0% found this document useful (0 votes)
2 views44 pages

Computer Notes

The document provides an overview of computer functionality, covering types of computers, core components, software types, memory, and networks. It emphasizes the importance of a healthy and safe computing environment, detailing ergonomic practices, common health risks, and preventative measures. Additionally, it discusses security tools for data protection, types of malware, and the significance of netiquette in online communication.

Uploaded by

Simamkele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views44 pages

Computer Notes

The document provides an overview of computer functionality, covering types of computers, core components, software types, memory, and networks. It emphasizes the importance of a healthy and safe computing environment, detailing ergonomic practices, common health risks, and preventative measures. Additionally, it discusses security tools for data protection, types of malware, and the significance of netiquette in online communication.

Uploaded by

Simamkele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

Understanding How Computers

Function
LO1: Apply knowledge of how
computers function in general
Presented by [N Cekiso-Smith]
Learning Outcome 1 (LO1)
• • Identify different types of computers
• • Understand components and devices
• • Differentiate between software types
• • Explain memory and networks
Types of Computers
• Type | Capacity | Speed | Cost | Users
• Supercomputer | Extremely high | Extremely
fast | Very costly | Scientific research
• Mainframe | Very high | High | Costly | Large
organizations
• Minicomputer | Medium | Moderate |
Moderate | SMEs
• Microcomputer | Low | Varies | Affordable |
Individuals
Core Components of a Computer
• • CPU (Processor)
• • Motherboard
• • RAM
• • Power Supply
• • Hard Drive
Input, Output & Storage Devices
• Input Devices: Keyboard, Mouse, Scanner,
Webcam
• Output Devices: Monitor, Printer, Speakers
• Storage Devices: SSD, HDD, USB Drive, Cloud
Types of Computer Software
• System Software: OS, Utility Programs, Device
Drivers
• Application Software: Word Processors,
Spreadsheets, Browsers
Understanding Memory
• Primary Memory: RAM, ROM
• Secondary Storage: HDD, SSD-
• Solid state drives (SSD) and hard disk drives
(HDD) are data storage devices.
• SSDs store data in flash memory, while HDDs
store data in magnetic disks.
• SSDs are a newer technology that uses silicon's
physical and chemical properties to offer more
storage volume, speed, and efficiency.
• Measurement Units: Bit, Byte, KB, MB, GB, TB
Communication Networks
• LAN: Local Area Network - Small area like an
office
• MAN: Metropolitan Area Network - Covers a
city
• WAN: Wide Area Network - Covers a large
area like the internet
Internet, Intranet, Extranet &
WWW
• Internet: Public global network
• Intranet: Private internal network
• Extranet: Limited access for external partners
• WWW: Web-based services over the Internet
(websites)
Summary of Key Concepts
• • Computer types
• • Main components
• • Devices
• • Software
• • Memory
• • Networks
• • Web-related terms
Let’s Discuss
Not exceed 5pages include references, Tahoma-12,1.5,justify
• ASS-G-1-8
Which computer type or network are you most familiar and what
Share your Healthy and safe computing environment

Contextually differentiate and apply Security tools for data protection in your organization
Describe and discuss Malicious software and viruses and protective ways against

Discuss and explain ways of protecting computers and computing resources in your own
environment

Contextually discuss and assess Security tools used to protect data from fraud,

Apply your contextual knowledge on hackers and other technology interruptions


Contextually discus rules of netiquette in your organization
CML48 LO2 NOTES

LO2: Apply the knowledge surrounding health, safety, information privacy, information
security and ethics in society LO2: Apply the knowledge surrounding health, safety,
information privacy, information security and ethics in society

Here are detailed student notes and two essay questions based on Assessment Criterion 1 (AC1):
A healthy and safe computing environment is explained.

Student Notes: Healthy and Safe Computing Environment

1. Definition
A healthy and safe computing environment refers to the proper use of hardware, software, and
physical settings to minimize health risks and injuries, ensure user comfort, and protect equipment
and data.

2. Ergonomics in Computing

• Ergonomics is the design of the workstation to fit the user’s physical needs.

• Correct posture: Sit upright with feet flat, knees at a 90° angle.

• Monitor position: Eye level, about an arm’s length away.

• Keyboard and mouse: Should allow natural hand positioning.

3. Common Health Risks

• Repetitive Strain Injury (RSI): Caused by repetitive typing or mouse use.

• Eye strain: From staring at screens for long periods.

• Back and neck pain: Due to poor chair or screen height.

• Headaches: Caused by glare, poor lighting, or screen flicker.


4. Preventative Measures

• Take frequent breaks (20-20-20 rule: every 20 mins, look 20 feet away for 20 seconds).
• Use ergonomic furniture (adjustable chairs, footrests).

• Maintain good lighting (avoid glare).

• Use anti-glare screen filters and adjust screen brightness.

• Keep workstations clean and clutter-free to avoid accidents.

5. Safe Use of Equipment


• Avoid overloading electrical outlets.
• Do not eat or drink near computers to prevent spills.

• Secure loose cables to prevent tripping hazards.

• Use surge protectors to protect against power surges.

6. Digital Safety Practices

• Install and update antivirus software.

• Use strong passwords and change them regularly.

• Avoid clicking on suspicious links or attachments.

• Backup data regularly on secure drives or cloud storage.


7. Legal and Ethical Use

• Respect software licensing and copyright laws.

• Do not engage in cyberbullying, hacking, or spreading malware.

• Follow institutional ICT policies on acceptable use.

Essay Questions

Essay Question 1:
Discuss the components of a healthy computing environment and explain how ergonomic practices
can help prevent common computer-related health problems. Support your discussion with
examples.

