Professional Documents
Culture Documents
Basic Computer
Skills Training
Bridges to Digital
Excellence
Basic Computer
Skills Training
Table of Content
Bridges to Digital Excellence
This training manual was compiled into print format by Rebecca Shuler,
Americorps VISTA/Program Manager.
ii Table of Content ii
Bridges to Digital Excellence
vi Table of Content vi
o Insert Symbols ............................................................................................................... 129
o Why Display Non-Printing Characters? ........................................................................ 130
o Bullets and Numbering .................................................................................................. 131
o Create Bulleted and Numbered Lists ............................................................................. 131
o The Bullets and Numbering Dialog Box ....................................................................... 132
6. Spelling and Grammar ...................................................................................................... 133
o AutoCorrect .................................................................................................................... 134
o Find and Replace ............................................................................................................ 135
o Spell and Grammar Check ............................................................................................. 136
o Check Spelling as You Type .......................................................................................... 136
o Check Grammar as You Type ........................................................................................ 136
o Spelling and Grammar Dialog Box ................................................................................ 137
o Using the Thesaurus ....................................................................................................... 137
7. Inserting Items Into a Word Document ........................................................................... 139
o Create a Text Box .......................................................................................................... 140
o Moving and Resizing Text Boxes .................................................................................. 140
o The Format Text Dialog Box ......................................................................................... 141
o Working With Tables ..................................................................................................... 142
o Custom-Made Tables ..................................................................................................... 143
o Entering Text ................................................................................................................. 143
o Editing Tables ................................................................................................................ 143
o Inserting and Deleting Columns and Rows ................................................................... 144
o Resizing Tables .............................................................................................................. 144
o Adding Borders .............................................................................................................. 146
o Add Shading ................................................................................................................... 146
o Introduction to Word Graphics ...................................................................................... 147
o Drawing Objects ............................................................................................................ 147
o WordArt Drawing Objects ............................................................................................. 148
o Formatting Drawing Objects .......................................................................................... 148
o Inserting Clip Art ........................................................................................................... 149
o Inserting Pictures From Your Computer ........................................................................ 149
o Moving Clips ................................................................................................................. 150
o Sizing Handles ............................................................................................................... 150
o Changing the Appearance of Your Pictures ................................................................... 151
8. Printing ............................................................................................................................... 153
o Print Preview Toolbar .................................................................................................... 154
o Editing Text in Print Preview ........................................................................................ 155
o Page Setup ...................................................................................................................... 156
o Printing ........................................................................................................................... 157
o Troubleshooting Printing Problems ............................................................................... 157
ix Table of Content ix
x Table of Content x
I want to put another page number on here so here I go
2 I want to put another page number on here so here I go 2
Section 1-1:
History of Computers
A computer is a machine that manipulates information or "data." You can use a computer to type
documents, send email, and surf the Internet. You can also use it to handle spreadsheets, accounting,
database management, presentations, games, and desktop publishing.
The first personal computers or PCs were introduced in the 1970s. PCs came into widespread use
in the 1980s as costs decreased and machines became more powerful.
In recent years, notebook-size laptop computers and hand-held Personal Digital Assistants
(PDAs) have become popular.
The computer case is the metal and plastic box that contains the main components of the computer.
Computer cases come in different shapes and sizes. A desktop case lies flat on a desk, and the monitor
usually sits on top of it. A tower case, pictured below, is tall and sits next to the monitor or on the floor.
The front of the case usually has an on/off switch and two or more drives. (You'll learn more about the CD
ROM drive and 3 1/2" Floppy drive in later sections.)
On the back of the computer case are connection ports made to fit only one type of plug-in device. The ports include monitor
cable port, keyboard/mouse ports, network cable port, microphone/speaker/auxiliary input ports and printer port (SCSI
or Parallel). There's also a place for the power cord plug.
The monitor, which resembles a television, is where the computer displays text and pictures.
The mouse is the hand-held device that lets you point, click, and move objects on the
monitor screen. Some models have a ball underneath which allows you to easily move it
on a flat surface. The mouse got its name because of its size and shape.
Typically, a mouse has two or three buttons used to move a cursor around the screen.
The trackball, touchpad, and touchscreen are alternatives to the mouse. A trackball is similar to a mouse, but
the ball that helps maneuver the cursor is on top instead of underneath. When using a touchpad or touchscreen,
you can use your finger or a tool called a stylus to move around the screen.
The mouse and keyboard can also be used together to navigate around the computer screen.
A modem allows you to connect to the Internet and communicate with other computers via a
telephone line. An external modem plugs into the computer and sits on the desk. Most new
computers come with an internal modem.
The Keyboard
The main part of a computer keyboard has alpha-numeric (letter and number) keys similar to a typewriter. However, the
keyboard also features keys that cause the computer to perform specific tasks.
The Escape key, labeled Esc, allows you to stop a function or action. For example, if
your computer suddenly freezes up, you may be able to resume by pressing Esc.
The Function keys, along the top of the keyboard, are labeled F1, F2, up to F12.
These shortcut keys allow you to quickly complete a specific task within certain
programs. For example, F1 opens Help in Microsoft Office.
The Print Screen, Scroll Lock and Pause/Break keys are at the far right end of the keyboard. The Print Screen key takes a
"picture" of your screen that you can edit or save using a graphics program.
The Enter key carries out commands. For example, while on the Internet, you can type in a website address, called a URL, and
press Enter to go to the site.
The Control (Ctrl), Alternate (Alt), and Shift keys are designed to work with other keys. For example, if you press Ctrl + S at
the same time, you can save a file.
The Backspace key erases the character to the left of the cursor.
To the right of the regular keys is the cursor control pad. At the bottom are four arrow keys. Pressing any one of these keys
moves the cursor in the direction of the arrow. There are six keys above the arrows:
The Delete key erases the character to the right the cursor.
The Insert key switches between the insert mode and overtype mode. The insert mode is the normal mode for word processing.
The Home key moves the cursor to the left or beginning of the current line.
End moves the cursor to the right end of the current line.
Page Up and Page down take you to the top or bottom of the screen.
The Number pad, at the far right end of the keyboard, resembles a calculator keypad. Similar to the curser keys, you can use
the arrow keys on this keypad to move the cursor.
The Mouse
The mouse is the hand-held device that lets you point to objects on the screen, click on them, and
move them.
Left-handed computer users sometimes use their right hand to maneuver the mouse. However, if you're left-handed and
want to use your left hand, the mouse buttons can be switched.
A scanner allows you to copy an image into your computer. It comes in handy if you want to email pictures of the kids to
grandma.
Most scanners come with a scanning utility and some type of image editing application. Many include software that allows you
to turn a printed page into a text document for your word processor.
The best way to learn how to use a scanner is to spend some time with it. Explore the image quality controls. Scan a picture or a
document in at the default setting. Then, scan it with different contrast settings until you learn what many of the settings control.
Learn how to use the image editing programs. Go through the tutorial or start guide usually found under the Help menu.
A scanner is connected to the computer via a parallel port, a USB port, or a SCSI connection. No matter which connection is
used, the images are stored on your PC's hard drive in a digital format.
A joystick is a lever used while playing a computer game. There are a variety of different joysticks. If you're looking for a
joystick, consider your system's requirements, and whether or not you have a USB port or a game port.
Digital Camera
A digital camera lets you capture a picture in digital (computer-readable) form and lets you transfer that image directly from the
camera to the computer. It's a handy tool for taking those pictures you want to email to friends or put on the Web.
A digital camera is similar to a standard 35 mm camera, but it doesn't use film. Instead, it uses an image sensor to capture
hundreds of thousands of tiny squares called pixels. These pixels make up a photo.
When you use a digital camera, you can also preview your pictures before printing them. If you don't like what you see, you can
edit or delete them.
Separate devices are used to record and store digital images. Older cameras have built-in fixed storage that can't be removed or
increased. This limits the number of pictures you can take before having to erase to make room for new ones.
Almost all newer digital cameras use some type of removable storage, usually flash memory cards or small hard disks, and even
a floppy disk. Flash memory uses chips to store your image files.
All of these devices can be removed from the camera and plugged into the computer or printer to transfer the images.
Printers
Some printers use specially coated paper, which can cost three times as much as regular paper.
If you primarily need to print to multi-page forms, the a dot matrix printer will do the job. If you're a graphic artist who
wants photo-quality images, buy a laser jet. An ink jet is fine for home use, school work, or business documents.
Monitors
The monitor works with a video card, located inside the computer case, to allow you to see images and text on the screen.
Monitors come in different sizes, including 15, 17, 19 and 21-inch. Most new computers come with a monitor the size of a small
TV. However, you can buy a less bulky but more expensive flat panel monitor.
Your monitor has an on/off button and control buttons (visible or behind a small panel) that allow you to change your monitor's
display. To sharpen, brighten or center your display, check the manual that came with your monitor.
Earphones are output devices. Plug earphones into your speaker, monitor, or case to listen to music, movie clips and other
media.
56K modems are the fastest type of modem you can use on a standard phone line. Computer users who want more speed may
replace a dial-up modem with a cable Internet connection or DSL Internet connection.
A cable modem allows you to connect your computer to a local cable television line and is about 26 times faster than a standard
56K phone modem. It is nearly equal to the data rate available to a DSL subscriber. A cable modem can be added to or integrated
with a set-top box that provides your TV set with channels for Internet access. In most cases, cable modems are furnished as part
of the cable access service and are not bought directly and installed by the subscriber.
Data Storage
An expansion card is a card which you can install to expand a computer's capabilities. For example, your computer's video card
is an expansion card which plugs into the motherboard.
The sound card, also called an audio card, is another type of expansion card. It lets the computer play sounds through speakers.
Some motherboards feature integrated sound, and do not require a separate sound card..
The microprocessor determines how fast a computer can execute instructions. A microprocessor's speed is measured in mega-
hertz (MHZ), or millions of instructions per second.
Intel, and AMD are the two main CPU manufacturers for PCs. The PowerPC microprocessor, developed by Apple, Motorola,
and IBM, is used in Macintosh personal computers.
Storing Information
RAM (Random Access Memory) is your system's short-term memory. Data is temporarily stored here until you save your work
to the hard disk.
This short-term memory disappears when the computer is turned off, so always save your file before turning off the machine.
When you save a file, you are saving it to long-term storage.
The more RAM you have, the faster you computer performs. RAM is measured in megabytes (MB) or gigabytes (GB).
To understand megabytes and gigabytes, you need to know about bits and bytes. A bit is the smallest unit of data in computer
processing. A byte is a group of eight bits. A megabyte is about one million bytes. A gigabyte is 1,024 megabytes.
To put this into perspective, consider that a printed page of single-spaced text contains about 3,000 characters. One MB holds
about 400 pages of single-spaced text.
When you use a word processing program, the computer loads the instructions from long-term storage (your hard disk) into short
-term memory.
The hard disk drive is the data center inside of the computer. All of your programs are stored here. Hard disk speed determines
how fast your computer starts up and loads programs. The hard disk is called the C drive on most computers.
The floppy disk drive, a slot on the computer case, is used for data transfer and software installation. The floppy disk
drive, known as A Drive, is also used for storing data. The floppy disk is the tool used for these tasks. Sometimes
called a diskette, it can store 720 KB to 1.44 MB of data. That's about 360 to 720 pages in a book. These drives are be-
coming outmoded as CD-R drives become more common.
A CD-ROM (Compact Disk Read-Only Memory) drive accesses information on a CD-ROM similar to how a CD
player accesses music from a CD. CD-ROMs hold much more information than floppy disks - up to 650 MB or the
equivalent of about 450 average size books.
ROM (Read-only memory) means you can access the programs or data stored on CD-ROMs but you can't write or
store your own data or programs on them. (Recording information on a compact disk requires a special type of drive.)
A CD writer is a device that can write CD-RW (Compact Disk ReWritable) and CD-R (Compact Disk-Recordable)
discs, and read CD-ROM discs. CD-RW discs may be written, erased and rewritten, while CD-R discs may be written
only once. The terms CD-RW and CD-R may also refer to the CD writer itself.
DVD-ROM (Digital Versatile Disc Read-Only Memory), refers to the DVD media itself, or to the disk drive. DVD-
ROM drives can read DVD discs, all types of CDs, and can display movies from digital video discs.
A Zip drive stores 250 megabytes on disks similar to floppy disks, but Zip drives cannot read or write standard floppy
disks. Various versions of the Zip can connect to the computer via the parallel port, SCSI port, USB, IEEE 1394
(Firewire) or internally via the IDE interface. Expansion-bay versions of the Zip drive, compatible with many laptop
brands, are also available.
Types of Computers
IBM compatibles
The first personal computer produced by IBM was called the PC. The term PC came to mean IBM or IBM-compatible personal
computers -- excluding other types of computers, such as the Macintosh.
The Macintosh
Introduced in 1984 by Apple Computer, the Macintosh, or Mac, was the first widely sold personal computer with a graphical user
interface or GUI (pronounced gooey). The Mac was designed to provide users with a user-friendly interface. For example, the
use of icons or small images to represent objects or actions. Microsoft successfully adapted user interface concepts made popular
by the Mac.
Mac users represent about 5 percent of the total numbers of personal computer users. Macs are especially popular among graphic
designers.
Note: Our training is intended for people who use PCs and the Windows operating system. Some of our information also applies
to Macintoshes, but there are important differences.
Types of Computers
During this unit, we've primarily discussed personal computers. However, there are many other computers that serve a variety of
purposes.
Server
A server is a computer or device that manages a network of computers. It's typically used by businesses or organizations.
Laptops
A laptop computer, sometimes called a notebook computer because of its size, is a battery or
AC-powered personal computer. It's easy to carry and convenient to use in such places as airports,
libraries, and coffee shops.
Laptops usually cost more than desktop computers because of design and manufacturing costs.
