This action might not be possible to undo. Are you sure you want to continue?
Concepts of IT
Windows Vista / Microsoft Office 2007 – Syllabus Five
ECDL Module 1 – Page 2
HARDWARE CONCEPTS Hardware. What is a personal computer? Apple computers Laptop & palmtop computers Features of handheld portable digital devices Personal Digital Assistant (PDA) Mobile Phones (cell Phones) Media players Smartphones Parts of a computer The CPU Memory (RAM) ROM-BIOS Disks The Hard (Fixed) Disk INPUT/OUTPUT PORTS Universal Serial Bus (USB) Port Serial Port Parallel Port Network Port FireWire Port COMPUTER PERFORMANCE Factors affecting computer performance CPU Clock speed RAM size Hard disk speed and storage Free hard disk space De-fragmenting files Multitasking considerations CPU speeds MEMORY AND STORAGE What is computer memory? RAM ROM ROM-BIOS Video (graphics) memory Measurement of storage capacity Types of storage media Internal hard disks External hard disks CDs DVDs Recordable CD & DVD drives USB flash drives (memory sticks) Memory cards Network drives and on-line file storage Floppy disks (diskettes) INPUT DEVICES Input devices Keyboard Mouse Scanners Tracker balls Touch pads Joysticks Web cams 6 6 6 6 6 7 7 7 8 8 8 9 9 9 10 10 10 10 11 11 11 11 11 11 11 12 12 12 12 12 12 13 13 13 13 13 13 14 14 14 15 15 15 15 15 16 16 16 16 16 16 17 17 17 17 17 18 18
Kullegg San Gorg Preca – Liceo Subien
ECDL Module 1 – Page 3
Digital Cameras Microphones OUTPUT DEVICES Output devices Traditional computer monitor Flat screen computer monitor Flat screen computer screens Projection devices Speakers and headphones Speech synthesizers Printers Different types of printers Laser printers Colour laser printers Inkjet printers Dot Matrix printers INPUT AND OUTPUT DEVICES Some devices are both input and output devices SOFTWARE CONCEPTS What is software? What is an operating system? Examples of software applications Word processing applications Spreadsheets applications Database applications Presentation applications E-mailing applications Web browsing applications Photo editing applications Computer games Difference between the operating system and application programs Accessibility options Voice recognition software Screen reader software Screen magnifier software On-screen keyboard NETWORKS NETWORK TYPES LAN (Local Area Network) WLAN (Wireless Local Area Network) WAN (Wide Area Network) Client/server networks Internet World Wide Web (WWW) vs. the Internet Intranets Extranets DATA TRANSFER Downloading from & uploading to a network Data transfer rate measurement Broadband vs. dial-up Internet connection services Internet connection options Features of a broadband Internet connection ICT IN EVERYDAY LIFE 18 18 18 19 19 19 19 19 20 20 20 20 20 21 21 21 21 21 22 22 22 22 23 23 23 23 24 24 24 24 24 25 25 25 25 26 27 28 28 28 28 28 28 28 29 29 29 29 30 30 30 30 30 32
Kullegg San Gorg Preca – Liceo Subien
ECDL Module 1 – Page 4
ELECTRONIC WORLD What does ‘Information and Communication Technology’ (ICT) mean? Internet services for consumers E-commerce Advantages of e-commerce Disadvantages of e-commerce E-banking E-government E-learning Uses of computer applications in education Tele-working Some of the advantages of tele-working Some of the disadvantages of tele-working COMMUNICATION Electronic mail (e-mail) Instant messaging (IM) Voice over Internet Protocol (VoIP) Really Simple Syndication (RSS) feeds Blogging (web logs) Podcasts VIRTUAL COMMUNITIES Online (virtual) communities Social networking websites Internet forums (message boards / discussion boards) Chat rooms Online computer games Publishing and sharing content online Sharing photos, video and audio clips Precautions when accessing online communities HEALTH What is ergonomics? Repetitive Strain Injury (RSI) Lighting issues when using a computer Screen and keyboard positioning Seating issues when using a computer Wellbeing when using a computer Make sure that cables are safely secured Make sure that power points are not overloaded ENVIRONMENT Computer recycling options Computer energy saving options SECURITY IDENTITY/AUTHENTICATION Computer logon user name (ID) and password Password policies DATA SECURITY Off-site backups Why do you need to back your computer? Organising your computer for more efficient backups Complete vs. incremental backups What is a firewall? Data theft issues VIRUSES Computer viruses Computer viruses infection issues 32 32 32 32 32 33 34 34 34 34 35 35 36 36 37 37 37 37 37 38 38 38 38 38 38 39 39 39 39 40 40 40 40 40 41 41 41 41 41 42 42 43 43 43 43 43 43 44 44 44 44 44 45 45 45
Kullegg San Gorg Preca – Liceo Subien
ECDL Module 1 – Page 5
Protecting against computer virus infection What to do if you discover a virus on your computer The limitations of anti virus software LEGAL ISSUES COPYRIGHT What is copyright? Copyright Issues when copying files SITE LICENSES Site licences are used by larger organisations Checking software licence status What is an ‘end-user license agreement’ within Office 2007 software Types of licence agreement What is shareware? What is freeware? Open source software DATA PROTECTION Data Protection and Privacy Issues Data Protection Legislation Data protection legislation relating to those that keeps data (data collectors) Data protection legislation relating to individuals about which data is stored (data subjects) ABBREVIATIONS & TERMINOLOGY 45 45 46 47 47 47 47 48 48 49 49 49 49 49 50 50 50 50 51 51 52
refers to a video clip that can be found in the folder named clips
Kullegg San Gorg Preca – Liceo Subien
In fact just about everyone needs to know how to operate a PC these days. All PCs released since then are in many ways compatible with the original design. large and small office users. though many extensions have been made. In the early days the thing which really distinguished the Mac over the PC was the GUI (Graphical User Interface). What is a PC? • IBM invented the PC (Personal Computer) way back in 1981. What is a Mac? • Hint The Apple Mac is a computer. most PCs ran an operating system called DOS (Disk Operating System). Education. and requires special versions of application programs (such as word-processors or spreadsheets). Even the hardware add-ons have to be customised to some extent to be able to be connected to a Mac. Normally measured in GHz. mouse. Doctors. Costs: Getting cheaper by the day.ECDL Module 1 – Page 6 Hardwareaaaaaaaaaaaaaaaaaaaabbbbbibaa Concepts Hint Hardware • The term hardware refers to the physical components of your computer such as the system unit. keyboard. It uses a different operating system. monitor etc. The term PC compatible relates to PCs manufactured by companies other than IBM which are compatible with the traditional PC specification. In the early days. Typical Users: Home users. but NOT a PC. Capacity: Large hard disks combined with a large working memory (RAM) Speed: Fast. or in plain Kullegg San Gorg Preca – Liceo Subien . These days most PCs will be running a version of Microsoft Windows such as Microsoft Vista.
Multimedia players Personal Digital Assistant (PDA) • • • These devices use a special pen. Often speed specifications are less than for a PC of equivalent price. Cost: Components need to be much more compact. While they tend to still be more expensive than an equivalent Desktop computer.ECDL Module 1 – Page 7 English the way you could use the mouse to drive the computer. you really had to be a bit of an expert to use and maintain your PC.Smartphones . so there is a price overhead when compared to a PC of equivalent power.Mobile (Cell) phones . A newer term. rather than a keyboard and can be used for storing and retrieving information. In the early days of the PC. Kullegg San Gorg Preca – Liceo Subien . These are especially popular with salespersons on the move or people giving presentations. Typical Users: Business users. people on the move. Features of handheld portable digital devices • A range of small portable digital devices are now available including: . PDAs have many built-in features such as a calculator. which allows for longer battery life as well as portability. Recently the differences between the PC and the Mac have blurred. educational users. rather than the traditional bulky VDUs (Visual Display Units). as the name implies. they can now match the power of a Desktop computer. What are laptop & palmtop computers? • Laptop computers. Speed: Fast. Palmtops are even smaller computers which can literally fit into the palm of your hand. They are extremely compact. are small portable computers which can run on batteries as well as mains power. Capacity: Large hard disks combined with a large memory (RAM) – Often less powerful than for a PC of equivalent price. simply indicates a VERY small laptop. many can connect to the Internet. a clock and a calendar Many allow you to to send and receive emails and even browse the web. “Notebooks”. with Microsoft buying a stake in Apple. Like most computer devices. They use special screens. Normally measured in GHz.Personal digital assistants (PDAs) .
or Wireless Wide-Area Networks (WWANs). Mobile Phone • An electronic telecommunications device.ECDL Module 1 – Page 8 • PDAs can also be used for accessing the internet. all of which are different types of media. and newer phones may also provide Internet services such as Web browsing and e-mail. Multimedia presentations. typewriting and word processing. coverage may include the entire Earth. Costs: In relative terms expensive when compared to a PC. video recording. for example. Speed: Much less than a PC unless you pay a lot extra. web browsers. Newer PDA salsa have both colour screens and audio capabilities. Mobile phones connect to a wireless communications network through radio wave or satellite transmissions. satellite phone. A satellite telephone. or extranets via Wi-Fi. making and writing on spreadsheets. or only specific regions. Depending on the architecture of a particular system. sending and receiving e-mails. or satphone is a type of mobile phone that connects to orbiting satellites instead of terrestrial cell sites. Multimedia Message Service (MMS). Smart phones Kullegg San Gorg Preca – Liceo Subien . pictures. and Global Positioning System (GPS). Many PDAs employ touch screen technology. combine sound. Short Message Service (SMS). • Media players • The form and technology used to communicate information. Most mobile phones provide voice communications. often referred to as a cellular phone or cellphone. playing computer games. scanning bar codes. recording survey responses. Capacity: Much smaller storage capacity compared to a PC. use as an address book. Typical Users: Mostly business users. and videos. enabling them to be used as mobile phones (smartphones).