Essay Question 2:
Describe the importance of creating a safe computing environment. Include in your answer the
measures users can take to ensure both physical and digital safety in a computer lab or workspace.

(AC2): Security tools for data protection are identified, differentiated, and applied.

Student Notes: Security Tools for Data Protection


1. Importance of Data Protection

• Protects sensitive information from unauthorized access.

• Prevents identity theft, fraud, data loss, and system damage.

• Ensures compliance with data protection laws and organizational policies.

2. Types of Security Tools


Tool Function Example

Detects and removes malicious software Windows Defender,


Antivirus Software
(viruses, worms, trojans). Avast

Monitors and controls incoming and Windows Firewall,


Firewall
outgoing network traffic. ZoneAlarm

Converts data into unreadable format unless


Encryption BitLocker, VeraCrypt
a decryption key is used.

Stores and manages complex passwords


Password Manager LastPass, Dashlane
securely.

Copies and stores data in separate locations


Backup Software Acronis, Google Drive
for recovery.

Multi-Factor Requires more than one verification step to SMS codes,


Authentication (MFA) access data. Authenticator apps

3. Differentiating the Tools

• Antivirus vs Firewall: Antivirus removes threats already in the system. Firewalls block
threats from entering.

• Encryption vs Backup: Encryption protects data from unauthorized viewing. Backups


recover data after loss or attack.

• Password Manager vs MFA: Password managers store credentials. MFA adds an extra
security step for authentication.

4. Applying Security Tools


• Install antivirus and update regularly to detect new threats.

• Enable firewalls on all devices connected to the internet.


• Encrypt sensitive files, especially on mobile devices and USB drives.

• Use strong, unique passwords for each account. Avoid sharing them.

• Enable MFA for online services such as email and banking.

• Schedule automatic backups weekly or daily, depending on the data’s importance.

5. Safe Online Behaviour

• Avoid using public Wi-Fi for sensitive tasks.


• Regularly update software and security patches.

• Be cautious with email attachments and unknown links.

• Report suspicious activities to IT support immediately.

Essay Questions

Essay Question 1:
Identify and compare five different security tools used for protecting digital data. Discuss their
specific functions and how they can be applied in a professional or personal computing
environment.
Essay Question 2:
Explain how individuals and organisations can use a combination of security tools to create a
strong data protection strategy. Include examples to show how each tool contributes to overall data
security.

(AC3): Malicious software and viruses are defined.

Student Notes: Malicious Software and Viruses

1. Definition of Malicious Software (Malware)

Malicious software, or malware, is any software designed to harm, disrupt, steal, or gain
unauthorized access to computer systems and data. It operates without the user’s informed consent
and poses a threat to both individuals and organizations.

2. Types of Malware

Type Description Impact

Attaches to clean files or programs and Corrupts files, slows systems, spreads to
Virus
spreads when executed. other devices.

Replicates itself and spreads without user Consumes bandwidth, slows networks,
Worm
action. spreads quickly.

Creates backdoors, steals information,


Trojan Horse Disguises itself as legitimate software.
installs more malware.

Steals personal data like passwords and


Spyware Secretly gathers user data and activities.
credit card info.
Type Description Impact

Locks or encrypts data, demanding


Ransomware Causes data loss and financial damage.
payment to unlock it.

Displays unwanted ads; may track user Slows down computers and invades
Adware
behaviour. privacy.

Rootkits Hides malware from detection tools. Allows hackers full control of a system.

3. Virus vs Other Malware

• A virus needs user action to spread (e.g. opening an infected file).


• A worm spreads on its own.

• A trojan tricks the user into installing it.

4. How Malware Spreads

• Infected email attachments and phishing links.

• Downloading pirated or untrusted software.

• Inserting infected USB drives.

• Visiting compromised websites.

5. Signs of Malware Infection

• Slow system performance.

• Frequent crashes or error messages.

• Unexpected pop-ups.
• Files missing or encrypted.

• Unauthorized programs running.

6. Preventive Measures

• Install and regularly update antivirus software.


• Avoid downloading from untrusted sources.

• Do not click on suspicious links or email attachments.

• Enable automatic system and software updates.

• Use firewalls and keep backup copies of important data.


Essay Questions

Essay Question 1:
Define malicious software and describe the different types of malware. Explain how each type
affects computers and user data, using practical examples.

Essay Question 2:
What is the difference between a virus and other forms of malware? Discuss how malware spreads
and suggest methods to prevent infection on personal or institutional computers.

(AC4): Ways of protecting computers and computing resources are described.


Student Notes: Protecting Computers and Computing Resources

1. What Are Computing Resources?

Computing resources include:

• Hardware (e.g. desktops, laptops, servers)

• Software (e.g. operating systems, applications)

• Data (e.g. files, documents, databases)

• Network infrastructure (e.g. Wi-Fi, routers)

Protecting these ensures system availability, data integrity, and user privacy.

2. Physical Protection of Computers

• Use surge protectors to prevent damage from power surges.

• Lock equipment in secure rooms or use cable locks.

• Install CCTV or physical access controls in labs and offices.


• Avoid food and drinks near computers to prevent spills.

• Keep devices cool and dust-free to avoid overheating.


3. Software and Data Protection

• Install antivirus software and update it regularly.

• Enable firewalls to block unauthorized access.

• Use encryption for sensitive files and folders.

• Backup data regularly to external drives or cloud storage.


• Use licensed software to avoid malware from pirated apps.

4. Access Control Measures

• Set strong passwords using a mix of characters and symbols.

• Change passwords regularly and avoid reusing them.

• Create user accounts with different access levels.

• Enable multi-factor authentication (MFA) for critical systems.