While some models are full desktop replacements, others can be "transformed" into a desktop
computer with a docking station, which supplies connections for peripherals.
Laptops users typically don't use a mouse to navigate around the screen. Instead, they use a touch
pad, trackball or stylus. A serial port does, however, allow a mouse to be attached.
The two major types of PDAs are the Palm OS Handhelds, and the Microsoft Pocket PC.
The Palm can help you easily organize appointments, addresses, and to-do lists.
The Pocket PC, designed as a near replacement for a laptop computer, can also easily manage appointments, addresses, and to-do
lists. You can add software to both models.
Small, email-only machines, marketed to home users, are dedicated to sending, receiving, and managing email. Users typically
must pay an access fee to use these devices.
What will you primarily be using it for? Emailing or surfing the Internet? Playing games or organizing your life?
Will you be working at home or in an office? Or, will you be moving around a lot? Would a stationary or portable machine
work best?
How much can you afford to pay?
Service and support. You may pay for it upfront but it's usually worth it. A service warranty calls for the manufacturer to fix
your computer if something breaks. On-site service, where someone comes to your home or office to fix the computer, is best.
Support is help in the form of phone support or training.
Software
The operating system (OS) or system software is the most important program that runs on a PC. Operating systems recognize
input from the keyboard, send output to the monitor, keep track of files and directories, and control peripheral devices such as
printers.
An operating system lets you use different types of application software. For example, you can use a word processing applica-
tion to write a letter, and a spreadsheet application to track your financial information. To learn more about operating systems,
see the GCF Global Learning sections on Windows. To learn more about applications, see the GCF Global Learning sections on
Word, Excel, PowerPoint and Access.
Types of Software
Word processing programs such as Microsoft Word and Corel WordPerfect allow you to create and edit documents, such as
letters, reports, and resumes.
A spreadsheet application allows you to store information, perform complex calculations, and get printed output. Microsoft
Excel and Lotus 1-2-3 are two popular spreadsheet applications.
Database management software organizes specific information in one or more tables. Databases utilize tables, created by the
user, to retrieve data for a variety of purposes. For example, if you are a business owner, you might use Microsoft Access to
analyze your customer information and ordering data. Retrieve data by asking questions, sorting or filtering, and creating reports.
Presentation software like Microsoft PowerPoint and Corel Presentations is designed for creating on-screen presentations,
reports, overhead transparencies, and slideshows. It allows you to combine text and graphics in a single document.
Desktop publishing software, also known as publishing software, offers tools for precise control over text and graphics
placement, and some image editing functions. This software can often handle layout for newsletters and other publications.
Adobe PageMaker, Quark Express and Microsoft Publisher are desktop publishing applications.
Computer game software allows you to play interactive games on your computer, including card and board games, and flight
simulation.
With educational software, your computer becomes a virtual teacher covering such topics as reading, writing, math, geography,
foreign languages, and science.
Beta software is a version of commercial software that's released before the full version. Software companies use beta software
to test the product in the real world and to find and correct bugs before the final release hits the stores. Betas often expire after a
period of time, usually when the full version or the next beta is released. Developers sometimes have private beta testing that
you can apply to join. Or, they may have an open beta available to download.
Before you buy software, check its hardware requirements to make sure its compatible with your computer. If possible, try
software before you buy it. You can sometimes download a demo from a manufacturer's website or visit a computer store to see
it in action.
A software product license gives you the legal right to run a software program on your computer. When you buy software at a
store, the license comes in the box or appears online when you install the software.
To use the software legally, you must comply with the End User License Agreement (EULA). That's the agreement that
appears during the installation process.
Some software companies offer volume licensing or volume purchasing. An organization can save a lot of money if they choose
to buy multiple product licenses. The licensing options vary, depending on the product and the size and type of organization.
Types of Licenses
Freeware (public domain) - This is a license that allows you to use a program at no cost. Freeware is copyrighted software that
you can download, use, and legally pass around to others.
Shareware - This license allows you to download and sample shareware for a trial period. If you continue to use the program,
you must reimburse the producer of the program as noted on the documentation that comes with the program. Shareware is
copyrighted and includes games, screensavers, utilities, word processors, and more.
Single-user license - When you buy the product, this license grants you use of the program. This license is typical for a home
user.
A multiple-user license - This license is intended to be used in a network or multiple-installation situation. Network versions
are installed on a server and may allow a specified number of users to access the programs concurrently. In a multiple
installation situation, a certain number of copies are installed on several machines. This is a standard license for a business or
organization.
Software Piracy
Software piracy is the illegal distribution and/or copying of software for personal or business use. While it may not seem like a
big deal, sharing software with others violates federal copyright law.
End-User copying is one of the most common forms of software piracy. It typically involves friends loaning disks to each other
or organizations not reporting the total number of software installations on computers. Counterfeiting, or extensive duplication
and distribution of illegally copied software, is another form of software piracy. Consumers who buy counterfeit software get no
warranty, no technical support and no legal right to use the software. It can even carry viruses.
Penalties for software piracy can range from fines of up to $250,000 and imprisonment of up to five years.
In some cases, you may permanently transfer your rights to software that you have bought and used. Check your End User Li-
cense Agreement (EULA) for details. However, many Microsoft products distributed by original equipment manufacturers
(OEM) (companies such as Dell, Compaq or Gateway) may not be transferred under any circumstances. Check the EULA that
came with the OEM products to determine transferability.
Some upgrades are free, while others require a fee. An upgrade costs less than the full version of the software.
The software publisher may also allow you to download corrected versions of software. These "patches" are pieces of computer
code that replace the faulty code in your software. Patches work only if you own the software.
An Overview of Installing
Most software comes with an installation wizard that provides on
-screen step-by-step instructions for loading software. As you are in-
stalling, you are putting parts of a program in different folders on your
computer.
During the installation, you may be asked where you want to install the
program and if you want to create a shortcut on your desktop. A
desktop shortcut allows you to launch a program without going to the
Start menu or other location on your computer.
First, don't try to install new software while you have many other applications running. Close all applications, close your
anti-virus program and shut down your Internet connection.
Run Scandisk to help make sure your computer is in good shape before you install additional software. This utility can prevent
or fix many common disk problems. You'll learn more about this tool in Unit 3.
If you are downloading software from the Internet, make sure you scan it for viruses first.
Always back up or copy your files to a floppy disk or CD so that they will be recovered if your computer fails. While backing
up is usually routine for businesses, personal computer users often neglect this necessary task.
Some programs aren't compatible. They simply can't get along. Sometimes errors occur when you load new software or
upgrade software. Drivers that don't work well together could be causing the conflict. A driver converts the instructions of the
operating system to messages that the devices on your computer can understand.
If you change your operating system, the driver for your printer or other peripherals may need to be updated, too.
The Installation
The process of installing new software varies based on the software. However, most applications feature on-screen instructions.
For example, you can install a new Windows application using the automated Setup program included in most programs.
OR
If it doesn't start automatically, you will have to launch the Setup program manually.
Click Start.
Choose Run.
Type a:\setup if using a floppy disk, or d:\setup if using the CD-ROM drive, in the Run dialog box.
Click OK.
Sometimes when you install software, you do a partial installation. That means that you still need to insert the disk each
time you want to run the program. The computer will prompt you if you need to insert the disk.
Cleaning a Computer
Avoiding problems saves you money in the long run - cutting down on the amount of money you spend for new components or
repairs.
Preventative maintenance saves you time since it saves you the hassle of dealing with systems failures and data loss.
Don't eat or drink while working at your computer. Liquid spilled on your computer or monitor can harm the components.
Make sure to turn off your PC and unplug it before doing this or any of the cleaning described in this section.
You can also use an anti-static wipe with rubbing alcohol to clean your mouse. Turn the mouse over, pop out the tracking ball
by either popping off the cover or unscrewing it, depending on your mouse brand. Then, clean the tracking ball and the inside of
the mouse.
Use a can of compressed air with a narrow nozzle to blow out debris from between the keyboard keys and the air intake slots.
A safe cleaning solution for computer surfaces (not computer screens) is ammonia diluted with water or glass cleaner
comprised mostly of ammonia and water. (Check the label). Remember, the milder the solution, the better.
IMPORTANT: To clean the monitor screen, use a paper towel or soft, lint-free cloth moistened with water only.
You can also buy monitor-cleaning cloths. However, these are for regular monitors - not for laptops. Use a cloth moistened
with water on your laptop screen.
Windows XP is an operating system that lets you use different types of applications or software. For example, it allows you to
use a word processing application to write a letter, and a spreadsheet application to track your financial information.
Windows XP is a graphical user interface (GUI). It has pictures (graphical) that you use (user) to communicate (interface) with
the computer. This type of system is popular because it's logical, fun and easy to use.
This operating system has multitasking capabilities, meaning it can run several applications at the same time. Multitasking allows
you to view this section on the Internet at the same time that you practice using other applications with Windows XP.
When you click the Start button, the Start menu appears. The Start menu
is your gateway to the applications that are on your computer. The left side
of the Start menu lists programs, and the right side allows access to
common Windows folders (My Documents, for example). It also provides
access to Help and Support, Search, and Run.
Exploring Programs
Programs enable you to do work on the
computer. For example, a word
processing programs such as Microsoft
WordPad allows you to create a basic
document. You can easily open a
program from the Start menu using the
All Programs button.
To close a program, click the located at the top right of the window.
Note: You must be connected to the Internet for Internet Explorer to open a web page.
Understanding Icons
The small pictures on the desktop are called icons. One type of icon is an object icon. Examples of object icons
are My Computer, Recycle Bin, and Internet Explorer. These icons allow you to open files and programs on
your computer.
Shortcut icons allow you to open an application quickly. These icons appear on your desktop and with little
arrow in the left corner. Desktop shortcuts are links to files and programs. You can add or delete shortcuts
without affecting the programs on your computer. You'll learn about creating shortcuts in a later section.
The box on the right is called the Notification Area. Here, you'll find the clock and several other icons
depending on what you have installed on your computer. Other icons appear in the Notification
Area detailing the status of your activity. For example, when you're printing a document, a printer
icon appears. Microsoft also uses the Notification Area to remind you when software updates are
available for download.
When you open or minimize a window or program, a rectangular button appears on the taskbar that shows the name of the
application. These buttons disappear when you close a window.
Windows XP Windows
The workspace is the white area inside the window. This is where
you do your work with a program, such as writing a letter.
Depending on what program you're working with, the workspace
will appear differently.
The title bar is the horizontal bar at the top of a window. It's displayed as white text on blue background by default.
The Control menu button is the icon at the far left end of the title bar. The Control menu button opens a menu you can
use to control the window.
The Close button is at the far right end of the title bar. It looks like a box with an X in it. Click the Close button to close a
window or to exit a program. Next to the Close button, you'll see the Minimize and Maximize buttons. Learn more about
these buttons in the next section.
The menu bar is the below the title bar. It contains several menus, which let you see a list of commands.
Some menu options are followed by ellipsis, or... Choosing a menu option followed by an ellipses will
open a dialog box, which feature helpful tools to help you perform tasks.
Some Windows XP programs have toolbars across the top of the window. The toolbar buttons allow
you to print, cut, paste, or do other tasks. The options vary depending on the program.
To scroll:
The Minimize button is among the three buttons at the right end of the title bar. This button has a small dash (or minus sign). The
Minimize button shrinks the window and places it on the taskbar while leaving the program running.
The Maximize button, which looks like a small window, is used to enlarge a window to cover the entire desktop.
Sizing Windows
Sizing window is slightly different from minimizing, restoring, or maximizing. Note: You cannot size a window if it's been
maximized.
Make sure the mouse pointer change into a two-headed arrow before you try to size the window.
To move a window:
Place the mouse pointer over the title bar (at the top of the window).
Click and hold down the left mouse button. (You cannot move a window that has been maximized other than to use the
Minimize button.)
Drag the window to the place where you want it and release the mouse button.
Tiled windows are next to each other. Windows can be tiled horizontally or vertically. If windows are tiled horizontally,
they appear one above another. If windows are tiled vertically, they appear side by side.
Click the program buttons on the taskbar to activate the window you want to work with.
Unlike previous versions of Windows, Windows XP keeps the taskbar from getting too cluttered. It groups the buttons when
too many accumulate on the taskbar. For example, when you open Outlook Express, you'll see one button on the taskbar.
However, if you have three or more email message windows open, one button represents the Outlook Express's open windows.
Simply click the button to select from the pop-up list of open windows.
Customizing Windows XP
OR
Many folders feature a link to the Control Panel in the See Also dialog box (only in XP view).
The Windows XP Control Panel is divided into Categories. If you click a Category, the window presents a List of Tasks and
related Control Panel icons.
Note: Task and Control Panel icons perform basically the same functions. For example, notice that you can "Choose a
screen saver" in the Pick a Task list. Clicking this link opens the Display Properties dialog box. However, if you were to choose
the Display icon, the Display Properties dialog box opens.
If you look at the left side of the window, you'll notice that the See Also and Troubleshooters dialog boxes provides several
more related options.
The new Control Panel design provides multiple ways to do something, thereby making it more user-friendly. However, the
new Control Panel design doesn't provide you with access to every available Control Panel tool - it only provides you access
to the most commonly used tools.
To access ALL of your Control Panel tools, you must switch to Classic View.
Use the menu bar and toolbar buttons to navigate and further explore Control Panel options.
Wallpaper is the background image that appears on your desktop. Windows XP offers many wallpaper choices.
Advanced Users:
Click Browse to choose a picture from the My Pictures folder (or navi-
gate to a picture located in another folder.)
Click the Customize Desktop button to alter your desktop icons or display a web page on your desktop.
In the early days of computing, screen savers helped prevent images from being burned into the monitor. Now, screen savers
entertain us, provide some privacy, and enhance or work or home environment. Windows XP comes with several screen savers.