it is a miniature computer that has phone capability.ECDL Module 1 – Page 9 • A smartphone is a mobile phone offering advanced capabilities. Memory (RAM) • The RAM (Random Access Memory) within your computer is where the operating system is loaded to when you switch on your computer and Kullegg San Gorg Preca – Liceo Subien .The hard disk . a 2 GHz Pentium is much faster than say a 1 GHz Pentium CPU. Parts of a computer • Hint You should understand some of the basic elements that make up a computer including: . a smartphone is a phone that runs complete operating system software providing a standardized interface and platform for application developers. Arithmetic logic unit (ALU): The ALU performs the arithmetic and logical operations. calling on the ALU when necessary. The control unit (CU): The control unit extracts instructions from memory and decodes and executes them. when running programs such as word-processors.Types of memory . For some.Central processing unit (CPU) . spreadsheets and databases. Internet and e-book reader capabilities. For others. It determines how fast your computer will run and is measured by its MHz or GHz speed. Thus.Input and output devices The CPU • The CPU (Central Processing Unit) is normally an Intel Pentium (or equivalent) and it is one of the most important components within your computer. often with PC-like functionality (PC-mobile handset convergence). Bus: The computer bus transports data between the memory and registers. Registers: The registers are memory storage areas within the CPU that hold the data that is working on by the ALU. and/or a built-in full keyboard or external USB keyboard and VGA connector. a smartphone is simply a phone with advanced features like e-mail. It is the CPU which performs all the calculations within the computer. There is no industry standard definition of a smartphone. In other words.
Basic Input Output System) chip is a special chip held on your computer's system (mother) board. for instance it is responsible for copying your operating system into RAM when you switch on your computer. network and FireWire ports. your application programs (i. Disks • You use disks to store any data that you create. scanners and cameras. your word processor.g. It contains software which is required to make your computer work with your operating system. such as printers. These include ports such as USB. games etc) and your data. Kullegg San Gorg Preca – Liceo Subien . As a rule of thumb. these are initially created and held in RAM and then copied to disk when you save the data. serial. Hard (Fixed) Disk • Hard disks are the main. Hard disks are used to store your operating system. letters and pictures). The picture shows the inside of a hard disk (which you would not normally see). There are many different types of disk. Input/output Ports • The Input and Output ports are normally located at the back or on the side of your computer. such as a word processor or database program. (e. When you create data. the more RAM you have installed in your computer the better. large data storage area within your computer. This can range from a memo created within a word processor to a video file created using a video camera. They are much faster than CD/DVDs and can also hold much more data.ECDL Module 1 – Page 10 also where your applications are copied to when you start an application. Hard disks are installed within the system unit of your computer.e. These days you will commonly find over 2 Gigabytes of RAM installed. ROM-BIOS • The ROM-BIOS (Read Only Memory . parallel. You plug cables into these ports to connect your computer to other devices.
in which only 1 bit is transmitted at a time. Note: The parallel port used to be the main way the computer connected to a printer. RAM size. Firewire Port • A very fast external bus standard that supports data transfer rates of up to 400Mbps (in 1394a) and 800Mbps (in 1394b). These days you are more likely to use a USB cable to connect the computer to a printer. and keyboards. types of graphics card processor and memory plus the number of applications running. A single USB port can be used to connect up to 127 peripheral devices. Serial Port • A port. such as mice. that can be used for serial communication. which then lets you communicate with other computers connected to your local network or to other computers via the Internet. Parallel Port • A parallel interface for connecting an external device such as a printer. It is important to realise that it is not just the speed of the CPU that effect Kullegg San Gorg Preca – Liceo Subien . Most personal computers have both a parallel port and at least one serial port. Network Port • The network port allows you to plug a ‘network cable’ into your computer. modems. or interface. USB also supports Plug-and-Play installation and hot plugging. These include CPU speed.ECDL Module 1 – Page 11 Universal Serial Bus (USB) Port • Universal Serial Bus. Computer Performance Factors affecting computer performance • There are a wide range of factors that can affect the performance of your computer. an external bus standard that supports data transfer rates of 12 Mbps.
A file with noncontiguous clusters is fragmented. the file cannot be written in contiguous clusters. a task being a program. To some extent this slowing Kullegg San Gorg Preca – Liceo Subien . There is no point in having a very fast CPU if the other parts of a computer may slow down the real world performance. Multitasking considerations • The ability to execute more than one task at the same time. because of the time it takes to move the read/write head of a hard drive. The disk storage capacity is measured in Gigabytes (GBytes). RAM size • As a rule the more memory you have the faster the PC will appear to operate. if you have very little free hard disk space you may find that Microsoft Windows will not be able to run your programs at all. 1 GByte is equivalent to 1024 Mbytes. defined by the disk access time. The higher the MHz speed the faster the computer. The clock speed is given in megahertz (MHz).ECDL Module 1 – Page 12 the overall performance of your computer. The higher the clock speed the faster the computer will work for you. you not only need a fast hard disk but also a large hard disk with plenty of “spare space”. The further apart on a disk the noncontiguous clusters are. In fact. the process of moving file clusters on a disk to make them contiguous. However the more programs which are running at the same time. so logically the faster the hard disk can operate then again the faster the PC will appear to run. Windows also uses the hard disk a lot. To optimize files for fast access. Microsoft Windows will create many so-called “Temporary files” which it uses for managing your programs. The data storage capacity of hard disks continues to increase as new products are released. that is. the worse the issue. De-fragmenting files • When a file is written to a disk. Hard disk speed and storage • Hard disks are also measured by their speed. • Defragmentation is the process of moving portions of files around on a disk to defragment files. Free hard disk space • To get the most out of your Windows based PC. which is measured in milliseconds. This is due to the (Random Access Memory). the slower each one will run. CPU Clock speed • The computer clock speed governs how fast the CPU will run. Noncontiguous clusters slow down the process of reading and writing a file. The smaller this access time the faster the hard disk will store or retrieve data. a volume can be defragmented.
which contains read-only software. Often network cards and video cards also contain ROM chips. The higher the value the faster the CPU will operate. while data which is being processed is stored in RAM (Random Access Memory). so that 1 GHz = 1000 MHz. Editing a large high definition video for instance can take up a lot of CPU time. As a rough rule. it is copied into RAM. A good example is the ROM-BIOS chip.e. This software performs a variety of tasks. they are talking about RAM. CPU speeds • The speed (operating frequency) of the CPU is measured in megahertz (MHz) or gigahertz (GHz). What is ROM? • Hint Read Only Memory (ROM) as the name suggests is a special type of memory chip which holds software which can be read but not written to. whereas a modern computer can effectively house as much RAM as you can afford to buy. The original IBM PC released way back in 1981 ran at 4. a Microsoft Windows based computer will operate faster if you install more RAM. • 1 MHz means that the device will run at one million cycles per second. Normally when people talk about memory in relation to a PC. which contains software. What is the ROM-BIOS? • The 'Read Only Memory Basic Input Output System' chip is a chip located on the computer's system (mother) board. When adverts refer to a computer having 128 Mbytes of memory. 1GHz is a thousand times faster. Data which is stored on a hard disk can be permanent. which gives you an idea of how far things have progressed. Data and programs stored in RAM are volatile (i. What is RAM? • Random Access Memory (RAM) is the main 'working' memory used by the computer. Commonly modern computers are supplied with over 2 GB of RAM. The original IBM PC could only use up to 640 KB of memory (just over half a megabyte).ECDL Module 1 – Page 13 effect depends on what each program is doing.77 MHz whereas modern PCs can run at over 4000MHz. while data in RAM is only temporary. Memory and Storage What is computer memory? • You can store data on your hard disk. the information is lost when you switch off the computer). When you first switch on the computer the ROM-BIOS software performs a selfKullegg San Gorg Preca – Liceo Subien . it is this RAM which they are talking about. When the operating system loads from disk when you first switch on the computer.
Humans work in tens (because we have 10 fingers).000 bytes. Some are more suitable than others for a particular job. external hard disks.000. they process data in ones or zeros. Often hardware is specified as a 32-bit computer. approximately 1.000. Kullegg San Gorg Preca – Liceo Subien . Bit: All computers work on a binary numbering system.000. Kilobyte: A kilobyte (KB) consists of 1024 bytes.000 bytes. memory cards. which means that the hardware can process 32 bits at a time. Software is also described as 16 bit. To use the jargon humans work in base 10. for instance a flash drive is great for quickly transferring relative small amounts of data from one computer to another. DVDs. network drives and on-line file storage. these chips are usually located on the video card. Types of storage media • These days area range of storage media to choose from including CDs. 32 bit or 64 bit software. What is video (graphics) memory? • The picture which you see on your screen is a form of data and this data has to be stored somewhere. internal hard disk. When we talk about computer storage. A modern computer will be supplied with several Megabytes of video memory.e. Byte: A byte consists of eight bits. A digital computer uses the numbers 0 and 1 (or on and off if you prefer). This 1 or 0 level of storage is called a bit. Measurement of storage capacity It is important to understand the following terminology: Basic Units of Data Storage: It is important to realise that the term digital computer refers to the fact that ultimately the computer works in what is called binary.000 bytes. USB flash drives.000. Gigabyte: A gigabyte (GB) consists of 1024 megabytes.ECDL Module 1 – Page 14 diagnostic to check that the computer is working OK. This software then loads your operating system from the disk into the RAM. approximately 1. Terabyte: A terabyte (TB) consists of approximately 1. Megabyte: A megabyte (MB) consists of 1024 kilobytes.000. i.000. either the amount of memory (RAM) or the hard disk capacity we are talking about numbers which are multiples of 0 or 1. The on-screen pictures are held in special memory chips called video memory chips.