• Log out of systems when not in use.

5. Network Security
• Secure Wi-Fi with strong passwords and WPA3 encryption.

• Limit user access to shared resources through network permissions.

• Monitor network activity for unusual behaviour.

• Apply software patches and updates to fix vulnerabilities.

6. User Responsibility and Good Practices

• Be aware of phishing scams and avoid clicking unknown links.

• Do not share login credentials.

• Report suspicious activity to IT support immediately.

• Follow the institution’s acceptable use policy (AUP).

Essay Questions

Essay Question 1:
Describe the different ways computers and computing resources can be protected from physical
damage, cyber threats, and user-related risks. Use real-life examples where possible.

Essay Question 2:
Discuss the importance of combining physical, software, and network security measures to protect
computing resources. Include preventive strategies for both personal and institutional settings.

AC5): Security tools used to protect data from fraud, hackers and other interruptions are
described.

Student Notes: Security Tools for Protecting Data from Fraud, Hackers, and Interruptions
1. Why Data Protection Matters
• Prevents financial fraud, identity theft, and data loss

• Guards against unauthorised access by hackers

• Ensures system reliability and business continuity

• Complies with laws like POPIA (South Africa), GDPR (Europe)

2. Key Security Tools and Their Functions

Tool Purpose Example

Detects and removes malicious


Antivirus Software Norton, Kaspersky
code

Blocks unauthorized access to and


Firewall Windows Firewall, pfSense
from a network

Scrambles data to make it


Encryption Software BitLocker, VeraCrypt
unreadable without a key

Blocks fake websites and email Browser plugins, built-in


Anti-Phishing Filters
links browser tools

Intrusion Detection Monitors and alerts about


Snort, OSSEC
Systems (IDS) suspicious activity

Multi-Factor Google Authenticator,


Adds extra layers of login security
Authentication (MFA) Microsoft Authenticator

VPN (Virtual Private Encrypts internet connections and


NordVPN, ExpressVPN
Network) hides IP addresses

Ensures data recovery after attacks


Backup Tools Acronis, Google Drive Backup
or system failure

Restricts system access to


Access Control Software Active Directory, IAM solutions
authorised users

3. Preventing Fraud and Hacking

• Use firewalls and antivirus tools on all devices.

• Encrypt sensitive financial data, such as payroll and customer records.

• Activate MFA on systems handling money or personal data.

• Train users to recognise phishing and scam tactics.


• Monitor networks and systems regularly for suspicious activity.

4. Avoiding Service Interruptions

• Use backup power (UPS) to prevent power failure data loss.

• Perform regular system backups and test recovery.

• Install updates and patches to fix software vulnerabilities.

• Configure redundant systems to ensure uptime during attacks.

5. Good Practices

• Never reuse passwords across services.


• Log out of accounts after use.

• Avoid public Wi-Fi for banking or confidential work.

• Report unusual system behaviour to IT support.

Essay Questions

Essay Question 1:
Describe five security tools that can protect data from fraud, hackers, and other interruptions.
Explain the function of each tool and how it contributes to a secure computing environment.

Essay Question 2:
Explain how organisations can combine different security tools and user practices to defend against
data breaches and service disruptions. Include examples from either business or educational
settings.

Rules of netiquette are explained.


Student Notes: Rules of Netiquette

1. What is Netiquette?
Netiquette (network etiquette) refers to the set of rules and good manners for respectful and
responsible behaviour when communicating online. It applies to emails, social media, chats,
forums, and virtual classrooms.

2. Importance of Netiquette

• Promotes clear, respectful communication

• Builds a positive digital reputation


• Prevents misunderstandings, bullying, or harassment

• Encourages ethical use of digital platforms

• Supports a safe and inclusive online environment

3. Common Rules of Netiquette

Rule Description Why It Matters

Use polite language; avoid insults or Prevents conflict and promotes


Be respectful
offensive jokes. mutual understanding.

Think before you Once online, messages can be saved


Avoid posting in anger or haste.
post and shared.

Use proper Avoid slang, all caps (shouting), or Improves clarity and shows
language unclear writing. professionalism.

Contribute relevant, meaningful content Keeps communication focused and


Stay on topic
to discussions. productive.

Don’t share someone else’s information Protects others and prevents legal
Respect privacy
or images without consent. issues.

Acknowledge Cite when using other people’s ideas, Avoids plagiarism and builds
sources quotes, or work. credibility.

Avoid sending repetitive, irrelevant, or Keeps communication spaces clean


Don’t spam
promotional messages. and useful.

Understand tone and cultural


Use emojis wisely Prevents miscommunication.
differences before using them.

4. Special Considerations in Online Learning and Workspaces

• Keep your camera on when required (if bandwidth allows).


• Mute your mic when not speaking during meetings.

• Use formal greetings and closings in emails.

• Ask before recording or sharing virtual class content.

5. Consequences of Ignoring Netiquette

• Being blocked, reported, or banned from platforms


• Damaged reputation or relationships

• Academic or workplace discipline for misconduct

• Legal consequences for defamation or privacy breaches

Essay Questions

Essay Question 1:
Explain what netiquette is and describe six key rules that should be followed in online
communication. Support your answer with real or hypothetical examples.

Essay Question 2:
Discuss why netiquette is important in academic and professional settings. How can following
netiquette help build a positive digital presence and prevent conflict?
CML TUTORIAL 3
LO3: Perform basic computer operations to their field
Topic: AC1 - A Computer is Switched On and Off
1. Switching On a Computer (Booting Process)
• When the power button is pressed, the computer starts the booting process.
• The power supply sends electricity to the motherboard and other components.
• The BIOS (Basic Input/Output System) or UEFI (Unified Extensible Firmware
Interface) initializes.
• BIOS runs the POST (Power-On Self-Test) to check basic hardware (RAM, processor,
storage, keyboard).
• If POST is successful, the bootloader is located in storage (like SSD or HDD).
• The bootloader loads the Operating System (OS) into RAM, allowing the user to
interact with the system.
Example:
When a user presses the power button on a laptop, the Dell logo appears, followed by Windows
11 loading on the screen. This is the process of booting.

