You are on page 1of 68

Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 1 of 68

CHAPTER 1

INTRODUCTION
Sometimes the way people talk about computers can be very confusing, even after you have used them for many
years. Fortunately, like a car you do not need to know all the "ins and outs" of computers to be able to use them.
Knowing a few basic terms will take you a long way. The following tutorials will introduce you to the basic
concept of a computer and will give you some basic terminology for future tutorials.

DEFINITION OF A COMPUTER
A computer is simply defined as the collection of several electronic components that work
together which accept input, process the input into meaningful result or information.
-OR-
Computers are machines that perform tasks or calculations according to a set of
instructions, or programs.

The first fully electronic computers, introduced in the 1940s, were huge machines that required teams of people to
operate. Compared to those early machines, today's computers are amazing. Not only are they thousands of times
faster, they can fit on your desk, on your lap, or even in your pocket. This shall be discussed later on types of
computers.
To accomplish its various tasks, the computer is made up of different parts, each serving a particular purpose
almost independent of, or in conjunction with, other parts. You don't necessarily need to know how these parts
operate, at least not at this time, but you should be aware of their co-dependence to take advantage of their various
characteristics. Computers work through an interaction of hardware and software.

SHORT HISTORY OF THE FIRST COMPUTERS


In the first computers, CPUs were made of vacuum tubes and electric relays rather than microscopic transistors on
computer chips. These early computers were immense and needed a great deal of power compared to today’s
microprocessor-driven computers. The first general purpose electronic computer, the ENIAC (Electronic
Numerical Integrator and Computer), was introduced in 1946 and filled a large room. About 18,000 vacuum tubes
were used to build ENIAC’s CPU and input/output circuits. Between 1946 and 1956 all computers had bulky CPUs
that consumed massive amounts of energy and needed continual maintenance, because the vacuum tubes burned
out frequently and had to be replaced.

CURRENT DEVELOPMENTS OF COMPUTERS

The competitive nature of the computer industry and the use of faster, more cost-effective computing continue the
drive toward faster CPUs. The minimum transistor size that can be manufactured using current technology is fast
approaching the imaginary limit. In the standard technique for microprocessor design, ultraviolet (short
wavelength) light is used to expose a light-sensitive covering on the silicon chip. Various methods are then used to
sketch the base material along the pattern created by the light. These sketches form the paths that electricity follows
in the chip. The theoretical limit for transistor size using this type of manufacturing process is approximately equal
to the wavelength of the light used to expose the light-sensitive covering. By using light of shorter wavelength,
greater detail can be achieved and smaller transistors can be manufactured, resulting in faster, more powerful
CPUs. Printing integrated circuits with X-rays, which have a much shorter wavelength than ultraviolet light, may
provide further reductions in transistor size that will translate to improvements in CPU speed.

Many other avenues of research are being pursued in an attempt to make faster CPUs. New base materials for
integrated circuits, such as composite layers of gallium arsenide and gallium aluminum arsenide, may contribute to
faster chips. Alternatives to the standard transistor-based model of the CPU are also being considered.
Experimental ideas in computing may radically change the design of computers and the concept of the CPU in the
future. These ideas include quantum computing, in which single atoms hold bits of information; molecular
computing, where certain types of problems may be solved using recombinant DNA techniques; and neural
networks, which are computer systems with the ability to learn.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 2 of 68

COMPUTER HARDWARE:
The computer is primarily made up of the system unit, monitor, keyboard and mouse. Other pieces of hardware
commonly referred to us as peripherals, can enhance or improve the performance of the computer for instance,
printers, scanners, speakers, microphones, projectors, etc. Together of these components are termed as the
hardware.

Hardware is simply defined as the physical components or peripherals you can feel and touch. (Ex. Keyboard,
mouse, monitor). The hardware and the software work together to help the user accomplish his or her task.
The hardware of the computer consists of four (4) major divisions. These include;
 Input devices
 Processing Devices
 Output Devices
 Storage Devices

THE INFORMATION PROCESSING CYCLE.

INPUT OUTPUT
PROCESSING
DEVICES DEVICES
DEVICES

COMPUTER
MEMORY STORAGE
DEVICES

INPUT DEVICES
These are devices that serve as an interface between the computer and the user that helps the user to send data into
the computer for further processing. Examples of input devices include keyboard, mouse, scanners, microphones,
webcams, digital cameras, joystick, etc. For instance, typing on the keyboard are done by the user and sent to the
computer.

PROCESSING DEVICES
There are two major components in the system unit. These components include
 Central Processing Unit (C. P. U.) Or the Microprocessor.
 Memory

CENTRAL PROCESSING UNIT (C. P. U.) OR THE MICROPROCESSOR


The most important piece of hardware is a tiny rectangular chip inside your computer called the
central processing unit (CPU), or microprocessor. It's the "brain" of your computer—the part that
translates instructions and performs calculations.
There are three arms of the CPU. These include Arithmetic and Logical Unit (ALU), Control Unit
and the Registers.
CPU
ARITHMETIC AND LOGICAL UNIT (ALU)
This arm of the CPU takes logical and arithmetical decisions and comparisons.
This is the part of the CPU that does the actual processing of data.
E.g. 2*2=4, 2+2=4, 4*4=16, 4+4=8

CONTROL UNIT ALU REGISTERS


This arm of the CPU manages or directs the affairs of the ALU and the
Registers so that the ALU is not congested with data processing.
CONTROL UNIT
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 3 of 68

REGISTERS
The registers stores either processed or unprocessed data temporarily.

MEMORY
The Information Processing Cycle (Input—Processing—output--storage) would not be possible without a holding
place for the instructions and data that the processor (CPU) can easily reach. This holding place is termed the
memory. There are two (2) basic types of memory
 Random Access Memory (RAM)
 Read Only Memory (ROM)

RANDOM ACCESS MEMORY (RAM)


This type of memory is also termed as volatile simply because data once written to it is lost when power is lost or
system is shut down. It is the primary memory that holds data and instructions while system is in use.

READ ONLY MEMORY (ROM)


ROM is built in memory that permanently stores instructions and data. The instructions and data in ROM are
created when it is manufactured and it cannot be changed. This type of memory is also termed as non-volatile
simply because data once written to it is not lost when power is lost or system is shut down.

MEMORY MEASUREMENT
It is important to know that the terms megabyte (MB) and gigabyte (GB) are used when referring to a computer's
memory capacity. The number of megabytes or gigabytes reflects the amount of electronic holding places available
for instructions or data. The processor only recognizes two digits: the "0" and the "1". All information is stored as
0's and 1's.The 0's and 1's are referred to as bits. (The smallest unit of information on a computer.) Technically on
digital devices where you have a switch for on and off, ‘0’ stands for OFF whilst ‘1’ stands for ON.

SYNARO:
1 CHARACTER = 1 BIT,
i. e. 8 CHACRACTERS = 8 BIT = 1 BYTE
8 BIT (b) = 1 BYTE (B)
1024 BYTE (B) = 1 KILOBYTE (KB)
1024 KILOBYTE = 1 MEGABYTE (MB)
1024 MEGABYTE = 1 GIGABYTE (GB)
1024 GIGABYTE = 1 TERABYTE (TB)

SUMMARY
 Ram can be thought of as the memory the computer uses to obey instructions.
 Ram can be written to and read from.
 Important to remember that if you do not save the information in RAM to a storage device (such as a
floppy disk, pen drive or hard drive) before turning off the computer the information will be lost.
 Hardware refers to the parts of a computer that you can see and touch, including
the case and everything inside it.
 Hardware items such as your monitor, keyboard, mouse, printer, and other
components are often called hardware devices, or devices.
 A CPU is similar to a calculator, only much more powerful. The main function of
the CPU is to perform arithmetic and logical operations on data taken from
memory or on information entered through some device, such as a keyboard,
scanner, or joystick.
 The CPU is controlled by a list of software instructions, called a computer program.
 Software instructions entering the CPU originate in some form of memory storage device such as a hard
disk, floppy disk, CD-ROM, or magnetic tape.
 These instructions then pass into the computer’s main Random Access Memory (RAM), where each
instruction is given a unique address, or memory location.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 4 of 68

OUTPUT DEVICES
These are devices that serve as an interface between the user and the computer that helps the computer send
processed data (Information) to the user. Some examples of output devices include: monitor, printer, speakers,
projectors…

STORAGE DEVICES
A storage device is simply a place to keep (store) data for future reference. Although there are several types of
storage devices, for the purposes of this tutorial, only the following types will be discussed. More of these will be
discussed later.

Hard Drive
This is a permanent data storage device built into PCs that permits you to save and retrieve information. It also,
stores the computer’s operating system and other softwares that are installed onto the computer.
The size of a hard drive is usually expressed in terms of megabytes, gigabytes and terabytes.
Because hard disks can hold massive amounts of information, they usually serve as your computer's
primary means of storage. The hard disk drive is normally located inside the system unit.

Floppy Disk
Floppy disks allow information to be transported easily from one computer to another. This
process is called sneakernet. Floppy disks have limited storage capacity, generally 1.44 MB.
Saving and retrieving information from a floppy disk is slower than on a hard drive. They are
more susceptible to physical damage and viruses than the hard drive.

Compact Disk/CD
There are varieties of compact disks (CD). A few of these are
 CD ROM
 CD-R
 CD-RW

CD ROM
CD ROMs are read only storage medium. Typically, a CD ROM holds up to 650 MB of information.
While information retrieval is faster than from a floppy disk, it is still not as fast as from the hard drive.

CD-R
A CD-R is highly effective for storing a large amount of data. CD-R can hold up to 700MB of
information. A CD-R is a one time recordable compact disc.

CD-RW
A CD-RW allows you to read, write, erase and write again. Writing takes place in a single pass of the
focused laser beam. This is sometimes referred to as direct overwriting and can be repeated several
thousand times per disc.

HOW THE COMPUTER TRANSFORMS DATA INTO INFORMATION


The computer can transform data into information with the help of the Information Processing Cycle. Before data
can be transformed in the computer, there must be an input from the user using the keyboard, mouse, scanner or
even the microphone. The CPU can access specific pieces of data in RAM by specifying the address of the data
that it wants.

As a program is executed, data flow from RAM through an interface unit of wires called the bus, which connects
the CPU to RAM. The data are then decoded from human language to machine language by a processing unit
called the Instruction Decoder that interprets and implements software instructions. From the instruction decoder
the data pass to the Arithmetic/Logic Unit (ALU), which performs calculations and comparisons.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 5 of 68

Data may be stored by the ALU in temporary memory locations called Registers where it may be retrieved quickly.
The ALU performs specific operations such as addition, multiplication, and conditional tests on the data in its
registers, sending the resulting data back to RAM or storing it in another register for further use. During this
process, a unit called the Program Counter keeps track of each successive instruction to make sure that the
program instructions are followed by the CPU in the correct order after which the program counter displays the
feedback (information) on the monitor.

SOME FACTS ABOUT BASIC HARDWARES

MOUSE
The mouse is a hand held device that lets you interact with the computer by pointing to things on the screen. When
you move the mouse on a flat surface a cursor (pointer) moves on the screen. By using the buttons on the mouse
you can choose, highlight and move objects. The following list of terms describes the different ways a
mouse can be used: It may have two or three buttons. The mouse is used to move the cursor (pointer) on
the computer screen.

Clicking - Pointing to an item and quickly pressing and releasing the mouse button.
Left clicking - clicking the left button while the pointer is over something or an object on the screen
will select it.

Right clicking - clicking the right button while the pointer is over something or an object on the
screen will bring up a pop-up menu from which you choose an option. These menu list things that
can be done with that object. (Ex. copy and paste)

Double-clicking - Double-clicking means clicking twice with your left mouse button very fast. This
is used to begin programs. This will be explained further in future tutorials.

Dragging - Holding down the mouse button while over an object will grab on to it. If you move the mouse while
holding down the mouse button you will be able to move (drag) the object to a new place on the screen.

Dropping - After dragging an item, releasing the mouse button will leave (drop) the object at the new place on the
screen.

KEYBOARD
A keyboard is used mainly for typing text into your computer. Like the keyboard on a typewriter, it has keys for
letters and numbers, but it also has special keys:
* The function keys, found on the top row, perform different functions depending
on where they are used.
* The numeric keypad, located on the right side of most keyboards, allows you to
enter numbers quickly.
* The navigation keys, such as the arrow keys, allow you to move your position
within a document or webpage.

MONITORS
A monitor displays information in visual form, using text and graphics. The portion of the monitor that displays the
information is called the screen. Like a television screen, a computer screen can show still or moving pictures.
There are two basic types of monitors.
 CRT (cathode ray tube) monitors and
 LCD (liquid crystal display) monitors.
Both types produce sharp images, but LCD monitors have the advantage of
being much thinner and lighter. An LCD Monitor
A CRT Monitor
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 6 of 68

PRINTER
A printer transfers data from a computer onto paper. You don't need a printer to use your computer, but having one
allows you to print e-mail, cards, invitations, announcements, and other materials. Many people also like being able
to print their own photos at home. The two main types of printers are
 Inkjet printers
Inkjet printers are the most popular printers for the home. They can print in
black and white or in full color and can produce high-quality photographs
when used with special paper.
A Laser Printer An Inkjet Printer
 Laser printers.
Laser printers are faster and generally better able to handle heavy use.

SPEAKERS Computer Speakers


Speakers are used to play sound. They can be built into the system unit or connected with
cables. Speakers allow you to listen to music and hear sound effects from your computer.

MODEM
To connect your computer to the Internet, you need a modem. A modem is a device that sends and
receives computer information over a telephone line or high-speed cable. Modems are sometimes built
into the system unit, but higher-speed modems are usually separate components.

PROJECTOR
Equipment for projecting film: a piece of equipment for projecting the image from film
onto a screen and for playing back recorded sound from tracks on the film

SCANNER
A computer input device that uses light-sensing equipment to scan paper or another medium, translating the pattern
of light and dark (or color) into a digital signal that can be manipulated by either optical character recognition
software or graphics software. A frequently encountered type of scanner is “flatbed,”
meaning that the scanning device moves across or reads across a stationary document. On a
flatbed scanner such as the common office copier, such objects are placed face down on a flat
piece of glass and scanned by a mechanism that passes under them. Another type of flatbed
scanner uses a scanning element placed in a stationary housing above the document.

DIGITAL CAMERA
A camera that records and stores photographic images in digital form.
The images can be viewed and manipulated by the camera, loaded onto a computer, and
printed as a photograph or e-mailed as an image.

PEN DRIVE / FLASH DRIVE


A card that stores computer information: a small plastic device functioning as a disk drive, containing
memory chips that retain their contents without electrical power. On the end is a standard USB
connector that fits into USB ports. Onlike a hard disk drive, the size of a pen drive is usually expressed
interms of megabyte & gigabyte

CD ROM DRIVE
To read information from a compact disc using the computer, CD Rom Drive is required. It uses a low-intensity
laser scanner that reflects light off of the surface of the disk. The intensity of the light reflected back from the
surface of the CD depends upon whether the light strikes a flat spot, which corresponds to a 0, or a
pit, which corresponds to a 1. Special circuitry in the CD Rom Drive converts the variations in
intensity of the reflected light into electrical signals.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 7 of 68

TYPES OF COMPUTERS
A computer is one of the most brilliant inventions of mankind. Thanks to the computer technology, we were able to
achieve an efficient storage and processing of data; we could rest our brains by employing computer memory
capacities for storage of the information. Owing to computers, we have been able to speed up daily work, carry out
critical transactions and achieve accuracy and precision in work output. The computers of the earlier years were of
the size of a large room and were required to consume huge amounts of electric power. However, with the
advancing technology, computers have shrunk to the size of a small watch. Depending on the processing powers
and sizes of computers, they have been classified under various types. Based on the operational principle of
computers, they are categorized as analog computers and hybrid computers.

ANALOG COMPUTERS: These are almost extinct today. These are different from a digital computer because an
analog computer can perform several mathematical operations simultaneously. It uses continuous variables for
mathematical operations and utilizes mechanical or electrical energy.

HYBRID COMPUTERS: These computers are a combination of both digital and analog computers. In this type
of computers, the digital segments perform process control by conversion of analog signals to digital ones.
Following are some of the other important types of computers.