Modern entries into the market consist of standard SATA. called CD-R (Compact Disc – Recordable). while a single-layer. Similar to CD-ROM drives but allows you to use DVD disks. allowing you to watch movies on your computer screen. DVD Drives • Short for "Digital Versatile Disk”. Recordable CD &DVD Drives • CD-ROMs are read-only devices. The advantage of a CDROM is that it can hold a vast amount of data (equivalent to the storage capacity of over 450 floppy disks). A CD-ROM can store 650 MB of data.ECDL Module 1 – Page 15 Internal Hard Disk • Hard disks are the main. This means that you can own a range of different CD-ROMs and choose which one to insert into your CD-ROM drive. eSATA client interfaces to connect to the host computer. but increasingly people are purchasing a special type of CD drive unit which allows you to record data. The picture shows the inside of a hard disk (which you would not normally see).7 GB of data. These also transfer the data from the disk to the computer far faster. CD-ROM discs look exactly like music CDs but contain computer data instead of music. USB. single-sided DVD can store 4.e. Kullegg San Gorg Preca – Liceo Subien . External Hard Disk • An external hard disk drive is a type of hard disk drive which is externally connected to a computer. They are much faster than CD-ROMs and can also hold much more data. music or video to your own CDs. These devices require the purchase of special CDs to which you can write. Hard disks are used to store your operating system. your application programs (i. or SCSI hard drives in portable disk enclosures with SCSI. which contain vastly more information than a traditional CD-ROM disk. IDE. games etc) and your data. Hard disks are installed within the system unit of your computer. The other big advantage of CDROMs is that they are interchangeable. CDs • Most computers are now supplied with a CD-ROM (Compact Disc Read Only Memory) drive.5 GB. A double-sided DVD increases the storage capacity to 17 GB (or over 25 times the data storage capacity of a CD-ROM). your word processor. large data storage area within your computer. The two-layer DVD standard allows a capacity of 8. IEEE 1394 Firewire.
Memory cards • Memory cards are a popular storage medium for many of today's consumer electronics devices. This means that your data is safely backed up for you. However.44 Mbytes). Flash memory is nonvolatile. • Floppy disks (diskettes) • Floppy disks are also known as diskettes. Kullegg San Gorg Preca – Liceo Subien . on a network server. In many companies network software automatically backs up selected folder or each computer to the central server. that is the memory card will not lose its data when removed from the device.e. Alternatively you may create and store your data on your own PC or laptop and periodically copy it across the network to be stored safely on a central network server. Network drives and on-line file storage • Within an office it is normal that the computers are connected together via a network. copy) important data from their hard disk to floppy disks. USB flash drives are touted as being easy-to-use as they are small enough to be carried in a pocket and can plug into any computer with a USB drive. as diskettes are notoriously unreliable this is not the best way of backing up valuable data (but is better than nothing). They are very slow compared to hard disks or CD-ROMs. This network server should be backed up by the IT support staff on a daily basis. including digital cameras. portable flash memory card that plugs into a computer’s USB port and functions as a portable hard drive. USB flash drives have less storage capacity than an external hard drive. handheld devices and other small electronic devices. Sometimes people will backup (i.ECDL Module 1 – Page 16 USB flash drives (memory sticks) • A small. but they are smaller and more durable because they do not contain any internal moving parts. Input Devices Input devices. This allows you to store your data centrally. and hold relatively small amounts of data (1. • Input devices allow you to input information into the computer and include things such as the keyboard and mouse. cellphones. and the cards can also be erased or reformatted and reused.
ECDL Module 1 – Page 17 The Keyboard • The keyboard is still the commonest way of entering information into a computer. You can scan pictures and then manipulate these inside the PC using a graphics application of your choice. Kullegg San Gorg Preca – Liceo Subien . They may take a while to get used to if you are used to the traditional mouse. actual text which can be manipulated and edited as text within your word-processor. you can scan printed text and convert this not just to a picture of the text but also to. There are a number of different types. the operating system (DOS) would normally be controlled via the keyboard. generically called OCR (Optical Character Recognition) programs which are specifically designed for converting printed text into editable text within your applications. The Mouse • The mouse came into common use on a PC with the introduction of the Microsoft Windows operating system. There are many different types of mice. Scanners • A scanner allows you to scan printed material and convert it into a file format which may be used within the PC. Used in conjunction with a special pen they can be used by graphic artists wishing to create original. including those specially designed for use with Microsoft Windows. The quality of the keyboard is often overlooked when buying a PC. These days it is vital to be a competent mouse user. a commonly used model now has a small wheel on it which when combined with the correct software allows additional functionality and fine control over the use of your applications. There are a number of specialist programs. In addition. digital artwork. it should be robust and easy to use. Tracker Balls • A tracker ball is an alternative to the traditional mouse and favoured by graphic designers. Tracker balls often give much finer control over the movement of the items on the screen. Before this. but offer a lot in terms of added flexibility. Touch Pads • A touch pad is a desktop device and responds to pressure.
where you train the software to respond to your particular voice. Things are changing rapidly however and recent systems allow you to talk to a PC and see text appear on the screen. Output Devices Kullegg San Gorg Preca – Liceo Subien . These pictures can easily be transferred to your computer and then manipulated within any graphics programs which you have installed on your computer. as well as having a number of configurable buttons. the more sophisticated respond to movement in 3 axis directions. strongly constructed model. While not yet considered a standard piece of PC kit. especially bearing in mind that children will hammer these devices whilst playing games. due to the limitations of the software combined with hardware limitations. Currently they are limited by the quality of the image recorded and the number of pictures which you may store within the camera. Whilst still not perfect this is a key technology of the future. Web Cams • Ever since it was invented.ECDL Module 1 – Page 18 Joysticks • Many games require a joystick for the proper playing of the game. Most of these systems require an initial training period. the images are stored digitally in memory housed within the camera. the Web has become increasingly interactive. but instead of storing images on rolls of film which require developing. Like most things in life you get what you pay for with joysticks and it is worth investing in a good. There are many different types. You can now use a small digital movie camera (a Web cam) mounted on the PC monitor to allow two-way communication involving not just text communication but sound and video communication as well. It takes an awful lot of CPU processing power to convert the spoken word into text which appears on the screen. it is only a matter of time … Digital Cameras • A digital camera can be used in the same way a traditional camera can. Microphones • Early voice recognition systems offered very poor results.
In many applications. The price of these devices has dropped dramatically recently. such as Microsoft PowerPoint. Other factors to be aware of are the quietness (or otherwise) of the device. as well as the cost of replacement bulbs. Traditional computer monitor • An output device. Flat screen computer screens • Flat panel displays encompass a growing number of technologies enabling video displays that are lighter and much thinner than traditional television and video displays that use cathode ray tubes. and digital cameras. common sizes range from 15” to 21” screens. specifically modern portable devices such as laptops. You should be aware that poor quality or badly maintained monitors could harm your eyesight. They are used within education and are also very popular for sales presentations. They were supplied in different sizes. When purchasing one of these devices the two things to look out for are the resolution (go for a minimum of XGA) and the brightness of the lamp (the brighter the better). Flat panel displays balance their smaller footprint and trendy modern look with high production costs and in many cases inferior images compared with traditional CRTs. printers. • Computer presentation projection devices • These are projection devices which can be attached to your computer and are useful for displaying presentations to a group of people. speakers and headphones. They can be divided into two general categories: Volatile or Static. They are best used in combination with presentation programs. The original computer monitors were TV type screens on which you viewed your programs. cellular phones. Kullegg San Gorg Preca – Liceo Subien . whatever disadvantages exist are overcome by the portability requirements.ECDL Module 1 – Page 19 Output devices • Include items such as screens (monitors. and are usually less than 4 inches (100 mm) thick.
This is of enormous benefit to the visually impaired when using a computer. Thus. In large organisations. Most computers allow you to plug headphones into one of the computer sockets. the printers are connected to the computers via a network. This enhances the value of educational and presentation products and can now be considered a standard PC component. Most common are ink jet and laser printers both of which can now produce coloured output (at a cost) Different types of printer • • There are many different types of printers. Speech synthesizers • A recent development is the ability not only to display text on a monitor but also to read the text to you. In most organisations.ECDL Module 1 – Page 20 Speakers and headphones • • Most computers are sold with the capability to add a pair of speakers to your system unit. In fact. On the flip side. Each computer connected to the network can print using a particular shared printer. the monitor may have speakers built directly into the unit. in some cases. Printers • Most data is printed once you have created it and there are a vast number of different printers available to accomplish this. Whilst these systems are far from foolproof they are getting better as more advanced software is being made available. laser printers are most commonly used because they can print very fast and give a very high quality output. This is useful as the sound will then not annoy others in the room. one of the things the salesperson will not necessarily stress is how much it will cost to keep that printer running. it is now possible to use a microphone to talk to the computer and for the computer to directly convert the spoken word into text which will be displayed within say your word-processor. you could receive a text email from a colleague and the system could read that email to you. This means that each person with a computer does not require his or her own printer. Laser printers do not use ink: they use something called toner which is normally supplied in a sealed unit called a toner cartridge is very high. Laser printers Kullegg San Gorg Preca – Liceo Subien . Ink jet printers can work out even more expensive to run. When you buy a printer.