2. Types of Booting
• Cold Boot (Hard Boot):
Starting the computer from a completely powered-off state.
o Example: Turning on a desktop in the morning after it was switched off overnight.
• Warm Boot (Soft Boot):
Restarting the computer without turning off the power (using restart command or key
combination like Ctrl + Alt + Del).
o Example: After installing new software that requires restarting the PC.

3. Switching Off a Computer (Shut Down Process)


• The user selects the Shut Down command from the OS.
• The OS closes all running applications.
• It saves user data and system configurations.
• It safely powers down the hardware to prevent data loss or hardware damage.
Example:
Using the Windows "Shut Down" button ensures all programs close correctly before the
computer powers off.

4. Risks of Improper Switching Off


• Sudden power cuts or forced shutdown (holding the power button) can:
o Corrupt data.
o Damage the file system.
o Cause loss of unsaved work.
o Stress hardware components like hard drives.
Best Practice:
Always shut down via the OS interface to protect data and hardware.

Three Essay Questions


1. Describe the sequence of events that occurs when a computer is switched on,
including the role of BIOS and POST. Support your answer with practical examples.
2. Explain the differences between cold booting and warm booting. Provide scenarios
where each type of booting is most appropriate in a computer system.
3. Discuss why it is important to follow the correct process when switching off a
computer. What are the possible consequences of ignoring this practice? Use real-
life examples to support your discussion.

Topic: AC2 - Logging On and Off of a Computer is Performed


1. Logging On (Sign In Process)
• After the computer boots up, the Operating System (OS) presents the login screen.
• The user enters credentials, usually a username and password, or uses methods like
fingerprint, PIN, or facial recognition.
• The OS verifies the credentials against the user accounts database.
• Once verified:
o The user's profile loads.
o Personal settings, desktop environment, files, and applications become accessible.
Example:
In Windows 11, after startup, a user enters their password on the login screen to access their
personal desktop and files.

2. Types of User Accounts


• Administrator Account:
o Has full control over the system.
o Can install software, change settings, and manage other accounts.
• Standard User Account:
o Can access basic functions.
o Cannot make system-wide changes.
• Guest Account (Optional):
o Provides limited access, mostly for temporary users.

3. Logging Off (Sign Out Process)


• When finished, the user logs off (signs out).
• The OS:
o Closes running applications.
o Saves session data.
o Disconnects the user from the system.
• This ensures security, prevents unauthorized access, and clears resources for other users.
Example:
After completing work, a user clicks "Sign Out" from the Start menu, ensuring their personal
data is no longer accessible by others.

4. Importance of Logging On and Off Correctly


• Logging On:
o Ensures personalized access.
o Protects sensitive data.
• Logging Off:
o Secures the system.
o Prevents others from misusing the user's account.
o Keeps the system stable by closing active sessions.

5. Common Mistakes and Best Practices


• Mistakes:
o Leaving the computer without logging off.
o Sharing passwords with others.
• Best Practices:
o Use strong passwords.
o Always log off or lock the screen when stepping away.
o Avoid using the administrator account for daily tasks.

Three Essay Questions


1. Describe the process of logging on and off a computer system. Discuss the role of
user credentials and the system’s response during these processes. Provide practical
examples.
2. Explain the importance of logging off a computer after use, especially in shared or
public environments. What risks are associated with not logging off properly? Use
real-life examples.
3. Differentiate between administrator and standard user accounts in terms of access
rights during the login process. Why is it recommended to use standard accounts for
daily tasks?

Topic: AC3 - Different Desktop and Control Panel Components Are Identified
1. Desktop Components
The desktop is the main user interface that appears after logging on. It allows users to interact
with files, folders, and applications.
Key Desktop Components:
• Icons:
Small graphical representations of programs, files, folders, or shortcuts.
Example: Recycle Bin, This PC, Microsoft Word shortcut.
• Taskbar:
A horizontal bar at the bottom of the screen showing open applications, quick launch
icons, system tray, and the clock.
Example: Open applications appear as buttons; the Start button is also here.
• Start Menu (Windows OS):
Provides access to installed applications, settings, power options, and search.
Example: Click Start to find installed programs like Excel or Settings.
• Wallpaper/Background:
The image or color displayed behind desktop icons.
Example: User can set a company logo or personal photo.
• System Tray (Notification Area):
Shows system notifications, time, date, volume control, Wi-Fi status, and antivirus alerts.

2. Control Panel Components


The Control Panel is a system tool that allows users to manage hardware, software, user
accounts, and system settings.
Key Control Panel Components:
• System and Security:
Manage security settings, firewall, system updates, backup and restore.
Example: Checking for Windows updates.
• Network and Internet:
Configure Wi-Fi, Ethernet, VPN, and manage network sharing settings.
• Hardware and Sound:
Add or remove printers, manage audio devices, change power settings.
• Programs:
Install or uninstall applications, manage default programs.
• User Accounts:
Create, delete, or change user account types and passwords.
• Appearance and Personalization:
Change themes, screen resolution, fonts, and taskbar settings.
• Ease of Access:
Adjust settings to assist users with disabilities, like screen magnifiers or narrators.

