide Web you must launch a web
browser.
 There are Many different web browsers to choose from and it is
up to personal preference on which one you choose.

2.2.1 Performing a search using Google chrome

Example:-

 Type google.com in the address bar.


 In Chrome, type your search terms into the address bar, or go
Google.com in your Web browser.
 From there, you can search for anything you would like more
information about.
 Just type your Search terms in the search bar, then click the
Google Search button or press Enter on your Keyboard.
 After you type search terms into search bar, you will see a list
of relevant websites (also called Search results), that match
your search.
 If you see a site that interests you, simply click the link to Open
it.

2.2.2 Composing a search expression

# When you are looking for search terms try to:

 Type in the question in a full English sentence.


 Use just the main keywords.
 Add more keywords to narrow down (reduce) the number of
hits.
 Define (by clicking a button) if you wish to search the entire
web, or if you just wish to search Australian sites.
 Use synonyms for the keywords.
 Use acronyms.
 Use words to broaden your search like OR.
 Use words to narrow your search like AND, +, -, NOT.
 Use double quotation marks to ensure the phrase you are
using is located in exactly that Sequence.

2.2.3 Narrowing or broadening a search

(look the picture on your Module & try to understand)

2.3 saving and presenting searching engine

 Online data storage refers to the practice of storing electronic


data with a third party services accessed via the internet.
 It‘s an alternative to traditional local storage (such as disk or tape
Storages) and portable storages (such as optical Medias or flash
drives).
 It can also be called hosted storage or cloud storage.

2.3.1. Introduction to online Data Storage

 In recent years, the number of vendors offering online data


storage for both consumers and Business has increased
dramatically.
 Some services store only a particular of data, such as Photos,
music or back up data, while others will allow users to store any
type of file.
 Most of these vendors offer a small amount of storage for free
with additional storage capacity available for a free, usually paid
on a monthly or annual basis.

2.3.2. Benefits of online storage


 One of the biggest benefits of online storage is:

 The ability to access data from anywhere.


 Provides the ability to share files among different users.
 Offer distinct advantages for backup and disaster recovery
situations because it‘s located off site.

However, online data storage does have some potential downsides.


Some peoples worry about:

 The security of cloud storage services


 Some vendors have experienced significant outages from time to
time, leading to concerns about reliability.

2.4 Bookmark the Webpage

# A bookmark is a saved shortcut that directs your browser to a specific


webpage.

 It stores the title, URL, and icon of the corresponding page.


 Saving bookmarks allows you to easily access your favorite
locations on the Web.
 All major web browsers has a slightly different way of managing
them.
For example,
 Chrome and Firefox display your bookmarks in an open window,
 while Safari displays them in a list in the sidebar of the browser
window.
 Internet Explorer uses the name "Favorites" to refer to
bookmarks, and like
 Safari, it displays all your favorites in a list within the browser
window side bar.

2.3.1 Creating and Saving Book marks

 To create a bookmark, simply visit the page you want to bookmark


and select Add Bookmark or
 Bookmark this Page from the Bookmarks menu.
 In Internet Explorer, you can click the star Icon to open the
Favorites sidebar and click Add to Favorites to add the current
page to your bookmarks.
 It is helpful to bookmark frequently visited websites and useful
references since you don’t have to remember the URLs.
 NOTE: A bookmark only stores the location of a webpage, not
store the contents of the webpage itself.
 Therefore, when you open a previously saved bookmark, the
contents of page may have changed since the last time you viewed
it.

2.3. Adjust Print Margins on a Web Browser

 If you run a small business, the Internet enables you to find


valuable resources that can help you expand your business and
increase your profits. However, you can’t always take your laptop
with you and you don’t have an Internet connection everywhere
you travel. To take the information with you everywhere, you must
print it. You can print Web pages directly from your Web browser
and, to print more data on a page; you can adjust the print
margins.
2.3.2 Modifying Page set up options and printing Information

# Printing background colours

 If you are trying to print a story with a background color, Internet


Explorer and Firefox users will Need to also turn on ‘Print
Background Colours’, usually found under Page Setup.
 Chrome and Safari have this option turned on by default.