MAINFRAME COMPUTERS: Large organizations use mainframes for highly critical


applications such as bulk data processing. Most of the mainframe computers have the capacities
to host multiple operating systems and operate as a number of virtual machines and can thus
substitute for several small servers. Example of mainframe computer is AS400

MINICOMPUTERS: In terms of size and processing capacity, minicomputers lie in between mainframes and
microcomputers. Minicomputers are also called mid-range systems or workstations. The term began to be popularly
used in the 1960s to refer to relatively smaller third generation computers. They are equally huge computers ever
developed. Example of mini computer is AS/400e.

SUPERCOMPUTERS: The highly calculation-intensive tasks can be effectively performed by means of


supercomputers. Quantum physics, mechanics, aircraft design, complex structural engineering, weather forecasting,
molecular theory are best studied by means of supercomputers. Their ability of parallel processing and their well-
designed memory hierarchy give the supercomputers, large transaction processing powers. Example of the super
computer is the Cray machine

MICROCOMPUTERS: A computer with a microprocessor and its central processing unit is known as a
microcomputer. They do not occupy space as much as mainframes. When supplemented with a keyboard and a
mouse, microcomputers can be called as personal computers. A monitor, a keyboard and other similar input output
devices, computer memory in the form of RAM and a power supply unit come packaged in a microcomputer.
These computers can fit on desks or tables and serve as the best choices for single-user tasks.
Personal computers come in a variety of forms such as desktops, laptops and personal digital assistants. Let us look
at each of these types of computers.

DESKTOPS: A desktop is intended to be used on a single location. The spare parts of a desktop computer are
readily available at relative lower costs. Power consumption is not as critical as that in laptops. Desktops are widely
popular for daily use in workplaces and households. There are two architectures of personal computers. These
include
 Desktop computer
 Tower Computer

LAPTOPS: Similar in operation to desktops, laptop computers are miniaturized and


optimized for mobile use. Laptops run on a single battery or an external adapter that
charges the computer batteries. They are enabled with an inbuilt keyboard, touch pad
acting as a mouse and a liquid crystal display. Its portability and capacity to operate on
battery power have served as a boon for mobile users.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 8 of 68

PERSONAL DIGITAL ASSISTANTS (PDAS): It is a handheld computer and popularly known as a palmtop. It
has a touch screen and a memory card for storage of data. PDAs can also be effectively used as
portable audio players, web browsers and smart phones. Most of them can access the Internet by
means of Bluetooth or Wi-Fi communication.

Looking at the rate of the advancement in technology, we can definitely look forward to many more types of
computers in the near future.

COLLABORATION EXERCISE

REVIEW QUESTIONS
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 9 of 68

CHAPTER 2
INTRODUCING SOFTWARES

The software is all the programming or instructions that make the computer run; controlling everything that the
computer does. There are two kinds of software that help the computer run:
 Operating Systems Software (OSS)
 Applications Systems Software (ASS)

OPERATING SYSTEMS SOFTWARE (OSS)


An OSS is the base program on a computer. It tells the computer how to work or operate. The operating system
also allows you to load other programs that do specialized tasks on to your computer. The OSS also serves as an
interface between the computer and the user or other input/output (I/O) devices.
There are two (2) types of software interface. These include

a. Character User Interface (CUI)


This type of user requires the user to type specific commands to operate it. Commands are used to open, exit, and
delete directories or folders. Disk Operating System (DOS) and UNIX are typical examples of a Character User
Interface

b. Graphical User Interface (GUI)


It consists of various user defined elements such as windows & menus. The most commonly sued GUI operating
systems are Microsoft Windows 95, Microsoft Windows 98, Microsoft Windows Millennium (ME), Microsoft
Windows XP, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows 2003 server, Linux Redhat,
and Macintosh.

APPLICATIONS SYSTEMS SOFTWARE (ASS)


Applications Systems Software (ASS) is an additional program installed on the computer to do specialized tasks
according to user’s specification. These programs are:

WORD PROCESSORS
They enable you to create, edit, format and print documents such as letters, reports and even web pages. E.g.
Microsoft Word, Lotus WordPro and Word Perfect.

SPREADSHEETS APPLICATIONS
They enable you to perform calculations based on predefined formulas and generate reports, graphs, pie charts, and
balanced sheet. E.g. Microsoft Excel and Lotus 123

DATABASE MANAGEMENT SYSTEMS (DBMS)


It enables you to store and retrieve large volume of data. DBMS is used in various fields such as schools, hospitals,
airlines, banks, and railways. E.g. Microsoft Access, DBASE, SQL, FOXPRO, Oracle

ACCOUNTING APPLICATIONS
They enable you to perform accounting operations such as trail balance, and balance sheet, income & expenditure;
etc Examples include Tally, ACCPAC and SAGE

DESKTOP PUBLISHING APPLICATIONS


They enable you to combine graphics and text to produce books, brochures, newsletters. Examples include Adobe
Photoshop, Coral Draw, and Microsoft Publisher.

WEB BROWSER APPLICATION


They enable you to view web pages and sites and search for information on the internet. The internet is a public and
global communication network that can be used to access a web site such as http://www.google.com
www.google.com http://www.yahoo.com www.yahoo.com , etc. Typical examples of Web Browser
Applications include Internet Explorer, Mozilla Firefox, and Netscape Navigator.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 10 of 68

SUMMARY OF SOFTWARES
Software is:
 What makes the computer work
 Software refers to the instructions, or programs, that tell the hardware what to do. A word-processing
program that you can use to write letters on your computer is a type of software. operating system (OS) is
software that manages your computer and the devices connected to it. Windows is a well-known operating
system.
 Software consists of an organized list of instructions that causes the computer to behave in a predetermined
manner.
 For work, for play, for kids, and for adults.
 A computer game you play or a word processing program.
 Divided into two categories:
 Operating System Software and
 Application System Software.
 Operating System Software includes the utilities that enable the computer to function.
 Application System Software includes programs that perform specific tasks (e.g., games, word processors,
spreadsheets, and databases).
Figuratively speaking, Application System Software sits on top of Operating System Software because the
computer is unable to run without the operating system and system utilities.

COLLABORATION EXERCISE

REVIEW QUESTIONS
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 11 of 68

CHAPTER 3

INTRODUCING THE ELEMENTS OF GUI


All applications have a user interface that functions as a link between the computer & the user. The GUI interface
is also termed as the GUI environment. This kind of interface uses illustrations rather than text so that the user can
interact freely with the computer. This type of interface is referred to us as user-friendly. The mouse helps you
freely work with the GUI interface. Specifically, the elements of GUI have been categorized in Microsoft Windows
operating Systems as follows:
 Window
 Menu
 Icon
 Property Sheet
 Dialog Box

WINDOW
A window is simply described as a rectangular area on a screen in which program and content appear. A window
can be resized, moved, minimised or closed.

PARTS OF A WINDOW
Although the contents of every window are different, all windows share some things in common. For one thing,
windows always appear on the desktop. In addition, most windows have the same basic parts.
Minimize Button

Title Bar Maximize Button


Menu Bar Address Bar

Close Button

Toolbar

Scroll Arrow Border

Vertical Scroll Bar


Icon representing file

Left Panel

Icon representing folder

Right Panel

Horizontal Scroll Bar

There are two (2) ways that a window appears. They include;
 Active window
An active window is a window you are working on. An alternative window behaves like a pressed button
on the taskbar. Only one can be active at a time.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 12 of 68

 Inactive window
An Inactive window is the window type that you do not have immediate use for it, but you want to be using
it later. An Inactive window behaves like a raised button on the taskbar.

WORKING WITH WINDOWS


Whenever you open a program, file or folder, it appears on your screen in a box or frame called a window (that's
where the operating system gets its name). Because windows are everywhere in Windows, it's important to
understand how to move them, change their size, or just make them go away.

MENU
Menu contains items that you can click to make choices in a program. Most programs contain dozens or even
hundreds of commands (actions) that you use to work on the program. Many of these commands are organized
under menus. Like a restaurant menu, a program menu shows you a list of readily available choices. To keep the
screen uncluttered, menus are hidden until you click their titles in the menu bar, located just underneath the title
bar.
To choose one of the commands listed in a menu, click it. Sometimes a dialog box appears, in which you can select
further options. If a command is unavailable and cannot be clicked, it is shown in gray. For instance, clicking on
the ‘File’ menu in Microsoft Office Word displays the File menu as shown in the diagram.
A drop down menu A Pop up menu
There are two types of menus these include

 Drop Down Menu


A drop down menu is a list of choices made available to the users when
the user clicks on an option in the menu bar. The menu drops down from
the option as shown in the diagram

 Pop Up Menu
A pop up menu is a list of options that are made available to the user
when the right button on the mouse is clicked. A pop up menu is shown below.

TITLE BAR - MOVING A WINDOW


To move a window, point to its title bar with the mouse pointer. Then drag the window to the location that you
want. (Dragging means pointing to an item, holding down the mouse
button, moving the item with the pointer, and then releasing the mouse
button.)

MINIMIZING / HIDING A WINDOW


Hiding a window is called minimizing it. If you want to get a window out of the way temporarily without closing it,
minimize it. To minimize a window, click its Minimize button. The window disappears from the desktop and is
visible only as a button on the taskbar, the long horizontal bar at the bottom of your screen. To make a minimized
window appear again on the desktop, click its taskbar button. The window appears exactly as it did before you
minimized it.

MAXIMIZE BUTTON
A maximized window is useful for items you typically run in a full screen, such as your word-processing program.
You can click on the maximize button to run a full screen or double click on the title bar

CLOSE BUTTON
Closing a window removes it from the desktop and taskbar. If you're done with a program or document and don't
need to return to it right away, close it. To close a window, click its Close button.
Note: If you close a document without saving any changes you made, a message appears that gives you the option
to save your changes.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 13 of 68

SCROLL BARS
The process of moving a document in a window to permit viewing of any desired portion. Scrolling is so named
because it is the electronic equivalent of reading through a rolled (scrolled) document rather than flipping through
the pages of a book. The keyboard provides a number of “scroll-control” keys, such as the up, down, left, and right
arrow keys. Application programs often offer additional methods of scrolling—for example, combining the Control
and Page Up keys to move to the beginning of a document.

To use a scroll bar:


 Click the up or down scroll arrows to scroll the window's contents up or down in small steps. Hold down the
mouse button to scroll continuously.
 Click an empty area of a scroll bar above or below the scroll box to scroll up or down one page.
 Drag a scroll box up, down, left, or right to scroll the window in that direction.
Tip:
 If your mouse has a scroll wheel, you can use it to scroll through documents and webpages.
 To scroll down, roll the wheel backward (toward you). To scroll up, roll the wheel forward (away from
you).

Borders and corners.


You can drag these with your mouse pointer to change the size of the window.

BORDERS
Other windows might have additional buttons, boxes, or bars. But they'll usually have the basic parts, too.
You can drag these with your mouse pointer to change the size of the window.

ICONS
These are pictorial representation of a file, folder, program or other object or function.

PROPERTY SHEET
A property sheet contains tabs. When you select a tab, the corresponding tabbed page is displayed. A tabbed page
displays information corresponding to the object such as Recycle Bin. In addition a property sheet enables you to
configure the settings for the corresponding objects.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 14 of 68

DIALOG BOXES
A dialog is a communication that takes place between objects or persons. In windows, a dialog is a special type of
window that asks you a question, allow you to select options to perform a task, or provide you with information.
You will often dialog boxes when a program or windows refuse response from you to continue its task. Unlike
regular windows, most dialog boxes can’t be maximized, minimized or resize, they can however be moved.

CHANGING THE SIZE OF A WINDOW


 To make a window fill the entire screen, click its Maximize button or double-click the window's title bar.
 To return a maximized window to its former size, click its Restore button (this appears in place of the
Maximize button). Or, double-click the window's title bar.
 To resize a window (make it smaller or bigger), point to any of the window's borders or corners. When the
mouse pointer changes to a two-headed arrow (see picture below), drag the border or corner to shrink or
enlarge the window. A window that is maximized cannot be resized. You must restore it to its previous size
first.
Note: Although most windows can be maximized and resized, there are some windows that are fixed in size, such
dialog boxes.

TO TURN OFF THE COMPUTER


Follow the procedure below to shut down your computer safely
 Click Start
 Click Turn Off Computer
 In the drop-down list, click shut down.
This action shuts down Windows so that you can safely turn off the computer power. Many computers turn the
power off automatically.
Note: When you turn on the computer power again, Windows starts automatically.

TO LOG OFF FROM THE COMPUTER


When you log off from the computer, you close your user account but the computer remains on for easy access the
next time you log on. Follow the procedure below to log off your computer
 Click Start
 Click Log off,
 Click Log off again.
To log on, click your user account icon on the Welcome screen and then type your account information.

TO RESTART YOUR COMPUTER


Follow the procedure below to restart your computer
 Click Start
 Click Shut Down.
 In the ‘What do you want the computer to do’ drop-down list, click Restart.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 15 of 68

COLLABORATION EXERCISE

REVIEW QUESTIONS
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 16 of 68

CHAPTER 4
DESKTOP COMPONENTS
The desktop provides components that enable you to perform actions such as starting an application and switching
between applications. These components include

 The Start Menu


 The Taskbar

START MENU
Clicking Start displays a menu that lets you easily access the most useful items on your computer. You can click
Help and Support to learn how to use Windows, obtain troubleshooting information, receive support, and more.
Clicking All Programs opens a list of programs currently installed on your computer.

The list of programs on the Start menu is divided into two parts
 The programs displayed above the separator line (also known as the pinned items list). The programs on
the pinned items list remain there and are always available for you to click to start them. You can add
programs to the pinned items list.

 The programs displayed below the separator line (also known as the most frequently used programs list).
Programs are added to the most frequently used programs list when you use them. Windows has a default
number of programs that are displayed on the most frequently used programs list. When that number of
programs is reached, the programs you have not opened recently are replaced by the programs you used
last. You can change the default number of programs displayed on the most frequently used programs list.

You can customize the Start menu by adding a folder called My Recent Documents that contains the files you
opened most recently. Another way you can customize the Start menu is to set items to open when you pause on
them with the mouse, a simpler way to view the contents of the item.

Buttons providing quick access

Programs above separator line

Separator Line

Programs below separator line


Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 17 of 68

TO CHANGE THE START MENU STYLE


 Right-click the Start button, and then click Properties.
 On the Start Menu tab, click one of the following options:
To select the default Start menu, click Start menu.
To select the style from an earlier version of Windows, click Classic Start menu.
 The next time you click Start, the Start menu displays the new style.

Note: To make additional selections for the Start menu style, click Customize. Additional selections include
 Specifying the items you want to display on the Start menu
 Setting submenus to open when you pause on them with your mouse
 Clearing your list of recently used programs, documents, and Web sites.

TO ADD SELECTED ITEMS TO THE START MENU


 Right-click the Start button, and then click Properties.
 On the Start Menu tab, under Start menu, click Customize.
 On the Advanced tab, under Start menu items, select the items you want to appear on the Start menu.
 The next time you click Start, the items you selected are on the Start menu.
Note: You can remove an item from the Start menu by clearing its check box in the last step of this procedure.

MORE ON ITEMS FOUND ON THE START MENU AND THEIR FUNTIONS


 All Programs displays all the currently installed programs on the computer
 Run is used to open applications
 Search is used to look for files, folders & computers on the local computer or on the network.
 Printers & Faxes is used to display the currently installed or connected printers & fax on your computer.
 Control Panel is used to adjust the settings of the various hardwares and softwares that are either running on
the computer or connected to the computer to suit the user’s requirement.
 My Network Places is used to access computers that are connected with your computer with the intention of
sharing files and other peripherals that are not found on your computer system.
 Log Off is used to close all the programs opened on a user’s account to make way for someone else to use the
computer with a different user account and properbly, a password.
 Help and Support is used to provide help on any information about the use of the computer.
 Shut Down is used to turn off the computer safely

TASKBAR BUTTON GROUPING


USING THE TASKBAR
The taskbar is a way to organise all your windows. Each window has a corresponding button on the taskbar. To
switch to another, just click its taskbar button. The window appears in front of all other windows, becoming the
active window the one you’re currently working in.
If the taskbar becomes too crowded with buttons, then the buttons with the same program become grouped into a
single button. Taskbar can become crowded with buttons when you are working with multiple programs at the
same time. For this reason, Windows provides a feature to help you manage a large number of open documents and
program items.