3. Importance of Knowing Desktop and Control Panel Components


• Helps users navigate and personalize their computers.
• Allows basic troubleshooting.
• Ensures users can adjust system preferences and security settings safely.
Example:
A user wants to change the screen resolution. They go to Control Panel → Appearance and
Personalization → Display Settings to adjust it.

Three Essay Questions


1. Identify and describe the key components of the Windows desktop. Explain the
purpose of each component with examples.
2. Discuss how the Control Panel supports users in managing system settings and
resources. Provide practical examples of how users might use at least three different
Control Panel components.
3. Why is it important for users to understand both desktop and Control Panel
components? Discuss the benefits for users in everyday computer usage and
troubleshooting.

Topic: AC4 - Electronic Mouse Operations Are Performed


1. Understanding the Electronic Mouse
A computer mouse is an input device used to control a pointer (cursor) on the screen. It allows
users to select, open, and manipulate items on the desktop or in applications.
2. Key Mouse Operations and Their Functions
• Left-Click:
o The most common action.
o Used to select or open files, folders, or menu options.
o Example: Clicking once on a folder selects it; clicking once on a menu option
opens the menu.
• Right-Click:
o Opens a context menu with additional options.
o Provides quick access to actions like copy, paste, rename, delete, or properties.
o Example: Right-clicking on a file shows options like "Open," "Delete," or
"Properties."
• Double-Click:
o Involves clicking the left mouse button twice quickly.
o Used to open files, folders, or applications directly.
o Example: Double-clicking on a Word document opens it in Microsoft Word.
• Drag and Drop:
o Hold down the left button, move the mouse, and release it at the desired location.
o Used to move or copy files and folders.
o Example: Dragging a file from the desktop into a folder.
• Scroll Wheel:
o Allows users to scroll up or down on a page or document.
o Example: Scrolling through a webpage or long document.

3. Importance of Knowing Mouse Functions


• Improves user efficiency and speed when navigating the system.
• Reduces errors when opening or managing files.
• Enables accurate interaction with applications, settings, and system features.

4. Practical Examples
• Opening a file: Double-click on the file icon.
• Accessing file options: Right-click on the file to see a menu.
• Selecting multiple items: Hold Ctrl, and left-click on each file.
• Dragging a file: Left-click and hold the file, drag it to a new folder, and release.

Three Essay Questions


1. Explain the different functions of the left-click, right-click, and double-click mouse
operations. Use examples to show how each function helps in navigating and
managing files or programs.
2. Discuss the importance of understanding mouse operations for new computer users.
How do these skills contribute to efficient computer use in both personal and office
environments?
3. Describe the drag-and-drop function and explain its benefits when organizing files
and folders. Include a practical example from your experience or observation.
Topic: AC5 - Identifying Different Elements of a Screen Layout
1. Understanding the Screen Layout
The screen layout is the arrangement of elements that appear on the computer screen once the
computer is switched on and the operating system is loaded. These elements help users navigate
and interact with the computer.
2. Key Elements of a Basic Screen Layout

Element Function Example

Main screen area where icons, files, and Icons like 'This PC,' 'Recycle Bin,'
Desktop
folders appear. or shortcuts.

Small pictures that represent programs, files, 'Microsoft Word,' 'Google


Icons
folders, or shortcuts. Chrome,' 'Documents folder.'

Horizontal bar (usually at the bottom) Start button, open programs, time
Taskbar
showing open programs and tools. and date.

Menu accessed from the Start button; used to


Start Menu 'Settings,' 'Shut Down,' 'All Apps.'
access programs and settings.

Located on the right side of the taskbar Volume, battery status, Wi-Fi
System Tray
showing system notifications. signal.

Quick Allows fast access to frequently used Chrome, File Explorer, Email
Launch Bar applications. shortcut.

Bar at the top of a window showing the


Title Bar 'Document1 - Microsoft Word.'
program or file name.

Window Buttons to minimize, maximize/restore, or The 'X,' '□,' and '_' buttons in the
Controls close a window. upper-right corner.

Allow users to scroll up, down, left, or right Scroll bar on the right of a web
Scroll Bars
in a document or webpage. browser or Word document.

3. Importance of Knowing Screen Layout Elements


• Helps users navigate the system efficiently.
• Supports faster access to files, applications, and settings.
• Reduces mistakes when managing programs and documents.
4. Practical Examples
• Clicking the Start Menu to open Microsoft Word.
• Using the Taskbar to switch between open applications.
• Identifying the System Tray to check battery percentage.
• Using Window Controls to close or minimize a document window.

Three Essay Questions


1. Identify and explain at least five key elements of a typical Windows desktop screen
layout. Use practical examples to show their functions and how they help users.
2. Discuss why it is important for new computer users to learn the elements of a screen
layout. How does this knowledge support effective computer use in school or work
settings?
3. Explain how the taskbar and system tray differ in function and appearance. Provide
examples of how each is used in daily computer tasks.

Topic: AC6 - Utilising Multitask Feature by Opening Several Applications


1. What is Multitasking in Computers?
Multitasking refers to the ability of a computer to run multiple applications or processes at the
same time.
Modern operating systems like Windows, macOS, and Linux allow users to open and use more
than one application simultaneously.
2. Methods of Multitasking

Method Description Example

Click icons on the taskbar to switch Switching from Word to Excel by


Taskbar switching
between open applications. clicking on taskbar icons.

Alt + Tab Keyboard shortcut to switch between Pressing Alt + Tab to move from
(Windows) open applications. browser to PowerPoint.

Arrange two or more applications Viewing Word on the left and


Split-screen view
side by side on the screen. browser on the right.
Method Description Example

Multiple desktops Create virtual desktops for different Desktop 1 for work apps; Desktop 2
(Windows) tasks. for entertainment.