Inkjet printers are very quiet in operation and produce print quality comparable to that of laser printers.ECDL Module 1 – Page 21 • Laser printers produce high print quality at high speed. Inkjet printers • Inkjet printers work by using tiny jets to spray ink onto the paper. most modern dot matrix printers have 24 pins. Dot matrix printers are used for high volume / low quality printing. As a result. the inkjet printer has now largely replaced the dot matrix printer. and accept input when people touch the menus displayed on the screen. especially if you are using a lot of colour on a page can be very high compared to the cost of printing in black and white.g. A touch screen can display a menu system (output device). e. printing company pay slips. you should be aware of the fact that the "price per page". e. a type of printer which is designed to give very high quality reproduction of pictures. Inkjet printers are ideal for low volume printing where high quality print is required and speed is not a high priority. There is a wide range of laser printer manufacturers and one buzzword to be aware of is Postscript. While many of these produce excellent results. Kullegg San Gorg Preca – Liceo Subien . most laser printers would only print in black and white (mono). A modem can be used for downloading information from web sites and receiving emails.g. Unfortunately. printing letters in a small office or in the home. though laser printers still have the edge in terms of speed. dot matrix printers can generate a lot of noise and do not produce a very high quality of print. They are called "laser printers" due to the fact that they contain a small laser within them. It can also be used for uploading and sending emails. The more pins the print head has the higher the quality of the print. Dot Matrix printers • Dot matrix printers work by firing a row of pins through an ink ribbon onto the paper. Input and Output Devices Input/Output devices • Some devices are both input and output devices. Colour laser printers • Originally. especially when printing graphics. More recently colour laser printers have dropped in price and are entering wide spread use.
It had a Graphical User Interface (GUI). The operating system allows you to use the advanced features of a modern computer without having to learn all the details of how the hardware works. you could 'drive' it using a mouse and drop down menus. there are a number of different types of Windows. Microsoft introduced Windows and this is the operating system which is most widely used on PCs today. as and when required. DVD or on a diskette (floppy disk) and is loaded (i. To complicate matters further.com/software/os/warp Linux: http://www. IBM produced an operating system called OS/2 but this was largely ignored and is only used by a few companies.com • • • • Kullegg San Gorg Preca – Liceo Subien .microsoft. i. CD-Rom. in the correct place on the screen.ECDL Module 1 – Page 22 Softwarea aaaaaaaaaaaaaaaaaaabbbbbibaa Concepts What is software? • Hint The software is the collection of instructions which makes the computer work. It was NOT user-friendly. Most people are today running either Windows XP or Windows Vista. different releases of Windows were introduced.1. copied) from the disk into the computers RAM (Random Access Memory). when you type in words via the keyboard. The first widely used version of Windows was called Windows 3.e. Software is held either on your computer’s hard disk.www.e. and you had to be a bit of a computer expert just to understand how to use it. UNIX and Linux are other examples of operating systems which may be run on PCs. What is an Operating System? • Hint The operating system is a special type of program which loads automatically when you start your computer. Microsoft Windows: Microsoft: http://www. Later. To complicate matters further.linux. Later on. For instance. Other types of computers. such as those manufactured by Apple have a completely different operating system. This operating system was very basic. The IBM PC (Personal Computer) was introduced way back in 1981 and was originally supplied with an operating system called DOS (Disk Operating System). There are a number of different types of operating system in common use.ibm. the software is responsible for displaying the correct letters. This was more powerful than DOS and far easier to use. there are a number of different types of Windows.com IBM OS/2: http://www.
com/Office2000 Spreadsheets • A spreadsheet program (such as Microsoft Excel) allows you to work out a company’s income.org UNIX: http://www.www. games programs and graphics programs (for producing pictures.htm Lotus Word Pro http://www.nsf/welcome/lotus123 Databases • A database program (such as Microsoft Access) allows you to compile information and then to search this information to extract just the Kullegg San Gorg Preca – Liceo Subien . databases (for organising large amounts of information). memos etc).. It is important that you recognise examples of application programs covering the following areas: Word processing Spreadsheets Databases Presentations E-mailing Web browsing Photo editing Computer games • Word processing • A word processing program (such as Microsoft Word) allows you to produce letters. manuals etc).com/office/excel Lotus 123 http://www. spreadsheets (for doing accounts and working with numbers).corel. expenditure and then calculate the balance. easily.nsf/welcome/wordpro WordPerfect http://www. You can easily mail merge a list of names and addresses to produce mass mailers.ECDL Module 1 – Page 23 Linux: http://www. Microsoft Excel http://www. Microsoft Word http://www. advertisements.lotus. etc. memos.www.microsoft. It enables you to make 'what if' type projections of how the company will fair in the future and to forecast how changes in prices will affect profits.unix.org What is an application program? • An application program is the type of program which you use once the operating system has been loaded.lotus.microsoft.com/office/word/default.linux.com/home.com/home. Examples include word-processing programs (for producing letters. individually addressed to customers or subscribers.
netscape. Microsoft Outlook is supplied within Microsoft Office.microsoft. contact and colour balance.microsoft. As the name suggests you use these to send and receive emails. For instance.com/home. Alternatively.mozilla. you can display your presentations directly on a computer screen or via a computerised projector.ECDL Module 1 – Page 24 information you require. The level of graphical detail on screen gets better each year. Microsoft Internet Explorer http://www.lotus. Computer games • Computer games started off as simple bat and ball games and today have evolved into an enormous worldwide business. Web browsing • Applications used to view and interact with the World Wide Web (WWW). There are many different types of games renging from the educational.nsf/welcome/freelance E-mailing • There are many emailing programs available.microsoft. Kullegg San Gorg Preca – Liceo Subien .com/office/powerpoint Lotus Freelance http://www. Microsoft Access http://www. to the ‘shoot them up’ variety. Examples include Photoshop from Adobe and Paint Shop Pro from Correl. You can remove defects such the red eye effect often caused when using a flash.com Mozilla Firefox http://www.nsf/welcome/approach Presentation • A presentation program (such as Microsoft PowerPoint) allows you to produce professional looking presentations.lotus. Another well know example is the Thunderbird email program.com/ie Netscape Navigator http://www. You can adjust items such as the picture brightness. Microsoft PowerPoint http://www. which can be printed out directly onto slides for use with an overhead projector.org/products/firefox Photo editing • These programs allow you to edit digital photos.com/office/access Lotus Approach http://www.com/home. if you have a database of all the equipment housed within an office you can very simply produce a report listing only the equipment above a certain value. You can apply interesting special effects and filters to visually enhance your photographs.
• In addition many web sites are now written to be compatible with software designed to increase accessibility. Comprehending human languages falls under a different field of computer science called natural language processing. they generally require an extended training session during which the computer system becomes accustomed to a particular voice and accent. not that it understands what is being said. A number of voice recognition systems are available on the market. Note that voice recognition implies only that the computer can take dictation. These cover: -Voice recognition software -Screen reader software -Screen magnifier software -On-screen keyboard. • Screen reader software • A screen reader is a software application that attempts to identify and interpret what is being displayed on the screen (or. Difference between the operating system and application programms • • The operating system works closely with the hardware that you have installed within your computer. while others require a dedicated console such as a Sony Playstation Famous example include Doom (a shoot them up game) and Simms (a game where you build your own little world within the computer). However. and make use of the functionally built into the operating system. They are specific to a particular task. whether a video monitor is present or not). Such systems are said to be speaker dependent. For instance Microsoft Word is designed as a word processing program. while Microsoft Excel is a spreadsheet program. sent to standard output. The application programs sit above the operating system.ECDL Module 1 – Page 25 There are many different formats available for games. Kullegg San Gorg Preca – Liceo Subien . If interprets the input via the mouse or keyboard and outputs data to the screen. Some games can be played on a standard computer. Accessibility options • There are a range of options to improve computer accessibility. The most powerful can recognize thousands of words. Voice recognition software • The field of computer science that deals with designing computer systems that can recognize spoken words. more accurately.
• A person's choice of screen reader is dictated by many factors. such as screen magnifiers. or a Braille output device. Microsoft Windows has basic screen magnifier software included.ECDL Module 1 – Page 26 This interpretation is then re-presented to the user with text-to-speech.S. Screen readers are a form of assistive technology (AT) potentially useful to people who are blind. The Window XP Narrator options look like this: • There are many rival commercial option available. making it easier to read for the visually impaired. sound icons. Screen magnifier software • This type of software magnifies the screen contents. visually impaired. and the role of organizations like charities. often in combination with other AT. illiterate or learning disabled. The options include the following: Kullegg San Gorg Preca – Liceo Subien . schools. and employers. cost (even to upgrade a screen reader can cost hundreds of U. including platform. Try searching the web for ‘screen reader software’ for an idea of what is available. dollars). Screen reader choice is contentious: differing priorities and strong preferences are common.