Notification Area/System Tray

The taskbar button grouping feature works in two ways.

 First, taskbar buttons for documents opened by the same program are always displayed in the same area of the
taskbar so you can find your documents easily.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 18 of 68

 Second, if you have many documents open in the same program, Windows combines all the documents into
one taskbar button that is labelled with the name of the program. A triangle on the right side of the button
indicates that many documents are open in this program. The single button provides access to all the open
documents.
To access one of the open documents, click the triangle on the taskbar button, and then click a document name in
the list. To act on all the open documents at the same time, use the right-click menu. For example, right-clicking the
triangle gives you a menu that lets you close all the open documents.

SWITCHING BETWEEN APPLICATIONS/WINDOWS.


You can switch between application or windows by holding the Alt key and pressing the Tab (ALT+TAB), or
cycle through all the open windows and the desktop by holding down the ALT and repeatedly pressing TAB.
Release ALT to show the selected window.
If you open more than one program or document, your desktop can quickly become chattered with windows.
Keeping track of which windows you have opened isn’t always easy, because some windows might partially or
completely cover others.

ARRANGING WINDOWS AUTOMATICALLY.


Now that you know how to move and resize windows, you can arrange them however you like on the desktop. You
can also have windows automatically arrange them in one of three ways which include
 Cascading
 Vertical stacked
 Side by side.

To choose one of these options, right click an empty area of the taskbar, then click cascade windows, show
windows staked or show widows side by side.

TO GROUP TASKBAR BUTTONS BY PROGRAM


 Right-click the taskbar
 Click Properties.
 On the Taskbar tab, select the Group similar taskbar buttons check box, and then click Apply.

Notes: When you open more than one document in the same program and then minimize each document so that it
appears as a button on the taskbar, all the buttons for that program are grouped together on the taskbar.
The button displays the name of both the document and the program in which it was created.
If the name of the document is too long for the button, Windows fades the last letters on the right side of the button
to indicate that there is more text. Point at the button to see the name of the document and the name of the program
in which it was created.

TO HIDE THE TASKBAR


 Right-click the Start button, and then click Properties.
 On the Taskbar tab, select the Auto-hide the taskbar check box.
Notes: To redisplay the taskbar, point to the area of your screen where the taskbar is located.
You can temporarily hide the taskbar by dragging the top edge down. To redisplay the taskbar, drag the visible
edge upward.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 19 of 68

DESKTOP ICONS
My Computer
This icon is used to view the disk drive and other hardware connected to the computer. Double
Clicking on this icon on the desktop helps you get vivid information about your disk drives, digital
cameras, and any other devices you might have installed.

My Documents
This icon is represents the default directory or folder where your files like letters, notes, reports &
other forms of documents are kept.

My Network Places
This icon allows you to connect or view computers that are connected to your local computer.
Double clicking on this icon enables you to browse for files & folders and peripherals like printers
that reside on other computers.
Recycle Bin
This icon represents the container that keeps files that are deleted temporarily until the user opens it to
delete the files there permanently.

Shortcut
This shortcut provides a means of quickly ordering the computer to perform a complicated function
instead of going through the normal procedure. An arrow is usually attached to the icon.

File
This icon represents a saved file with name ‘Try123’. The icon of a file will show the program used to
open the file. Refer to file names and their extensions for details about the different types of icons we
have

Folder
This icon represents a folder with name ‘Invoice’. A folder is a container that helps you to secure your
files. A folder also helps you to manage your files according to your convienience. A folder that exists
in another folder is termed as a subfolder. It usually has a yellowish icon.

COLLABORATION EXERCISE

REVIEW QUESTIONS
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 20 of 68

CHAPTER 5
CONFIGURING THE DESKTOP ENVIRONMENT
SELECT A THEME
 Click Start, and then click Control Panel.
 Click Appearance and Themes.
 Under Pick a task, click Change the desktop background
to go to the Display Properties dialog box.
 On the Themes tab, in the Theme list, click the theme
you want, and then OK.

CUSTOMIZE YOUR DESKTOP'S BACKGROUND


 On the Desktop tab of the display properties, do one or
more of the following:
 In the Color box, select a color.
 In the Background list, click a background picture.
 In the Position list, click Center, Tile, or Stretch to
define how your picture will be displayed.
 Click Browse to search for a background picture in
other folders or on other drives. You can use files
with the following extensions: .bmp, .gif, .jpg, .dib,
.png, or .htm.
 When you are satisfied with your choice click OK or Apply.

CHOOSE A SCREEN SAVER


 On the Screen Saver tab of the display properties, in the Screen saver list, click the screen saver you want.
 Click Preview to view the screen saver for a few seconds (move your mouse or press any key to end the
preview), and then click Settings to customize its behavior.
 When you are satisfied with your choice, click OK

CHANGE SCREEN RESOLUTION


 On the Settings tab of the display properties, under Screen resolution, drag the slider to the resolution you
want
 Click Apply.

CHANGING THE APPEARANCE OF THE WINDOW


 On the Appearance tab of the display properties, choose elements to customize from the drop-down menus
and modify them by clicking the Effects button to open windows containing further instructions.
 When you are satisfied, click OK.

TO ADD SOUND EFFECTS


 Click Start, and then click Control Panel.
 Click Sounds, Speech, and Audio Devices.
 Under Pick a task, click Change the sound scheme.
 On the Sounds tab, under Program events, click the event to which
you want to apply a sound.
 In the Sounds list, click the sound you want to link to the event.
 To hear the sound, click the play button to the right of the Sounds
list. If you are satisfied with your choice, click OK. Repeat steps 4
and 5 until you have linked sounds to as many program events as you
want. To save your settings into a personalized sound scheme, click
Save As. Type a name for the sound scheme, and then click OK.
 Click OK to complete the procedure and save your sound scheme.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 21 of 68

ADJUST POINTER SPEED


 Click Start, and then click Control Panel.
 Click Appearance and Themes.
 Under See Also, click Mouse Pointers.
 On the Pointer Options tab, under Motion, drag the slider left
to make the pointer move slower, or right to make the pointer
move faster. If you choose a fast speed, make sure that the
Enhance pointer precision check box is selected (this
provides better control of the pointer when moving it at short
distances), and then click OK.

MAKE YOUR MOUSE LEFT-HANDED


 Click Start, and then click Control Panel.
 Click Appearance and Themes.
 Under See Also, click Mouse Pointers.
 On the Buttons tab, under Button configuration, select the
Switch primary and secondary buttons check box.
 Click OK.

SWITCH FROM STANDARD MOUSE POINTERS


 Click Start, and then click Control Panel.
 Click Appearance and Themes.
 Under See Also, click Mouse Pointers.
 On the Pointers tab, do one of the following:
 Switch all of your pointers at once, in the Scheme list, click the scheme you want.
 To change pointers one at a time, in the Customize list, click the pointers you want to change. After
each selection, click Browse, click the pointer image you want to assign as a replacement (a preview
of the image displays in the lower left-hand corner), and then click Open.
 Click Apply and OK to complete the procedure.

CONFIGURING THE DATE AND TIME PROPERTIES


You can equally configure the Date and Time properties of your computer. Your computer's clock is used to record
the time whenever you create or modify files on your computer. You can change the clock's time and time zone. To
configure the Date & Time properties, double click on the date and time located on the lower right hand side of the
taskbar.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 22 of 68

CONFIGURING THE VOLUME CONTROL


A computer requires a sound card and speakers to enable multimedia features like sound to be played back on the
computer. Most speakers have a volume control, but you can also control the overall level of sound on your PC.
Double click on the volume control icon located on the taskbar to display the volume control window as illustrated
below. The volume control window enables you to work with sound volume such as increase, decrease or mute the
volume.

COLLABORATION EXERCISE
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 23 of 68

CHAPTER 6
PERSONAL FOLDERS

M y Documents is your personal folder. It contains two specialized personal folders, My Pictures and My
Music. You can make your personal folders available to each person with a user account on this computer, or
you can make them private so that only you can access the files within them.

Windows creates personal folders for every user on the computer. When there is more than one person
using the computer, each personal folder is identified by the user's name. For example, if Mat and Abigail
use the same computer, there will be two sets of personal folders: Mat's Documents, Mat's Music, and Mat's
Pictures, and Abigail's Documents, Abigail's Music, and Abigail's Pictures. When Mat is logged on to the
computer, his personal folders appear as My Documents, My Pictures, and My Music, and Abigail's appear as
Abigail's Documents, Abigail's Pictures, and Abigail's Music.

Windows also provides a Shared Documents folder for files you want to share with other users. Like My
Documents, the Shared Documents folder contains a Shared Pictures and Shared Music folder. These folders are
for pictures and music you want to share with other people who use your computer.
You can use Windows Explorer to access your personal folders or the Shared Documents, Music, and Pictures
folders. To open Windows Explorer, click Start, point to All Programs, point to Accessories, and then click
Windows Explorer.
Note: If you are connected to a network the Shared Documents, Shared Pictures, and Shared Music folders are not
available.

WORKING WITH FILES & FOLDERS


Every Windows folder provides easy access to common file and folder management tasks. When you open any
folder on your computer, a list of tasks is displayed next to the folder contents. You can select a file or folder, and
then click a task to rename, copy, move, or delete it. You can also send a file in e-mail or publish it to the Web.

In addition to the basic file and folder tasks provided in all Windows folders, there are several folders that provide
links to specialized tasks.
 My Pictures and My Music folders provide task links that can help you manage your picture and music
files.
 In the My Computer folder, you can view and select the drives on your computer, devices with removable
storage, and the files stored on your computer. You can use the task links in this folder to view information
about your computer, change system settings using Control Panel, and perform other system management
tasks.
 Use the Recycle Bin tasks to empty the Recycle Bin or restore deleted files and folders to their original
locations. The Recycle Bin is displayed on your desktop.

TO CREATE A NEW FOLDER


 Open My Documents.
 Under File and Folder Tasks, click Make a new folder.
 A new folder is displayed with the default name, New
Folder, selected.
 Type a name for the new folder, and then press ENTER.
Note: To open My Documents, click Start, and then click My
Documents.
You can also create a new folder by right-clicking a blank area
in a folder window or on the desktop, pointing to New, and then
clicking Folder.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 24 of 68

WORKING WITH TEXT


You can perform text editing operations in Windows Operating Systems. Microsoft Wordpad is a Text Editor
which enables you to create text. Other text editing softwares include Microsoft Word & Notepad. These
application packages are termed as Word Processors.

WORKING WITH THE WORDPAD APPLICATION.


Follow these steps to open Wordpad…
1. Click the Start Menu
2. Click All Programs
3. Click Accessories
4. Select Wordpad.

The interface of Wordpad is illustrated as follows.

You will notice that the I-Beam Cursor appears in the window above. This is the insertion point at which you can
insert text. You can press ENTER to move to the next line or press the SPACE BAR to move the cursor one space
to the right.

The following table shows some keyboard shortcut to move the cursor to the required position.
KEYBOARD SHORTCUT DESCRIPTION
Down Arrow Moves the Cursor downwards to the next line
Up Arrow Moves the Cursor upwards to the previous line
End Moves the Cursor to the end of the same line
Home Moves the Cursor to the beginning of the same line
Delete Deletes the text from the right from where the cursor is
Backspace Deletes the text to the left from where the cursor is

Wordpad enables you to perform actions such as inserting, copying, moving, deleting, changing font size and style
and many more.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 25 of 68

INSETING TEXT
 click on the left mouse button at the position you want to insert text
 Type the required text as illustrated below.

Menu Bar

Standard Bar

Formatting Bar

Ruler

Text

Selected Text

Pop-up

Status Bar

SELECTING TEXT
 Position the cursor at the required location where the text needs to be selected.
 Hold down the left mouse button and drag the mouse over the text that needs to be selected. You can also
select a word by double-clicking on it.
COPYING TEXT
 Select the text that needs to be copied
 On the Edit menu, select Copy
 Place the cursor at the location where you want the text to be placed
 On the Edit menu select Paste

Alternatively the copy & paste option can be selected from the Pop up by right clicking on the selected text.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 26 of 68

TO SAVE A FILE
While you're working with a file in program, you should save it frequently to avoid losing data unexpectedly due to
a power failure or other problems.
 In the program that you're using, click the
File menu, and then click Save.
 If the program that you're using doesn't
have a File menu or you can't find the Save
button, you might be able to use the
keyboard shortcut Ctrl+S to perform the
same task.
 If the file is new and this is the first time
that you're saving it, type a name for the
file in the File name box, and then click
Save.
Notes: Files can't be opened or saved in Windows
itself you must use a program to perform these
tasks. Typically, you would open or save a file in
the program that was used to create the file.
If you save a file to a library (such as Documents), the folder is saved to that library's default save location (for
example, My Documents).

TO CHANGE THE NAME OF A FILE OR FOLDER (RENAME)


 Open My Documents. (If the file or folder you want to rename is not located in My Documents or its
subfolders, use Search to find it. To open Search, click Start, and then click Search.)
 Click the file or folder you want to rename.
 Under File and Folder Tasks, click Rename this file or Rename this
folder.
 Type the new name, and then press ENTER.

ALTERNATIVELY
Right-click on the file or folder and select the Rename command in the pop up
menu as shown below
Notes: Some programs cannot interpret long file names. The limit for programs that
do not support long file names is eight characters. You can also rename a file or
folder by right-clicking it and then clicking Rename.
The names of system folders such as Documents and Settings, Windows, or
System32 cannot be changed. They are required for Windows to run properly.

TO COPY A FILE OR FOLDER


 Open My Documents.
 Click the file or folder you want to copy.
 Under File and Folder Tasks, click Copy this file or Copy this folder.
 In Copy Items, select the drive or folder you want to copy to, and then click Copy.

ALTERNATIVELY
Right-click on the file or folder and select the Copy command in the pop up menu as shown below
Notes: To open My Documents, click Start, and then click My Documents.
You can copy more than one file or folder at a time.
To select consecutive files or folders, click the first item, press and hold down SHIFT, and then click the last item.
To select non-consecutive files or folders, press and hold down CTRL, and then click each item.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 27 of 68

TO MOVE A FILE OR FOLDER


 Open My Documents.
 Click the file or folder you want to move.
 Under File and Folder Tasks, click Move this file or Move this folder.
 In Move Items, click the new location for the file or folder, and then click Move.
Open a file or folder
You can open a file or folder in Windows to perform a variety of tasks, such as editing the information in a file or
making a copy of a file or folder.
To open a file, you must have a program that is associated with it. Typically, this is the same program that was used
to create the file.

Here's how to open a file or folder in Windows:


 Find the file or folder that you want to open.
 Double-click the file or folder to open it.

Notes
 When you double-click a file, an associated program automatically opens if it's not already open. To open a
file in a different program, right-click the file, point to Open with, and then click a compatible program in
the list.
 When you double-click a folder, the folder opens in Windows Explorer. It doesn't open a different
program.
 If you see a message that says Windows can't open a file, you probably need to install a program capable of
opening files of that type.

TO MOVE FILES BY DRAGGING


 Open Windows Explorer. Find the file or folder you want to move. Make sure the destination for the file or
folder you want to move is visible. For example, if you are moving a file from the My Documents folder to
the desktop, you might need to resize Windows Explorer so the desktop is visible.
 Drag the file or folder to the destination.

ALTERNATIVELY
Right-click on the file or folder and select the Move command in the pop up menu as shown below
Notes:
To open Windows Explorer, click Start, point to All Programs, point to Accessories, and then click Windows
Explorer. If you drag an item while pressing the right mouse button, you can move, copy, or create a shortcut to the
file in its new location.
To copy the item instead of moving it, press and hold down CTRL while dragging.
If you drag an item to another disk, it is copied, not moved. To move the item, press and hold down SHIFT while
dragging.
Dragging a program to a new location creates a shortcut to that program. To move a program, right-click and then
drag the program to the new location.