3. Steps to Open and Use Multiple Applications


1. Click the Start Menu.
2. Select the application (e.g., Word).
3. Open another application (e.g., Excel) while Word is still open.
4. Use the Taskbar or Alt + Tab to switch between them.
5. Use Split View by dragging windows to different sides of the screen.
4. Importance of Multitasking
• Improves productivity by handling several tasks at once.
• Saves time switching between programs.
• Allows for better workflow management.
5. Examples of Multitasking
• Typing an assignment in Word while researching in a web browser.
• Listening to music in a media player while designing a presentation.
• Checking email while working on a spreadsheet.

Three Essay Questions


1. Define computer multitasking and explain how the multitask feature can improve
productivity in daily activities. Use examples to support your answer.
2. Describe different methods a user can use to switch between multiple open
applications on a Windows computer. Explain the advantages of each method.
3. Discuss the steps a beginner user should follow to open, use, and switch between
multiple applications on a computer. Include practical examples of typical
multitasking scenarios.

Would you also like a simple step-by-step illustrated guide on multitasking using
screenshots?
If yes, say "Yes, multitasking guide."
Here are detailed notes with examples and three essay questions for AC7: A dialog box is
used.

Detailed Notes
Topic: AC7 - Using a Dialog Box
1. What is a Dialog Box?
A dialog box is a small window that appears on the screen to:
• Request user input.
• Provide information.
• Ask the user to make a decision before continuing.
Dialog boxes are part of the Graphical User Interface (GUI).
2. Types of Dialog Boxes

Type Description Example

Message Box Displays information or warnings. "File saved successfully."

Input Box Allows the user to enter data. Enter your name for a form.

Asks for confirmation before an action "Do you want to delete this file?"
Confirmation Box
is done. [Yes][No]

Settings/Options Lets the user adjust settings or select


Printer settings box in Word.
Box preferences.

3. Common Features of a Dialog Box


• Title bar: Describes the purpose (e.g., Save As, Print).
• Input fields: Areas to type information.
• Buttons:
o OK/Yes: Confirms the action.
o Cancel/No: Cancels the action.
o Apply: Applies changes without closing the dialog box.
4. How to Use a Dialog Box
1. Perform an action that requires confirmation or settings (e.g., click Save As).
2. The dialog box appears.
3. Fill in the required fields (e.g., file name, folder).
4. Click the appropriate button (e.g., Save, Cancel).
5. Examples of Using Dialog Boxes
• Saving a File:
o File > Save As > Dialog box opens > Enter file name > Click Save.
• Printing a Document:
o File > Print > Print dialog box opens > Select printer > Click Print.
• Closing without saving changes:
o Close Word > "Do you want to save changes?" dialog box appears.
6. Importance of Dialog Boxes
• Prevent errors by confirming actions.
• Collect user input for specific tasks.
• Allow customization of tasks (e.g., adjusting print settings).

Three Essay Questions


1. Explain the purpose of dialog boxes in computer applications. Provide at least two
examples where dialog boxes are used and describe the steps involved.
2. Describe the different types of dialog boxes commonly found in computer
applications and explain their functions with practical examples.
3. Discuss the importance of dialog boxes in preventing errors and ensuring user
decisions before completing tasks. Use real-world examples to support your
explanation.

Topic: AC8 - Creating a Shortcut of an Application


1. What is a Shortcut?
A shortcut is a small file that links directly to an application, folder, or document.
• It provides quick access without going to the original location.
• Shortcuts often appear on the desktop, taskbar, or start menu.
• They are identified by a small arrow on the icon.
2. Why Create Shortcuts?
• Saves time by providing easy access.
• Reduces the need to search through folders.
• Useful for frequently used applications or documents.
3. Ways to Create a Shortcut
Method 1: From the Start Menu
1. Click Start.
2. Find the application (e.g., Microsoft Word).
3. Right-click the application.
4. Select More > Open file location.
5. Right-click the application icon.
6. Select Send to > Desktop (create shortcut).
Method 2: From the Application's Location
1. Go to the folder where the application is installed (e.g., C:\Program Files).
2. Right-click the application’s executable file (e.g., word.exe).
3. Select Send to > Desktop (create shortcut).
Method 3: Drag and Drop
1. Open the folder containing the application.
2. Right-click and drag the application icon to the desktop.
3. Release and select Create shortcut here.
4. Managing Shortcuts
• You can rename the shortcut by right-clicking and selecting Rename.
• You can move it to other locations such as the taskbar or folder.
• Deleting a shortcut does not delete the original application.
5. Example
Creating a shortcut for Google Chrome:
1. Right-click on the Chrome icon in the Start menu.
2. Select More > Open file location.
3. Right-click the Chrome icon.
4. Choose Send to > Desktop (create shortcut).
5. The Chrome shortcut appears on the desktop.
6. Importance in Daily Use
• Helps users with limited computer skills.
• Organizes the desktop for easy access.
• Supports multitasking by keeping essential tools accessible.

Three Essay Questions


1. Describe the steps involved in creating a shortcut for an application on a computer
desktop. Provide a practical example.
2. Explain the importance of using shortcuts in a work environment. How do they
improve productivity? Support your answer with real-world examples.
3. Discuss different methods of creating application shortcuts on a Windows desktop.
Highlight the advantages of each method with examples.