# Other printing options

 This article explains how you can remove the number of pages,
date, title etc. that the browser Applies to the headers and footers
of each printed page by default.

# Different browsers, operating systems and printers

 All printers have slightly different set-ups, these tips may not work
for you. If you find a better way, we’d love to hear about it. Please
contact us and let us know.

# Shutting Down and Exiting Browse

 Before you are going to shut down your browser first you should
save all the necessary information
 And also you must wait if down loading and uploading data/image
is on progress, if you shut Down before the data is completed your
data may be corrupted or destructed

.
2.4 OHS and netiquette principles implemented on online
communication

(As we understood it’s a principle)

 ((Occupational health and safety (OHS) is a practice that deals


with the safety, health, welfare and wellbeing of people when they are
at work.))
 Netiquette (internet-etiquette) are the rules of the road.
These
 Its Simple guide posts on good manners in online
communication.

# Netiquette will make you seem like a

 Great person to talk to,


 more importantly, it helps you become better understood,
 exude Professionalism, and
 create a positive online reputation that will lead you to more
lasting and Meaningful connections.
2.4.1 Observing OHS and netiquette principles

# Core rules of netiquette: some are

 Remember the human – is the Golden Rule of internet


communications.
 Adhere to the same standards of behaviour online that you
follow in real life.
 Know where you are in cyberspace.
 Respect other people‘s time and bandwidth.
 Make yourself look good online.
 Share expert knowledge.
 Help keep flame* wars undercontrol.
 Respect other people‘s privacy.
 Don‘t abuse your power
 Be forgiving of other people‘s mistakes.

Don‘t abuse youmistakes. Be forgiving of other


people‘sCommandments

The Ten Commandments of Computers Ethics

 (from the Computer Ethics Institute)


 Do not use a computer to harm other people.
 Do not interfere with other people‘s computer work.
 Do not snoop(talka megbat) around in other people‘s computer
files.
 Do not use a computer to steal.
 Do not use a computer to bear false witness.
 Do not copy or use proprietary software for which you have not
paid.
 Do not use other people‘s computer resources without
authorization or proper Compensation.
 Do not appropriate other people‘s intellectual output.
 Do think about the social consequences of the program you are
writing or the system you are designing.
 Always use a computer in ways that insure consideration and
respect for your fellow humans.

……… END OF CHAPTER TWO …..….


CHAPTER THREE – Organize and complete Daily Work Activities

3. Work Plans And Goals

 Our personal work goals and plans need to fit in with your overall
team‘s goals and plans.
 Make sure you actively participate in work meetings about work
goals and plans.
 If you don‘t understand something, ask questions to clarify what
you have to do.
 If you think something isn‘t fair, make sure you speak out.
Everyone needs to understand and agree to the goals and plans
that have been established.
 Your work goals and plans should be negotiated with at least one
other person.
# People you need to negotiate your work plan with:
• Coach or mentor
• Supervisor or manager
• Team leader
• Peers, work colleagues or other members of your team

3.1 Work goals and plans to Organize Work Activities

 Be clear on your work duties position description should tell you


what your responsibilities are,
 How does your job affect the organizations goals?
 What do you need to achieve on a daily basis?
 What do you need to achieve on a daily basis?
3.1.1 Set goals
# Knowing what you want to achieve can help you attain it. Goals
should be: SMART