TO DELETE A FILE OR FOLDER


 Open My Documents.
 Click the file or folder you want to delete.
 Under File and Folder Tasks, click Delete this file or Delete this folder.

ALTERNATIVELY
Right-click on the file or folder and select the Delete command in the pop up menu as shown below
Notes:
You can also delete files or folders by right-clicking the file or folder and then clicking Delete.
To retrieve a file you have deleted, double-click the Recycle Bin icon on your desktop. Right-click the file you
want to retrieve, and then click Restore.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 28 of 68

To permanently delete a file, press and hold down SHIFT and drag it to the Recycle Bin. The item is permanently
deleted and cannot be retrieved from the Recycle Bin.

TO PRINT A DOCUMENT.
Before you can print an accurate document, it is necessary to Print Preview the document first. To print preview
your document before printing, select Print Preview in the File menu. Use the print preview to make corrections of
any possible error before printing. In the File menu of the program you are working in, Click Print to print your
document.

COLLABORATION EXERCISE

REVIEW QUESTIONS
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 29 of 68

CHAPTER 7

FILE TYPES
File Types, is the structure of a file that defines the way it is stored and laid out on the screen or in print. Each file
you view or save is of a particular format or type which the application uses to recognise the file. Each file type has
a unique icon that represents the file type. Some of the file types will vary depending on the programs that you have
installed on the computer. Few of the file types are listed below.

ICON DESCRIPTION

Indicates a text file and has the .txt extension

Indicates a Microsoft Executable file and has the .exe extension

Indicates an image file and has the .jpg extension. Some image files have the .gif extensions

Indicates a Wordpad file and has the .rtf extension

Represents an Internet Explorer file and has the .htm extension

Indicates a Microsoft Word file and has the .doc extension

Indicates a Microsoft Excel file and has the .xls extension

Indicates a Microsoft Access file and has the .mdb extension

Indicates a Microsoft Publisher file and has the .pub extension

Indicates a Microsoft PowerPoint file and has the .ppt or .pps extension

Indicates a Coral Draw file and has the .cdr extension

Indicates a Wave sound file and has the .wav extension

NAMING CONVENTIONS FOR FILES


 File names cannot contain the following characters: \ /: *? " < > |
 A file name should be descriptive and meaningful
 A file name can contain a maximum of 255 characters long
 Using the same file name for the same application is not allowed since it may create conflict when
accessing or seaching the file.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 30 of 68

VIEWING & MODIFYING FILE FOLDER PROPERTIES


A file or a folder has properties such as size & type. These properties can be viewed in the properties dialog box.
To display the properties dialog box, perform the following steps:
 Right-click the file or folder in the windows Explorer to display the pop up menu as illustrated below.
 Select the properties command to display the properties dialog box as illustrated below
The following information is displayed in the properties dialog box.
 Type of file: It provides information regarding the file, for instance, Text Document
 Opens with: It provides information regarding the name of the
application that is used to open the selected file. For instance
Notepad application is used to open a text document
 Location: It provides information regarding the path of the file.
 Size: it provides information regarding the size of the file. The
size refers to the amount of data in the file
 Size on disk: It provides information regarding the amount of
disk space that is allocated to the file
 Created: It provides information regarding the date & time
onwhich the file was created
 Modified: It provides information regarding the date & time
onwhich the file was modified
 Accessed: It provides information regarding the date & time
onwhich the file was accessed
 Attributes: it consists of the following check boxes:
 Read Only You can select this check box to specify that the
file is read-only. This means that you cannot modify the file.
 Hidden You can select this check box to hide the file. By
default, hidden file will not be displayed in the Windows
Explorer.
 Archive You can display this check box to save a backup of the file on the hard disk. This check box is
selected by default

USING THE WINDOWS EXPLORER


The Windows Explorer is a window that is split into two panes.
 The left pane: displays the various drives & folders.
 the right pane: displays the folders, subfolders and files corresponding to the currently selected item in the
left pane

Left Panel

Right Panel
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 31 of 68

IMPORTANCE OF THE WINDOWS EXPLORER


You can use the Windows Explorer to:
 Display file details such as the file size, the date of creation & the date onwhich the file was last modified.
 Windows Explorer can be used to view files & folders in a hierachical structure.
 Windows Explorer provides toolbars for various purposes such as displaying the complete path of a folder
or file

HOW TO OPEN WINDOWS EXPLORER


 Right-click the Start menu and select the Explorer command to display Windows Explorer window as
illustrated below.

The Windows Explorer can be customized to display files and folders in different views. To display this view,
select the VIEW menu. The View menu contains options such as:

 Large Icon: this option displays the files & folders in the Windows Explorer using large icons
 Small Icon: this option displays the files & folders in the Windows Explorer using small icons
 List: this option allows you to display files and folders in the Windows Explorer in a list of format.
 Details: this option displays the details of the files & folders in the Windows Explorer, such as the name,
size, type, and last modified date of the file or folder
 Thumbnails: this option displays a thumbnails – sized image of the file or folder

COLLABORATION EXERCISE

REVIEW QUESTIONS
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 32 of 68

CHAPTER 8

INTRODUCTION TO THE INTERNET & THE WORLD WIDE WEB


The Internet is a computer-based global information system. The Internet is composed of many interconnected
computer networks. Each network may link tens, hundreds, or even thousands of computers, enabling them to share
information and processing power. The Internet has made it possible for people all over the world to communicate
with one another effectively and inexpensively. Unlike traditional broadcasting media, such as radio and television,
the Internet does not have a centralized distribution system.

Instead, an individual who has Internet access can


 communicate directly with anyone else on the
Internet
 Post information for general consumption
 Retrieve information
 Use distant applications and services
 Buy and sell products (E-commerce).
 The Internet enables marketers to promote
products and services to millions of potential
customers through the World Wide Web.

ADVANTAGES OF THE INTERNET


The Internet has brought new opportunities to
government, business, and education.
 Governments use the Internet for internal
communication, distribution of information, and automated tax processing.
 In addition to offering goods and services online to customers, businesses use the Internet to interact with
other businesses.
 Many individuals use the Internet for communicating through electronic mail (e-mail), retrieving news,
researching information, shopping, paying bills, banking, listening to music, watching movies, playing
games, and even making telephone calls.
 Educational institutions use the Internet for research and to deliver online courses and course material to
students.
Use of the Internet has grown tremendously since its beginning. The Internet’s success arises from its flexibility.
Instead of restricting component networks to a particular manufacturer or particular type, Internet technology
allows interconnection of any kind of computer network. No network is too large or too small, too fast or too slow
to be interconnected. Thus, the Internet includes inexpensive networks that can only connect a few computers
within a single room as well as expensive networks that can span a continent and connect thousands of computers.

WHO ARE THE PROVIDERS OF THE INTERNET?


Internet Service Providers usually known as ISP, provide Internet access to computer users, usually for a monthly
fee. A customer who subscribes to an ISP’s service uses the ISP’s network to access the Internet.
Because ISPs offer their services to the general public, the networks they operate are known as Public Access
Networks.
In the United States, as in many countries, ISPs are private companies; in countries where telephone service is a
government-regulated monopoly, the government often controls ISPs.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 33 of 68

DEVICES USED TO CONNECT THE INTERNET

 COMPUTERS
The most common device used to connect the internet is the computer. A computer connects the internet with
the help of a device called a modem. A modem converts the digital bits of a computer’s output to an audio tone,
which is then converted to an electrical signal and passed over telephone lines to be decoded by a modem
attached to a computer at the receiving end. A web browser such as Internet Explorer, Netscape Navigator or
Mozilla Firefox is also required by the user to read and view webpages & websites on the internet.

 GPRS
It is a wireless system providing Internet access: A GPRS is the full form of General Packet Radio Service. It
is a system that provides immediate and continuous access to the Internet from wireless devices such as cell
phones.

 TELEPHONES
Telephone, instrument that sends and receives voice messages and data. Telephones convert speech and data to
electrical energy, which is sent great distances. Modern technology has made the telephone much more
portable, convenient, and versatile.

 MOBILE DEVICES
Palmtops, Laptops & mobile phones are equally used to connect the internet. These devices are mobile simply
because you can access the internet everywhere of your choice, and once the internet is connected, you have
the liberty to move the device to anywhere without any disruption.

DISADVANTAGES OF THE INTERNET


Inspite of the numerous advantages of the internet, it has brought about serious disadvantages that have brought
about very bad perception as a bad technology ever introduced to the world. Some of these problems include:

 COMPUTER FRAUD
The most serious threats to the integrity and authenticity of computer information come from those who have
been entrusted with usage privileges and yet commit computer fraud. For example, authorized persons may
secretly transfer money in financial networks, alter credit histories, interfere with information, or commit bill
payment or payroll fraud. Modifying, removing, or misrepresenting existing data threatens the integrity and
authenticity of computer information. For example, omitting sections of a bad credit history so that only the
good credit history remains violates the integrity of the document. Entering false data to complete a fraudulent
transfer or withdrawal of money violates the authenticity of banking information.

 THE SPREAD OF VIRUSES


Download is simply the process of transferring a copy of a file from a remote computer to the requesting
computer by means of a modem or network whilst Uploading is the process of transferring a copy of a file
from your computer to a remote computer by means of a network or modem. Both processes can be used to
spread viruses which can destroy the computer or valuable files stored on it.

 EXPENSIVE
ISPs typically charge a monthly fee for Internet access, and they often charge an additional fee for broadband
installation. These monthly or periodic charges make the internet very expensive.

 SPREAD OF SOCIAL VICES


Pornography, films, magazines, writings, photographs, or other materials that are sexually explicit and
intended to arouse sexual excitement in their audience. Most internet users purposely visit the internet with the
rationale of visiting websites with pornographic pictures & films. This makes them practice what they see,
which leads them to unwanted pregnancy or sometimes pre-marital sex.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 34 of 68

THE WORLD WIDE WEB

THE DIFFERENCE BETWEEN A WEBSITE AND A WWW


The WWW is a set of protocols and software that allows the global computer network called the Internet to display
multimedia documents whilst the Web Site, is simply the file of information (webpages) located on a server
connected to the World Wide Web (WWW). The Web offers a place where companies, universities and other
institutions, and individuals can display information about their products, services, facilities, or research, or their
private lives. Only a small percentage of information on the Web is restricted to subscribers or other authorized
users. The majority of Web pages are available to anyone who can access a computer that connects to the Internet.
The Web has become a marketplace for many companies selling products or services, and a forum for people to
exchange opinions and information. Museums, libraries, government agencies, and schools post information on the
Web to make it available to others.

WHO ARE THE CHIEF USERS OF THE WEB?


Users form a cross-section of society, including
 students preparing term papers
 physicians researching the latest medical information, and
 College applicants investigating campuses or even filling out application and financial aid forms online.
 Investors examining the trading history of a company's stock or evaluating data on various commodities
and mutual funds. All the necessary information is available on the Web.

INTRODUCING COMPUTER VIRUS

COMPUTER VIRUS A computer Virus is a self-duplicating computer program that spreads from computer to
computer, interfering with data and software. Just as biological viruses infect people, spreading from person to
person; computer viruses infect personal computers.

Some viruses are mere annoyances, but others can do serious damage. Viruses can delete or change files, steal
important information, load and run unwanted applications, send documents via electronic mail (e-mail), or even
cripple a machine’s operating system (OS).

HOW INFECTIONS OCCUR


A virus can infect a computer in a number of ways.
 It can arrive on a floppy disk or inside an e-mail message.
 It can piggyback on files downloaded from the World Wide Web or from an Internet service used to share
music and movies.
 It can develop errors in the way computers exchange data over a network.

Traditionally, even if a virus found its way onto a computer, it could not actually infect the machine—or propagate
to other machines—unless the user was somehow fooled into executing the virus by opening it and running it just
as one would run a legitimate program. But a new breed of computer virus can infect machines and spread to others
entirely on its own. Simply by connecting a computer to a network, the computer owner runs the risk of infection.
Because the Internet connects computers around the world, viruses can spread from one end of the globe to the
other in a matter of minutes.

TYPES OF VIRUSES
There are many categories of viruses, these include
 Bootstrap-sector virus: Bootstrap-sector viruses reside on the first portion of the hard disk or floppy disk,
known as the boot sector. These viruses replace either the programs that store information about the disk's
contents or the programs that start the computer. Typically, these viruses spread by means of the physical
exchange of floppy disks. Examples of some Bootstrap viruses include Michelangelo virus & Ohio Virus

 Parasitic or file viruses: Parasitic or file viruses infect executable files or programs in the computer. These
files are often identified by the extension .exe in the name of the computer file. File viruses leave the contents
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 35 of 68

of the host program unchanged but attach to the host in such a way that the virus code is run first. These viruses
can be either direct-action or resident. A direct-action virus selects one or more programs to infect each time it
is executed. A resident virus hides in the computer's memory and infects a particular program when that
program is executed. Parasitic or file viruses can further be divided into two categories. These include Worms
and Trojan Horses

WORM
A computer worm is a type of virus. However, instead of infecting files or operating systems, a worm replicates
from computer to computer by spreading entire copies of itself. A worm operates entirely on its own, without ever
attaching itself to another program. Typically, a worm spreads over e-mail and through other ways that computers
exchange information over a network. In this way, a worm not only wreaks havoc on machines, but also clogs
network connections and slows network traffic, so that it takes an excessively long time to load a Web page or send
an e-mail.

TROJAN HORSE
The Trojan horse acquired its name from the Greek mythology story of the Trojan horse. It is a destructive program
disguised as a game, a utility, or an application. When run, a Trojan horse does something tricky to the computer
system while appearing to do something useful.

HOW TO DETECT VIRUSES ON YOUR COMPUTER


Several types of antiviral software can be used to detect the presence of a virus. Scanning software can recognize
the characteristics of a virus's computer code and look for these characteristics in the computer's files. Because new
viruses must be analyzed as they appear, scanning software must be updated periodically to be effective. Other
scanners search for common features of viral programs and are usually less reliable.
Most antiviral software uses both On-demand scanners and On-access scanners

ON-DEMAND SCANNER ON-ACCESS SCANNERS

On-demand scanners usually detect a virus only after On-access scanners, on the other hand, are constantly
the infection has occurred and that is why they are monitoring the computer for viruses but are always in
considered reactive the background and are not visible to the user.

On-demand scanners are launched only when the user The on-access scanners are seen as the proactive part
activates them of an antivirus package and the on-demand scanners
are seen as reactive

Antivirus software is usually sold as packages containing many different software programs that are independent of
one another and perform different functions. When installed or packaged together, antiviral packages provide
complete protection against viruses. Within most antiviral packages, several methods are used to detect viruses.
Checksumming, for example, uses mathematical calculations to compare the state of executable programs before
and after they are run. If the checksum has not changed, then the system is uninfected. Checksumming software can
detect an infection only after it has occurred, however. As this technology is dated and some viruses can evade it,
checksumming is rarely used today.

Most antivirus packages also use heuristics (problem-solving by trial and error) to detect new viruses. This
technology observes a program’s behavior and evaluates how closely it resembles a virus. It relies on experience
with previous viruses to predict the likelihood that a suspicious file is an as-yet unidentified or unclassified new
virus.

Other types of antiviral software include:


Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 36 of 68

 Monitoring software Monitoring software is different from scanning software. It detects illegal or potentially
damaging viral activities such as overwriting computer files or reformatting the computer's hard drive
 Integrity-shell software. Integrity-shell software establishes layers through which any command to run a
program must pass. Checksumming is performed automatically within the integrity shell, and infected
programs, if detected, are not allowed to run.

PREPARATION AND PREVENTION


Computer users can prepare for a viral infection by creating backups of legitimate original software and data files
regularly so that the computer system can be restored if necessary.
 Viral infection can be prevented by obtaining software from legitimate sources or by using a quarantined
computer—that is, a computer not connected to any network—to test new software.
 Users should regularly install operating system (OS) patches, software updates that mend the sort of fault, or
holes, in the OS often exploited by viruses. Patches can be downloaded from the Web site of the operating
system’s developer.
 However, the best prevention may be the installation of current and well-designed antiviral software. Such
software can prevent a viral infection and thereby help stop its spread.