Windows has a basic on-screen keyboard option located within the Accessories group. Kullegg San Gorg Preca – Liceo Subien . It is designed for use by individuals that are not able to use a physical keyboard.ECDL Module 1 – Page 27 On-screen keyboard • • An on-screen keyboard is a representation of the physical keyboard on the screen.
e. the whole world). which the users have.ECDL Module 1 – Page 28 Networks aaaaaaaaaaaaaaaaaaabbbbbibaa Network Types What is a LAN (local Area Network)? • A LAN (Local Area Network) is a system whereby individual PCs are connected together within a company or organisation. What is the Internet? • Hint A collection of networks started by and for the US military to enable them to 'survive' a nuclear war. Even more useful is the ability to share information when connected to a network. In a similar way. For instance if ten people are working together within an office it makes sense for them all to be connected. WLAN (Wireless local Area Network) • Wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver. other devices such as modems or scanners can be shared. the office can have a single printer and all ten people can print to it. The server tends to be a very powerful PC (or group of PCs). Later adopted by the educational system. In this way. Kullegg San Gorg Preca – Liceo Subien . but rather the network is connected by radio waves and/or microwaves to maintain communications. What does client/server mean? • This term relates to the type of network where resources are kept centrally on the server and used locally by the client. is less powerful. and now exploited by the commercial world. while each client workstation. What is a WAN? • A WAN (Wide Area Network) as the name implies allows you to connect to other computers over a wider area (i.
a web browser. without the need for a single sales-person. Whether you are gathering information about a rival company on the other side of the world. closed version of the Internet. These days the problem is often not finding information but rather dealing with the sheer amount of information which is available. this has interesting possibilities. it can be accessed by everyone on the Web (providing they can find it. Once a company has installed a comprehensive Intranet many users need only one piece of software on their PC. What is the difference between the World Wide Web (WWW) and the Internet? • The World Wide Web (WWW) is just a small part of the Internet as a whole. An Intranet uses Internet technologies to allow users to access company documents. email and newsgroups. you have no idea how accurate or up to date a lot of the information you access really is. Data Transfer Kullegg San Gorg Preca – Liceo Subien . What is the difference between the Internet and an Intranet? • An Intranet is a smaller.ECDL Module 1 – Page 29 • The Internet is a global network of interconnected networks. it also includes FTP (File Transfer Protocol). An Intranet is normally only accessible by members of the same company or organisation. Intranets are becoming an increasingly popular way to share information within a company or other organisation. As a marketing tool. The WWW is basically the text and pictures which you can view using your web browser. For research the Internet is an incredibly valuable tool. What is the difference between an Intranet and an Extranet? • An Extranet is an Intranet which is partially accessible to authorised outsiders. The Internet relates to all the hardware and software involved. you will find there is plenty of information available.). an extranet also allows outsiders who have been issued with a password to gain limited access to information held on a company network. schedule meetings and of course send emails. you can search for and find information on the most obscure topics. Whatever your interest. as well as the WWW. Extranets are being used as a way for business partners to share information. It is possible for a small company to sell products and services worldwide. search databases. If you publish material on the Web. or Netscape Navigator. Also. The unique thing about the Internet is the sheer amount of information which you can access from it. which can only be accessed by authorised members of an organisation. such as Microsoft Internet Explorer. or are looking for information about your family tree.
the maximum data rate with dialup access was 56 Kbps (56. . mainframe. It is based on traditional 'copper wire' technology and can transmit analogue voice data.000 bits per second). Kullegg San Gorg Preca – Liceo Subien .Bits per second (bps). • Data transfer rate measurement • The speed with which data can be transmitted from one device to another. uses broadband transmission. For example. dial-up Internet connection services • Broadband connection: A type of data transmission in which a single medium (wire) can carry several channels at once. and allows much faster transfer rates than when using modems. In the past. for example. Data rates are often measured in: .Kilobits per second (kbps). Very slow connections will be quoted in bits per second. To copy data (usually an entire file) from a main source to a peripheral device.ECDL Module 1 – Page 30 Downloading from & uploading to a network • Hint To transmit data from a computer to a bulletin board service. . Because dial-up access uses normal telephone lines. Broadband vs. Downloading can also refer to copying a file from a network file server to a computer on the network. or network. the quality of the connection is not always good and data rates are limited.ISDN stands for "Integrated Services Digital Network. you must upload the files from your PC to the network. . • Internet connection options • Phone line: . if you use a personal computer to log on to a network and you want to send files across the network. Dial-up access is really just like a phone connection." ISDN dates back to 1984. Using ISDN.Megabits per second (mbps) High speed data transfer is measured im megabits per second. Dial-up connection: Refers to connecting a device to a network via a modem and a public telephone network. The term is often used to describe the process of copying a file from an online service or bulletin board service (BBS) to one's own computer.PSTN (or Public Switched Telephone Network) is the technical name for the public telephone system. except that the parties at the two ends are computer devices rather than people. Cable TV. you can transfer 64 Kbit or 128 Kbit of data per second.
Instead of using telephone or cable networks for your Internet connection. Wireless access is still considered to be relatively new. Wireless Internet Connections: Wireless Internet. or wireless broadband is one of the newest Internet connection types. Wireless Internet provides an always-on connection which can be accessed from anywhere — as long as you geographically within a network coverage area. with certain channels used for downstream transmission. A more recent technology which allows more data to be sent over existing copper telephone lines. IoS is slightly slower than high-speed terrestrial connections over copper or fiber optic cables. and other channels for upstream transmission. and it may be difficult to find a wireless service provider in some areas. • • Mobile phones: newer phones may also provide Internet services such as Web browsing and e-mail. but requires a special ADSL modem. Because the coaxial cable used by cable TV provides much greater bandwidth than telephone lines.ADSL is short for 'Asymmetric Digital Subscriber Line'. Satellite: Internet over Satellite (IoS) allows a user to access the Internet via a satellite that orbits the earth. Because of the enormous distances signals must travel from the earth up to the satellite and back again. A satellite is placed at a static point above the earth's surface.ECDL Module 1 – Page 31 .5 to 50 Mbps when receiving data (called the downstream rate) and from 16 to 640 Kbps when sending data (called the upstream rate). you use radio frequency bands. • • Kullegg San Gorg Preca – Liceo Subien . It is typically more expensive and mainly available in metropolitan areas. in a fixed position. a cable modem can be used to achieve extremely fast access. Cable Internet works by using TV channel space for data transmission. ADSL allows data transfer rates of ranging from 0. Cable: Through the use of a cable modem you can have a broadband Internet connection that is designed to operate over cable TV lines.
the service can connect users with an almost unlimited number of third-party information providers. Advantages of e-commerce There are many advantages using e-commerce: Services available 24 / 7: Unlike a normal shop which closes in the evening. in fact. Internet services for consumers • Hint A business that provides its subscribers with a wide variety of data transmitted over telecommunications lines.e. either by exchanging e-mail messages or by participating in online conferences (forums). Subscribers can get up-to-date stock quotes. Most sites which accept credit card payment are on secure services and your Internet browser program (i. In addition. E-commerce • The phrase e-commerce is a buzzword which relates to buying or selling via the Internet. but rather it can be held in one central distribution warehouse. Online services provide an infrastructure in which subscribers can communicate with one another. articles from many magazines and journals. Microsoft Internet Explorer or Netscape Communicator) will normally inform you (via a popup) when you are entering or leaving a secure server. 7 days a week. almost any information that has been put in electronic form. you can shop via the Internet 24 hours a day. When you send your credit card details these SHOULD be encrypted by the site operators so that no one can intercept your details. it is the study or business of developing and using technology to process information and aid communications. Increasingly you can purchase directly via a Web site by selecting the goods or services which you require and entering your credit card details.ECDL Module 1 – Page 32 ICT in Everyday Life aaaaaaaaaabbbbbibaa Electronic world What does ‘Information and Communication Technology’ (ICT) mean? • Information and Communications Technology. accessing all this data carries a price. Of course. news stories hot off the wire. Large stock range: A larger range of stock can be carried than a conventional store. The stock does not have to be distributed and duplicated over many physical stores. and 365 days a year. Detailed product information: Kullegg San Gorg Preca – Liceo Subien .
What about returning faulty goods?: If the goods arrive and are substandard. Each country may have its own laws relating to consumer protection. and above all will not attempt to 'run off with your money'.ECDL Module 1 – Page 33 A detailed product description for each product. How are you covered when you purchase goods from another country? This is a minefield. There can even be links to the product manufactures own web site. In many cases you will find that the law gives you a right to return defective goods or even goods which are not quite as you expected. Ability to compare prices: Many sites claim to offer you the very best prices. Disadvantages of e-commerce Includes the following: Possible Credit card Fraud: Some web sites have been set up solely to trick you into providing your credit card details. Right to return defective goods: Most e-commerce web sites will have a 'Returns Policy' and it is advisable to read this prior to purchase. Ask for references from other customers. When it comes to credit card fraud there is basically one rule 'wherever humanly possible the bank never pays: someone else does'. Are full contact details provided? If in doubt ring the phone numbers provided on the site and try to decide whether the company sounds genuine. Just because you see trade association logos on a site. you know that the company is well respected. along with a picture can be given. Is there a client list on the site? How long has the company been trading. do not assume that the use of these logos is genuine. Check the small print on your credit card agreement. You can use the information on these sites to compare prices. But what about when you purchase online from a company you have never heard of? Look for clues. far from the nearest town makes no difference at all when shopping via the Net. BEFORE you make an online purchase.com. make sure that someone is not you. Where do you return them to? Be sure you know about a company’s returns policy. which can later be sold to criminals so that they can make purchases with your money. Equal delivery to town and country: The fact that you may live in the countryside. Is the web site genuine?: When you purchase from a company such as amazon. who pays to return them. There are organisations now whose sole purpose is to verify that other web sites belong to honest companies. Be warned! Kullegg San Gorg Preca – Liceo Subien . is unlikely to go bust tomorrow.