You already know about the Taskbar, but did you know you can
customize its appearance?
Different types of files store different types of information. Each file is given a filename and has a three-letter filename
extension that identifies the file type. (The filename and filename extension are separated by a period.) For example, a document
created using WordPad might have the file name, letter to John.doc.
Click Start.
Choose All Programs Accessories
Notepad.
Notepad opens.
Type, "This is my new document."
Choose File Save from the menu
bar (Ctrl + S).
The Save As dialog box appears.
Save your file to the desktop.
Name your document new document.
In the Save as type drop down box, be
sure your document is saved as a text
document.
Click Save. Your file is now saved to
the desktop.
To delete a file:
Locate your file (in this case, the file is located on the desktop).
Right-click the file icon.
Choose Delete.
A Confirm File Delete dialog box appears asking you if you are sure you want to send the
file to the Recycle Bin.
Choose Yes.
The file is moved to the Recycle Bin.
What is a Folder?
When you first start using Windows XP, you may only create a few files. Over time, you'll create MANY files. To keep your
files organized, create folders.
OR
Open My Documents.
Choose the Make a New Folder link from the File and Folder tasks menu.
What is a Drive?
A drive, or disk drive, is hardware on which you can store files and folders. Disk drives are assigned a letter.
Your hard drive (the drive inside your computer) is known as the (C:) drive.
Your floppy disk drive is known as the (A:) drive.
If your computer has a CD ROM drive, it is usually called (D:)
Choose where you'll save your files during the Save As process. Most computer users store their files on the (C:) drive.
To open My Computer:
Double-click the My Computer
icon on the desktop.
My Computer opens.
OR
OR
Locate the file or folder you want to copy and choose Edit Paste. (Ctrl + V)
OR
To select a consecutive group of files, click the first file, press and hold down the Shift key, and click the last file. All of the
files will be selected.
Choosing Views
You can choose how you want to display files and folders. Display them as thumbnails, tiles, large icons, small icons, as a list,
or as a list with details including size, type and date last modified.
When you delete a shortcut, the original item still exists on your computer in its original location.
Adding a Shortcut
In this section, you will learn three ways to create a shortcut.
Choose the one that works best for you.
You can open the Recycle Bin anytime and see what's inside by double-clicking
the Recycle Bin icon located on the desktop or using Windows Explorer.
Let's say you choose to search for a particular file. The Search
Companion prompts you with questions to help you refine your search. It's helpful if you can
remember something about the missing file such as all or part of the filename, file type, when
you last worked with the file, a word or phrase in the file, or what drive it's on, etc. The more
criteria contained in your search, the more refined the search becomes.
Finding a file can take seconds, minutes or much, much longer depending on the type of search and
where you look. If you don't find the file or folder you're looking for on the first try, type in a
different name and/or location.
To quickly review files listed in your search results, hover your mouse pointer over the
filename. A yellow pop-up window displays, telling you its location, the file type, and size.
Double-click the file to open it.
User Accounts
1. Administrator account. The administrator can do everything with the computer and can go anything he or she desires -
essentially giving them control over the entire computer, including other accounts. The administrator account can never be
disabled or deleted.
2. Standard account. Users with standard accounts can install programs and hardware, change pictures and related personal data,
and create, change, or remove his or her password.
3. Guest account. The guest account doesn't require a password, can't add or remove programs from the computer, and is disabled
by default. This account type is great for kids or students.
Accessibility
The Keyboard tab allows you to change the way your keyboard inputs information into Windows XP.
These features are especially helpful for users who are visually impaired.
Choose from two options:
To enable High Contrast, click the Use High Contrast checkbox. Clicking the Settings button enables the shortcut for
High Contrast, ALT+SHIFT+PRINT SCREEN.
Use the sliders to change the cursor blink rate and the width of the cursor.
Using MouseKeys
The Mouse tab allows you to use the numeric keypad on
your keyboard to control the pointer. To use MouseKeys,
click the Use MouseKeys checkbox. Clicking the Settings
button enables the shortcut for MouseKeys, LEFT
ALT+LEFT SHIFT+NUM LOCK.
Automatic reset. If accessibility features are turned on, users can turn off accessibility features after being idle for a
specific period of time. Use the drop down menu to select the desired time.
Notification. Receive a warning when turning a feature on or make a sound when turning a feature on or off.
SerialKeys. Turn on SerialKeys so other input devices (other than the traditional keyboard and mouse) can work with
Windows XP.
Administrative options. Computer administrators can apply all accessibility options to the logon desktop and apply all
accessibility settings for each new user.
Microsoft Magnifier makes the screen more readable. It creates a separate window
that shows a magnified portion of your screen.
The Narrator
The Narrator can read items on the screen to you. However, the Narrator works only in English and may not work with every
program installed on your computer. Your computer will also need to be equipped with a sound card and speakers for the
narrator to function properly.
The Utilities Manager is a helpful tool that allows you to manage all of the Accessibility tools.
This window tells you which Accessibility tools are currently running and may help you troubleshoot any problems.
The Index
Notice the buttons across the top of the home section. The Index option works
like any other index, providing you with a fast and easy way to locate topics and
resources.
When you want to review your Help Favorites, open the Help and Support Center and click the Favorites
button.
History
The History option, as in Internet Explorer, keeps track of all of the Help and Support Center pages you have visited on the
Internet. To review pages you've visited in the past, click the History button. Double-click any of the links to display any of the
pages.
Support
If you are having trouble with Windows XP that you can't resolve on your own, there is support available to
you in the Help and Support Center. To access Support, click the Support button.
Ask a friend to help. If you have an Internet connection, you can invite someone you trust to chat with you, view your
desktop, and work on your computer.
Get help from Microsoft. Using an Internet connection, you can allow a Microsoft support professional to answer your
questions via email, chat, view your screen, or work on your computer.
To use search:
Open the Help and Support Center.
In the Search box, type in a keyword that pertains to the topic you're interested in
and click the green arrow key.
Adding a Printer
Adding a printer is simple using the Add Printer Wizard available in the Printers and Faxes folder.
Note: Many of the latest Plug and Play printers connect through a USB port. If your printer falls into this category, you may
not need the Add a Printer Wizard. If you do have to use the wizard and your printer isn't listed in the Windows XP list (which
usually displays when you try to add a new printer) you may have to contact the printer manufacturer for a driver. When you get
the driver, follow the Add a Printer instructions on your computer.
If you work in an office environment where several people share a printer, there may be a network problem. Contact
your Network Support person.
If you can find the manual for your printer, read it to see if you can find the solution to the problem.
If your printer still doesn't work, go to Help and Support Center. Under Pick a Help Topic, click Printing and
Faxing. Or, enter the term printer into the Search box.
Open the Printing Troubleshooter. Answer the questions and follow the instructions so the computer can help you
figure out what's wrong.
System Tools
Disk Cleanup
Disk Cleanup is another tool that helps keep Windows XP operating as it should.
It inspects your hard disk and looks for files that can be safely deleted. Deleting
unnecessary files frees up valuable disk space.
The More Options tab gives you even more disk cleanup options.
Note: It's recommended that you run Disk Cleanup every three
months.
To open Microsoft
Management Console:
Open Disk Defragmenter.
Open the Action menu.
Click Help.
A Microsoft Management Console
opens and explains how to run Disk
Defragmenter.
Dealing with an
Unresponsive Computer
While doing regular maintenance on your computer should
keep it running smoothly, your computer may occasionally
freeze up or become unresponsive to the click of a mouse
or keyboard.
Shown below is the Microsoft Word default window. When Word is launched, a new blank document, or default window, opens
in Print Layout view. Although window elements are fully explained in our Windows course, here is a brief explanation of the
Word window.
Ruler View
Buttons
Used to set margins,
indents, and tabs. Changes the layout
view of the
Insertion Point document to
Normal View, Web Layout View, Reading Layout
View, Print Layout View, or Outline View.
The location where the next character appears.
Normal view is best used for typing, editing, formatting and proofreading. It provides a maximum amount of space without rul-
ers or page numbers cluttering your view.
Web Layout view shows you what your text will look like on a web page.
Reading Layout view is best for documents that you do not need to edit. The goal of this view is to increase legibility so that the
user can read the document easily.
Print Layout view shows you what your document will look like when it is printed. Under Print Layout view you can see all
elements of the page. Print Preview shows you this as well.
Outline view is used to create and edit outlines. Outline view only shows the headings in a document. This view is particularly
handy when making notes.
Full Screen view displays ONLY the document that you are working on. All the other pieces of the Word window are removed
except for one button that allows you to Close View Screen.
location).
If you have used a previous version of Microsoft Word, you may notice the menu bar in Word 2003 operates a little differently
than before.
Word 2003 uses pull-down menus that initially display commands that users most often need.
If there is a small black triangle next to a command, hover the mouse pointer over
the command with the triangle and a cascading menu with additional options will
appear. Point and click to make a selection from the cascading menu.
Commands that are not used often in 2003 are initially hidden from the viewer. If you do not see
all the commands on a menu, click on the double arrows at the bottom of the pull-down menu. You
can also double-click the menu to expand it.
If you do not see your task pane, you can view it by either selecting certain commands or by
manually opening it.
Along the top bar of the task pane you should see
small backwards and forwards buttons on the left as
well as a down arrow on the right. To view different
task panes available to you, click on the down arrow.
Once you have opened different
task panes, you can navigate
through them by clicking on the
left and right arrow button on the
left. To close your task pane, click
the x symbol on the far right of
the bar.
The more you work with Office 2003, the more files you will create.
Creating a new file follows a similar process in most Office 2003 programs.
Important Terms:
In Word 2003, a file is called a document.
In Excel 2003, a file is called a workbook.
In PowerPoint 2003, a file is called a presentation.
In Access 2003, a file is called a database.
In Outlook 2003, a file is called a mail message.
Microsoft Word provides several ways to create a new document. You can start with a new, blank document or you can use a
predefined template. A template is a sample document, or pattern, that you can personalize.
To Use a Template:
Select File New from the main menu. The New Document task pane will appear.
Look in the Templates section of the New Document task pane. You can access templates from three locations:
Templates on Office Online
On my computer
On my websites
Select On my computer to view templates
that are preloaded on your computer.
Click one of the eight category tabs:
General
Legal Pleadings
Letters & Faxes
Mail Merge
Memos
Other Documents
Publications
Reports
Select one of the templates to view it in the
Preview section
Click OK. The template will appear in your
Word window.
Insert your text into the template.
Save and close the document.
OR
OR
Before you click the Save button in the Save As dialog box, first name your file. Choosing a short, descriptive name will help
you remember what each file contains.
After you save your work for the first time, you must continue to save in order to prevent lost work. To do this, choose File
Save (Ctrl + S) or click the Save button. The Save As dialog box will not open again.
Save As
Save As allows you to save an existing file under a new name, therefore creating a new file.
To save an existing file under a new name and create a new file:
With the existing file open, choose File Save As from the menu bar.
The Save As dialog box appears.
Type a new name for your file in the file name box.
Click Save.
To open a file:
Use the Open dialog box to find the file you want
to open. Use the buttons along the left side of the
dialog box or the Look in drop down box to
navigate to where your existing file is located. Use
the arrow buttons to move between levels of
folders.
button.
The file opens.
OR
To recover a program:
Open the Start menu.
Choose All Programs Microsoft Office Tools Microsoft Office Application Recovery.
In the Application list, click the program or file that is not responding.
To try to recover the file, click Recover Application or Restart Application.
To close the program, click End Application. (You will lose your most recent changes.)
If you want to report the problem to Microsoft (you must have access to the Internet), click Report problem. Otherwise, click
Don't report problem.
Open the Office program.
Review the list of files in the Document Recovery task pane.
Note: If a file has the word [Recovered] added to its filename, it usually contains your most recent changes.
To reset AutoRecover:
Open the Office program.
Choose Tools Options from the menu bar.
The Options dialog box opens.
Click the Save tab.
Make sure the Save AutoRecover info every:
box is checked.
Use the arrows to adjust how often AutoRe-
cover saves a temporary copy of your file.
Click OK.
Save your work periodically and before you close a file. This is the best protection against losing work.
Backup your work. Backup is the process of copying files so they will be saved in the case of computer failure or other
problem. Many computers come with basic backup software, but you can also buy backup software. Since some files are more
important than others, choose a backup schedule that works best for you. For example, weekly backup may be adequate for the
latest family newsletter, but you may want to run a daily backup for that 10-page paper due next week.
The insertion point (also called a cursor) is the blinking line that indicates where text will be inserted when you begin typing.
In Word 2003, a small horizontal black line indicates the end of your file. You cannot move your insertion point below this line.
You'll also notice that your mouse pointer changes shape as you work within a file depending on which program you have open.
In Word 2003, your mouse pointer changes from an arrow into an I-beam
In Excel 2003, your mouse pointer changes from an arrow into a cross
In PowerPoint 2003, your mouse pointer changes from an arrow into an I-beam
In Outlook 2003, your mouse pointer changes from an arrow into an I-beam
Remember, the I-beam or cross indicates where the mouse pointer is located. The blinking insertion point indicates where
your text or numbers will be typed. Once the pointer leaves the Office 2003 file to perform a Windows function, it changes back
into an arrow.
The backspace key erases the text to the left of the insertion point one character at a time.
The delete key (located under the Insert key) erases the text to the right of the insertion point.
Before you can change the font style, size, or color, replace or delete text, you must first select, or highlight, it. There are many
different selection techniques. Remember: First, select what you want to change and then edit the text. Click anywhere outside the
selected area to deselect text.
Pros: Cons:
Highlights letters, words, and even entire documents. Lack of control may cause:
Lots of control with individual letters, words, and phrases.
Selecting the entire file when you don't want to.
Selecting text to the right when you want to select to the left
and vice versa.