COLLABORATION EXERCISE

REVIEW QUESTIONS
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 37 of 68

CHAPTER 9

ENHANCING YOUR TYPING SKILLS


Keyboard, is a keypad device with buttons or keys that a user presses to enter data characters and commands into a
computer. Keyboards emerged from the combination of typewriter and computer-terminal technology. They are
one of the fundamental pieces of personal computer (PC) hardware. When a user wants to insert data into the
computer system, a user requires a basic input device like the keyboard.

PARTS OF A KEYBOARD
Functional Keys

Tab Key

Caps Lock Key

Numeric Key Pad


Control Keys

Space bar
Shift Keys

Alphabetical Keys Navigation Key Pad

 Functional Keys
The function keys are used to perform specific tasks. They are labeled as F1, F2, F3, and so on, up to F12. The
functionality of these keys differs from program to program.

 Numeric Key Pad


To use the numeric keypad to enter numbers, press Num Lock. Most keyboards have a light that indicates
whether Num Lock is on or off. When Num Lock is off, the numeric keypad functions as a second set of
navigation keys (these functions are printed on the keys next to the numerals or symbols).

 Navigation Keys
These keys are used for moving around in documents or webpages and editing text. They include the arrow
keys, Home, End, Page Up, Page Down, Delete, and Insert.

 Alphabetical Keys
These keys include the same letter, number, punctuation, and symbol keys found on a traditional typewriter.

 Shift Keys
There are two shift keys on the keyboard. The left shift key & the right shift key.

 Control Key
These keys are used alone or in combination with other keys to perform certain actions. The most frequently
used control keys are Ctrl, Alt, the Windows logo key, and Esc.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 38 of 68

Typing text

Whenever you need to type something in a program, e-mail message, or text box, you'll see a blinking vertical line
(l). That's the cursor, also called the insertion point. It shows where the text that you type will begin. You can move
the cursor by clicking in the desired location with the mouse, or by using the navigation keys. In addition to letters,
numerals, punctuation marks, and symbols, the typing keys also include Shift, Caps Lock, Tab, Enter, the
Spacebar, and Backspace.

Key name How to use it


Press Shift in combination with a letter to type an uppercase letter. Press Shift in combination with
Shift
another key to type the symbol shown on the upper part of that key.
Caps Press Caps Lock once to type all letters as uppercase. Press Caps Lock again to turn this function off.
Lock Your keyboard might have a light indicating whether Caps Lock is on.
Press Tab to move the cursor several spaces forward. You can also press Tab to move to the next text
Tab
box on a form.
Press Enter to move the cursor to the beginning of the next line. In a dialog box, press Enter to select the
Enter
highlighted button.
Spacebar Press the Spacebar to move the cursor one space forward.
Backspace Press Backspace to delete the character before the cursor, or the selected text.

So far, we've discussed almost every key you're likely to use. But for the truly inquisitive, let's explore the three
most mysterious keys on the keyboard: PrtScn, Scroll Lock, and Pause/Break.

PrtScn (or Print Screen)

A long time ago, this key actually did what it says—it sent the current screen of text to your printer. Nowadays,
pressing PrtScn captures an image of your entire screen (a "screen shot") and copies it to the Clipboard in your
computer's memory. From there you can paste it (Ctrl+V) into Microsoft Paint or another program and, if you want,
print it from that program.

ScrLk (or Scroll Lock)

In most programs, pressing Scroll Lock has no effect. In a few programs, pressing Scroll Lock changes the
behavior of the arrow keys and the Page Up and Page Down keys; pressing these keys causes the document to
scroll without changing the position of the cursor or selection. Your keyboard might have a light indicating whether
Scroll Lock is on or off.

Pause/Break

This key is rarely used. In some older programs, pressing this key pauses the program or, in combination with Ctrl,
stops it from running.

Tips for using your keyboard safely

Using your keyboard properly can help avoid soreness or injury to your wrists, hands, and arms, particularly if you
use your computer for long periods of time. Here are some tips to help you avoid problems:

 Place your keyboard at elbow level. Your upper arms should be relaxed at your sides.
 Center your keyboard in front of you. If your keyboard has a numeric keypad, you can use the spacebar as
the centering point.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 39 of 68

 Type with your hands and wrists floating above the keyboard, so that you can use your whole arm to reach
for distant keys instead of stretching your fingers.
 Avoid resting your palms or wrists on any type of surface while typing. If your keyboard has a palm rest,
use it only during breaks from typing.
 While typing, use a light touch and keep your wrists straight.
 When you're not typing, relax your arms and hands.
 Take short breaks from computer use every 15 to 20 minutes.

USING THE RIGHT FINGURES FOR THE RIGHT KEYS

The home row keys involves


A, S, D, F, G, H, J, K, L

These keys are known as the home row keys


simply because that is where you rest your
fingures when typing. It is very important to
learn how to type with the right figures and at
a faster pace.

One effective way of learning how to type is


to set realistic targets that can be used to
measure your progress in typing. The goal is
to check the number of words you can type
per minute. This is termed as words per
minute (wpm).

COLLABORATION EXERCISE

 Press Alt+PrtScn to capture an image of just the active window, instead of the entire screen.

REVIEW QUESTIONS
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 40 of 68

CHAPTER 10
KEYBOARD SHORTCUT
Move over Mister Mouse: When speed counts, the keyboard is still king! Almost all the actions and commands you
can perform with a mouse you can perform faster using combinations of keys on your keyboard. These simple
keyboard shortcuts can get you where you want to go faster than several clicks of a mouse. You'll work faster on
spreadsheets and similar documents, too, because you won't lose your place switching back and forth between
mouse and keys.

Use shortcut keys as an alternative to the mouse when working in Windows. You can open, close, and navigate the
Start menu, desktop, menus, dialog boxes, and Web pages using keyboard shortcuts. Keyboard shortcuts may also
make it easier for you to interact with your computer.

No. PRESS TO
1 CTRL+C Copy
2 CTRL+X Cut
3 CTRL+V Paste
4 CTRL+Z Undo
5 DELETE Delete
6 SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin
7 CTRL while dragging an item Copy selected item
8 CTRL+SHIFT while dragging an item Create shortcut to selected item
9 F2 Rename selected item
10 CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word
11 CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word
12 CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph
13 CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph
14 CTRL+SHIFT with any of the arrow keys Highlight a block of text
15 SHIFT with any of the arrow keys Select more than one item in a window or on the desktop, or select text within a document.
16 CTRL+A Select all
17 F3 Search for a file or folder
18 ALT+ENTER View properties for the selected item
19 ALT+F4 Close the active item, or quit the active program
20 ALT + Enter Displays the properties of the selected object
21 ALT+SPACEBAR Opens the shortcut menu for the active window
Close the active document in programs that allow you to have multiple documents open
22 CTRL+F4
simultaneously
23 ALT+TAB Switch between open items
24 ALT+ESC Cycle through items in the order they were opened
25 F6 Cycle through screen elements in a window or on the desktop
26 F4 Display the Address bar list in My Computer or Windows Explorer
27 SHIFT+F10 Display the shortcut menu for the selected item
28 ALT+SPACEBAR Display the System menu for the active window
39 CTRL+ESC Display the Start menu
30 F10 Activate the menu bar in the active program
31 RIGHT ARROW Open the next menu to the right, or open a submenu
32 LEFT ARROW Open the next menu to the left, or close a submenu
33 F5 Refresh the active window
View the folder one level up in My Computer or Windows Explorer OR Open a folder one level
34 BACKSPACE
up if a folder is selected in the Save As or Open dialog box
35 ESC Cancel the current task
36 SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing
37 CTRL+TAB Move forward through tabs
38 CTRL+SHIFT+TAB Move backward through tabs
39 TAB Move forward through options
40 SHIFT+TAB Move backward through options
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 41 of 68

41 ALT + Underlined letter Carry out the corresponding command or select the corresponding option
42 ENTER Carry out the command for the active option or button
43 SPACEBAR Select or clear the check box if the active option is a check box
44 Arrow keys Select a button if the active option is a group of option buttons
45 F1 Display Help
46 F4 Display the items in the active list
47 Logo Display or hide the Start menu
48 Logo +D Show the desktop
49 Logo + M Minimize all windows
50 Logo +Shift+M Restores minimized windows
51 Logo +E Open My Computer
52 Logo +F Search for a file or folder
53 CTRL+ Logo +F Search for computers
54 Logo +F1 Display Windows Help
55 Logo +R Open the Run dialog box
56 Logo +U Open Utility Manager
57 Right SHIFT for eight seconds Switch FilterKeys on and off
58 Left ALT +left SHIFT +PRINT SCREEN Switch High Contrast on and off
59 Left ALT +left SHIFT +NUM LOCK Switch MouseKeys on and off
60 SHIFT five times Switch StickyKeys on and off
61 NUM LOCK for five seconds Switch ToggleKeys on and off
62 Logo +U Open Utility Manager
63 RIGHT ARROW Display current selection if it's collapsed, or select first subfolder
64 LEFT ARROW Collapse current selection if it's expanded or select parent folder
65 NUM LOCK+MINUS SIGN on numeric keypad (-) Collapse the selected folder
66 NUM LOCK+PLUS SIGN on numeric keypad (+) Display the contents of the selected folder
67 NUM LOCK+ASTERISK on numeric keypad (*) Display all subfolders under the selected folder
68 END Display the bottom of the active window
69 HOME Display the top of the active window

You must associate a password with your user account to secure it from unauthorized access. Some keyboard
shortcuts may not work if StickyKeys is turned on in Accessibility Options.

COLLABORATION EXERCISE

* Try these examples:


 Press the Windows key (WinKey) - found between the Ctrl and Alt keys - to open the Start Menu.
 Press the cursor keys to move around the menu items.
 Press the Enter key to open a highlighted item.
 Press the Alt and F4 keys simultaneously to close the item.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 42 of 68

GLOSSARIES

Access control A security mechanism that determines which operations a user, group, service, or computer is
authorized to perform on a computer or on a particular object, such as a file, printer, registry key, or directory
service object.

Account lockout A Windows security feature that locks a user account if a number of failed logon attempts occur
within a specified amount of time, based on security policy lockout settings. Locked accounts cannot log on.

Acknowledgment message For Message Queuing, a message class that indicates that a message arrived or was
retrieved by the target application (a positive acknowledgment), or that an error occurred before the original
message could be retrieved (a negative acknowledgment). These messages are sent to administration queues on the
source computer.

Active Describes the window or icon that you are currently using or that is currently selected. The operating system
always applies the next keystroke or command you choose to the active window. Windows or icons on the desktop
that are not selected are inactive.

Active content Dynamic content, such as a stock ticker, a weather map, or news that is usually updated from the
World Wide Web or a channel.

Active Directory The directory service that stores information about objects on a network and makes this
information available to users and network administrators. Active Directory gives network users access to
permitted resources anywhere on the network using a single logon process. It provides network administrators with
an intuitive, hierarchical view of the network and a single point of administration for all network objects.

Active partition A partition from which an x86-based computer starts up. The active partition must be a primary
partition on a basic disk. If you use Windows exclusively, the active partition can be the same as the system
volume.

Administrative alerts Alerts that relate to server and resource use. They notify users about problems in areas such
as security and access, user sessions, server shutdown due to power loss (when an uninterruptible power supply is
available), directory replication, and printing. When a computer generates an administrative alert, a message is sent
to a predefined list of users and computers.

Administrator For Windows XP Professional, a person responsible for setting up and managing domain
controllers or local computers and their user and group accounts, assigning passwords and permissions, and helping
users with networking problems. Administrators are members of the Administrators group and have full control
over the domain or computer.

Allocation unit The smallest amount of disk space that can be allocated to hold a file. All file systems used by
Windows organize hard disks based on allocation units. The smaller the allocation unit size, the more efficiently a
disk stores information. If you do not specify an allocation unit size when formatting the disk, Windows picks
default sizes based on the size of the volume. These default sizes are selected to reduce the amount of space that is
lost and the amount of fragmentation on the volume. An allocation unit is also called a cluster.

Asymmetric Digital Subscriber Line (ADSL) A high-bandwidth digital transmission technology that uses
existing phone lines and also allows voice transmissions over the same lines. Most of the traffic is transmitted
downstream to the user, generally at rates of 512 Kbps to about 6 Mbps.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 43 of 68

Asynchronous Transfer Mode (ATM) A high-speed connection-oriented protocol used to transport many
different types of network traffic. ATM packages data in a 53-byte, fixed-length cell that can be switched quickly
between logical connections on a network.

Attribute For files, information that indicates whether a file is read-only, hidden, ready for archiving (backing up),
compressed, or encrypted, and whether the file contents should be indexed for fast file searching.

Audio input device An audio input device records music and voice input into your computer. Examples of audio
input devices are CD-ROM players and microphones.

Auditing The process that tracks the activities of users by recording selected types of events in the security log of a
server or a workstation.

Authentication The process for verifying that an entity or object is who or what it claims to be. Examples include
confirming the source and integrity of information, such as verifying a digital signature or verifying the identity of
a user or computer.

Authorization The process that determines what a user is permitted to do on a computer system or network.

Background The screen background image used on a graphical user interface such as Windows. Any pattern or
picture that can be stored as a bitmap (.bmp) file can be set as a screen background.

Background program A program that runs while the user is working on another task. The computer's
microprocessor assigns fewer resources to background programs than foreground programs.

Backup set A collection of files, folders, and other data that has been backed up and stored in a file or on one or
more tapes.

Backup set catalog A summary of the files and folders that have been saved in a backup set.

Backup types A type that determines which data is backed up and how it is backed up. There are five backup
types: copy, daily, differential, incremental, and normal.

Bandwidth In analog communications, the difference between the highest and lowest frequencies in a given range.
For example, an analog telephone line accommodates a bandwidth of 3,000 hertz (Hz), the difference between the
lowest (300 Hz) and highest (3,300 Hz) frequencies it can carry. In digital communications, bandwidth is expressed
in bits per second (bps).

Basic disk A physical disk that can be accessed by MS-DOS and all Windows-based operating systems.

Basic input/output system (BIOS) On x86-based computers, the set of essential software routines that test
hardware at startup, start the operating system, and support the transfer of data among hardware devices. The BIOS
is stored in read-only memory (ROM) so that it can be executed when you turn on the computer. Although critical
to performance, the BIOS is usually invisible to computer users.

Basic storage A storage method in MS-DOS, Windows, Windows NT, and Windows 2000 for primary partitions,
extended partitions, and logical drives.

Binary A base-2 number system in which values are expressed as combinations of two digits, 0 and 1.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 44 of 68

Bit (binary digit) The smallest unit of information handled by a computer. One bit expresses a 1 or a 0 in a binary
numeral, or a true or false logical condition. A group of 8 bits makes up a byte, which can represent many types of
information, such as a letter of the alphabet, a decimal digit, or other character. Bit is also called binary digit.

Bits per second (bps) The number of bits transmitted every second, used as a measure of the speed at which a
device, such as a modem, can transfer data.

Boot The process of starting or resetting a computer. When first turned on (cold boot) or reset (warm boot), the
computer runs the software that loads and starts the computer's operating system, which prepares it for use.

Boot files The system files needed to start Windows. The boot files include Ntldr and Ntdetect.com.

Boot Logging A process in which a computer that is starting (booting) creates a log file that records the loading of
each device and service. The log file is called Ntbtlog.txt, and it is saved in the system root directory.

Boot partition The partition that contains the Windows operating system and its support files. The boot partition
can be, but does not have to be, the same as the system partition.

Broadband Relating to communications systems in which the medium of transmission (such as a wire or fiber-
optic cable) carries multiple messages at a time, each message modulated on its own carrier frequency by a modem.

Broadband connection A high-speed connection. Broadband connections are typically 256 kilobytes per second
(KBps) or faster. Broadband includes DSL and cable modem service.

Broadcast An address that is destined for all hosts on a particular network segment.

Browser Software that interprets the markup of files in HTML, formats them into Web pages, and displays them to
the end user. Some browsers also permit end users to send and receive e-mail, read newsgroups, and play sound or
video files embedded in Web documents.

Buffer A region of RAM reserved for use with data that is temporarily held while waiting to be transferred
between two locations, such as between an application's data area and an input/output device.

