SlideShare une entreprise Scribd logo
1  sur  87
Responsible Use of ICT – End User Training
End-User Training for Novice ICT
Users
eSkwela team
APEC Training Program for Preventive Education on ICT Misuse
Responsible Use of ICT – End User Training
Concepts of ICT
Proper Handling of Computers
Keyboard and Mouse Operation
Linux Desktop Environment
File Management
Responsible Use of ICT – End User Training
CONCEPTS OF INFORMATION ANDCONCEPTS OF INFORMATION AND
COMMUNICATION TECHNOLOGYCOMMUNICATION TECHNOLOGY
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
3. Online opinion
What is Data?What is Data?
 Refers to the facts and
figures relating to events that
take place
 refers to things “known”
 a collection of independent raw
facts, numbers, letters, symbols
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
3. Online opinion
What is Information?What is Information?
• Information is data that is made
meaningful based on the needs of the
user through manipulation.
• A computer can only process
data and create new data.
The data have to be
interpreted to yield the
information
1+1 = 2
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
3. Online opinion
Desirable Qualities of InformationDesirable Qualities of Information
 Relevance
 Completeness
 Timeliness
 Accuracy
 Cost Effective
R
ELEV
A
N
C
E
COMPLETENESS
TIMELINESS
ACCURACY
COST EFFECTIVE
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
3. Online opinion
Data Processing ConceptsData Processing Concepts
Input-Process-Output Model
 Refers to a conceptual framework wherein input in
the form of data is processed which would result in
the generation of an output in the form of
information.
PROCESS
DATA INFORMATION
INPUT OUTPUT
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
Data Processing CyclesData Processing Cycles
Flow of data from
the moment it is
recorded until the
time it becomes a
usable piece of
information
Origination
Input
Preparation
Processing
Output
Preparation
Storage
Feedback
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
3. Online opinion
What is Information Technology?What is Information Technology?
• Information Technology (IT) is the totality of
means employed to systematically collect, process,
store, present, and share information, in support of
human intellectual activities.
• Information Technology is also known as
Information and Communications Technology
(ICT)
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
What is CommunicationWhat is Communication
Technology?Technology?
 The electronic transfer of information from one location to
another
• DATA COMMUNICATIONS or DATACOM refers to digital
transmission.
• TELECOMMUNICATIONS or TELECOM refers to a mix of
voice and data, both analog and digital
• NETWORKING refers specifically to LANs
and WANs. Transmission of information
over the network
WANWAN
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
What is Computer?What is Computer?
Computer is an electronic data processing machine
capable of performing mathematical and logical
operations and processing large volumes of data at
high speed
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
Capabilities of ComputerCapabilities of Computer
• Ability to perform arithmetic and logical operations
• Ability to store and retrieve information
• Ability to handle large volumes of repetitive tasks
accurately
• Can communicate with its operators and other
machines.
• Capable of remote processing
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
Limitations of ComputerLimitations of Computer
• Information is provided by a human being
• Can detect but cannot correct an inaccurate entry
by itself
• Subject to occasional breakdown
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
Computer System ComponentsComputer System Components
• Dataware
The systematic and organized collection of data and
procedures relevant to the organization
• Peopleware
The personnel who manage the EDP system, who design
applications, who write and encode the programs
• Hardware
The computer and all of its physical components such as disk
drives, printer, input terminals
• Software
The non-physical components such as computer programs,
computer language and operating system
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
The DatawareThe Dataware
 Specifies the manner in which data will be obtained
and prepared
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
The PeoplewareThe Peopleware
 Personnel involved in the design, development,
installation and maintenance of computer
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
The HardwareThe Hardware
 Refers to the equipment/devices that make the
computer system perform one or more functions
 Computer and all of its other physical components
Functional Components
 Input Devices
 Output Devices
 Central Processing Unit
 Secondary Storage Unit
Data Communication Devices
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