Second Method: Use the Pointer to Select the Entire Line of Text
Move the I-Beam to the left margin until it becomes a right-slanted white arrow pointer
Position the arrow pointer to the left of the line that you want to highlight.
Click once to highlight a single line.
Click and drag up or down to select as many lines as you want to edit.
Pros: Cons:
Quick and easy. Selects the whole line of text when you may not want it to.
May take some practice to position the arrow pointer
correctly.
Pros: Cons:
Great when you need to quickly select all text in a file Selects all text when you may not need it.
(great for changing font style or size).
When text is selected, pressing any key will delete it. The Undo button often comes in handy for this common mistake.
The Undo command lets you "undo" or delete the last change made to your document. As you can imagine, this is a very useful
feature. If you make a change or mistake that you do not want or did not mean to do, you can simply "undo" your action.
Word remembers up to 300 actions in a document and allows you to undo any or all of them as long as you haven't closed the
document first.
To Use Undo:
Click Edit on the menu bar.
Select Undo - this command will change names depending on the action you just took. If you accidentally deleted a
sentence, it says Undo Clear.
Press Ctrl + Z on your keyboard for a shortcut to Undo.
OR
Undo all your recent actions by repeatedly clicking the Undo button located on the Standard toolbar.
Notice the small list arrow next to the Undo button. When you click on it, you see a list of all the separate actions you have
performed on the document you are working on. You can select as many actions as you want to undo.
IMPORTANT: If you undo an action in the middle of the list, you will also undo all the ac-
tions above the one you select. For example, if you undo the 15th action in your list, you will
also be undoing the 14 actions that came before the one you select.
To Use Repeat:
Click Edit on the menu bar.
Select Repeat - this command will change names depending on the action you just took. If
you need to format a title on one page and wish to format another title the same way using
Repeat, it will say Repeat Style.
Press Ctrl + Y on your keyboard for a shortcut to Repeat.
If you want to move or copy the item to another file, switch to the file.
Click where you want the item to appear.
Click the Paste button on the Standard toolbar. (Ctrl + V)
To format the pasted items, click an option that appears on the Paste Options
button that appears just below your pasted selection.
The cut, copy, and paste commands are also available on the Edit menu.
Click and hold the left mouse button until the insertion point changes into a white arrow pointing up to the left.
Drag the selected text to its new location.
Below you will view examples of text that are aligned using the left, right, center, and justified alignment buttons.
When line spacing is measured in points, it is referred to as leading (rhymes with wedding). When you reduce the leading you
automatically bring the lines of text closer together, sometimes making it difficult to read. Increasing the leading will space the
lines out, allowing for improved readability. For example, the 10 point font usually uses 12 point leading. This is the default and,
in general, should be used.
When you make a line spacing change, it affects only the text in a
paragraph that contains the insertion point.
Paragraph Spacing
Just as you can add spacing between lines in your document, you can
also choose spacing options between each paragraph. Typically, extra
spaces are added between paragraphs, headings, or subheadings. Extra
spacing between paragraphs adds emphasis and makes a document eas-
ier to read.
Choose Reveal Formatting on the Task Pane and click on the blue link, Margin, under the Section heading.
You can change the margin in precise steps by clicking on the up or down arrows next to the margin that you wish to change or
you may type a number in the text box next to the margin you wish to change.
Click OK.
Margins Tab
Click the Default button in the lower left corner of the Page Setup
dialog box to set (or reset) Word's default margins.
You can choose to apply these new margins to the whole document or
from this point forward by using the drop-down menu, Apply to:.
Change the Page Orientation by clicking on either the Portrait box (8.5
x 11) or the Landscape box (11 x 8.5).
Paper Tab
The default paper size is 8.5 x 11, but you can change the paper size en-
tirely. You can even customize the paper size to include note cards, enve-
lopes, photo paper, index cards, and much more.
Layout Tab
The Layout Tab includes options to customize page numbering, borders, and headers/footers. A nice feature on the Layout Tab
is creating a Title Page for your document.
Working with columns can be challenging, but with practice, you'll have columns
mastered in no time. An approach we will first try will be to enter text into a single
column and then convert it into multiple columns.
In the Indentation section, you can click the increment arrows to enter the amount of indentation.
OR
Each time you click the Increase or Decrease Indent button your text is moved by the default .5 inches.
Remember, there is a difference between indents and tabs. If you set a tab, only one line of text is indented. If you click one of
the indent buttons or set an indent in the Paragraph dialog box, all of the text you type afterwards will be indented.
Hanging Indents
When all the lines in a paragraph are indented except the first line, a
hanging indent is created. Hanging indents are not standard in
documents such as business letters, but you may see examples of the
hanging indent on web pages, newsletters, and often on bibliographic
entries. Hanging indents are used for the MLA bibliographic format.
The Ruler is helpful when you need to create several columns, show column placement, or the distance between columns.
If you switch to Print Layout View (Choose View Print Layout View), a vertical ruler displays along the left hand side of
the screen. To hide this vertical ruler, switch to a different layout view.
Tabs
Click on the small gray box to the left of the ruler to move through the five different Tab Settings.
Left tab : Moves text toward the right edge of the page as you type.
Right tab : Moves text toward the left edge of the page as you type.
For example:
Remember you can also increase or decrease your Indents by using the Increase/Decrease Indent buttons on the Formatting
toolbar.
Formatting Text
To avoid frustration, remember to select text before you apply style. If you choose a type style without selecting any text, Word
uses your chosen styles on whatever text you type next.
Font Names
To select a font, you can scroll through the Font list. The list shows you all the fonts that are available on the computer you are
using.
As you scroll through the many different font names, take notice of those fonts that have TT beside their name. These TrueType
fonts will look the same on both the computer screen and when you print them on paper.
Using Color
The use of color can add emphasis to your words and make your document easier to read.
Arial 10 Point
Arial 12 Point
Arial 20 Point
The standard Font size for most documents is 12 Point. You can preview different font sizes in the Preview window in the Font
dialog box.
OR
Remember you can also change the font size from the Formatting toolbar.
Other commonly used symbols that appear in the Symbol Dialog Box are:
© Copyright
® Registration
TMTrademark
Checkmark
-- Em Dash
Insert Symbols
To Insert Symbols into your Document:
Click Insert on the Menu Bar.
Select Symbols. The Symbols Dialog
Box appears.
Click the Symbols Tab to select a
symbol from a Font type.
OR
The available symbols will depend on which fonts you have installed on your machine. Word comes with pre-installed
symbols for you use, but other fonts such as, Wingdings, will also offer numerous symbol options.
For example:
A document that was created with numerous tabs could be quite difficult to edit if you needed to delete all the tabs. However, if
you display your non-printing characters, you will be able to quickly see where all the tabs exist. The tab symbol will appear as
an arrow pointing to the right, . Place the insertion point to the right of the tab symbol and press the Backspace key to
quickly delete these tabs.
OR
When you select the Show/Hide button, codes for paragraph marks , tabs , and
spaces are visible in your document. If you prefer to display non-printing characters when
formatting your document, these symbols will not appear in your printed document.
A bullet is usually a black circle but it can be any other symbol used to highlight items in a list. Use bullets to list items that do
not have to be in any particular order.
Numbers (or letters) are used when information has to be in a certain order. You can use the default Bullets and Numbering
settings by clicking on the appropriate button on the Formatting toolbar.
Review the following tips that will help you manage your numbered or bulleted lists.
Remove a bullet by placing the insertion point to the right of the bullet or number and press backspace (you will not
be able to place your insertion point to the left of the bullet).
If you want to change a bulleted list to a numbered list (or vice versa), select the entire list and click on the appropriate
button.
To create a line break between items in a bulleted or numbered list, place your cursor where you want the line break
and press Shift + Enter.
You can view the type of bullets and numbers available to you by opening the Bullets and Numbering Dialog Box.
Examples:
When typing the misspelled word, stannd, Word will automatically convert this typo to the correct spelling, stand.
Instead of having to write a long proper noun like, GCF Global Learning, you can customize AutoCorrect to automatically
complete the rest of the proper noun once you type the letters GCF.
Modifying AutoCorrect:
Click Tools
Select AutoCorrect Options from the menu bar. The
AutoCorrect Options dialog box appears.
Check or de-select any of the following options:
Show AutoCorrect Options buttons.
Correct two initial capitals.
Capitalize the first letter of the sentence.
Capitalize the first letter of table cells.
Capitalize names of days.
Correct accidental usage of Caps Lock key.
Replace text as you type.
Use the Replace: box to type a word you frequently
misspell or type a shorthand word to represent a longer
word or phrase, such as GCF Global Learning.
Use the With: box to type the correct word.
Click Add.
If AutoCorrect changes a word that you don't want it to change, you can hover the pointer over the area where the auto-correction
was made and a Smart Tag will appear that allows you to reset the original word. Click on the Smart Tag and a drop-down list
with options to reverse the action is displayed.
For example, consider a document you are editing that displays Word XP needs to be updated to Word 2003. Currently the
document has the text, Word XP, typed again and again throughout the document. Using Find and Replace to replace Word XP
with Word 2003 will save you much time and effort in your editing process.
OR
Check the Highlight all items found in: box to find all instances of the word at the same time. Use the list box below to select
all, or portions of your document.
You can perform a more detailed search by clicking the More button on the Find and Replace dialog box:
Click Ignore Once to ignore this one instance of the grammatical error in your document.
Click Ignore Rule to ignore this grammatical error and all other grammatical errors of this type in the document.
Click Next Sentence to take you to the next grammatical error listed in your document.
Click Change to replace the error with what is in the Suggestion box.
Click Explain to open the Office Assistant, which will offer you reasons for this error.
If the red and green wavy lines distract you, you can turn them off:
Choose Tools Options from the menu bar. The Options dialog box appears.
Click the Spelling & Grammar tab.
Un-check the Check Spelling as You Type or Check Grammar as You Type so the check box so that it is empty.
Click OK.
Have you ever realized after typing a long paragraph that you accidentally left the Caps Lock on and all your letters are in Upper
Case? Fortunately, you will not have to re-type the text to correct this mistake. Word offers a quick solution by allowing you to
either select the Upper Case text and pressing Shift + F3 or clicking Format on the menu bar and selecting Change Case.
Choose the correct option from the Change Case Dialog Box.
Text boxes can be formatted with shadings, color, borders, and graphics, making for an impressive display of your Word skills.
The text box will by default contain a white background color and a thin black border.
Note: When you create a text box in Word 2003, the drawing canvas appears by default. The canvas helps you arrange and resize
the objects you are working with.
Sizing handles (small circles) appear. Hover the mouse pointer over any of the sizing
handles (small circles) until it turns into a diagonally pointing arrow.
Click and drag the sizing handle until the box is the desired size.
Right-click on the text box border and select Format Text Box. The Format Text Box dialog box appears.
You can access the Text box feature from the Drawing toolbar.
Click View on the Menu Bar.
Select Toolbar and then Drawing from the cascading menu. The Drawing toolbar appears at the bottom of your document.
Click the Text box button . Don't confuse this button with the Rectangle button. You cannot insert text using the
Rectangle button.
The Text Box Dialog Box offers you several tabs to choose from:
Color and Lines: Fill text box with color, define the border colors, styles and weight
Size: Define a specific size
Layout: Text wrap and alignment
Textbox: Internal margins
Similar to columns, Tables can be challenging at first. Word has created an entire menu to help assist you in creating your first
Table.
A few important terms to know before you begin creating tables are:
Another automated way to create a quick table is by using the Insert Table Button on the
Standard toolbar.
Drag the pencil to create a rectangle about the size of the table you want.
Release the mouse button. The border of the table appears in your document.
Use the pencil again to draw in column and row borders.
Click the Draw Table button again to change the pencil back into an I-beam.
If you make a mistake while drawing your table, you can erase both rows and columns by using the Eraser on the Tables and
Borders toolbar. Once you select the Eraser, the pointer will change to resemble the Eraser Button. Drag the Eraser over
parts of the table you wish to erase. When you are finished erasing, click the Eraser button again to put the Eraser away.
Entering Text
Click inside any table cell to begin entering text or numbers.
The insertion point rotates when entering vertical text, but editing vertical text is really no different than editing horizontal
text.
Table:
Right-click and choose Table Delete Rows
Place the insertion point anywhere in the table. from the shortcut menu.
Choose Table Insert Rows above OR Rows below. To Delete Single Table Cell:
Place the insertion point inside the cell you wish to delete.
To Insert a Column:
Choose Table Delete
Position the mouse pointer where you want to column to be
located. Cells from the menu
bar. The Delete Cells dialog
Choose Table Insert box appears.
Click Shift cells left, Shift
Insert Columns to the cells up, Delete entire row,
Right or Insert Columns to or Delete entire column.
the Left.
To automatically adjust the size, select the entire Table and then choose Table AutoFit AutoFit to Contents.
AutoFormat
Just as Word offers document templates for memos, faxes, reports and other items; Word also offers templates for Tables.
To use AutoFormat:
Create your table.
Click anywhere in the table and choose Table and then
Table AutoFormat. The Table AutoFormat dialog
box appears.
Scroll through the Table Styles until you find a table
you like. You can preview the Table Style in the
Preview Box.
Check and uncheck the options in the Apply special
Formats to: sections to slightly change parts of your
table. Check out your changes using the Preview box.
Click the New button to customize your own Table
Style.
Click the Modify button to change parts of an existing
Table Style.
Click OK.
To Apply a Border:
Select the Line Style, Line Weight, and Border Color you would like.
Select the cells you want bordered.
Click the Outside Border button drop down menu and choose the location of your border.
Add Shading
To Apply Shading:
Select or place the insertion point inside the cell(s) you want
shaded.
Click the Shading Color button drop down arrow. A shading
color menu appears.
Click on a color. Your cell(s) are automatically shaded.