He purchased the computer for his daughter. There are security considerations relating to online banking. However. but does not have a common definition. Some online banks have no physical branches at all. where technology is used to support the learning process. E-learning • E-learning (or sometimes electronic learning or eLearning) is a term which is commonly used. transactions and interactions with citizens. it may include all types of technology-enhanced learning (TEL). Uses of computer applications in education • Student registration and timetabling: There are many specialist programs designed to computerise these otherwise time consuming tasks. also much broader definitions are common. or telephoning them. through a very well known PC manufacturer. E-banking • The phrase e-banking relates to managing your money online. Never buy from a company which does not provide you with full contact details including a telephone number. E-government • e-Government (short for electronic government. also known as e-gov. The computer eventually turned up in February. but was unable to talk to a real person and was forced to rely solely on email contact with the company. with no face-to-face interaction. graphics and Kullegg San Gorg Preca – Liceo Subien • . Instead of having to go to the local branch. online government or transformational government) is a diffused neologism used to refer to the use of information and communication technology to provide and improve government services. businesses. Computer Based Training (CBT): Computer Based Training (CBT) offers a low cost solution to training needs where you need to train a large amount of people on a single subject. These programs are normally supplied on CD-ROM / DVD and combine text. and other arms of government.ECDL Module 1 – Page 34 Can you talk to a real person? I recently heard a radio presenter who purchased a computer online. making it a very profitable operation for the bank. For example. in good time for Christmas. you can pay your bills online and move money from one place to another. digital government. As Christmas due near he tried to find out what was happening. with numerous examples of poor security coupled with sloppy operations. Most frequently it seems to be used for web-based distance education.
then the students can work at their own pace. As an alternative to training via CD-ROM / DVD. It can take many forms ranging from a simple web version of printed books.You may have to pay for the connection time. .One trainer can train many people at many different locations. Packages range from general encyclopaedias right through to learning a foreign language.Because of the increased time required to produce some types of elearning packages. or a new certification syllabus. and repeat parts of a course which they do not understand.The Internet connection may temporarily fail for some reason. by the minute. This arrangement has advantages and disadvantages to both the employer and the employee. This saves time (and money) for the employee and reduces environmental overheads.There may be no opportunity to ask a question of a real person. Communication is via email or the telephone. Advantages include: . . It means that the employee does not arrive at work already stressed Kullegg San Gorg Preca – Liceo Subien .ECDL Module 1 – Page 35 sound. Distance learning systems: E-learning is a term used to describe studying via the Internet. In many cases there can be real-time two-way communication between the teacher and the student. Disadvantages include: . 7 days a week. Also the teaching can be at any time. • Using the Internet as a homework resource: The Internet is the ultimate resource for getting the information necessary to complete a student’s homework. The Internet can also be used to set and collect homework (via email). the e-learning tutorials may not be available for some time following the release of a new version of software. 24 hours a day.If the training is solely computer based. . .The download speed may be too slow for some forms of e-learning . Some of the advantages of tele-working • Advantages include: Reduced or zero commuting time. • Tele-working • Tele-working is a broad term which refers to people working at home connected to the rest of the organisation via a computer network. as less commuting means less car pollution. . through to advanced use of video images with sound. CBT can also be delivered via the Internet.Often e-learning solutions are cheaper to provide than other more traditional teaching methods.
but come the evening you may not feel like working. Negative impact on teamwork: If you never see the rest of the team it is hard to feel part of the team. as long as the job gets done. "Hot Desking" is a term used to indicate that people do not have a desk dedicated to their exclusive use. Reduced office desk space requirements: The cost of Office space can be very high and tele-working can help to reduce these costs if a proportion of the staff work at home. there is a greater ability to concentrate and focus. Self-discipline: It can take a lot to work from home and remain focused on work. and finish your work later. Hot Desking is popular where staff spend a proportion of their time working at home. ban it altogether). just so that people can keep in touch. Greater ability to focus on one task: As there are fewer interruptions from low priority phone calls. which include: Lack of human contact: Many people cite this as the single biggest factor when switching from a regular office job.ECDL Module 1 – Page 36 from car jams or late train connections. to tele-working. which will allow them to uniquely access their own work stored within the computer system. such as picking up the kids from school. Some of the disadvantages of tele-working • As well as advantages. there are many disadvantages for tele-workers. it does not matter when the job gets done. People simply sit at any desk and log on to the networked computers using their own ID. It also means that work can be finished in the evening if required. or at sites outside the main office complex. Flexible schedules: In many cases. If it is a beautiful day. To some extent this is offset by video links and by occasional gettogether meetings. Communication Kullegg San Gorg Preca – Liceo Subien . Possible Employee Exploitation: If workers are isolated from each other there is the possibility for companies to take advantage. why not take advantage of the weather. In fact many companies now arrange company gossip networks. Some large companies using teleworking restrict trade union activity (or if they can. It is all very well saying 'I will take the afternoon off and work this evening'. This means there is time for other activities.
anywhere in the world. headlines. usually maintained by an individual with regular entries of commentary. As well as sending a text message. A user that can read RSS-distributed content can use the content on a different site. analagous to a telephone conversation but using text-based. "Blog" can also be used as a verb. Kullegg San Gorg Preca – Liceo Subien . Typically. its most widespread usage is in distributing news headlines on the Web. Really Simple Syndication (RSS) feeds • RSS is the acronym used to describe the de facto standard for the syndication of Web content. excerpts from discussion forums or even corporate information. Other terms frequently encountered and synonymous with VoIP are IP telephony. project updates. RSS is an XML-based format and while it can be used in different ways for content distribution. not voice-based. events listings. and broadband phone. Voice over Internet Protocol (VoIP) • Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched networks. meaning to maintain or add content to a blog. voice over broadband (VoBB). Syndicated content can include data such as news feeds. files can be sent as email attachments. a type of communications service that enables you to create a kind of private chat room with another individual in order to communicate in real time over the Internet. communication. It requires both computers to be connected to the Internet. A Web site that wants to allow other sites to publish some of its content creates an RSS document and registers the document with an RSS publisher. descriptions of events. news stories. broadband telephony. Entries are commonly displayed in reverse-chronological order. You can then initiate a chat session with that particular individual. Internet telephony.ECDL Module 1 – Page 37 Electronic mail (e-mail) • Hint Email allows you to send a message to another person almost instantly. the instant messaging system alerts you whenever somebody on your private list is online. or other material such as graphics or video. Blogging (web logs) • A blog (a contraction of the term "weblog") is a type of website. Instant messaging (IM) • Abbreviated IM.
Most social network services are web based and provide a variety of ways for users to interact. you have a set of subscriptions that are checked regularly for updates and instead of reading the feeds on your computer screen. forums or boards are web applications managing user-generated content. Internet forums (message boards / discussion boards) • An Internet forum. is an online discussion site. which allows subscribers to subscribe to a set of feeds to view syndicated Web site content. From a technological standpoint. and a technological evolution of the dialup bulletin board system. If the mechanism is a computer network. or message board. it is called an online community. telephone. Significant sociotechnical change may have resulted from the proliferation of such Internet-based social networks. e-community or online community is a group of people that primarily interact via communication media such as newsletters. Many means are used in social software separately or in combination. Virtual and online communities have also become a supplemental form of communication between people who know each other primarily in real life. Social networking websites • A social network service focuses on building online communities of people who share interests and/or activities. Chat rooms • The term chat room. such as e-mail and instant messaging services. The term can thus mean any technology ranging from real-time online chat over instant messaging and online forums to fully immersive graphical social environments.ECDL Module 1 – Page 38 Podcasts • Podcasting is similar in nature to RSS. or chatroom. It originated as the modern equivalent of a traditional bulletin board. you listen to the new content on on your iPod (or like device). Kullegg San Gorg Preca – Liceo Subien . occasionally even asynchronous conferencing. professional. internet social network service or instant messages rather than face to face. video text or avatars. including text-based chatrooms and forums that use voice. is primarily used by mass media to describe any form of synchronous conferencing. educational or other purposes. for social. With podcasting however. email. Virtual Communities Online (virtual) communities • Hint A virtual community. or who are interested in exploring the interests and activities of others.
for example.ECDL Module 1 – Page 39 Online computer games • An online game is a game played over some forms of computer network. video). making online games a form of social activity beyond single player games. but games have always used whatever technology was current: modems before the internet. Precautions when accessing online communities • In the computer industry. At the present. refers to techniques for ensuring that data stored in a computer or transferred online cannot be read or Kullegg San Gorg Preca – Liceo Subien . and hard wired terminals before modems. The expansion of online gaming has reflected the overall expansion of computer networks from small local networks to the Internet and the growth of Internet access itself. In any of these cases. and the use of distributed peer-topeer (P2P) networking. Online games can range from simple text based games to games incorporating complex graphics and virtual worlds populated by many players simultaneously. a credit card whose details are also passed— usually fully encrypted—across the Internet. centralized computer file server installations on computer networks. It may be implemented in a variety of storage. or electronic books. The price can be paid by the remote charging of funds from. colleagues and friends as an attachment. It can be uploaded to a website or FTP server for easy download by others. access to the file may be controlled by user authentication. Sharing photos. documents. Many online games have associated online communities. It can be put into a "shared location" or onto a file server for instant use by colleagues. transmission. and money may change hands for access to the file. World Wide Web-based hyperlinked documents. this almost always means the Internet or equivalent technology. multi-media (photos. and distribution models. video and audio clips • File sharing is the practice of distributing or providing access to digitally stored information. The load of bulk downloads to many users can be eased by the use of "mirror" servers or peer-topeer networks. Common methods are manual sharing using removable media. such as computer programs. the transit of the file over the Internet may be obscured by encryption. Publishing and sharing content online • A computer file can be e-mailed to customers. audio.