 S= Specific :- Help us to Focus our efforts and clearly define what


we are going to do

 Specific is the What, Why, and How


 WHAT are you going to do?
 WHY is this important to do at this time?
 HOW are you going to do it?
 M= Measurable :- If you can’t measure it, you can’t manage it.
 Choose a goal with Measurable progress, so you can see the
change occur.
 A= Attainable :- When you identify goals that are most important
to you, you begin to figure out ways you can Make them come
true.
 You develop the attitudes, abilities, skills, and financial
capacity to reach them.
 Goals you set which are too far out of your reach, you
probably won’t commit to doing.
 R= Realistic :- Realistic, in this case, means do able.
 It means that the skills needed to do the work are available;
that the project fits with the overall strategy and goals of
the organization.
 A realistic project may push the Skills and knowledge of the
people working on it but it shouldn’t break them.
 Devise a plan or a way of getting there which makes the goal
realistic.
 T= Timely :- Set a timeframe for the goal: for next week, in three
months, by November.
 Putting an end point On your goal gives you a clear target to
work towards.
 If you don’t set a time, the commitment is too Vague. It
tends not to happen because you feel you can start at any
time.
 Without a time limit, There‘s no urgency to start taking
action now.
 Time must be measurable, attainable and realistic.

3.1.3 Procrastination (moving something to other time)

 Procrastination is the scourge of action planning.


 It’s important that you manage ‘Your fear of Doing things’
you don’t want to do and realize that the fear is often far
worse than any possible negative results.
 The best time to do something is usually NOW.

# Note that to Organize your time!

3.1.4 Plan & Organize Work Activities


 Planning and organization makes efficient use of your time.
 A comprehensive plan for work activities and projects ensures you
tackle all necessary steps for success.

# planning include prioritizing , Time management, Negotiation,


Delegation, Individuals/ group needs.

3.2 Team Relationship


 Your personal work goals and plans need to fit in with your overall
team‘s goals and plans.
 Make sure you actively participate in work meetings about work
goals and plans.

3.2 Negotiate work plans and goals with the appropriate people

 Everyone needs to understand and agree to the goals and plans


that have been established.
 Your work goals and plans should be negotiated with at least one
other person.

# People you need to Negotiate your work plan with:

• Coach or mentor

• Supervisor or manager

• Team leader

• Peers, work colleagues or other members of your team

3.2.2 Determine your resources


 Resources are the things you need to help you complete a task.
 When you are planning your work, make sure that you allow
enough time to gather resources.
 You need to know where relevant resources are kept, and whether
you need permission to take them.

 For example, your supervisor may need to sign a form or you may
need to write down What you have taken.
 Make sure you always follow your organization‘s procedures for
using Resources.

3.2.3 Work out priorities

 Once you know the required time lines and the relative
importance of your tasks, you can Set priorities.
 Your day-to-day workload will usually include a variety of tasks.
Some tasks need to be completed straight away, such as arranging
a courier or answering a telephone call.
 Your supervisor might tell you which tasks to do first. However,
you will often Need to use your own judgment and set your own
priorities.
 In order to do this, think about how your tasks affect the work of
other people in your work group.
 Try to organize your work so that it is completed in time for others
to do theirs.

# Below are some examples of useful planning tools.

A)Review priorities

 It is a good idea to review your list of priorities about halfway


through each day.
 This gives you a chance to monitor your daily work schedule, set
new priorities and make the best use of your remaining time.

B) Do several tasks at the same time

 As you gain more experience, you need to develop the ability to


work on several tasks at the same time.
 Life might be simpler if you could just work on one task, and then
the next. However, that is often not the most efficient way of
working.
 Time management and multi-tasking are the important skills in a
workplace.

3.3 Meet organizational requirements

I. Supervisor feedback

 Feedback from your supervisor is also valuable. They may have a


private discussion with you for things that only concern you.
 At other times they will give you feedback in a team meeting,
 particularly if what they have to say concerns the rest of the work
group.

II. Performance appraisal

 The purpose of the performance appraisal is to be clear about


your job requirements and the necessary standards of work
performance and behaviour.
 Your manager should give you constructive feedback on your
progress in relation to your work plan for the last six months or
year.
 An appraisal is also an opportunity to identify training and
development needs related to your position and the business
needs of the organization.

3.3 Complete tasks on time


 Keep your daily work schedule on hand so you can see what
needs to be done every day.
 If you are not completing your daily tasks and are regularly
behind schedule, you need to discuss the situation with your
supervisor.
 You might need some help to manage your time better, or
you may need to share some of your work with other people.

You might also like