You can access many of the features from the Table and Borders Dialog box on the Task Pane. Choose the Reveal Formatting
Menu and look for the Table and Cell Headings.
The Drawing Toolbar offers many options for including lines, lines with arrows, and many types of shapes into your document.
Drawing Objects
To Draw Lines and Shapes:
Open the Drawing toolbar by clicking View on the Menu Bar, Select Toolbars and then Drawing from the Cascading
Menu.
OR
Line Tool -
Arrow Tool -
Rectangle Tool -
Oval Tool -
Hold the Shift key down to create straight lines, perfect circles, or perfect squares.
AutoShapes are inserted (on their own layer) with the In front of text wrapping style applied.
Here are just a few examples of what WordArt allows you to do:
To Insert WordArt:
Place the insertion point where you would like to insert
WordArt.
To select several objects hold down the Shift key and click on each object, or use the Select Objects tool.
Fill color allow you to color all selected drawing objects. No fill is the color white.
Changes the line style of a selected object. Includes solid and dotted lines.
To change your Search For text: Click the Modify button below the clip art results
To preview video and sound clips, click the appropriate tab and click the Play button to preview the file.
To Delete a Picture:
Select the image (click on it).
Press the delete key on your keyboard.
By default, when a picture is imported into Word, it is aligned to the left margin. However, just as you would text, you can
change the alignment so the graphic is right-aligned or centered. You can also drag the image anywhere on the page.
To Move a Clip:
Select the clip.
Use your mouse to drag a selected clip to any position on the page.
The I-beam turns into a white pointer with a little box under it as you move the
picture.
OR
Sizing Handles
You have two options when sizing your graphics. If it is important to maintain proportions, which will prevent the image from
looking skewed, then you should use the corner handles to re-size the image. If you do not need to maintain the graphic's
proportions, you can use the top, bottom or side handles.
To keep the center of an object in the same place, hold down the CTRL key while dragging the mouse.
Be careful; using only the sizing handle can make your pictures blurry and distorted.
Crop, Recolor Object, and Set Transparent Color buttons are used with areas of the picture. All other buttons affect the
entire picture.
Use eyedropper to make areas of the picture transparent (mainly for web graphics)
Set Transparent Color
Printing
OR
Once you have accessed Print Preview, your file will now be in Print Preview mode. It will look something like this:
Choose File Print Preview or click the Print Preview button on the Standard toolbar.
Click the text in the area you want to edit.
The program zooms in on the area.
Click the Magnifier (to turn off magnification). When the pointer becomes an I-beam, edit your file.
To return to the original magnification, click the Magnifier, then click on the file.
To exit print preview mode, click the Close button.
OR
161 Section 4-1: The History and Definition of the Internet 161
A Brief History of the Internet
In 1969, the US Department of Defense started a project to allow researchers and military personnel to communicate with each
other in an emergency. The project was called ARPAnet and it is the foundation of the Internet.
Throughout the 1970's, what would later become the Internet was developed. While mostly military personnel and scientists used
it in its early days, the advent of the World Wide Web in the early 1990's changed all that.
Today, the Internet is not owned or operated by any one entity. This worldwide computer network allows people to communicate
and exchange information in new ways.
According to www.commerce.net, in April of 1999, there were 92.2 million Internet users over the age of 16 in the United States
and Canada. By 2005, it is predicted 75% of the total US population will be online.
Local Area Network (LAN): A LAN is two or more connected computers sharing certain
resources in a relatively small geographic location (the same building, for example).
162 Section 4-1: The History and Definition of the Internet 162
Servers
All computers on the Internet (a wide area network, or WAN) can be lumped into two groups: servers and clients. In a
network, clients and servers communicate with one another.
Manages resources (for example, one printer many people use) in a network.
The term server is often used to describe the hardware (computer), but the term also refers to the software (application) running
on the computer. Many servers are dedicated, meaning they only perform specific tasks.
For example:
An email server is a computer that has software running on it allowing it to "serve" email-related services.
A web server has software running on it that allows it to "serve" web-related services.
Clients
Remember, all computers on the Internet (a wide area network, or WAN) can be lumped into two groups: servers and clients,
which communicate with one another.
Independent computers connected to a server are called clients. Most likely, your home or office computer does not provide
services to other computers. Therefore, it is a client.
Clients run multiple client software applications that perform specific functions.
For example:
An email application such as Microsoft Outlook is client software.
Your web browser (such as Internet Explorer or Netscape) is client software.
163 Section 4-1: The History and Definition of the Internet 163
The World Wide Web (WWW)
As you now know, the Internet is the physical computer network (computer, monitor, modem, cables, phone lines, etc).
Before the Web, the Internet was mostly text-based. To use it, you had to know lots of keyboard command prompts, making
it largely unusable to the average person. The World Wide Web changed all that.
Web Browser
A piece of software used to navigate the Web. Internet Explorer and Netscape are web browsers.
Hypertext
The system of electronically linking words or pictures to other words or pictures.
164 Section 4-1: The History and Definition of the Internet 164
Section 4-2:
In this section, you will learn what you need to access the Internet:
1. Computer
2. Modem
3. Web Browser
4. Internet Service Provider
What is a modem?
A modem is a device that converts a computer's outgoing data to a format that can be transferred via telephone lines. Modems
can also convert incoming data so the computer can read it.
A modem can be located inside or outside your computer. Some of the different types of modems are internal, external,
voice/data, and fax modems.
Internet Service Providers (ISPs) are companies that provide access to the Internet.
For a monthly fee (and an initial activation fee), you can purchase a software package from your ISP. These packages feature
different levels of Internet access. Flat-rate service will buy you unlimited hours, whereas a less-expensive hourly package buys
limited Internet access. In either case, the speed with which you access the Internet factors into how much you pay per month.
If you connect to the Internet at work, you may be part of a LAN (local area network) that shares network resources. To
gain Internet access, your employer contracted with an ISP.
Did You Know? Eight bits of data is roughly the amount that you enter each time you tap a key on your keyboard.
Let's say you want to estimate the time it takes for you to commute from home to work. You have to travel through a physical
network of roadways to travel from home to work.
The Internet is similar to the roadway example. Remember, the Internet is a physical network (phone lines, etc). Data has to
travel through that physical network. Too much traffic on the network means you may be unable to connect at a fast rate, or at
all. The more open and wider your network is, the faster you can connect and surf.
Pros: Pros:
Uses existing phone lines. Can provide 2-4 times the speed of a 56K modem.
Lower cost-usually around $22.00 per month or less. Uses digital rather than analog signals to transmit data.
Cons: Cons:
Dial-up connection uses existing phone line, making it Requires special equipment that can drive up your cost.
impossible to receive phone calls unless another line is Data is not compressed so transmission rates can be
installed. comparable to 56k-at more cost.
Slow -- Can be limited to speeds of 28.8K to 33.6K. Upload May be replaced by other technologies.
speeds can be limited to as low as 28.8, with download
speeds approaching 56K under only perfect conditions.
Service can be somewhat unreliable (busy signals,
spontaneously terminated sessions, etc).
Pros: Pros:
Can fall back to slower speeds if the line cannot handle the Uses coaxial and/or fiber-optic cable rather than phone
modem's fastest speed. lines for data transmission, so performance doesn't depend
Uses the existing phone line in most cases. on your distance from a central cable office.
Does not tie up existing phone line, leading to "always on" Can fall back to slower speeds if the line cannot handle the
access. modem's fastest speed.
More bandwidth results in improved streaming audio/video, Convenient for homes already wired with cable access.
online games, application programs, telephone calling, video Does not tie up existing phone line, leading to "always on"
conferencing and other high-bandwidth services. access.
Can connect multiple computers on a single line. More bandwidth results in improved streaming audio/
Faster than a 56K dial-up modem. video, online games, application programs, telephone call-
ing, video conferencing and other high-bandwidth services.
Can connect multiple computers on a single line.
Cons: Faster than a 56K dial-up modem.
Cache
Have you ever started typing your favorite
website's address, and the entire address
displays?
If you've used any of the methods listed above to surf the Web, you are using your web browser's cache.
Your web browser stores recently visited sites (as temporary Internet files) on your computer's hard disk. When you revisit your
favorite sites, the browser displays the pages from the cache instead of requesting them from the web server.
Search Engines
Instead of trying to guess where certain information may be located on the Web, search engines allow you to search both the
Web and newsgroups.
A search engine searches for keywords and returns a list of documents where the keywords can be found. Most search engines
allow you to search using plain language relevant to the topic of interest, meaning you don't have to know any special
programming tricks to effectively search the Web.
Use correct spelling, and capitalization. Be aware of pluralizing your words, and spell them correctly. For example, good
will, goodwill, Goodwill, Goodwills, and Good Will may yield different results.
AND. Use AND (all caps) to search for multiple words that must appear in a web page. Some search engines support a plus
sign (+) in place of AND. For example, free AND coupon, or free + coupon.
NOT. Use NOT (all caps) to exclude certain words or phrases. For example, casserole NOT chicken NOT beef.
OR. Use OR (all caps) to include any of the search words (rather than most.) For example, George Washington OR Bush.
Wildcards. The percentage symbol (%) can be used to replace only one character. The asterisk (*) can be used to replace
multiple characters. For example, post* could produce postwar, postgame, or postmarital.
Phrases. Put quotes around a phrase so each word in the phrase isn't searched for separately. For example, if you put quotes
around "free online computer training," the search engine searches for that entire phrase in a web page. However, if you
simply type, free online computer training, the search engine searches for each of the words individually in a web page.
The Standard buttons bar displays commonly used buttons such as the Back, Forward, Favorites, History, and Print
buttons.
The Address bar displays the address, or URL, of the web page you are currently visiting. Type new URLs or search terms
into the Address bar. The Search Box is to the right of the address bar. You can search for something by typing in the box and
pressing the magnifying glass button. Also in the address bar are the Refresh and Stop buttons.
The Status bar, located at the bottom of the IE window, indicates when a web site is found, loading, waiting for reply, or if
you have a secure connection. It is always a good idea to display the Status bar, particularly for security reasons.
The Favorites Center is a sidebar located in the left side of the IE window. It's a convenient way of accessing the Favorites
list, History list, and Search function. Note that the Favorites is not made visible unless you choose it.
OR
Right-click the toolbar and click to clear or show the checkmark for
each item.
Customizing Toolbars
In newer versions of Internet Explorer, you can move and resize the toolbars.
To move a toolbar:
Look for the resize/move toolbar handle.
To resize a toolbar:
Look for the resize/move toolbar handle.
Hover your mouse pointer over the resize/move toolbar handle.
The mouse pointer becomes a double-headed arrow.
Click and drag until toolbar is desired size.
Current tab
OR
Press Ctrl + T
When you have more then one tab (webpage) open, the one you are currently looking at will appear to be in front of the other
tabs and highlighted in a darker, such as blue, while the non-active tabs will be in a lighter color, such as gray.
Closing tabs
(Note: You must have more than one tab open)
Press Ctrl + W
For example, if you want to start each Internet session with GCF Global Learning, http://www.gcflearnfree.org should be your
home page. If you like to check the weather every time you log on, you might prefer http://www.weather.com as your home
page.
Choose Tools Internet Options from the IE menu bar. The Internet Options dialog
box opens.
If not already selected, click the General tab.
Type a new URL in the home page section of the General tab.
Click OK.
OR
If you like the current page and want to set it as your new home page, click the Use
Current button.
The Use Default button sets www.microsoft.com as your home page.
The Use Blank button sets a blank page as your home page. This option is beneficial to
those who don't want to begin each Internet session waiting for a home page to load.
Click OK.
OR
Click the arrow on the Home button on the toolbar, then choose Add or
change homepage.
A dialog box asks you if you want to add the page you’re on to your home page tabs, or
if you want to use the webpage as your only home page. Click the circle next to the
option you’d like to choose.
Click Yes.
This feature comes with some pre-existing Favorites you may or may not find useful. You can access, add to, find, and organize
your Favorites.
To Organize Favorites:
Press the Alt key on the keyboard to bring up
the menu bar.
Choose Favorites Organize Favorites
from the IE menu bar.
The Organize Favorites dialog box opens.
Click a Favorite you want to organize.
Drag and drop any Favorite into a pre-
existing folder.
OR
Press the Alt key on the keyboard to bring up the menu bar.
Choose Favorites Organize Favorites from the IE menu bar.
The Organize Favorites dialog box opens. Use this dialog box to Create a New Folder, Rename, Move to Folder,
and Delete.
Drag and drop Favorites into folders.
OR
Working in the Organize Favorites dialog box, click the Move to Folder button and drag and drop Favorites into
folders.
OR
To Rename a Favorite:
In the Favorites Center list, right-click a Favorite. Choose rename from the
shortcut menu.
The name is now highlighted, ready to be changed.
OR
To Delete a Favorite:
In the Favorites Center list, right-click a Favorite. Choose delete from the shortcut menu.
A confirmation message appears. Choose Yes.
OR
You can also save specific pictures, text, or links from web pages for later reference.
To save pictures:
Go to the web page that features a picture you want to save.
Right-click the item you want to save. The shortcut menu opens.
Choose Save Picture As from the shortcut menu.
The Save Picture dialog box opens.
The default save location is My Pictures. Click the Save in drop
down box arrow to navigate to a new save location.
Rename the image in the File name text box if needed.
Click Save.
Emailing Links
While surfing the Internet, you may come across an interesting site you want to share with friends or family. There are several
different methods of sending a web page via email.
Some web pages include a "Tell A Friend" or "Email this Article" feature. This may be convenient, but you may want to be
wary of who you give your email address to.
OR
Click the Print button on the toolbar to print the page (no dialog box will appear)
As you move around a web page, you've probably noticed the mouse pointer's various states: the insertion point, the mouse
pointer (arrow), and the finger.
Insertion Point
Displays when you roll your mouse over text that is not linked.