e. Screen and keyboard positioning • Your screen: Your screen should be fully adjustable so that your eyes are at the same height as the top of the screen. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. For detailed work. your employer has a legal duty to pay for eye tests for employees as and when they request it. You should consider using the best (i. Health What is ergonomics? • The science concerned with designing safe and comfortable machines for humans. you should also consider using a large screen rather than the 'standard' 14" or 15" screens which are in common use. most expensive) monitor which you or your company can afford. Repetitive Strain Injury (RSI) • Often referred to as RSI. ergonomics plays an important role in the design of monitors and keyboards. The better the monitor the better the screen resolution and the higher the refresh rate. In many countries.rsi-center.ECDL Module 1 – Page 40 compromised by any individuals without authorization. then get a qualified technician to take a look at it. one branch of ergonomics deals with designing furniture that avoids causing backaches and muscle cramps. You may want to consider the use of a pad on which you can rest your arms.com Lighting issues when using a computer • You should take regular breaks to avoid staring constantly at the screen and straining your eyes. In the computer field. You should periodically refocus into the distance. as opposed to always gazing at a screen a few inches from your eyes. You should take regular breaks to help avoid this type of injury. If the screen is badly focused. which will help to some extent. You may wish to use a filter attached to the screen to reduce glare. This is a condition caused by constant use of the keyboard or mouse. You can get filters which fit in front of the screen and reduce glare. A password is a secret word or phrase that gives a user access to a particular program or system. too bright or appears to flicker. For example. More information: http://www. Kullegg San Gorg Preca – Liceo Subien . Most security measures involve data encryption and passwords.
Environment Kullegg San Gorg Preca – Liceo Subien . Make sure that the cables are safely secured at the back of the desk and that you have power points located near the desk. Make sure that cables are safely secured • You should always use the power cables which were supplied with your computer or cables of a similar quality. Make sure that power points are not overloaded • Overloading of a power point is dangerous and a potential fire hazard. Avoid long trailing cables as you or other people can easily trip over them and cause injury to yourself or others. It should have an adjustable back. have regular eye tests and get a good desk and chair to maintain good posture. If your desk has a cable ducting system make sure that you use it. Seating issues when using a computer • Your chair: Your chair should be fully adjustable. • Wellbeing when using a computer • • Take regular breaks. accidentally pulling out a power cable could cause your computer to lose power and you will lose data as a result. Apart from personal injury. Your feet: You may wish to use a footpad to rest your feet while using the computer.ECDL Module 1 – Page 41 • Your keyboard: Use a good keyboard and you may also wish to use a wrist pad to relieve pressure on your wrists. Make sure that the area where you are using the computer is adequately lit and well ventilated. and be able to be moved up or down. Ventilation is especially important if you are using a laser printer. Network cables tend to be delicate and easily damaged and the most common cause of failure to log onto a network server is that someone has accidentally dislodged or damaged the network cables. have them properly installed by a qualified electrician. If you need more power sockets. which may produce ozone when printing.
Where possible the use of on-screen manuals and help systems. and send them for recycling. rather than printed manuals. This equates to less trees being cut down.ECDL Module 1 – Page 42 Computer recycling options • • You should have a separate bin for paper which can be sent for recycling (be sure that sensitive material is first shredded). it will consume less power. • Computer energy saving options • Many monitors and other peripherals will automatically switch into 'sleep' mode after a period of inactivity. Printer toner cartridges can be sent for recycling. Kullegg San Gorg Preca – Liceo Subien . This means that even though the computer is still switched on. You may also wish to consider the use of recycled toners in your printers (but be aware that in some cases this may invalidate the printer’s guarantee). in fact some charities now collect spent toner cartridges. will save on the amount of paper consumed.
It uniquely identifies you to the network. accidental error. Password policies • Your password is the only thing which will prevent someone else logging into a computer using your user ID and impersonating you. Kullegg San Gorg Preca – Liceo Subien . the network administrators often have access rights to just about every computer. Your network administrator will have defined these access rights. connected) to the rest of your computer network. Sending backups off-site ensures systems and servers can be reloaded with the latest data in the event of a natural disaster. or system crash. which is known as electronic vaulting or e-vaulting. Data Security Off-site backups • In computing. or vaulting. It is also recommended that you change your password regularly. You on the other hand may have access rights to print to only certain. Data is usually transported off-site using removable storage media such as magnetic tape.ECDL Module 1 – Page 43 Securityaaaaa aaaaaaaaaaaaaaabbbbbibaa Identity/Authentication Computer logon user name (ID) and password • Hint A User ID is normally used to logon to a computer. In addition you use a password which is only known to you. The password guarantees that no one can access the network and impersonate you (in theory). Once you have logged on (i. off-site data protection. modem etc on the network. some computer systems will require you to change your password periodically. or computer network.e. The idea of access rights is that you only have the ability to connect to. specified printers and you may be able to access only certain data held on the network. devices which you have authority to use. printer. Off-site backup services are convenient for companies that backup pertinent data on a daily basis (classified and unclassified). Data can also be sent electronically via a remote backup service. It is important to choose a password which cannot be easily guessed by other people. Ideally a password should be at least 8 characters long & contain a mixture of words and numbers. you will have been assigned access rights to the network. In other words. Sending backups off-site also ensures that there is a copy of pertinent data that isn’t stored on-site. or share. is the strategy of sending critical data out of the main location (off the main site) as part of a disaster recovery plan.
ideally off-site. if your backup disks are stored next to the computer they too will be incinerated. or a combination of both. An incremental backup means that once a week you can perform a complete backup. but suffers from the disadvantage that this process can take a long time if your computer contains a lot of data. All messages entering or leaving the intranet pass through the firewall. In large organisations this backup procedure is normally performed automatically by your computer support team. you only backup files which have been newly created or modified since the last backup. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet. incremental backups • A complete backup means which you backup all the data on your computer. In smaller organisations. Complete vs. What is a firewall? • A system designed to prevent unauthorized access to or from a private network. For this reason it is VITAL that you take regular backups of the information which is stored on the computer. especially intranets. this process is automatic. where the data is normally held on a centralised. saving time. Organising your computer for more efficient backups • When you think about it. Firewalls can be implemented in both hardware and software.ECDL Module 1 – Page 44 Why do you need to back your computer? • The most important thing which you store on your computer is information. you have a computer containing many programs and also a large amount of data which you have created. If you create a folder structure which contains only data then only this directory (plus any sub-directories of this directory) needs to be backed up. This has the advantage that the entire hard disk can be backed up. then it is only the data which really needs to be backed up. If there is a fire and your office burns down. networked computer. If the hard disk stops working one day you could lose all those years of work. it is often up to the individual to organise some sort of data backup. which examines each message and blocks those that do not meet the specified security criteria. copy your files to a floppy disk and make sure that these backup disks are stored away from the computer. and normally you only have to select full or incremental. If nothing else is available. Data theft issues Kullegg San Gorg Preca – Liceo Subien . Often the contents of a hard disk can represent years of work. but every night for the rest of the week. With the right backup software.
Many companies supply updated disks on a regular basis or allow you to receive updates automatically via the Internet. What to do if you discover a virus on your computer Kullegg San Gorg Preca – Liceo Subien .com/avcenter Dr Solomon anti-virus software http://www. iPods and even digital cameras. The main thing about your virus checker is that it should be kept up to date. BEWARE: Viruses can destroy all your data. or misuse it while they are still in employment. Unless you use virus detection software. Computer viruses infection issues • Viruses hide on a disk and when you access the disk (either a diskette or another hard disk over a network) the virus program will start and infect your computer. the famous Friday the 13th virus will activate only when it is both a Friday and the 13th of the month. More Information: McAfee Anti-virus software http://www. Many anti-virus programs. such as Norton Anti Virus allow you to update the program so that the program can check for recently discovered viruses. Since employees often spend a considerable amount of time developing contacts and confidential and copyrighted information for the company they work for they often feel they have some right to the information and are inclined to copy and/or delete part of it when they leave the company. It is vital to keep your virus monitoring software up to date.ECDL Module 1 – Page 45 • Data theft is a growing problem primarily perpetrated by office workers with access to technology such as desktop computers and hand-held devices capable of storing digital information such as flash drives. Different viruses are activated in different ways. either via use of infected floppy disk. For instance.symantec. The Internet allows you to access files from all over the world and you should never connect to the Internet unless you have a virus-checking program installed on your computer. Viruses Computer viruses • Hint Viruses are small programs which hide themselves on your disks (both diskettes and your hard disk).com Norton Anti-virus software http://www.com Protecting against computer virus infection • There are a number of third party anti-virus products available. or over a computer network.mcafee.drsolomon. The worst thing about a computer virus is that it can spread from one computer to another. the first time that you know that you have a virus is when it activates.
• The limitations of anti virus software • Anti virus software can only detect viruses (or types of viruses) which the software knows about. Kullegg San Gorg Preca – Liceo Subien . If your virus checker alerts you to a virus. The other common method of infection is via emails. then the chances are that it has caught the virus before the virus could infect your computer and cause damage.ECDL Module 1 – Page 46 • If you discover a virus on your computer don’t panic. If you work within a larger company. If the diskette contains a virus. and it should automatically remove the virus. As such it is vital that you keep your anti virus software up to date so that it can detect new viruses which are constantly appearing. For instance you may insert a diskette into your computer and the virus checker should automatically scan the diskette. Be sure that you are familiar with your company’s policy regarding viruses. you should have a company IT support group which will come and rid your computer of viruses. a message will be displayed telling you that the diskette is infected.