Input DevicesInput Devices
 Handle the entering in of programs and data
through the keyboard or other input devices
Keyboard Mouse
Joystick and wheel
Touch Screen
Stylus and Digital Pen
Digital Camera and Web Camera
Scanner
Bar Code Reader
Image source: Discovering Computers 2008
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
Output DevicesOutput Devices
 Translate the result of computer processing into
human readable form through the monitor or printer
Image source: Discovering Computers 2008
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
Central Processing UnitCentral Processing Unit
 Heart of the computer which handles the entire
operation of the system
 Also known as the central processor and sometimes
the brain of the computer system
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
StorageStorage
 Also known as the secondary memory which serves
as the storage area of the computer system
Image source: Discovering Computers 2008
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
The Parts of the ComputerThe Parts of the Computer
image from http://www.pcguide.com/intro/over.htm
Responsible Use of ICT – End User Training
The Parts of the ComputerThe Parts of the Computer
Concepts of Information and Communication Technology
Responsible Use of ICT – End User Training
The Parts of the ComputerThe Parts of the Computer
((Internal Parts of System UnitInternal Parts of System Unit))
Concepts of Information and Communication Technology
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
The SoftwareThe Software
 Refers to the non-physical components, such as the
operating system and the machine coded
instructions that direct and control the different
hardware facilities
Types of Software
 System Software
 Application Software
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
System SoftwareSystem Software
• Provides an interface between the programmers and operators
and between the hardware system and the application
software
 Operating Systems
Supervises the overall operation of the computer, controls the
flow of programs in and out of the system, switches
input/output machines and calls program from storage
Responsible Use of ICT – End User Training
Concepts of Information and Communication Technology
Application SoftwareApplication Software

Refers to programs designed to perform specific data
processing tasks for a particular application

Usually written by the vendor or user that contains the logic to
update and maintain a company’s records or files to ease the
burden of day-to-day operation of the company
Responsible Use of ICT – End User Training
Proper Use of ComputersProper Use of Computers
Responsible Use of ICT – End User Training
Proper Use of Computers
VDT SyndromeVDT Syndrome
• VDT Syndrome
Is health problem caused by wrong use of the
computer and once
VDT's (Visual Display Terminals) place a significant level 
of strain on our eyes. Anyone who uses one often can 
attest to this fact. In some studies, up to 80% of VDT 
users report 'Computer Vision Syndrome' symptoms of 
eyestrain. The reason for this prevalence comes from 
both ergonomic and physiologic factors.
-http://www.visionarts.ca/vdtuse.htm
Responsible Use of ICT – End User Training
Proper Use of Computers
VDT SyndromesVDT Syndromes
VDT Syndromes are as follows.
① Carpal tunnel syndrome: Pain at the hand and
the wrist and fingers become numbed.
② Myofascial pain syndrome: Stiffness or sharp
pain at the back of neck, shoulder or waist.
③ Turtle neck syndrome: Forms a bent back pose
with head forward.
④ Visual system indisposition syndrome: Loss of
sights or develop eye diseases like keratitis or
conjunctivitis.
.
Responsible Use of ICT – End User Training
Preventing VDTPreventing VDT
• Ergonomics is the science of designing equipment of a
safe and comfortable working environment. Computer
Ergonomics is about things that you can do to make
working on a computer more comfortable and safer for
your body.
• Ergonomic factors are now fairly well understood by
most VDT users: have a comfortable chair, good lighting
(free of glare), quality monitor with high refresh rate,
etc.
Proper Use of Computers
http://www.visionarts.ca/vdtuse.htm
Responsible Use of ICT – End User Training
Proper Use of Computers
Preventing VDTPreventing VDT
• Lower the monitor and increase room humidity.
• Place the computer 10~20 degrees below the eye
level.
• Wear protective glasses.
• Take 15mins break for every hour.
• Distance from user to monitor should be more than
50cm, your fingertips touching the monitor when
stretched out.
• Choose monitor or computer models that produce
less electromagnetic waves.
Responsible Use of ICT – End User Training
Proper Use of Computers
Preventing VDTPreventing VDT
Preventing VDT
• Clean the monitors to prevent reflection from stains
or dusts.
• Use blinds or curtains to prevent from monitor to
reflect lights.
• Lower the brightness of the monitor.