Mouse Pointer
Displays when you roll your mouse over images that are not linked.
Finger
Displays when you roll your mouse over text and images that are linked.
When your mouse pointer becomes the insertion point, you can double-click any text or image to highlight it. You can
highlight text if you have difficulty seeing the insertion point.
Note: Graphics cannot be resized or changed in any way using a web browser.
Changing Color
While changing text size and font can increase readability, so can the use of color. Those with low vision and/or color blindness
may have difficulty viewing certain colors. However, web designers don't always take this into account when determining font
colors, sizes, and background colors.
Browser Security
Unfortunately, there are criminals (sometimes referred to as "hackers" or "crackers") who would like to break or "hack" into your
computer for a variety of reasons.
One of your first lines of defense against potential hackers is password protection.
Password Do's
Computers, programs, and files are often password protected. A password (along with a user name) grants you access to
protected computers, programs, or files.
Do password protect computers, accounts, programs, files, etc. Whenever possible, add this basic level of security.
Do change your password on a regular basis. Your local administrator and/or ISP may recommend when it's best to change
your password. Many people change their password once every three to four months. However, if you notice your account has
been compromised in any way, change your password immediately.
Do use a password that is at least eight to ten characters long. Use a combination of numbers and letters. A longer password
provides greater security. Remember, some passwords are cAse-SeNSitiVE.
Do memorize your password. While you may find it convenient to keep a list of your user names and passwords beside your
computer, this is a blatant security risk. Don't keep an electronic list of passwords on your computer, particularly if you use a
laptop.
Password Don'ts
Don't let anyone look over your shoulder while you type in your password. Think the woman standing behind you while you
use the ATM is too close for comfort? She may be. Also, don't knowingly give your password to anyone. The purpose of a
password is that no one but you can log in and start using your account.
Don't use a "one size fits all" password. Don't use the same password for your separate accounts. For example, use different
passwords for your employer's computer network, voicemail, ISP, web mail, etc.
Don't choose a password that can be easily traced to you. For example, using your birth date, social security number, phone
number, the name of your spouse, child, relative, pet, etc is a bad idea.
Don't use well-known abbreviations. For example, ASAP (as soon as possible) or NATO (North Atlantic Treaty
Organization) is far too familiar (and short, for that matter) to make a solid password.
Don't use words that can be found in the dictionary. Hackers use dictionaries as a tool to discover passwords. That goes for
foreign dictionaries as well.
Don't ever use your user name as your password. Or your name, for that matter. This is the easiest password to crack.
You usually buy goods and services online using a personal credit card or debit card. An electronic purchase form may look
something like this:
First Name
Last Name
Email
Password
Confirm Password
Street Address
City
State
Zip
Shipping Address
City
State
Zip
Credit Card Type
Credit Card Number
Expiration Date
Have you ever wondered what happened to that information once you click "send?" Is the information secure as it travels
over the Internet? How can you be sure?
Depending on your browser, if you see an unbroken key or lock symbol , SSL is active, or in effect. For Internet Explorer,
look next to the address bar.
You can also make sure SSL is in effect by looking at your browser's URL address box. When accessing a secure web server, the
first part of the URL will change from http:// to https//:.
Click on the lock symbol and then click on the View certificates link
at the button of the pop-up. Make sure the certificate is "Issued to" the Web
site and the "Valid from" dates are current.
For Internet Explorer, first press Alt on your keyboard, then choose File Properties from the menu bar.
With the increasing computing power of potential criminals, greater level of security is becoming more necessary. 128-bit
encryption remains a very strong method of security for the foreseeable future. If you have any doubt about a web site's security
level, consider placing your order by phone.
Privacy Tips
While you shouldn't be afraid to make an online purchase, you should be informed on how the online retailer will use your
personal information.
When filling out an online order form, don't blindly fill in every blank field. Instead, look for the fields that are required
to make the purchase. (Sometimes marked by an *asterisk* or different color.)
Read the order form. Watch out for areas that are "pre-selected" for your convenience (such as checkboxes); you may end
up with a lot of unwanted email. Ever wondered how those "spammers" got your email address?
Create a free web mail account and use it as for "junk mail." (Yahoo and Hotmail are just two examples of sites that
offer free web mail.) When retailers require an email address, use your junk mail account rather than your personal ISP email
account. That way, if you receive a lot of spam, you can simply create another junk mail account.
Look for links such as Help, FAQ, About Us, Customer Service, Privacy Policy, or Privacy and Security.
When you arrive at that page, look for answers to questions such as:
What kind of information do they collect?
How do they use my information?
Do they share my information with third parties?
How do I access my information? How do I update or delete my information?
How do I remove my information from email, phone, and postal mailing lists?
Do they use cookies?
At GCF Global Learning, we use a special type of cookie called a session cookie. These cookies expire when you leave our site
and do not store personally identifiable information in the cookie. Other sites cannot read them. We use session cookies simply to
keep track of how many members and registered students use the site.
While cookies may seem like an invasion of privacy, they can improve your online experience. Cookies allow you to
"personalize" web sites, such as a personalized MSN or Apple start page. They may also save you some time. You don't have to
type the same information into a frequently used site over and over again. Cookies help keep track of your order, and certain ads
or products display because of what you've purchased in the past, etc.
Internet Security
But when you have DSL and cable modem Internet connections, it also means that your computer is connected to the Internet 24
hours a day, seven days a week, 365 days a year. Any computer that is connected to the Internet all the time is more susceptible
to possible Internet attack than computers accessing the Internet through a 56K dial-up connection.
Many of the threats that your family and computer face on the Internet include viruses, worms, Trojan horses, hoaxes, spyware,
adware, keystroke logging, and cookies. We also discuss hacking, email threats, and identify theft.
Your Web browser provides certain features to allow you to monitor your children's access to Internet content. There are also
some commercial products that you can buy to monitor computer activity.
Somewhat similar to monitoring, filtering software can restrict your children's access to certain undesirable material on the
Internet, including pornography and hate content. The Microsoft Internet Explorer Web browser has some built-in capability to
assign Web sites to security zones and limit exposure to content. We discuss free resources that are available to you on the
Internet, as well as commercial products that can be purchased.
Is spyware, viruses, or worms affecting your computer's performance? We discuss how to scan your computer from spyware and
other harmful code, but also how to protect and remove these dangers. We discuss free resources and commercial products that
aid this effort.
Lastly, we discuss firewalls and how they can be used to protect your computer and family from outsiders who try to access your
computer to controll what Web sites your children can visit. There are both free tools and commercial products you can use to
protect your home. You can also evaluate the quality of your firewall protection
If you truly want to protect your family and children while they're online, you should know how to use the Internet, what sites
your children enjoy, and what activities they do online. Experiment for yourself. Become acutely aware of what your children are
capable of doing in the online environment.
They will meet people you don't know -- in chat rooms, discussion boards, newsgroups, instant messaging, and email -- and
perhaps correspond with them frequently. Your children will be exposed to pornography, and perhaps even cyber stalking and/or
harassment. Your children can expose your computer to threats introduced by software downloads, music downloads, and online
games. Because much of this material is copyrighted, the threat of illegal downloads is ever present.
In addition to these dangers, this course discusses how to establish ground rules for Internet use in your home. Perhaps you need
a formal written agreement that you and your children sign, stating what functions are allowed or are not allowed on the Internet.
It is up to you to investigate the ISP that is best suited for your family needs, which search engines are kid-friendly, and how to
recognize quality Web sites.
Many popular programs like Microsoft Office appear on different computers in different households. The likelihood is great that
many family members, co-workers, friends, and neighbors use the same software. And when many people use this software, they
begin to share information through downloading files, trading floppy disks or zip disks, opening e-mail attachments, displaying
Web pages, and file-sharing. They unknowingly open the door to viruses.
Some viruses are disguised as legitimate computer programs. Others may use macros written into popular software products --
like Microsoft Word -- where users can program certain keystrokes
to execute certain commands, or to specify certain processes to run
when documents are opened or closed -- may be written to infect
data files.
What is a Worm?
Worms are computer programs that replicate themselves and often
interferes with the normal operation of a computer, program, or
network.
A Trojan Horse is a program that initially appears useful or benign and fools a user into running it. It frequently hides in games
and other small software programs so that when you download it, you unknowingly execute it on your computer.
Unlike viruses, Trojans do not replicate themselves. Rather, they leave behind a program that can be contacted by another
computer. Trojans have also been known to destroy files on your hard disk.
One example of a Trojan Horse is a program that claims to find and delete viruses, but instead, introduce a virus to your
computer.
Hoaxes are scare alerts started by malicious people that are passed on by innocent users who think they are helping the
community by spreading the warning. Do not forward these hoax messages. There have been many reported cases where e-mail
systems collapsed after dozens of users forwarded false alerts to other users. The best course of action is to merely delete these
hoax emails.
Symantec, a global leader in information security, maintains a page on its Web site that contains a list of known hoaxes. If you
are concerned about a bogus email you received about a new virus or sales promotion, visit this site to see if it is listed and what
it says.
According to a recent MSNBC article, MessageLabs Inc. is referenced as saying that 2/3 of all email traffic is spam.
McAfee reports that "49% of Americans spend more than 40 minutes per week deleting spam, with 14% reporting they spend as
much as three and a half hours a week -- or 7.5 days per year -- on this task."
In general, it's best not to respond to spam or mail from someone you do not know. Certainly, don't follow any links or purchase
products that were advertised in this mail. By responding, you tell the sender that your email is in fact valid. Frequently, you may
find your email address on even more lists. And more lists mean more spam.
You don't know who sent the unsolicited email. The presence of a return address does not mean that it's a legitimate email address.
So never send a photograph of yourself or any personal information -- including credit card information -- to someone you don't
know. And never buy anything advertised via spam, even if it is a good offer.
Report any activity that appears to be illegal to CyberTipline at http://www.missingkids.com/cybertip or call 1-800-843-5678
File Attachments
If you receive an unsolicited commercial message, you should not open any attached file whose name ends in ".exe." Clicking on
such files could activate a computer virus that might affect how your computer operates and/or damage the information stored on
your computer. You can also protect yourself against viruses carried by e-mail or by computer files that you've received on a floppy
disk, by purchasing and installing on your computer or network a virus-protection program. Delete any email that contains suspi-
cious file attachments.
Hackers
As we rely more and more on computers, and continue to put sensitive information onto them, the potential for hackers to break into
them and steal or destroy personal and financial information grows. This is particularly true if you have a cable modem or DSL con-
nection, where your IP address rarely changes. You are essentially always online, even though you may not be browsing on the Inter-
net. Hackers use automated tools like IP address searches to look for computers connected to the Internet. Once found, they attempt
break in and then take control of the computer, allowing them to interrupt service and/or commit identity theft.
To find out if your computer is at risk, go to the National Cyber Security Alliance's Web site and take the self test. The site also
provides Top Ten Security Tips for more information on keeping your computer safe from hackers. Alternatively, you can evaluate
your computer's current level of protection at the Symantec Security Check Web site.
Identity Theft
It's fairly easy for criminals to obtain personal data. Have you seen the commercial where the guy is looking through his neighbor's
trash can to find a payroll receipt? How many of us simply throw this or credit card and bank statements in the garbage without
thinking? It's probably more than anyone would care to admit. These records make it easy for criminals to get control over accounts
in your name and assume your identity.
Identity theft occurs when someone obtains and then uses your personal information without your permission to commit fraud or
other crimes. Such activities may include fraudulent use of credit cards, fraudulent withdrawals from bank accounts, or false
applications for loans and credit cards.
The Internet has become a very attractive place for scammers or criminals to obtain such information as passwords and banking
information. Unfortunately, home users frequently give out personal information if requested. Families broadcast their email on the
Internet, respond to spam, or even become the target of hacking attacks.
1. File a complaint on the Federal Trade Commission (FTC) Web site or by telephone at 1-877-ID THEFT.
2. Contact the fraud units of any one or all of the three credit bureaus:
Equifax
http://www.equifax.com
Call 800-685-1111 to order a credit report
Call 800-525-6285 to report fraud
Experian
http://www.experian.com
Call 888-EXPERIAN (397-3742) to order a credit report
Call 888-EXPERIAN (397-3742) to report fraud
TransUnion
http://www.transunion.com
Call 800-888-4213 to order a credit report
Call 800-680-7289 to report fraud
3. Contact all creditors and financial institutions of those accounts that have been tampered or opened fraudulently.
4. Monitor your mail and credit-card bills for evidence of new fraudulent activity.
5. File a police report.
Luckily, there are some precautions you can take to filter out such messages from your inbox. You will never completely stop
spam, but the best hope you have is to control it. The rest of this section discusses some measures you can establish with
Microsoft Internet Explorer and Microsoft Outlook or Outlook Express, what your ISP may be able to do for you, and what anti
-spam software solutions -- free and commercial -- are available to manage your inbound and outbound email messages.
America Online
MSN
AT & T
Verizon
You can test the security of your email system by accessing the GFI Email Security Test. This site tests your email program by
sending you a number of emails that probe your mail system.
Another product that you can evaluate is Mail Washer, which is a freeware program that enables you to delete virus emails and
spam directly on the mail server before you download them.
Certain file types (.bat, .exe, .vbs,) are blocked by Outlook so you cannot see the attachment. The message in the Inbox might
display a paperclip icon in the Attachment column to let you know that the message has an attachment. You will also see a list
of the blocked attachment files in the InfoBar at the top of your message.
An email attachment will provide a prompt to save the attachment to your hard disk. Once you have saved the attachment, you
A Digital Signature is a private electronic key that confirms the document originated from the signer and has not been altered.
A Digital Certificate is a digital means of proving your identity. Your certificate is sent when you digitally sign messages to
help authenticate youself to the recipient.