Bus A communication line used for data transfer among the components of a computer system. A bus essentially
allows different parts of the system to share data. For example, a bus connects the disk-drive controller, memory,
and input/output ports to the microprocessor.

Bytes A unit of data that typically holds a single character, such as a letter, a digit, or a punctuation mark. Some
single characters can take up more than one byte.

Cache For DNS and WINS, a local information store of resource records for recently resolved names of remote
hosts. Typically, the cache is built dynamically as the computer queries and resolves names. It also helps optimize
the time required to resolve queried names.

Catalog For Indexing Service, a collection of all index information and stored properties for a particular group of
file system directories. By default, Indexing Service indexes the System and Web catalogs on your hard drive.

Channel A path or link through which noncontrol information passes between two devices. A single Basic Rate
Interface (BRI) connection, for example, has one physical connection but two channels for exchanging information
between devices.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 45 of 68

Character mode A display mode in which the monitor can display letters, numbers, and other text characters, but
no graphical images or character formatting (italics, superscript, and so on).

Clear To turn off an option by removing the X or check mark from a check box. You clear a check box by clicking
it, or by selecting it and then pressing the SPACEBAR.

Client Any computer or program connecting to, or requesting the services of, another computer or program. Client
can also refer to the software that enables the computer or program to establish the connection. For a local area
network (LAN) or the Internet, a computer that uses shared network resources provided by another computer
(called a server).

Client application A Windows-based application that can display and store linked or embedded objects. For
distributed applications, the application that imitates a request to a server application.

Client request A service request from a client computer to a server computer or, for Network Load Balancing, a
cluster of computers. Network Load Balancing forwards each client request to a specific host within the cluster
according to the system administrator's load-balancing policy.

Code page A means of providing support for character sets and keyboard layouts for different countries or regions.
A code page is a table that relates the binary character codes used by a program to keys on the keyboard or to
characters on the display.

Codec Hardware that can convert audio or video signals between analog and digital forms (coder/decoder);
hardware or software that can compress and uncompress audio or video data (compression/decompression); or the
combination of coder/decoder and compression/decompression. Generally, a codec compresses uncompressed
digital data so that the data uses less memory.

Color depth The number of colors per pixel your monitor and graphics adapter support. Color gamut. The
particular range of colors that a device is able to produce. A device such as a scanner, monitor, or printer can
produce a unique range of colors, which is determined by the characteristics of the device itself.

Color management Process of producing accurate, consistent color among a variety of input and output devices. A
color management system (CMS) maps colors between devices such as scanners, monitors, and printers; transforms
colors from one color space to another (for example, RGB to CMYK); and provides accurate on-screen or print
previews.

Color profile A profile that contains the data needed for translating the values of a color gamut. This data includes
information about color, hue, saturation, and brightness.

Command prompt window A window displayed on the desktop used to interface with the MS-DOS operating
system. MS-DOS commands are typed at an entry point identified by a blinking cursor.

Common groups Groups that appear in the program list on the Start menu for all users who log on to the
computer. Only administrators can create or change common groups.

Communication port A port on a computer that allows asynchronous communication of one byte at a time. A
communication port is also called a serial port.

Compatibility mode A feature of a computer or operating system that allows it to run programs written for a
different system. Programs often run slower in compatibility mode.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 46 of 68

Complementary Metal Oxide Semiconductor (CMOS) A specific type of semiconductor technology that
requires very little power. The term has been popularized to mean a small storage area where your system keeps
track of certain hardware parameters, such as the size of your hard disk, the number of serial ports your computer
has, etc. CMOS is also called Setup RAM.

Computer account An account that is created by a domain administrator and uniquely identifies the computer on
the domain. The Windows computer account matches the name of the computer joining the domain.

Computer administrator A user who manages a computer. The computer administrator makes system-wide
changes to the computer; including installing programs and accessing all files on the computer, and can create,
change and delete the accounts of other users.

Computer Management A component you can use to view and control many aspects of the computer
configuration. Computer Management combines several administration utilities into a single console tree, providing
easy access to a local or remote computers administrative properties and tools.

Connect To assign a drive letter, port, or computer name to a shared resource so that you can use it.

Console tree The left pane in a Microsoft Management Console (MMC) that displays the items contained in the
console. By default it is the left pane of a console window, but it can be hidden. The items in the console tree and
their hierarchical organization determine the capabilities of a console.

Copy backup A backup that copies all selected files but does not mark each file as having been backed up (in other
words, the archive attribute is not cleared). Copying is useful if you want to back up files between normal and
incremental backups because copying does not affect these other backup operations.

Credentials A set of information that includes identification and proof of identification that is used to gain access
to local and network resources. Examples of credentials are user names and passwords, smart cards, and
certificates.

Cryptography The processes, art, and science of keeping messages and data secure. Cryptography is used to
enable and ensure confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation.

Custom file type Typically, files with extensions that have been created for special kinds of files. Custom file
types are not tracked by the system registry.

Daily backup A backup that copies all selected files that have been modified the day the daily backup is
performed. The backed-up files are not marked as having been backed up (in other words, the archive attribute is
not cleared).

Data packet A unit of information transmitted as a whole from one device to another on a network.

Debugger A program designed to aid in detecting, locating, and correcting errors in another program by allowing
the programmer to step through the program, examine the data, and monitor conditions such as the values of
variables.

Default button In some dialog boxes, the command button that is selected or highlighted when the dialog box is
initially displayed. The default button has a bold border, indicating that it will be chosen automatically if you press
ENTER. You can override a default button by clicking Cancel or another command button.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 47 of 68

Default printer The printer to which a computer sends documents if you select the Print command without first
specifying which printer you want to use with a program. You can have only one default printer; it should be the
printer you use most often.

Default user The profile that serves as a basis for all user profiles. Every user profile begins as a copy of the
default user profile.

Defragmentation The process of rewriting parts of a file to contiguous sectors on a hard disk to increase the speed
of access and retrieval.

Delegation The ability to assign responsibility for management and administration of a portion of the namespace to
another user, group, or organization.

Desktop The on-screen work area on which windows, icons, menus, and dialog boxes appear.

Desktop pattern A design that appears across your desktop. You can create your own pattern or select a pattern
provided by Windows.

Destination documents The document into which a package or a linked or embedded object is being inserted. For
an embedded object, this is sometimes also called the container document.

Details pane The pane in the Microsoft Management Console (MMC) that displays the details for the selected item
in the console tree. The details can be a list of items or they can be administrative properties, services, and events
that are acted on by a snap-in.

Device Any piece of equipment that can be attached to a network or computer; for example, a computer, printer,
joystick, adapter, or modem card, or any other peripheral equipment. Devices normally require a device driver to
function with Windows.

Device conflict A conflict that occurs when the same system resources have been allocated to two or more devices.

Device driver A program that allows a specific device, such as a modem, network adapter, or printer, to
communicate with the operating system.

Device fonts Fonts that reside in your printer. They can be built into the printer itself or provided by a font
cartridge or font card.

Device Manager An administrative tool that you can use to manage the devices on your computer.

Dial location The country code, area code, and specific dialing requirements for the place you are dialing from.
Once you have created a dial location, you can select it to apply the dialing requirements to all your calls. To
change dialing locations, select or create a different one.

Dial-up connection The connection to your network if you are using a device that uses the telephone network.

Dialog box A secondary window that contains buttons and various kinds of options through which you can carry
out a particular command or task.

Dictionary attack A method of guessing a user's password or PIN by trying every word in the dictionary until
successful.

Differential backup A backup that copies files created or changed since the last normal or incremental backup.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 48 of 68

Differential data Saved copies of changed data that can be applied to an original volume to generate a volume
shadow copy.

Digital signature A means for originators of a message, file, or other digitally encoded information to bind their
identity to the information. The process of digitally signing information entails transforming the information, as
well as some secret information held by the sender, into a tag called a signature.

Digital Subscriber Line (DSL) A type of high-speed Internet connection using standard telephone wires. This is
also referred to as a broadband connection.

Digital video disc (DVD) A type of optical disc storage technology. A digital video disc (DVD) looks like a CD-
ROM disc, but it can store greater amounts of data. DVDs are often used to store full-length movies and other
multimedia content that requires large amounts of storage space.

Direct cable connection A link between the I/O ports of two computers created with a single cable rather than a
modem or other interfacing devices. In most cases, a direct cable connection is made with a null modem cable.

Direct memory access (DMA) Memory access that does not involve the microprocessor. DMA is frequently used
for data transfer directly between memory and a peripheral device such as a disk drive.

Directory partition A contiguous subtree of the directory that forms a unit of replication.

DirectX An extension of the Microsoft Windows operating system. DirectX technology helps games and other
programs use the advanced multimedia capabilites of your hardware.

Disable To make a device nonfunctional. For example, if you disable a device in a hardware configuration, you
cannot use the device when your computer uses that hardware configuration.

Disk A storage device that is attached to a computer.

Dismount To remove a removable tape or disc from a drive.

Document Any self-contained piece of work created with an application program and, if saved on disk, given a
unique file name by which it can be retrieved.

Domain A group of computers that are part of a network and share a common directory database.

Domain controller In a Windows domain environment, a computer running Active Directory that manages user
access to a network, which includes logging on, authentication, and access to the directory and shared resources.

Domain name The name given by an administrator to a collection of networked computers that share a common
directory.

Dots per inch (DPI) The standard used to measure screen and printer resolution, expressed as the number of dots
that a device can display or print per linear inch. The greater the number of dots per inch, the better the resolution.

Double-byte characters A set of characters in which each character is represented by two bytes. Some languages,
such as Japanese, Chinese, and Korean, require double-byte character sets.

Downloadable fonts A set of characters stored on disk and sent (downloaded) to a printer's memory when needed
for printing a document.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 49 of 68

Drag To move an item on the screen by selecting the item and then pressing and holding down the mouse button
while moving the mouse. For example, you can move a window to another location on the screen by dragging its
title bar.

Drive An area of storage that is formatted with a file system and has a drive letter. The storage can be a floppy
disk, a CD, a hard disk, or another type of disk. You can view the contents of a drive by clicking its icon in
Windows Explorer or My Computer.

Drive letter The naming convention for disk drives on IBM and compatible computers. Drives are named by letter,
beginning with A, followed by a colon.

Drop folder In the Macintosh environment, a folder for which you have the Make Changes permission but not the
See Files or See Folders permission. You can copy files into a drop folder, but you cannot see what files and
subfolders the drop folder contains.

Dual boot A computer configuration that can start two different operating systems.

Duplex A system capable of transmitting information in both directions over a communications channel.

DVD decoder A hardware or software component that allows a digital video disc (DVD) drive to display movies
on your computer screen.

DVD drive A disk storage device that uses digital video disc (DVD) technology. A DVD drive reads both CD-
ROM and DVDs; however, you must have a DVD decoder to display DVD movies on your computer screen.

Dynamic disk A physical disk that can be accessed only by Windows 2000 and Windows XP.

Dynamic storage A storage method in Windows that allows disk and volume management without requiring
operating system restart.

Enable To make a device functional. For example, if a device in your hardware configuration settings is enabled,
the device is available for use when your computer uses that hardware configuration.

Encrypted password A password that is scrambled. Encrypted passwords are more secure than plaintext
passwords, which are susceptible to network sniffers.

Encrypting File System (EFS) A feature in this version of Windows that enables users to encrypt files and folders
on an NTFS volume disk to keep them safe from access by intruders.

Encryption The process of disguising a message or data in such a way as to hide its substance.

Enhanced small device interface (ESDI) A standard that can be used with high-capacity hard disks, floppy disk
drives, and tape drives to allow these devices to communicate with a computer at high speeds.

Error detection A technique for detecting when data is lost during transmission.

Event Any significant occurrence in the system or an application that requires users to be notified or an entry to be
added to a log.

Event logging The process of recording an audit entry in the audit trail whenever certain events occur, such as
services starting and stopping, or users logging on and off and accessing resources.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 50 of 68

Event Viewer A component you can use to view and manage event logs, gather information about hardware and
software problems, and monitor security events. Event Viewer maintains logs about program, security, and system
events.

Expanded memory Type of memory that can be added to IBM personal computers.

Expansion slot A socket in a computer, designed to hold expansion boards and connect them to the system bus.

Express message For Message Queuing, a message that uses fewer resources and is faster than a recoverable
message.

Extended memory Memory beyond one megabyte in 80286, 80386, 80486, and Pentium computers.

Extended partition A type of partition that you can create only on basic master boot record (MBR) disks.

Extensible Markup Language (XML) A meta-markup language that provides a format for describing structured
data.

Extract When you extract a file, an uncompressed copy of the file that is created in a folder you specify. The
original file remains in the compressed folder.

Failback The process of moving resources, either individually or in a group, back to their preferred node after the
node has failed and come back online.

Failed A state that applies to a resource or a node in a cluster. A resource or a node is placed in the failed state after
an unsuccessful attempt has been made to bring it online.

Failover The process of taking resource groups offline on one node and bringing them back online on another
node.

Failover time The amount of time it takes a resource, either individually or in a group, to complete the failover
process.

FAT32 A derivative of the file allocation table (FAT) file system. FAT32 supports smaller cluster sizes and larger
volumes than FAT, which results in more efficient space allocation on FAT32 volumes.

Fax Service A system service that provides fax services to local and remote network clients. Fax services include
receiving faxes and faxing documents, fax wizard messages, and e-mail messages.

File allocation table (FAT) A file system used by MS-DOS and other Windows-based operating systems to
organize and manage files.

File system In an operating system, the overall structure in which files are named, stored, and organized. NTFS,
FAT, and FAT32 are types of file systems.

File type The file type identifies the program, such as Microsoft Word, that is used to open the file. File types are
associated with a file name extension. For example, files that have the .txt or .log extension are of the Text
Document type and can be opened using any text editor.

Filter For Indexing Service, software that extracts content and property values from a document in order to index
them.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 51 of 68

Filter Keys A keyboard feature that instructs your keyboard to ignore brief or repeated keystrokes.

Firewall A combination of hardware and software that provides a security system, usually to prevent unauthorized
access from outside to an internal network or intranet.

Folder A container for programs and files in graphical user interfaces, symbolized on the screen by a graphical
image (icon) of a file folder. A folder is a means of organizing programs and documents on a disk and can hold
both files and additional folders.

Font A graphic design applied to a collection of numbers, symbols, and characters. A font describes a certain
typeface, along with other qualities such as size, spacing, and pitch.

Font cartridge A plug-in unit available for some printers that contains fonts in several styles and sizes.

Foreground program The program that runs in the active window (the uppermost window with the highlighted
title bar). The foreground program responds to commands issued by the user.

Form The specification of physical characteristics such as paper size (that is, letter or legal) and printer area
margins of paper or other print media. For example, by default, the Letter form has a paper size of 8.5 inches by 11
inches and does not reserve space for margins.

Format The structure of a file that defines the way it is stored and laid out on the screen or in print. The format of a
file is usually indicated by its extension. For example, .txt after a file name indicates the file is a text document, and
.doc after a file name indicates it is a Word document.

Fragmentation The scattering of parts of the same disk file over different areas of the disk. Fragmentation occurs
as files on a disk are deleted and new files are added. It slows disk access and degrades the overall performance of
disk operations, although usually not severely.

Full name A user's complete name, usually consisting of the last name, first name, and middle initial.

Full-duplex A system capable of simultaneously transmitting information in both directions over a


communications channel.

Fully qualified domain name (FQDN) A DNS domain name that has been stated unambiguously so as to indicate
with absolute certainty its location in the domain namespace tree.

Game port An input/output connector to which you attach a joy stick or other game device to your computer. It is
typically a 15-pin socket on the back of a PC.

Gigabyte (GB) 1,024 megabytes, though often interpreted as approximately one billion bytes.

Graphics mode A display mode in which lines and characters on the screen are drawn pixel by pixel.

Group A collection of users, computers, contacts, and other groups.

Group account A collection of user accounts. By making a user account a member of a group, you give the related
user all the rights and permissions granted to the group.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 52 of 68

Group memberships The groups to which a user account belongs. Permissions and rights granted to a group are
also provided to its members

Group name A unique name identifying a local group or a global group to Windows.

Guest account A built-in account used to log on to a computer running Windows when a user does not have an
account on the computer or domain, or in any of the domains trusted by the computer's domain.