• Avoid colors that provokes the eyes.
• Sit properly at the chair with your back straight and
body close to the desk.
• Feet should be placed on the floor and relaxed. Do
not cross your legs..
Responsible Use of ICT – End User Training
Proper Use of Computers
VDT Prevention Daily ExerciseVDT Prevention Daily Exercise
Arm Exercise Wrist Exercise Shoulder Exercise
Neck Exercise
Whole Body Exercise
Responsible Use of ICT – End User Training
Proper Use of Computers
Proper Workstation DesignProper Workstation Design
1. Position in a well-ventilated room.
2. Use an adjustable workstation: ergonomic
computer chairs.
3. Place the monitor 16 to 24 inches away, at eye
level or slightly at a lower angle. Tilt the monitor or
adjust the light source. Adjust the brightness and
contrast settings.
4. Use extendable/retractable legs of the keyboard.
5. Mouse must be easily accessible by your dominant
hand.
6. Use a document holder to minimize vertical head
movements.
Responsible Use of ICT – End User Training
Proper Use of Computers
Proper Workstation DesignProper Workstation Design
http://www.funonthenet.in/images/stories/forwards/correct%20postures/posture1.jpg
• Position in a well-ventilated room
• Use a document holder to
minimize vertical head movements
•Use an adjustable workstation:
ergonomic computer chairs.
Responsible Use of ICT – End User Training
Proper Use of Computers
Good PostureGood Posture
http://www.funonthenet.in/images/stories/forwards/correct%20postures/posture1.jpg
Responsible Use of ICT – End User Training
Proper Use of Computers
Good PostureGood Posture
http://www.funonthenet.in/images/stories/forwards/correct%20postures/posture1.jpg
Responsible Use of ICT – End User Training
Proper Use of Computers
Good PostureGood Posture
http://www.funonthenet.in/images/stories/forwards/correct%20postures/posture1.jpg
Responsible Use of ICT – End User Training
Proper Use of Computers
Good Working HabitsGood Working Habits
• Tap on the keys/mouse buttons gently.
• Avoid long, uninterrupted periods of typing.
– Take short stretch breaks, ideally every 20 minutes, to
prevent fatigue.
– Avoid staring at the monitor for long periods.
– Take vision breaks: Focus on objects at least 20 feet away.
– Do eye exercises.
Responsible Use of ICT – End User Training
MOUSE AND KEYBOARDMOUSE AND KEYBOARD
OPERATIONSOPERATIONS
Responsible Use of ICT – End User Training
Mouse and Keyboard Operations
Mouse OperationsMouse Operations
• A mouse is a handheld pointing device for computers. It is fitted
with one or more buttons and shaped to fit naturally under the
hand, and is used to select and move objects on the screen.
• Mouse Pointer: Often in the form of an arrow, represents the
movement of the mouse or any pointing device on the screen.
Used to point to selected areas, icons, applications, text, objects,
etc.
Responsible Use of ICT – End User Training
Mouse and Keyboard Operations
Mouse OperationsMouse Operations
• Point. Moving the mouse to the desired location and pointing to the object.
• Click. Pressing the left mouse button
• Double Click. Pressing the left mouse button twice. Used to start or open an
application
• Drag. Holding down the left mouse button while moving the mouse
• Click and Drag. Action for highlighting a selection. Point the mouse button at
the start of the selection, and then click and drag the mouse to the end of the
selection.
• Drag and Drop. Action for moving an object or selection. Click on the object
and hold down the mouse button, drag the object to desired location, and drop
to the new destination by releasing the mouse button.
Responsible Use of ICT – End User Training
Mouse and Keyboard Operations
PointersPointers
Different pointers you will encounter:
• Mouse pointer (Normal Arrow): Appears if you have a mouse
installed and it is used to point or to select a command or objects.
• Resizing Arrow: Two-headed arrow that appears at the window
borders to resize a window.
• Insertion Arrow/Cursor: The I-beam that you usually see when
you are working on a document, showing the exact
location/position where you can type or insert text or graphic.