You can obtain a digital certificate from a commercial certification authority, such as VeriSign, Inc. You can also create a digital
signature yourself using the Selfcert.exe tool. Certificates that you create yourself are considered unauthenticated and will
generate a warning in the Security Warning box if the security level is set to High or Medium.
McAfee SpamKiller integrates directly with Outlook and Outlook Express to keep inboxes clean and free of spam, including
offensive content and potentially dangerous identity theft scams. McAfee SpamKiller can be purchased for under $40. An annual
subscription runs under $35. Visit the company Web site at: http://us.mcafee.com/
Norton AntiSpam
According to the Symantec Web site, Symantec's Norton AntiSpamTM 2004 works with any POP3 email program to filter
incoming mail, detecting and flagging unsolicited messages while promptly delivering valid mail. Norton AntiSpam also blocks
intrusive pop-up and banner ads. Symantec's Norton AntiSpamTM 2004 can be purchased for under $40. Visit the company Web
site at: http://www.symantec.com/index.htm
EmailProtect
EmailProtect from ContentWatch provides filtering and spam blocking controls -- email scams, unsolicited offers, and even
pornographic email -- out of your email inbox. You control who may send email to you or prevent emails to reach your Inbox.
EmailProtect Email Filtering can be purchased for under $30 per year. Visit the company Web site at:
http://www.contentwatch.com/
Spam Inspector
Spam InspectorTM is a spam filtering engine that quickly identifies and separates the hazardous and annoying spam from your
legitimate email. Based on personal and global learning networks, Spam InspectorTM AntiSpam Software for Outlook, Outlook
Express, Incredimail, Eudora, and Hotmail can be purchased for under $30. Visit the company Web site at:
http://www.giantcompany.com/
Disclaimer: GCF Global Learning® does not endorse or recommend any particular brand of software.
Spyware can also hog system resources like memory and hard disk space. It can also compromise your privacy, provide outsiders
with information about your computer habits and potentially expose your user IDs and passwords to thieves.
There are several free scans that are available to help you understand how spyware invades your computer. Both free and
commercial software are also available to remove known spyware programs.
New spyware software is written and introduced to the Internet all the time. Te only way to properly safeguard your computer is
to have the current version of the software to make sure your computer is always protected.
Free computer scans that search for spyware can be found at:
SpyKiller
PAL Spyware Removal
Webroot
Spyware-Guide
PestScan by Pest Patrol
Spybot - Search & Destroy can detect and remove spyware of different kinds from your computer. It removes certain advertising
components, that may gather statistics, as well as detection of various keylogging and other spy utilities. It can even scan your
download directory for files that have been downloaded but not yet installed. Visit the company Web sire at:
http://www.safer-networking.org/.
Ad-aware provides the ability to comprehensively scan your memory, registry, hard, removable and optical drives for aggressive
advertising and tracking components. As of July 2004, Ad-aware Standard is free for individual use only. Visit the company Web
site at: http://www.lavasoftusa.com
Webroot SpySweeper
Spy Sweeper safely detects and removes more traces of spyware including Trojans, adware, keyloggers and system monitoring
tools. The definition files are updated frequently to include the latest threats. As of July 2004, Spy Sweeper can be purchased for
under $30. Visit the company Web site at: http://www.webroot.com/wb/index.php
Pest Patrol
PestPatrol detects and eliminates trojans, spyware, adware and hacker tools. It compliments your anti-virus and firewall software,
extending your protection against non-viral malicious software that can evade your existing security software and invade your
personal privacy. As of July 2004, Pest Patrol can be purchased for under $40. Visit the company Web site at:
http://www.pestpatrol.com/
Spyware Eliminator scans your computer, checking against its comprehensive database of thousands of known spyware threats to
identify spyware installed on your system. It then performs several scans of your computer's files looking for spyware, removing
any that are detected. As of July 2004, Spyware Eliminator can be purchased for under $30. Visit the company Web site at:
http://www.aluriasoftware.com/
There are several reasons why a computer may run slow or performs out of the
ordinary. But if you have reason to suspect your computer may be infected by a
worm or virus - computer keeps crashing, error messages begin to pop up on
your screen, emails appear in sent mail that you never sent -- then perhaps it is
time to check for a virus or worm.
New viruses are written and introduced to the Internet all the time. The only way to properly safeguard your computer is to 1) be
notified when there are new viruses, and 2) be notified when an anti-virus remedy is available to protect your from the threat.
McAfee automatically downloads new software components to make sure your computer is always protected.
When you visit the Windows Update application on the Microsoft Web site, you can run a tool that checks the latest version of
the windows update software. If outdated, you will be prompted to download the new version of the software before you can
actually run any updates to the windows operating system.
Free computer scans that search for viruses can be found at:
McAfee FreeScan - scan your latest known viruses, and display a list of infected files.
HouseCall - scan and eliminate viruses with this free tool, created by the developer of PC-cillin.
Symantec Security Check - scan for viruses with this free online tool.
Panda Software
The PCMan Web site - free virus scanner test. This service tests your Virus Protection online see if your installed virus scanner detects
the test string. This test virus was developed by the European Institute for Computer Anti-Virus Research (EICAR).
Virus Bulletin - virus scanner tests, independent anti-virus advice.
Virus Test Center - publishes and performs virus scanner tests, virus lists, lists of macro viruses.
Free virus removal tools can be found at:
BitDefender - download tools to remove any of the worms listed on the page.
Avast! 4 Home Edition - full-featured antivirus package designed exclusively for home users, non-commercial users.
McAfee VirusScan automatically scans your email, attachments and downloads, then immediately starts to clean infections.
McAfee VirusScan also automatically checks for virus updates whenever you go online, so your protection stays up-to-date
against the latest Internet threats. A one-year subscription to VirusScan can be purchased for under $40. Visit the company Web
site at: http://us.mcafee.com/
Norton AntiVirus
Symantec's Norton AntiVirusTM protects email, instant messages, and other files by automatically removing viruses, worms, and
Trojan horses. Symantec's Norton AntiVirusTM can be purchased for under $50. Visit the company Web site at:
http://www.symantec.com
A firewall examines all traffic between your computer and the Internet to ensure it meets certain criteria that you define. A
firewall performs two main functions:
Windows XP includes Internet Connection Firewall (ICF) software that you can use to restrict what information is communicated
between the Internet and your home computer or small office network. ICF also protects a single computer connected to the
Internet with a cable modem, a DSL modem, or a dial-up modem.
The firewall is designed to help you keep hackers out of your system. However, it lacks the ability to control programs on your
system that are trying to send information out to the Internet. The Windows XP firewall isn't a full featured firewall.
Free firewall tools that can be downloaded from the Internet include:
ZoneAlarm (opens in a new browser window) offers a free firewall for personal use but the functionality offered is much less
than that of the commercial product.
Kerio Personal Firewall (opens in a new browser window) is a software agent that builds a barrier between your personal
computer and the Internet. It is designed to protect your PC against attacks from both the Internet, and other computers in the
local network. Free for personal use.
Sygate Personal Firewall (opens in a new browser window) protects your PC from hackers, trojans and Denial of Service
attacks. It is the first free personal firewall to offer protection from malicious code intrusions, keeping the information on your
PC safe and private.
Before providing your credit card or financial information, be certain you are using a secure browser:
Make sure the "http" in the address bar has changed to either "https" or "shttp" at the page where you are asked to input pay-
ment information.
Confirm the security status in the lower right area of the screen on the page where you are asked to input payment information.
In Microsoft Internet Explorer, a closed padlock appears in secure mode . In Netscape Navigator (version 4 or higher), a
locked padlock appears.
Remember, only do business with companies that use secure server technology. If the site isn't secure, don't buy from it. And
make sure your children always ask your permission before buying anything on the Internet.
But what about those online shopping sites you have never heard of? How do you know who is legitimate and reputable and who
is not? There are several things you can do to protect yourself.
First, make sure the Web site provides its' business name, mailing address, and telephone number. If it doesn't, perhaps you
should consider leaving the site. If there is an 800 number provided, consider calling the company to verify the security of their
Web site.
Second, is the company still in business? Look up the business name on a Google (opens in a new browser window) search.
Research the company at the Better Business Bureau (opens in a new browser window) or local consumer protection agency.
Are you familiar with the seller's merchandise or services? Do you understand all costs (including price, shipping, and taxes)?
The warranty information and return policy? Make sure the site has clear information about what you can do if you have prob-
lems with your purchase.
Does the site display a reliability seal? Two distinguished seals are provided by the BBBOnLine Reliability seal and the VeriSign
certification seal.
Bear in mind that technology allows companies to collect certain information about you while
browsing their Web site, as previously mentioned in the section on 'cookies.' And this is per-
fectly acceptable and legal as long as a privacy statement is posted on the site that tells how
they will use the information collected about you.
Read the privacy policy posted on the Web site. Fully understand what information is being collected and how the site will use
your personal information. If you choose to use their Web site, or certain portions of their Web site, then you freely give
permission for them to potentially sell or give that collected information to others. You have the option to either leave the site or
exercise your right to "opt out" if you don't want the seller to pass to others information about you.
Avoid shopping at any site that does not provide a privacy policy. Look for signs
that the site has been reviewed by trustworthy organizations, such as BBBOnLine,
TRUSTe, Verisign, Thawte or others to ensure that the business has demonstrated
compliance with credible online privacy principles.
The only information you are required to provide when purchasing a product online is your
credit card number and shipping information. Don't disclose personal information (address,
telephone number, Social Security number, etc) to anyone unless you know who and why
the information is being collected. Teach your children to ask you if it is OK for them to
provide personal information on the Web.
Note that the rules for debit cards are slightly different than for credit cards. First, the money associated with purchases is
typically withdrawn immediately from your bank account to that of the merchant's. And the liability limits on a debit card is
different, ranging anywhere from $50 to $500 or even more.
Protect your password. If you have accounts at more than one site, make sure each password is different. Use an unpredictable
combination of numbers, letters and symbols. Do not give your password to anyone who contacts you. Never use part or all of
your Social Security number as a password.
Web sites want to know more information about you. Some sites ask that you provide information on forms in order to display or
get something you want. Other download a cookie to your computer and track where you go on the site, or which remember
information that you have previously given the site. With this in mind, teach your children to never provide any information
about yourself -- particularly your home address, telephone number, or a photograph of yourself -- without first checking with
you, their parents.
The bottom line is that you can't be 100% sure the people that you contact on the Internet. It is best to visit only those sites that
you know are legitimate. And never provide personal information at the expense of your privacy.
1. Will it help my children learn? Is it of good quality? Are the skills necessary to work the site equivalent to my children's skills?
2. Is the site interactive and does it stimulate creativity?
3. Is it easy to use? Web sites geared for children should be designed so that children can easily navigate through them and
comprehend the information that they contain.
4. Do my children like the Web site?
5. What are the technical drawbacks? Does the site load quickly? Does it require plug-ins? Does it have interactive features? Can
my computer handle the technical requirements of the Web site?
6. Is there a clear purpose to the site? Are there advertising banners? What do they advertise? Do the advertisements pertain to my
children?
7. Who manages the site? Who writes the content?
Here are some kid-friendly search engines your children might want to use:
Safe Kids
Ask Jeeves for Kids
Yahooligans
Parent Contract
I know that the Internet can be a wonderful place for my kids to visit. I also know that I must do my part to help keep them safe dur-
ing their time online. I agree to follow these rules:
1. I will get to know the services and Web sites my children use.
2. I will set reasonable rules and guidelines for my children when they use the computer, and I will discuss these rules and post
them near the computer as a reminder.
3. I will not overreact if my children tell me about something "bad" they do or find on the Internet.
4. I will try to get to know my children's "online friends" and Buddy List contacts just as I try to get to know their other friends.
5. I will try to put the home computer in a family area.
6. I will report suspicious and illegal activity and sites to the proper authorities.
7. I will make or find a list of recommended sites for children.
8. I will frequently check to see where my kids have visited on the Internet.
9. I will seek options for filtering and blocking inappropriate material from my children.
10. I will talk to my kids about their online explorations and take online adventures with them as often as I can.
Child's Contract
I know that the Internet can be a wonderful place to visit. I also know that it is important for me to follow rules that will keep me safe
on my visits. I agree to the following rules:
1. I will choose a safe and sensible screen name for myself that will not reveal personal information about my family or me.
2. I will keep my password private, except from my parents. I will not sign up for other e-mail accounts without my parents'
approval.
3. I will not put my personal information in my profile. I will not share any personal information about my family or myself, in
any way, shape or form, online or with someone I meet online. This includes, but is not limited to name, address, telephone
number, age or school name.
4. I will treat others the way I want to be treated.
5. I will use good manners when I'm online, including good language and respect. I will not pick fights or use threatening or mean
words.
6. I will make my own personal safety my priority, since I know there are some people who might be online and pretend to be
someone they're not.
7. I will be honest with my parents about the people I meet online and will tell them, without always being asked. I won't answer
any emails or instant messages from anyone my parents have not approved.
8. If I see or read things that are bad, icky or mean, I will log off and tell my parents so they can make sure it never happens again.
9. I will tell my parents if I receive pictures, links to bad sites, e-mail or instant messages with bad language or if I'm in a chat
room where people are using swear words or mean and hateful language.
10. I will not send anything to anyone I've met online, without my parents' okay. If I get something from someone I've met online, I
will tell my parents immediately (because that means they have my private information).
11. I will not do anything that someone I've met online asks me to do, especially when I know it's something my parents would not
be happy about or approve of.
12. I will not call, write a snail mail or meet in person anyone who I've met online without my parents' approval or without having a
parent come with me.
13. I understand my parents will supervise my time online and use software to monitor or limit where I go online. They're doing this
because they love me and want to protect me.