This is also normally unlawful. Do not do this. or distributor to exclusive publication. or movie clips from Star Trek. you could find yourself being prosecuted. Most programs which you purchase are copyrighted and you must not copy them. There are many sites offering free graphics and clipart.ECDL Module 1 – Page 47 Legal Issuesaaaaaaaaaaaaaaaaabbbbbibaa Copyright What is copyright? • The legal right granted to an author. If you do so you may be breaking the law and if caught. ALWAYS first make sure that you have a licence which entitles you to copy the software. Never copy text without authority to do so and always quote your sources. if your manager tells you to copy software. it has become possible to copy entire CD-ROMs which can contain software. which are dedicated to preventing the illegal copying of software. If you can download a film for free before it is even officially available on video/DVD. Many sites however may not have this authority.startrek.com) you will see that use of images. musical. Abbreviated as (c) or ©. Most text which you will find on the Internet is copyrighted. playwright. it is a pretty good bet that the site is unauthorised. or distribution of a literary. publisher. Some sites even allow the 'free' download for complete films or music tracks. Even downloading sound clips to replace the bleeps which Microsoft Windows makes is often illegal. games or data. Many people will buy a copy of a game and make a copy for their friends or other family member. or artistic work. sound clips. Always be careful of software which you may find advertised at very cheap prices. such as FAST (the Federation Against Software Theft). In a business situation. production.don't' is the safe rule. because in many countries. Even lending your program disks or CD-ROM to other people may be breaking the law in most cases. Cover yourself. it may be illegally copied. composer. There are numerous organisations. If you visit the official Star Trek site (www. Get written permission to used downloaded materials and 'if in doubt . Some are genuine and have the authority to offer you a free download of images. dramatic. Popular examples are pictures. sale. Because CD-ROM writers have become so widely available. • • • Copyright Issues when copying files • Transferring files across a LAN: You need to be careful that you do not accidentally make copies of Kullegg San Gorg Preca – Liceo Subien . and even the name 'Star Trek' is protected and may not be used on 'fan sites'. you will be personally liable for damages.
then you can either purchase a separate copy of the software you require for each PC. • • • • Site Licenses Site licences are used by larger organisations • Many large companies do not go out and buy a certain amount of 'shrink-wrapped' copies of each software product which they need. It is very important not to confuse freeware and shareware. It is possible to download entire software packages from the net. It is often fully functional. This 'try before you buy' method of getting software is becoming increasing popular with the major software suppliers. you may. Just because a site may say you are free to download materials from the site. where the aim was not to profit from the software. Shareware: This is where you can use software for a free trial period. even entire movie films. You are certainly not allowed to copy and re-sell commercial software. You are not allowed to distribute copies to family and friends. The more copies you make the more the user licence will cost. in some cases be allowed to make a single. or better: you can purchase a user licence. Freeware: This is software which can be copied or downloaded for free. Sometimes the shareware versions may be fully functional. In many cases however it is not legal to do so. pay for) your software. but the cheaper the effective cost per PC. does not necessary mean that the owners of the Internet site have the authority to allow you to do this. asking you to register (i. instead they will buy a site licence. User Licences: If you have more than one PC. • Downloading files from the Internet: You need to be VERY careful when downloading files from the Internet. Copying diskettes / CD-ROMs / DVD / ZIP disks: If you purchase software. Examples may include software developed by organisations such as Universities.ECDL Module 1 – Page 48 software via your Local Area Network (unless of course you are authorised to make such copies). This user licence allows you to make copies and install them on each computer. or in some cases it may stop working altogether after the trial period.e. but after a time period will either start to display an annoying message. backup copy of disk. These site licences are different in Kullegg San Gorg Preca – Liceo Subien .
normally via a company network. A typical software license grants an end-user permission to use one or more copies of software in ways where such a use would otherwise constitute copyright infringement of the software owner's exclusive rights under copyright law. Software licenses can generally be fit into the following categories: proprietary licenses and free and open source licenses. which include free software licenses and other open source licenses.com What is freeware? • Some software is made freely available. What is shareware? • Shareware is software which is freely available and is designed to let you use the product for free.ECDL Module 1 – Page 49 their small print. Checking software licence status • A software license (or software licence in commonwealth usage) is a legal instrument (by way of contract law) governing the usage or redistribution of software. This agreement can be very large and is drawn up to protect the manufacturers of a product from being prosecuted due to faulty software. Always read any licences supplied with such software very carefully before use. Software can also be in the form of freeware or shareware. What is an ‘end-user license agreement’ within Office 2007 software • Normally when you install software these days there is a step within the installation routine in which you have to agree to be bound by the end user licence agreement. More information: http://shareware. The features that distinguishes them are significant in terms of the effect they have on the end-user's rights. you must legally either remove it. a lot of software is produced by the educational community and is made freely available. or pay an amount to the producers of the product. Types of licence agreement • Some software comes with the license when purchased off the shelf or an OEM license when bundled with hardware. All software is copyright protected.cnet. After this period. for a limited period while you decide if you like it or not. I recently printed out a Microsoft end user agreement and it was over 15 pages long. It also defines how many copies of the software you are entitled to. Kullegg San Gorg Preca – Liceo Subien . Demonstration disks often come under this category. but generally mean that the companies purchasing the licence can make a fixed numbers of copies available to their staff. In addition. Contractual confidentiality is another way of protecting software. irrespective of whether it is in the public domain.
relevant and not excessive in relation to that purpose or those Kullegg San Gorg Preca – Liceo Subien .uk/acts/acts1984/1984035. In many countries. Data Protection Legislation • Listed below are the main principles of the UK Data Protection Act. this right is enshrined under data protection laws.gov. In the same way doctors. This is meant as an illustration only and should NOT be used for determining liability or operating principles.htm The information to be contained in personal data shall be obtained. which is both sensitive and private. In a free society you have the right to ensure that the information held about you is not abused.hmso. then you have a moral and legal duty to treat that information with respect. For instance if a police force computer is used by unscrupulous people to gain unauthorised information about a person’s private life.pro.uk/recordsmanagement/dp/default. Such licenses may have additional restrictions such as a requirement to preserve the name of the authors and the copyright statement within the code. that would be a clear breach of trust. One popular (and sometimes considered normative) set of open source software licenses are those approved by the Open Source Initiative (OSI) based on their Open Source Definition (OSD).ECDL Module 1 – Page 50 Open source software • An open source license is a copyright license for computer software that makes the source code available under terms that allow for modification and redistribution without having to pay the original author. and personal data shall be processed.gov.htm#aofs http://www. government departments and credit agencies often hold vast amounts of information about the general public. Data Protection Data Protection and Privacy Issues • If your computer system holds information about individuals. For more information about the UK data protection act please access the following Web sites: http://www. fairly and lawfully. Personal data held for any purpose or purposes shall not be used or disclosed in any manner incompatible with that purpose or those purposes. You must read the full details of the act if you are considering legal implementation. Personal data held for any purpose or purposes shall be adequate. Personal data shall be held only for one or more specified and lawful purposes.
or alteration. where necessary.alter inaccurate or incorrect data. Personal data shall be accurate and. . whether it is simply our name and contact details. kept up to date. An individual shall be entitled at reasonable intervals and without undue delay or expense to be informed by any data user whether he holds personal data of which that individual is the subject. Personal data held for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. . personal data and against accidental loss or destruction of personal data. Data protection legislation relating to those that keeps data (data collectors) • Forms and questionnaires are used frequently in the business of the university. we are invariably providing information about ourselves. These include the right to: . When we fill in a form. disclosure or destruction of.see data held on them on request. and access to any such data held by a data user. and the mistake causes harm to them.sue if data is wrong.ECDL Module 1 – Page 51 purposes. Kullegg San Gorg Preca – Liceo Subien . including personal information about individuals. in order to collect all kinds of information. Personal data held by data users or in respect of which services are provided by persons carrying on computer bureau. to have such data corrected or erased. and where appropriate. Appropriate security measures shall be taken against unauthorised access to. Data protection legislation relating to individuals about which data is stored (data subjects) • Data subjects have a number of rights.
Information Systems Integrated Services Digital Network Information Technology Kilobyte. Local Area Network Kullegg San Gorg Preca – Liceo Subien . A gigabyte consists of 1024 MBytes Measurement of computer speed.Read Only Memory Central Processing Unit Digital Audio Tape Disk Operating System Digital Subscriber Lines Digital Versatile Disk File Transfer Protocol Gigabyte. Gigahertz Graphical User Interface Hertz ( this is a measurement of frequency (i.ECDL Module 1 – Page 52 ABBREVIATIONS & TERMINOLOGYvvv vv Item ADSL Bit BPS Byte CBT CD CD-R CD-ROM CPU DAT DOS DSL DVD FTP GByte GHz GUI Hz IS ISDN IT KByte LAN Meaning Asymmetric Digital Subscriber Line 1 or 0 level of storage is called a bit Bits Per Second A measurement of storage capacity Computer Based Training Compact Disk Compact Disk . speed).e. A kilobyte (KB) consists of 1024 bytes.Recordable Compact Disk .
ECDL Module 1 – Page 53 MByte MHz PC PSTN RAM ROM Megabyte. A megabyte (MB) is one million bytes Million Hertz Personal Computer Public Switched Telephone Network Random Access Memory Read Only Memory Read Only Memory .Basic Input Output System ROM-BIOS RSI TByte UPS USB VDU WAN WWW Repetitive Strain Injury Terabyte. A terabyte (TB) is one million MBytes Uninterruptible Power Supply Universal Serial Bus Visual Display Unit Wide Area Network World Wide Web • Kullegg San Gorg Preca – Liceo Subien .
ECDL Module 1 – Page 54 Kullegg San Gorg Preca – Liceo Subien .
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.