Half-duplex A system capable of transmitting information in only one direction at a time over a communications
channel.

Handle In the user interface, an interface added to an object that facilitates moving, sizing, reshaping, or other
functions pertaining to an object.

Handwriting input device A tool, such as a digital pen and tablet, used to enter text by writing instead of typing.

Handwriting recognition The ability to interpret handwritten text and convert it into computer-readable text.

Hard disk A device, also called hard disk drive that contains one or more inflexible platters coated with material in
which data can be recorded magnetically with read/write heads. The hard disk exists in a sealed case that protects it
and allows the head to fly 10 millionths to 25 millionths of an inch above the surface of a platter. Data can both be
stored and accessed much more quickly than on a floppy disk.

Hardware The physical components of a computer system, including any peripheral equipment such as printers,
modems, and mouse devices.

Hardware compression A feature available on some tape devices that automatically compresses the data that is
being stored on the device.

Hardware configuration Resource settings that have been allocated for a specific device.

Hardware decoder A type of digital video disc (DVD) decoder that allows a DVD drives to display movies on
your computer screen.

Hardware profile Data that describes the configuration and characteristics of specific computer equipment.

Hardware type A classification for similar devices. For example, Imaging Device is a hardware type for digital
cameras and scanners.

Hexadecimal A base-16 number system represented by the digits 0 through 9 and the uppercase or lowercase
letters A (equivalent to decimal 10) through F (equivalent to decimal 15).

Hibernation A state in which your computer shuts down after saving everything in memory on your hard disk.
When you bring your computer out of hibernation, all programs and documents that were open are restored to your
desktop.

High Contrast A display feature that instructs programs to change the color scheme to a high-contrast scheme and
to increase legibility whenever possible.

Histogram A chart consisting of horizontal or vertical bars, the widths or heights of which represent the values of
certain data.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 53 of 68

Home folder A folder (usually on a file server) that administrators can assign to individual users or groups.

Host A Windows computer that runs a server program or service used by network or remote clients

Host name The DNS name of a device on a network.

Hub A common connection point for devices in a network. Typically used to connect segments of a local area
network (LAN), a hub contains multiple ports.

Hue The position of a color along the color spectrum. For example, green is between yellow and blue. This
attribute can be set using Display in Control Panel.

Hyperlink Colored and underlined text or a graphic that you click to go to a file, a location in a file, an HTML
page on the World Wide Web, or an HTML page on an intranet. Hyperlinks can also go to newsgroups and to
Gopher, Telnet, and FTP sites.

Hypertext Markup Language (HTML) A simple markup language used to create hypertext documents that are
portable from one platform to another.

Hypertext Transfer Protocol (HTTP) The protocol used to transfer information on the World Wide Web. An
HTTP address (one kind of Uniform Resource Locator [URL]) takes the form: http://www.microsoft.com.

Icon A small image displayed on the screen to represent an object that can be manipulated by the user

Image Name The name of a process as displayed in Task Manager.

Incremental backup A backup that copies only those files created or changed since the last normal or incremental
backup.

Infrared (IR) Light that is beyond red in the color spectrum. While the light is not visible to the human eye,
infrared transmitters and receivers can send and receive infrared signals.

Infrared Data Association (IrDA) The industry organization of computer, component, and telecommunications
vendors who establish the standards for infrared communication between computers and peripheral devices, such as
printers.

Infrared device A computer, or a computer peripheral such as a printer, that can communicate using infrared light.

Infrared file transfer Wireless file transfer between a computer and another computer or device using infrared
light.

Infrared port An optical port on a computer that enables communication with other computers or devices by using
infrared light, without cables.

Initialize In Disk Management, the process of detecting a disk or volume and assigning it a status (for example,
healthy) and a type (for example, dynamic).

Ink An option that allows you to enter text in handwritten form. Instead of converting your handwritten text to
typed text, the text is converted to an object and displayed exactly as you wrote it.

Input language The specification of the language you want to type in.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 54 of 68

Input/output (I/O) port A channel through which data is transferred between a device and the microprocessor.

Insertion point The place where text will be inserted when typed. The insertion point usually appears as a flashing
vertical bar in an application's window or in a dialog box.

Install When referring to software, to add program files and folders to your hard disk and related data to your
registry so that the software runs properly.

Interactive dialog box A dialog box that requires a response from the user.

Interactive logon A network logon from a computer keyboard, when the user types information in the Logon
Information dialog box displayed by the computer's operating system.

Internet Two or more network segments connected by routers. Another term for internetwork.

A worldwide network of computers. If you have access to the Internet, you can retrieve information from millions
of sources, including schools, governments, businesses, and individuals.

Internet address An address for a resource on the Internet that is used by Web browsers to locate Internet
resources. An Internet address typically starts with a protocol name, followed by the name of the organization that
maintains the site; the suffix identifies the kind of organization it is. For example, the address http://www.yale.edu/
provides the following information:

http: This Web server uses the Hypertext Transfer Protocol.

www: This site is on the World Wide Web.

edu: This is an educational institution.

Internet address is also called Uniform Resource Locator (URL).

Internet Information Services (IIS)

Software services that support Web site creation, configuration, and management, along with other Internet
functions

Internet Protocol (IP) A routable protocol in the TCP/IP protocol suite that is responsible for IP addressing,
routing, and the fragmentation and reassembly of IP packets.

Internet service provider (ISP) A company that provides individuals or companies access to the Internet and the
World Wide Web.

Interrupt A request for attention from the processor.

Intranet A network within an organization that uses Internet technologies and protocols, but is available only to
certain people, such as employees of a company. An intranet is also called a private network.

IP address A 32-bit address used to identify a node on an IP internetwork.

Itanium An Intel microprocessor that uses explicitly parallel instruction set computing and 64-bit memory
addressing.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 55 of 68

Job object A system-level structure that allows processes to be grouped together and managed as a single unit.

Journal queue For Message Queuing, a queue where journal messages are stored.

Junction point A physical location on a hard disk that points to data located at another location on your hard disk
or another storage device

Keyboard language The language you want to use when you type.

Keyboard layout The arrangement that accommodates the special characters and symbols used in different
languages.

Label Each part of a full DNS domain name that represents a node in the domain namespace tree.

Library A data-storage system, usually managed by Removable Storage.

Linked object An object that is inserted into a document but still exists in the source file.

Liquid crystal display (LCD) A type of display used in digital watches and many portable computers. LCD
displays utilize two sheets of polarizing material with a liquid crystal solution between them. An electric current
passed through the liquid causes the crystals to align so that light cannot pass through them. Each crystal, therefore,
is like a shutter, either allowing light to pass through or blocking the light.

Local area network (LAN) A communications network connecting a group of computers, printers, and other
devices located within a relatively limited area (for example, a building). A LAN allows any connected device to
interact with any other on the network.

Local computer The computer that you are currently logged on to as a user.

Local group For computers running Windows and member servers, a group that can be granted permissions and
rights from its own computer and (if the computer participates in a domain) user accounts and global groups both
from its own domain and from trusted domains.

Local printer A printer that is directly connected to one of the ports on your computer.

Local user A person who uses a computer that is not connected to a network. A local user is most likely someone
using a computer at home.

Local user profile A computer-based record about an authorized user that is created automatically on the computer
the first time a user logs on to a workstation or server computer.

Log file A file that stores messages generated by an application, service, or operating system.

Log on To begin using a network by providing a user name and password that identifies a user to the network.

Logical drive A volume that you create within an extended partition on a basic master boot record (MBR) disk.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 56 of 68

Logon right A user right that is assigned to a user and that specifies the ways in which a user can log on to a
system. An example of a logon right is the right to log on to a system remotely.

Logon script Files that can be assigned to user accounts.

Long name A folder name or file name longer than the 8.3 file name standard (up to eight characters followed by a
period and an extension of up to three characters) of the FAT file system. This version of Windows supports long
file names up to 255 characters.

Luminosity The brightness of a color based on a scale from black to white on your monitor.

Make Changes The Macintosh-style permission that gives users the right to make changes to a folder's contents;
for example, modifying, renaming, moving, creating, and deleting files. When AppleTalk network integration
translates access privileges into permissions, a user who has the Make Changes privilege is given Write and Delete
permissions.

Mandatory user profile A user profile that is not updated when the user logs off. It is downloaded to the user's
desktop each time the user logs on, and is created by an administrator and assigned to one or more users to create
consistent or job-specific user profiles.

Map To translate one value into another. In virtual memory systems, a computer might map a virtual address into a
physical address.

Master boot record (MBR) The first sector on a hard disk, which starts the process of booting the computer. The
MBR contains the partition table for the disk and a small amount of executable code called the master boot code.

Maximize To enlarge a window to its largest size by clicking the Maximize button (at the right of the title bar), or
by pressing ALT+SPACEBAR and then pressing X.

Media Any fixed or removable objects that store computer data. Examples include hard disks, floppy disks, tapes,
and compact discs.

Mediator For Process Control, a process used to preserve information when a service stops or starts.

Memory address A portion of computer memory that can be allocated to a device or used by a program or the
operating system.

Memory Usage In Task Manager, the current working set of a process, in kilobytes.

Message Authentication Code (MAC) An algorithm that ensures the quality of a block of data.

Metadata Data about data. For example, the title, subject, author, and size of a file constitute the file's metadata.

Metric A number used to indicate the cost of a route in the IP routing table that enables the selection of the best
route among possible multiple routes to the same destination.

Microsoft Management Console (MMC) A framework for hosting administrative tools, called consoles. A
console may contain tools, folders or other containers, World Wide Web pages, and other administrative items.

MIDI setup The setup that specifies the type of MIDI device you are using, the channel and patch settings needed
to play MIDI files and the port your device is using.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 57 of 68

Minimize To reduce a window to a button on the taskbar by clicking the Minimize button (at the right of the title
bar), or by pressing ALT+SPACEBAR and then pressing N.

Modem (modulator/demodulator) A device that allows computer information to be transmitted and received over
a telephone line.

Modem compression A technique used to reduce the number of characters transmitted without losing data content.

Mount To place a removable tape or disc into a drive.

Mounted drive A drive attached to an empty folder on an NTFS volume.

MouseKeys A keyboard feature that enables you to use the numeric keypad to move the mouse pointer and to
click, double-click, and drag.

MS-DOS (Microsoft Disk Operating System) An operating system used on all personal computers and
compatibles.

MS-DOS-based program A program that is designed to run with MS-DOS and therefore may not be able to take
full advantage of all Windows features.

Multicast Network traffic destined for a set of hosts that belong to a multicast group.

Multicasting The process of sending a message simultaneously to more than one destination on a network.

Multiple boots A computer configuration that runs two or more operating systems.

Musical Instrument Digital Interface (MIDI) A serial interface standard that allows for the connection of music
synthesizers, musical instruments, and computers.

My Documents A folder that provides you with a convenient place to store documents, graphics, or other files you
want to access quickly. When you save a file in a program such as WordPad or Paint, the file is automatically saved
in My Documents, unless you choose a different folder.

Name The identifier of your computer on the network.

Namespace A set of unique names for resources or items used in a shared computing environment.

Network A group of computers and other devices, such as printers and scanners, connected by a communications
link, enabling all the devices to interact with each other. Networks can be small or large, permanently connected
through wires or cables, or temporarily connected through phone lines or wireless transmissions. The largest
network is the Internet, which is a worldwide group of networks.

Network adapter A device that connects your computer to a network. This device is sometimes called an adapter
card or network interface card.

Network administrator A person responsible for planning, configuring, and managing the day-to-day operation of
the network. Network administrator is also called a system administrator.

Network card driver A device driver that works directly with the network card, acting as an intermediary between
the card and the protocol driver.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 58 of 68

Network Connections A component you can use to gain access to network resources and functionality, whether
you are physically at the network location or in a remote location

Network partition A state in which one or more of the nodes in a cluster cannot communicate with the other
cluster nodes.

Network place A folder on a Web server. You can view files and folders on Web servers just as you would view
files and folders on network servers.

Non-Plug and Play A device, such as a printer, modem, or game controller, that requires manual configuration of
hardware settings before it can be used.

Normal backup A backup that copies all selected files and marks each file as having been backed up (in other
words, the archive attribute is cleared).

Notification area The area on the taskbar to the right of the taskbar buttons. The notification area displays the time
and can also contain shortcuts that provide quick access to programs, such as Volume Control and Power Options.
Other shortcuts can appear temporarily, providing information about the status of activities. For example, the
printer shortcut icon appears after a document has been sent to the printer and disappears when printing is
complete.

NTFS file system An advanced file system that provides performance, security, reliability, and advanced features
that are not found in any version of FAT.

Offline A state that marks a component in a cluster as unavailable.

Online A state that marks a component in a cluster as available.

Owner In a Windows environment, the person who controls how permissions are set on objects and can grant
permissions to others.

Package An icon that represents embedded or linked information.

Page In virtual memory systems, a unit of data storage that is brought into random access memory (RAM),
typically from a hard drive, when a requested item of data is not already in RAM.

Paging file A hidden file on the hard disk that Windows uses to hold parts of programs and data files that do not fit
in memory.

Paper source The location (such as Upper Paper Tray or Envelope Feeder) of the paper at the printer.

Parallel port The input/output connector for a parallel interface device. Printers are generally plugged into a
parallel port.

Parity A calculated value that is used to reconstruct data after a failure.

Partition A portion of a physical disk that functions as though it were a physically separate disk.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 59 of 68

Password A security measure used to restrict logon names to user accounts and access to computer systems and
resources.

Pending A state that refers to a resource in a cluster when the resource is in the process of being brought online or
taken offline.

Peripheral A device, such as a disk drive, printer, modem, or joystick, that is connected to a computer and is
controlled by the computer's microprocessor.

Peripheral component interconnect (PCI) A specification introduced by Intel Corporation that defines a local
bus system that allows up to 10 PCI-compliant expansion cards to be installed in the computer.

Permission A rule associated with an object to regulate which users can gain access to the object and

Pixel Short for picture element, one spot in a rectilinear grid of thousands of such spots that form an image
produced on the screen by a computer or on paper by a printer. A pixel is the smallest element that display or print
hardware and software can manipulate to create letters, numbers, or graphics. A pixel is also called a pel.

Plaintext Data that is not encrypted. Sometimes also called cleartext.

Plotter Any device used to draw charts, diagrams, and other line-based graphics.

Plug and Play A set of specifications developed by Intel that allows a computer to automatically detect and
configure a device and install the appropriate device drivers.

POP3 (Post Office Protocol 3) A popular protocol used for receiving e-mail messages. This protocol is often used
by ISPs. POP3 servers allow access to a single Inbox in contrast to IMAP servers, which provide access to multiple
server-side folders.

Port A connection point on your computer where you can connect devices that pass data into and out of a
computer. For example, a printer is typically connected to a parallel port (also called an LPT port), and a modem is
typically connected to a serial port (also called a COM port).

Power scheme A group of preset power-management options. For example, you can set elapsed times for putting
your computer on standby and for turning off your monitor and hard disk. You save these settings as a named
power scheme.

Primary disk The hard disk drive that contains the system and boot partitions used to start Windows.

Primary master An authoritative DNS server for a zone that can be used as a point of update for the zone.

Primary mouse button The button you use most often for clicking and double-clicking

Primary partition A type of partition that you can create on basic disks.

Print job The source code that contains both the data to be printed and the commands for print.

Print processor The component that, working in conjunction with the printer driver, receives and alters print jobs,
as necessary, according to their data type to ensure that the jobs print correctly.

Print queue A print queue is a list of documents waiting to be printed on the printer. In the print queue, you can
see information such as the size of the document, which sent the document, and status information for printing.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 60 of 68

Print server A computer that is dedicated to managing the printers on a network. The print server can be any
computer on the network.

Print spooler Software that accepts a document sent to a printer and then stores it on disk or in memory until the
printer is ready for it.

Printer A device that puts text or images on paper or other print media. Examples are laser printers or dot-matrix
printers.

Printer driverA program designed to allow other programs to work with a particular printer without concerning
themselves with the specifics of the printer's hardware and internal language.

Printer fonts Fonts residing in or intended for a printer. A printer font, usually located in the printer's read-only
memory (ROM), can be internal, downloaded, or on a font cartridge.