Topic: Viewing the Computer's Basic System and Device Information


1. What is System and Device Information?
This refers to key technical details about the computer hardware, software, and system
configuration.
• Includes information such as operating system version, processor, RAM, device name,
and system type (32-bit or 64-bit).
• Also includes device manager details for hardware components (like display adapter,
sound card, USB ports).
2. Why View System and Device Information?
• To check compatibility of software.
• For troubleshooting hardware or software issues.
• To check if the system meets the minimum requirements for applications.
• For updating drivers or system configuration.
3. Methods to View Basic System Information
Method 1: Using System Settings (Windows 10/11)
1. Click Start.
2. Click Settings (gear icon).
3. Select System > About.
4. Information displayed includes:
o Device name
o Processor type and speed
o Installed RAM
o System type (32-bit or 64-bit)
o Windows edition and version
Method 2: Using System Information Tool
1. Press Windows + R to open Run.
2. Type msinfo32 and press Enter.
3. The System Information window opens.
4. Displays detailed information about:
o Hardware resources (memory, IRQ)
o Components (storage, display, network)
o Software environment (drivers, services)
Method 3: Using Device Manager
1. Press Windows + X, select Device Manager.
2. View all connected devices and their status.
3. Useful to:
o Check for hardware issues (yellow exclamation mark).
o Update, disable, or uninstall drivers.
4. Example
A user wants to check their laptop's specifications:
1. Click Settings > System > About.
2. The screen shows:
o Processor: Intel Core i5 2.5 GHz
o Installed RAM: 8 GB
o System Type: 64-bit
o Windows Edition: Windows 10 Pro
5. Importance in Practical Use
• Helps IT support diagnose issues.
• Ensures correct updates and installations.
• Assists users in understanding system capacity.

Three Essay Questions


1. Explain the steps to view a computer's basic system and device information using
the Windows Settings and the System Information tool.
2. Discuss the reasons why it is important for users and technicians to view system and
device information. Use practical examples from daily use or workplace scenarios.
3. Describe how the Device Manager is used to check hardware components on a
Windows computer. Include the steps and examples of how to identify problematic
devices.

Topic: Viewing and Setting the Taskbar


1. What is a Taskbar?
The taskbar is a key component of the Windows interface, located at the bottom (default
position) of the screen.
• Displays Start menu, search bar, open applications, and system tray (with clock,
network, and notifications).
• Provides quick access to pinned apps.
• Allows users to switch between applications.
2. Components of the Taskbar
• Start Button: Opens the Start Menu.
• Search Bar: Allows searching apps, files, and web content.
• Pinned Applications: Apps placed on the taskbar for easy access.
• Open Applications Area: Shows running applications.
• System Tray: Displays background app icons, date, time, sound, and notifications.
• Show Desktop Button: On the far right, minimizes all windows.
3. Viewing and Customizing the Taskbar
Viewing the Taskbar
• Visible at the bottom of the screen by default.
• Move the mouse over to see running apps and notifications.
• Right-clicking on the taskbar opens settings and options.
Setting/Customizing the Taskbar
1. Change Position
o Right-click on taskbar.
o Select Taskbar settings.
o Scroll to Taskbar behaviors.
o Choose position: bottom, left, right, or top.
2. Pin/Unpin Applications
o Right-click an open application icon.
o Select Pin to taskbar to keep it always visible.
o Right-click pinned app and select Unpin from taskbar to remove.
3. Auto-Hide the Taskbar
o Right-click taskbar > Taskbar settings.
o Toggle Automatically hide the taskbar.
4. Change Icon Size
o In Taskbar settings, enable Use small taskbar buttons.
4. Example
A user wants the taskbar at the top of the screen:
1. Right-click taskbar > Taskbar settings.
2. Under Taskbar behaviors, select Top.
3. Taskbar now appears at the top, allowing more space below.
5. Importance in Practical Use
• Increases productivity by placing frequently used apps within reach.
• Customizes screen layout to user preference.
• Helps manage multiple running applications efficiently.

Three Essay Questions


1. Explain the purpose of the taskbar and its key components. Discuss how users
interact with it to manage running applications.
2. Describe the steps involved in customizing the position and appearance of the
taskbar on a Windows computer. Include an example.
3. Discuss the practical benefits of pinning applications and using auto-hide features
on the taskbar in a busy working environment.

AC11: Different Keyboard Keys Are Identified

1. Overview of Keyboard Keys


A keyboard is a primary input device that allows users to interact with a computer. It consists of
multiple keys, each designed to perform a specific function. These keys are categorized into
various types, each with distinct roles in the computer's operation.

2. Categories of Keyboard Keys


A. Alphanumeric Keys
These keys consist of:
• Letters (A-Z): Used for typing text.
• Numbers (0-9): Located above the letters or on the numeric keypad for numeric input.
Example: The letter 'A' or the number '5'.
B. Control Keys
Control keys modify the operation of other keys or computer processes. Common control keys
include:
• Ctrl (Control): Often used in combination with other keys to perform shortcuts (e.g.,
Ctrl + C for copy).
• Alt (Alternate): Used in combinations to execute commands (e.g., Alt + Tab to switch
between open programs).
• Shift: Used to type capital letters or alternate characters (e.g., Shift + 2 to type @).
• Esc (Escape): Used to cancel or exit current operations (e.g., exiting a full-screen mode).
Example: Pressing Ctrl + C copies the selected text.
C. Function Keys (F1 - F12)
These keys are located at the top of the keyboard and are used for specific system or software
functions.
• F1: Usually opens help documentation.
• F5: Often refreshes a web page or program.
• F12: Opens developer tools in browsers.
Example: Pressing F1 typically opens help in many applications.
D. Navigation Keys
These are used to navigate through text or documents.
• Arrow Keys (Up, Down, Left, Right): Move the cursor in the corresponding direction.
• Home: Moves the cursor to the beginning of a line or document.
• End: Moves the cursor to the end of a line or document.
• Page Up: Moves the screen up.
• Page Down: Moves the screen down.
Example: Pressing Page Down scrolls down a webpage.
E. Modifier Keys
• Caps Lock: When pressed, it toggles the capitalization of letters.
• Num Lock: Toggles the numeric keypad between number entry and other functions (e.g.,
navigation).
Example: If Caps Lock is on, typing will result in uppercase letters.
F. Special Keys
• Windows Key (⊞): Opens the Start menu in Windows.
• Print Screen (PrtScn): Takes a screenshot of the screen.
• Pause/Break: Pauses a process or exits full-screen mode in some programs.
• Insert: Switches between inserting and overwriting text.
Example: Pressing PrtScn captures a screenshot of your current screen.