14. I will teach my parents more about the Internet so we can have fun together and learn cool new things.
The Internet is a public forum. Any information you provide or post can be read by anyone. Your children should not give out
their names, address, telephone number, or any other personal information
Parents should tell their children that they should never arrange a face-to-face meeting with anyone on the Internet without first
talking to their parents. You never know if the people you meet online are who they say they are. If the parent agrees to the
meeting, children should meet in a public place and their parent(s) should go with them.
Never Respond to E-mail, Chat Comments, or Newsgroup Messages That Are Hostile, Belligerent, Inappropriate, Or In
Any Way Make You Feel Uncomfortable
Encourage your children to share suggestive, obscene, belligerent, hostile, or threatening email, bulletin board and chat messages
that they receive. Teach them to delete the message and not to respond to it. Sending a response will just encourage the person to
write again.
Talk with Your Children About Expectations and Ground Rules for Going Online
There are many different types of chat rooms on many different types of subjects. Some chat rooms are just open conversations
where everyone has an equal role. Other rooms are moderated by a "speaker" who leads the discussion and participants. And
others have monitors who maintain order but can't prevent anyone from moving into a private chat area.
It's not uncommon for people to make friends in chat rooms. You enter a room; start a conversation with someone; and establish
a relationship. But you don't really know the true identity of anyone in the chat room. In the majority of cases, your teenager is
talking to other teenagers. But the risk of them talking with a pedophile, predator, or an otherwise unfriendly or mischievous
adult is always present.
Teach your children the importance of keeping their personal life and pictures private and to never arrange a face-to-face meeting
with someone they met in a chat room without first checking with their parents. Also, make sure the nickname they use in chat
room discussions is gender-neutral, or some other name -- even a funny name -- that does not identify who they are.
The dangers in instant messaging are very similar to those threats discussed for chat rooms. Teach your children to identify
themselves with a nickname (don't provide their true name), don't provide an email address, and don't provide any personal
information like a phone number.
If you post a message, it remains on the newsgroup for people to view at a later date. Newsgroups can also be used to post files
including computer programs, pictures, illustrations, and stories.
Newsgroups are often used to ask questions, receive answers, and share information on virtually every imaginable topic.
Unfortunately, newsgroups also have risks. Content posted in a newsgroup might include nudity, sexual content, photographs, and
hateful or violent material. Remind your child that it is dangerous to post anything in these latter groups because their email address
could reveal their identity -- and bulletin board and newsgroup posts are available for anyone to see.
According to a Reuters article published in USA Today, "Online porn sites get about three times more visits than the top Web
search engines, including market leader Google, said Hitwise, company that tracks such activity."
For those people who bother to visit Web search engines, "porn" (along with "porno" and "pornography") was the 4th most
popular search term, according to an Alexa Research study referenced on InternetIndustry.com. "Nude" (and "nudes"), "xxx,"
"Playboy" and "erotic stories" (and "erotica") were also among the top 20.
A Kaiser Family Foundation report (reference found on the ProtectKids.com Web site), found that 70% of teenagers (ages 15-
17) have accidentally come across pornography on the Web."
A study (opens in a new browser window) funded by the U.S. Congress through a grant to the National Center for Missing and
Exploited Children found that approximately 20% of U.S. teenagers have had unwanted solicitation for sex while online in a
chat room.
What can you do as a parent to protect your children? First you can scan your hard drive
for pictures. The chances are very good that pornographic images downloaded from the
Web are of a .jpg file format. To look for this content: Open My Computer, click the
Search button in the task bar, and define a search to scan your hard drive (Local Hard
Drives C:) for all .jpg images (*.jpg), as shown in the picture to the right:
Like the other communication technologies discussed in this section on the Internet, email is another vehicle by which your
children can interact with others. Email might occasionally be received from someone your children meet on the Internet. While
it might be something innocent, remember also that it might be from someone trying to lure your child into an inappropriate
relationship. Your child's email address may have been pulled off a discussion board or chat room.
Spam is another risk to your children. Many of these messages promote sexually-explicit Web sites.
The Wired Patrol Web site identifies some online safety tips your children should follow to avoid cyberstalking or harassment:
If you have reason to believe that your children are being stalked or harassed, immediately contact WiredSafety's law
enforcement division at CyberLawEnforcement.org or complete its Cyberstalking and Harassment Report Form.
P2P file sharing acts as a library where everyone brings together their collection of music, films, or games. Every user that is
connected through the software can search the library for something they want and then download a copy to their own computer.
The downside of P2P is security; you have allowed someone to access an area of your computer. Such a person could
theoretically install a virus or worm, or install spyware software. As we will see in the next section, P2P has also enabled many
people to download pirated music.
Although Napster offers an entirely different type of service today, such illegal downloads continue from different sources. The
RIAA has changed its strategy and now targets those who download the music -- children of unsuspecting parents -- and tries to
get universities to provide the names of those individuals on campus who are allegedly sharing copyrighted music.
Parents must teach their children that downloading music illegally isn't any different than stealing from a store. Stealing is
stealing.
As we've previously seen, some pirated software often comes with a virus or Trojan Horse that allows hackers to enter your
computer, while other programs add spyware to your computer when you download them. It is important that you know the
source of these files and read the associated licensing agreement.
But it is also important that you install the necessary software on your computer to protect yourself from viruses and other
attacks. You will need the following types of software to ensure safe downloading:
How can parents check their computers for pirated or illegal software? First, look at the list of software using the My Computer
component of the Windows operating system. Is there any software that was not on the computer when you purchased it or that
you did not install? Ask your child about this software.
Are there any CDs with handwritten or homemade labels that are either games or software? If so, the chances are that these were
not produced commercially. Loading and using such software is illegal.
Some Web sites do offer legitimate software downloads. Shareware sites, let you download software for evaluation over a certain
period of time. If you want to continue using the software after this period expires, you will have to purchase the product.
Another form of software is called freeware. Freeware, as it suggests, is oftentimes free. However, most software is not free.
There are many sites on the Internet that allow you to download legitimate software. Some of the more popular ones include:
PC World
c|net
ZDNet
tucows
Internet: This zone pertains to every Web site that is not defined to either the Trusted Sites zone or Restricted Sites zone.
Trusted Sites: This zone contains Web sites that you defined as being trustworthy. Internet Explorer will allow all cookies from Web
sites in this zone to be saved on your computer and read by the Web site that created them.
Restricted Sites: This zone contains Web sites that you defined as being those you do not trust. Internet Explorer will block all cookies
from Web sites in this zone.
Approved Sites — Type the Internet address (URL) of a General — Allows you to define whether a user can see sites
Web site, and then click either the Always view or Never that have no rating, or whether a supervisor can type a
view buttons. password in order to allow site access. The ability to create a
password is also available under this tab. You even have the
ability find rating systems on the Web.
Other free filtering tools can also be downloaded from the Internet.
We-Blocker: Free software that allows a parent to request a site be blocked globally, block a site on their computer, and search
to see if a site is blocked.
Anti-Defamation League HateFilter: A web filter that blocks sites that, in the judgment of the ADL, advocate hatred, bigotry, or
even violence towards Jews or other groups on the basis of their religion, race, ethnicity, sexual orientation, or other immutable
characteristics.
Internet Junkbuster Proxy™ for Privacy: Free software from Junkbusters blocks unwanted banner ads, sites you deem offensive,
cookies, and protects your privacy on the Web.
Net Nanny
Net Nanny® 5 allows you to control what comes into and goes out of your home through your Internet connection by filtering
and blocking Web sites by URL and keywords; and filtering content by keyword in IRC chat, on web pages, and in newsgroups.
Net Nanny® 5 can be purchased for under $40. Visit the company Web site at: http://www.netnanny.com/.
CyberPatrol
CyberPatrol helps protect against the dangers children face online. It can safeguard them against inappropriate language in chat
sessions and protect them from divulging personal information online. It allows parents to manage and control children's access
to the Internet as well as limit or prevent children from accessing programs, such as games or home finance packages located on
your computer. You can buy a one-year subscription to CyberPatrol for under $40. Visit the company Web site at:
http://www.cyberpatrol.com/.
CYBERsitter
CYBERsitter provides over 30 categories of filtering that are updated automatically. Its "content recognition" system recognizes
and blocks new objectionable Web sites. Parents can override blocked sites, add sites to block, specify allowable times to access
the Internet, and maintain a detailed log of all Internet activity and violations. CYBERsitter is priced under $40. Visit the
company Web site at: http://www.cybersitter.com. There are no recurring fees of any kind.
Spector Pro monitors and records every detail of computer and Internet activity. It contains seven integrated tools that record
chats, instant messages, emails sent and received, web sites visited, keystrokes typed, programs launched, peer-to-peer file
searching and swapping. Visit the company Web site at: http://www.spectorsoft.com/.
Most people use the Internet primarily to email and surf the World Wide Web.
Simply put, email, or "electronic mail," is the process of sending and receiving messages over the Internet.
While email is similar to a traditional mail system, or "snail mail," as it's sometimes referred to, it's also very different. See the
chart below.
Packet:
In what is it delivered? Envelope, etc
A piece of text delivered over the Internet
Sender:
Sender:
Who is it from? John Doe
John Doe
Recipient:
Jane Doe Recipient:
Who is it for?
Jane Doe
After reading your email, you can save it, forward it to others, or delete it. If you want paper copies, you can print your email
messages.
jdoe@gcflearnfree.org
1. User name: jdoe Located to the left of the @ symbol, a user name identifies your account on the email server that handles the
email. For example, John Doe might choose "jdoe" as his username. However, someone may have already chosen jdoe, so have
some other choices ready. Choose a user name that sounds professional and is easy to remember.
2. @ Means "at" and separates your account name and the name of the mail server name. For example, jdoe "is located at"
gcflearnfree.org.
3. Domain Name: gcflearnfree.org The domain name usually consists of two pieces of identifying information. The first
piece is the name of the email server and is located to the right of the @ symbol. For example, gcflearnfree is the name of the
email server. The second piece, usually a three-letter extension, indicates the top-level domain. They are separated by periods,
called "dots."
Consider choosing a user name that protects your identity instead of your first and/or last name.
www.GCFLearnFree.org,
.org A non-profit or not-for-profit institution
www.goodwillenc.org
If there is a two-letter extension, it is usually a country code. For example, Malaysia uses "my."
Because not everyone uses top-level domains correctly, they are not always a reliable way to determine an organization's
association.
An email client (sometimes referred to as a composer) is software that runs on a personal computer, and relies on an Internet
connection to perform some of its operations.
Email clients work with any ISP (Internet Service Provider) that uses standard Internet email protocols. These protocols make it
possible for people using different email client software to communicate with one another. For example, if I use Microsoft
OutlookTM, I can send and receive email with someone who uses QUALCOMM EudoraTM.
Free web mail accounts, such as Hotmail or Yahoo, rely on an Internet connection and use an email client that appears in a
web page. Additional email client software is not required. Web mail is fully discussed in Lesson 5.
Web mail doesn't require any special email client software. Free web mail accounts such as HotmailTM or YahooTM use an
email client that appears in a web page. You can
access your web mail account on any computer
with Internet access. Just type in your web mail
service's URL and log in.
Accessible.
Even if you change ISPs, you'll still be able to access your web mail account.
Choice.
Pick a web mail service that best suits your needs. For example, is the access point (URL) always available? How much storage
space are you allotted? Does it feature an electronic address book? Is your privacy being protected?
Waiting.
If the speed of your computer and bandwidth are slow, you may have to wait long periods of time to read simple text messages.
Advertising.
Not only will you have to view ads as you check your email, most services will affix some sort of advertising line to your email
message. For example, "For the best free web mail, check out www.webmail.com." Also, some web mail providers sell member
lists to advertisers, which may result in a lot of unwanted mail in your INBOX.
Privacy.
Keep your web mail password secret and change it often. You never know who may want to read your email.
Difficulty.
Poor typing skills can inhibit IM communication.
226 Section 4-6: Email 226
Email Do's
Because email is fast, easy, cheap, and convenient, it's rapidly becoming a common form of communication in the workplace.
Here are a few basic guidelines to follow when sending e-mail.
For example:
Do keep it short
It's time-consuming to read through a lot of text looking for specific information. Make your point and make it short. Think of e
-mail as a brief telephone conversation. People you work with may receive hundreds of e-mail messages a day.
Email Don'ts
Don't ignore spelling and grammar mistakes
It's true that email communication is far more casual than a formal report, but it's crucial to know when to pay attention to detail
such as spelling and grammar. To help you, many email clients feature Spell check.
Examples:
:-) = happy
:-( = sad
;-) = wink
:-o = shocked, surprised
Electronic communication is very different. If you're not careful, email can complicate communication.
Before you send that next email message, consider the following:
Tone
When you are e-mailing friends, a casual tone is fine. When e-mailing at work, treat each message individually. If you typically
address someone using Mr. or Ms., then do so in your e-mail message. Generally, be courteous. Treat others as you would like to
be treated. And remember, sarcasm is often misunderstood in electronic communication.
Think Twice
Keep it simple. Formatting doesn't matter a whole lot when you are composing a short e-mail message. Logically organize your
message with line breaks when appropriate. Use HTML (Rich Text) sparingly.
Avoid "Shouting"
AVOID USING ALL CAPITAL LETTERS. IT'S CALLED "SHOUTING," AND IS CONSIDERED RUDE.
Don't Spam
While you may enjoy passing e-cards and jokes along to your friends and family, don't make a habit of sending this kind of mail
to your coworkers.
And Finally…
Privacy
E-mail is not a private form of communication. Some companies monitor employee e-mail. Keep this in mind when you e-mail
at work. Everything is on record.
Immediacy
Although e-mail is much faster than "snail mail," don't assume that your e-mail message will be answered 30 seconds after you
send it.
Printing
E-mail (electronic mail) cuts down on the amount of paper you have to deal with on a daily basis. Print the important stuff
(directions to a company meeting across town, flight information).