Printer permissions Permissions that specify the type of access that a user or group has to a printer. The printer
permissions are Print, Manage Printers, and Manage Documents.

Printer window Also called the queue view, the Printer window shows information about any pending print jobs
for the printer.

Printers and Faxes The folder in Control Panel that contains the Add Printer Wizard and icons for all the printers
installed on your computer.

Printing pool Two or more identical printers that are connected to one print server and act as a single printer. In
this case, when you print a document, the print job will be sent to the first available printer in the pool.

Priority For Process Control, the relative ranking of a process or process group with respect to the use of CPU and
system resources.

Privilege A user's right to perform a specific task, usually one that affects an entire computer system rather than a
particular object.

Process The virtual address space and the control information necessary for the execution of a program.

Program A complete, self-contained set of computer instructions that you use to perform a specific task, such as
word processing, accounting, or data management. Program is also called application.

Program information file (PIF) A file that provides information to Windows about how best to run MS-DOS-
based programs.

Property A characteristic or parameter of a class of objects or devices. For example, properties of Microsoft Word
files include Size, Created, and Characters.

Property cache For Indexing Service, a file that stores values for document properties.

Property value A specific characteristic or parameter that defines a property. For example, property values of a
specific Microsoft Word document could include Size = 10,000 bytes, Created = Jan 2, 1999, and Characters =
5,250.

Protocol A set of rules and conventions for sending information over a network.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 61 of 68

Query For Indexing Service, a structured statement that specifies the documents you want to find. The simplest
query is a single word.

Queue A list of programs or tasks waiting for execution.

Queue type For Message Queuing, a globally unique identifier (GUID) specified by the application that created the
queue.

Quick Launch A customizable toolbar that lets you display the Windows desktop or start a program (for example,
Internet Explorer) with a single click.

Quiet answer A telephone-answering protocol in which incoming calls are answered with silence instead of a tone
signal.

Quota limit The amount of disk space available to a user.

Random access memory (RAM) Memory that can be read from or written to by a computer or other devices.
Information stored in RAM is lost when the computer is turned off.

Read-only memory (ROM) A semiconductor circuit that contains information that cannot be modified.

Recoverable message For Message Queuing, a message that can be recovered no matter which computer fails, but
that uses more resources and is slower than an express message.

Recovery agent A person who is issued a public key certificate for the purpose of recovering user data that is
encrypted with Encrypting File System (EFS).

Recovery Console A command-line interface that provides a limited set of administrative commands that are
useful for repairing a computer.

Recycle Bin The place in which Windows stores deleted files. You can retrieve files you deleted in error, or you
can empty the Recycle Bin to create more disk space.

Refresh To update displayed information with current data.

Refresh interval An interval of time used by secondary masters of a zone to determine how often to check if their
zone data needs to be refreshed.

Refresh rate The frequency with which the video screen is retraced to prevent the image from flickering. The
entire image area of most monitors is refreshed approximately 60 times per second.

Remote computer A computer that you can access only by using a communications line or a communications
device, such as a network card or a modem.

Removable Storage A service used for managing removable media (such as tapes and discs) and storage devices
(libraries). Removable Storage allows applications to access and share the same media resources.

Replica A folder within a replica set.


Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 62 of 68

Replica set One or more shared folders that participates in replication.

Replication The process of copying data from a data store or file system to multiple computers to synchronize the
data.

Resource Generally, any part of a computer system or network, such as a disk drive, printer, or memory that can be
allotted to a running program or a process.

Resource allocation The process of distributing a computer system's facilities to different components of a job in
order to perform the job.

Restore Point A representation of a stored state of your computer.

Right-click To position the mouse over an object, and then press and release the secondary (right) mouse button.
Right-clicking opens a shortcut menu that contains useful commands, which change depending on where you click.

Roaming user profile A server-based user profile that is downloaded to the local computer when a user logs on
and that is updated both locally and on the server when the user logs off.

ROM An acronym for Read-Only Memory, a semiconductor circuit into which code or data is permanently
installed by the manufacturing process. ROM contains instructions or data that can be read but not modified.

Root The highest or uppermost level in a hierarchically organized set of information.

Routing The process of forwarding a packet through an internetwork from a source host to a destination host.

Saturation In color management, the purity of a color's hue, moving from gray to the pure color.

Scalability A measure of how well a computer, service, or application can grow to meet increasing performance
demands.

Scan interval For Process Control, the time between successive checks for new processes started on the server.
You can configure this in the Process Control snap-in.

Scrap A file that is created when you drag part of a document to the desktop.

Screen fonts A typeface designed for display on a computer monitor screen.

Screen resolution The setting that determines the amount of information that appears on your screen, measured in
pixels. Low resolution, such as 640 x 480, makes items on the screen appear large, although the screen area is
small. High resolution, such as 1024 x 768, makes the overall screen area large, although individual items appear
small.

Screen saver A moving picture or pattern that appears on your screen when you have not used the mouse or
keyboard for a specified period of time.

Script A type of program consisting of a set of instructions to an application or tool program

Secondary mouse button The button that you use to display shortcut menus or other program-specific features.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 63 of 68

Security On a network, protection of a computer system and its data from harm or loss, implemented especially so
that only authorized users can gain access to shared files.

Select To specify a block of data or text on screen by highlighting it or otherwise marking it, with the intent of
performing some operation on it.

Serial port An interface on the computer that allows asynchronous transmission of data characters one bit at a
time. Also called a communication or COM port.

SerialKey device Enables you to attach an alternate input device (also called an augmentative communication
device) to your computer's serial port. This feature is designed for people who are unable to use the computer's
standard keyboard and mouse.

Server In general, a computer that provides shared resources to network users.

Service A program, routine, or process that performs a specific system function to support other programs,
particularly at a low (close to the hardware) level

Session A logical connection created between two hosts to exchange data. Typically, sessions use sequencing and
acknowledgments to send data reliably.

Set Applies any changes you have made without closing the dialog box.

Share To make resources, such as folders and printers, available to others.

Share name A name that refers to a shared resource on a server.

Shared folder A folder on another computer that has been made available for other people to use on the network.

Shared folder permissions Permissions that restrict a shared resource's availability over the network to only
certain users.

Shared printer A printer that receives input from more than one computer. For example, a printer attached to
another computer on the network can be shared so that it is available for you to use. Shared printer is also called a
network printer.

Shared resource Any device, data, or program that is used by more than one other device or program.

Shortcut A link to any item accessible on your computer or on a network, such as a program, file, folder, disk
drive, Web page, printer, or another computer. You can put shortcuts in various areas, such as on the desktop, on
the Start menu, or in specific folders.

Show Sounds A feature that instructs programs that usually convey information only by sound to also provide all
information visually, such as by displaying text captions or informative icons.

Simple Mail Transfer Protocol (SMTP) A member of the TCP/IP suite of protocols that governs the exchange of
electronic mail between message transfer agents.

Smart card A credit card-sized device that is used with an access code to enable certificate-based authentication
and single sign-on to the enterprise.

Smart card reader A device that is installed in computers to enable the use of smart cards for enhanced security
features.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 64 of 68

Snap-in A type of tool you can add to a console supported by Microsoft Management Console (MMC).

Socket An identifier for a particular service on a particular node on a network.

Software decoder A type of digital video disc (DVD) decoder that allows a DVD drive to display movies on your
computer screen. A software decoder uses only software to display movies.

Sound card Accessory expansion board for personal computers that permits recording and playing back sound.

Sound file A sound file contains information that Windows uses to play sounds on your computer. Sound files
have the file name extension .wav.

Sound Sentry A Windows feature that produces a visual cue, such as a screen flash or a blinking title bar,
whenever the computer plays a system sound.

Source document The document where a linked or embedded object was originally created.

Speech recognition The ability to interpret spoken words and convert them into computer-readable text. Speech
recognition programs allow you to enter text by speaking into a microphone, rather than using a keyboard.

Splitting A Briefcase command that separates the copy of the file inside Briefcase from the copy outside Briefcase.

Spooling A process on a server in which print documents are stored on a disk until a printer is ready to process
them. A spooler accepts each document from each client, stores it, then sends it to a printer when the printer is
ready.

Standby A state in which your computer consumes less power when it is idle, but remains available for immediate
use. While your computer is on standby, information in computer memory is not saved on your hard disk. If there is
an interruption in power, the information in memory is lost.

Startup environment In dual-boot or multiple-boot systems, the configuration settings that specify which system
to start and how each system should be started.

Static dialog box A scripted dialog box between the client computer and an intermediary device. This kind of
dialog box requires no response from the user.

Status bar A line of information related to the current program. The status bar is usually located at the bottom of a
window. Not all windows have a status bar.

Sticky Keys A keyboard feature that enables you to press a modifier key (CTRL, ALT, or SHIFT), or the Windows
logo key, and have it remain active until a non-modifier key is pressed. This is useful for people who have
difficulty pressing two keys simultaneously.

Stop error A serious error that affects the operating system and that could place data at risk.

String A group of characters or character bytes handled as a single entity.

Subkey A key within a key. In the registry structure, subkeys are subordinate to subtrees and keys. Keys and
subkeys are similar to the section header in .ini files; however, subkeys can carry out functions.

Synchronize To reconcile the differences between files stored on one computer and versions of the same files on
another computer. Once the differences are determined, both sets of files are updated.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 65 of 68

System area network A network configuration, usually on a separate Internet Protocol (IP) subnet, that gives data
a direct path to system hardware.

System disk A disk that contains the MS-DOS system files necessary to start MS-DOS.

System files Files used by Windows to load, configure, and run the operating system. Generally, system files must
never be deleted or moved.

System menu A menu that contains commands you can use to manipulate a window or close a program. You click
the program icon at the left of the title bar to open the System menu.

System partition The partition that contains the hardware-specific files needed to load Windows (for example,
Ntldr, Osloader, Boot.ini, Ntdetect.com).

System Restore A tool that tracks changes to your computer and creates a restore point when it detects the
beginning of a change.

Tag For Indexing Service, one or more terms that identifies an element in a query, such as weight, phrase, property,
or regular expression. For example, the tag {prop name=created} specifies the Created property in a query.

Target The mapping destination of a DFS root or link, which corresponds to a physical folder that has been shared
on the network.

Task Manager A utility that provides information about programs and processes running on the computer.

Taskbar The bar that contains the Start button and appears by default at the bottom of the desktop. You can click
the taskbar buttons to switch between programs. You can also hide the taskbar, move it to the sides or top of the
desktop, and customize it in other ways.

Taskbar button A button that appears on the taskbar and corresponds to a running application.

Terminal A device consisting of a display screen and a keyboard that is used to communicate with a computer.

Text box In a dialog box, a box in which you type information needed to carry out a command. The text box may
be blank or may contain text when the dialog box opens.

Theme A set of visual elements that provide a unified look for your computer desktop. A theme determines the
look of the various graphic elements of your desktop, such as the windows, icons, fonts, colors, and the background
and screen saver pictures. It can also define sounds associated with events such as opening or closing a program.

Thumbnail A miniature version of an image that is often used for quick browsing through multiple images.

Title bar The horizontal bar at the top of a window that contains the name of the window.

ToggleKeys A feature that sets your keyboard to beep when one of the locking keys (CAPS LOCK, NUM LOCK,
or SCROLL LOCK) is turned on or off.

Token Any nonreducible textual element in data that is being parsed.

Toolbar In a program in a graphical user interface, a row, column, or block of on-screen buttons or icons.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 66 of 68

Topology In Windows, the relationships among a set of network components.

Training The process of teaching the speech recognition engine to recognize your voice and manner of speaking.

Transaction For Message Queuing, the pairing of two or more actions that are performed together as a single
action; the action succeeds or fails as a whole.

Transmission Control Protocol/Internet Protocol (TCP/IP) A set of networking protocols widely used on the
Internet that provides communications across interconnected networks of computers with diverse hardware
architectures and various operating systems.

Tree view A hierarchical representation of the folders, files, disk drives, and other resources connected to a
computer or network. For example, Windows Explorer uses a tree view to display the resources that are attached to
a computer or a network.

Trojan horse A program that masquerades as another common program in an attempt to receive information. An
example of a Trojan horse is a program that behaves like a system logon to retrieve user names and password
information that the writers of the Trojan horse can later use to break into the system.

Unallocated space Available disk space that is not allocated to any volume.

Undock To detach a laptop or other portable computer from a docking station.

Unicast In data communications networks, to transmit data from one terminal to another, such as from client to
server or from server to server.

Uninstall When referring to software, the act of removing program files and folders from your hard disk and
removing related data from your registry so the software is no longer available.

Uninterruptible power supply (UPS) A device connected between a computer and a power source to ensure that
electrical flow is not interrupted

Universal serial bus (USB) An external bus that supports Plug and Play installation. Using USB, you can connect
and disconnect devices without shutting down or restarting your computer.

UNIX A powerful, multiuser, multitasking operating system initially developed at AT&T Bell Laboratories in 1969
for use on minicomputers.

UPS service A service that manages an uninterruptible power supply (UPS) connected to a computer.

USB port An interface on the computer that enables you to connect a Universal Serial Bus (USB) device.

User A person who uses a computer. If the computer is connected to a network, a user can access the programs and
files on the computer, as well as programs and files located on the network (depending on account restrictions
determined by the network administrator).

User account A record that consists of all the information that defines a user to Windows

User name A unique name identifying a user account to Windows.

User password The password stored in each user's account.


Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 67 of 68

User profile A file that contains configuration information for a specific user, such as desktop settings, persistent
network connections, and application settings

User rights Tasks that a user is permitted to perform on a computer system or domain.

Users A special group that contains all users who have user permissions on the server.

Variable In programming, a named storage location capable of containing a certain type of data that can be
modified during program execution.

Video adapter An expansion board that plugs into a personal computer to give it display capabilities.

Virtual memory Temporary storage used by a computer to run programs that need more memory than it has.

Virus A program that attempts to spread from computer to computer and either cause damage (by erasing or
corrupting data) or annoy users (by printing messages or altering what is displayed on the screen).

Web server A computer that is maintained by a system administrator or Internet service provider (ISP) and that
responds to requests from a user's browser.

Well-connected Sufficient connectivity to make your network and Active Directory useful to clients on your
network. The precise meaning of well-connected is determined by your particular needs.

Wide area network (WAN) A communications network connecting geographically separated computers, printers,
and other devices.

Wildcard character A keyboard character that can be used to represent one or many characters when conducting a
query. The question mark (?) represents a single character, and the asterisk (*) represents one or more characters.

Window A portion of the screen where programs and processes can be run. You can open several windows at the
same time. For example, you can open your e-mail in one window, work on a budget in a spreadsheet in another,
download pictures from your digital camera in another window, and order your weekly groceries on the Web in
another window. Windows can be closed, resized, moved, minimized to a button on the taskbar, or maximized to
take up the whole screen.

Wi-Fi, An abbreviation for wireless fidelity is a wireless communication technology that can provide connections
between portable computers and wired connections to the Internet. To connect users with the Internet, Wi-Fi
devices use low-power transmitters and receivers equipped with special computer chips containing radio modems.
The chips can be installed in laptop computers, personal digital assistants (PDAs), and cellular telephones.

Workgroup A simple grouping of computers intended only to help users find such things as printers and shared
folders within that group.

Working set For a process, the amount of physical memory assigned to a process by the operating system.
Matrisoft ICT Series for SHS & Other ICT Users Compiled by: Moses Amgortey Tetteh Page 68 of 68

World Wide Web A system for exploring the Internet by using hyperlinks. When you use a Web browser, the
Web appears as a collection of text, pictures, sounds, and digital movies.

Writable CD Recordable compact disc (CD-R) or rewritable compact disc (CD-RW). Data can be copied to the
CD on more than one occasion. Rewritable compact discs can also be erased.

There are no glossary terms that begin with this letter.

There are no glossary terms that begin with this letter.

Zone list In the Macintosh environment, a list that includes all of the zones associated with a particular network.
Zone list is not to be confused with Windows DNS zones.

Zone transfer The synchronization of authoritative DNS data between DNS servers. A DNS server configured
with a secondary zone periodically queries the master DNS servers to synchronize its zone data.

You might also like