3. Example of Keyboard Key Usage


• When writing a report, Shift is used to type capital letters for proper nouns, like "John".
• To copy text, a user presses Ctrl + C and then Ctrl + V to paste it elsewhere.
• Home and End keys help in quickly navigating to the start or end of a document.
4. Importance of Understanding Keyboard Keys
Understanding keyboard keys is essential for:
• Efficient typing and text entry.
• Mastering keyboard shortcuts that improve productivity.
• Navigating documents or systems quickly without relying on the mouse.
• Customizing the keyboard for specific needs (e.g., gaming, programming).

Three Essay Questions


1. Describe the function and purpose of control keys on a keyboard, and provide
examples of how they are used in common computing tasks.
2. Explain the roles of navigation keys and function keys in enhancing the efficiency of
text editing or document navigation. Use examples to support your explanation.
3. Discuss the importance of modifier keys such as Caps Lock and Num Lock in
everyday computer use, and explain how they affect the typing experience.

Detailed Notes for AC12: A Keyboard is Used by Typing Passages of a Document

1. Overview of Typing on a Keyboard


Typing on a keyboard is the most common method of inputting text into a computer. It involves
using the alphanumeric keys, punctuation keys, and space bar to create written content such as
documents, emails, and reports. This process requires familiarity with the layout of the keys and
an understanding of how different keys work in combination to form words and sentences.

2. Key Steps for Typing Passages of a Document


A. Understanding the Keyboard Layout
• Alphanumeric Keys: These are the keys for typing letters (A-Z) and numbers (0-9).
• Punctuation Keys: Include keys like the period (.), comma (,), question mark (?), and
exclamation point (!), essential for creating meaningful sentences.
• Space Bar: Used to insert spaces between words. It is the largest key on the keyboard
and is vital for clear separation of words in a sentence.
• Enter Key: Moves the cursor to the next line when typing. It is used to start a new
paragraph.
• Shift Key: Allows for capital letters and typing symbols on keys that have two characters
(e.g., Shift + 2 to type @).
Example: To type the sentence “I love reading books,” you would use the alphanumeric keys to
type each letter and the space bar to separate the words.
B. Typing Process
1. Positioning Hands: Position your fingers on the "home row" of the keyboard (ASDF for
the left hand, JKL; for the right hand). This helps increase typing speed and accuracy.
2. Typing Letters and Words: As you type each letter, your fingers move across the
keyboard to press the appropriate key. Remember to use the space bar between words.
3. Correcting Errors: If you make a mistake, use the Backspace key to delete the incorrect
character. The Delete key removes characters to the right of the cursor.
4. Typing Special Characters: Press Shift along with the number keys to type symbols
like @, #, $, %, etc. You can also use other keys to type punctuation marks (e.g., comma,
period, question mark).
5. Starting New Paragraphs: When you finish a paragraph, press Enter to begin a new
one.
Example: To type the sentence, “The quick brown fox jumps over the lazy dog,” you would use
the keys for each letter, the space bar between words, and the Enter key at the end of each
paragraph.
C. Formatting While Typing
• Capitalization: The Shift key is used to type capital letters. For example, to type
“Hello,” press Shift + H and type the remaining letters in lowercase.
• Punctuation and Spacing: After typing a word, always use the space bar to insert a
space between words. Punctuation marks (such as commas and periods) are placed at the
end of sentences.
Example: When typing "I went to the market, and I bought apples," the comma is placed after
"market," followed by a space before "and."
D. Speed and Accuracy
• Typing Speed: The more practice you get typing, the faster and more accurate you will
become.
• Typing Accuracy: Accuracy is more important than speed, especially when typing
documents, as errors can be time-consuming to correct.
• Touch Typing: Learning to type without looking at the keyboard can significantly
increase speed and efficiency. Practice touch typing by memorizing the key positions and
focusing on the document.

3. Practice Example for Typing a Passage


Given the following passage:
"Technology has advanced rapidly over the past few decades, changing the way we live and
work. Computers, smartphones, and the internet have all played crucial roles in this
transformation."
To type this passage, follow these steps:
1. Start by typing each letter of the words.
2. Use the space bar after each word.
3. Use punctuation correctly, such as commas after "decades" and "work."
4. Press Enter after typing the passage to move to a new line or paragraph.

4. Importance of Typing Skills


• Productivity: Mastery of typing enhances your productivity, allowing you to complete
written tasks faster and more efficiently.
• Error-Free Work: Accurate typing ensures that documents are error-free, saving time
during the editing and proofreading process.
• Professional Communication: Proficient typing is essential for professional
communication, such as drafting emails, writing reports, or preparing presentations.

Three Essay Questions


1. Discuss the role of typing skills in improving productivity and efficiency in the
workplace. Provide examples of how proficient typing can impact job performance.
2. Explain the importance of proper keyboard positioning and hand placement for
typing accuracy and speed. How does it affect the overall typing experience?
3. Describe the challenges faced by individuals when learning to type and suggest
methods or techniques that could help improve typing speed and accuracy.

You might also like