Responsible Use of ICT – End User Training
Mouse and Keyboard Operations
KeyboardKeyboard
Responsible Use of ICT – End User Training
LINUX DESKTOP ENVIRONMENTLINUX DESKTOP ENVIRONMENT
Responsible Use of ICT – End User Training
Linux Desktop Environment
Linux Operating SystemLinux Operating System
• Linux is an operating system that is used today to run a variety of
applications on a variety of different hardware. It is a multitasking
and a multi-user operating system that has the ability to manage
thousands of tasks at the same time, including allowing several
users to access the system simultaneously.
Responsible Use of ICT – End User Training
Linux Desktop Environment
Edubuntu LinuxEdubuntu Linux
• Edubuntu is a complete Linux-based operating system, freely
available with community- based support.
• Some highlights of Edubuntu
– most of the KDE Edutainment Suite: a collection of fun educational
software (for science, Math, language)
– Gcomprise: huge collection of activities for the kindergarten. It gently
introduces kids to basic computer use, then it builds on that by expanding
to basic maths, reading activities, and more.
– Tux4Kids: includes TuxPaint, TuxMaths, and TuxTyping
– Schooltool
– OpenOffice suite
– Scribus desktop publishing: alternative to Pagemaker
Responsible Use of ICT – End User Training
Linux Desktop Environment
Log in to EdubuntuLog in to Edubuntu
• Log in to the system to begin a session. To login (also log in, log
on, sign on) is the to access a computer system by entering your
user name so that you get credentials that will let the system give
you access. It is an integral part of computer security procedure.
• The use of a computer login procedure provides an audit trail for
use of the system.
• Username: Used in preference to the full name of the user,
although that also is allowed.
• Password: Another sequence of characters, kept secret from
others, that provides the user with a key to get into the system
Responsible Use of ICT – End User Training
Linux Operating System
Edubuntu Login ScreenEdubuntu Login Screen
Responsible Use of ICT – End User Training
Linux Desktop Environment
Overview of GNOMEOverview of GNOME
• GNOME is the GNU graphical desktop, the default
desktop environment on Ubuntu, as well as Edubuntu. It
provides you with file managers, network browsers,
menus, and system tools.
Responsible Use of ICT – End User Training
Linux Desktop Environment
Desktop EnvironmentDesktop Environment
Responsible Use of ICT – End User Training
Linux Desktop Environment
Desktop EnvironmentDesktop Environment
• Desktop: Where icons or symbolic representations of frequently
used files and folders may be placed. GNOME provides multiple
desktops, each of which has its own windows.
• Panel: Located at the top of the screen, used to start applications
and administer your system; contains the pulldown menus for
Applications, Places, System, and other icons which help you
start an application when clicked (e.g. Mozilla Firefox, Mail, and
Help)
• Taskbar: Located at the bottom of the desktop, used to switch
between and manage currently running applications.
Responsible Use of ICT – End User Training
Linux Desktop Environment
Parts of Application WindowParts of Application Window
Responsible Use of ICT – End User Training
Linux Desktop Environment
Parts of Application WindowParts of Application Window
• Title Bar: Shows the name of the application or document. If
more than one window is open, the title bar for the active window
has a different color compared to the title bars of inactive
windows.
• Standard buttons on their title bar
– Minimize button: Reduces the window to a button on the task bar.
Window is still open, just inactive.
– Maximize button: To make your window occupy the entire desktop.
– Restore button: To bring back the size of the window to its previous size
(click the Restore button if the window is maximized or click the window
button from the taskbar if the window is minimized).
– Close button: To close the current window or exit the application.
Responsible Use of ICT – End User Training
Linux Desktop Environment
Parts of Application WindowParts of Application Window
• Menu Bar: A menu contains a list of commands, or actions you
can carry out with windows. Most applications have a File menu,
an Edit menu, and a Help menu.
• Toolbar : A row, column, or block of onscreen buttons or icons
that activate certain functions of the program – serving as
shortcuts to commands.
• Status Bar: A horizontal line of information displayed at the
bottom or top of an application window that reports information
about the current state of the program or the data contents in the
window.
Responsible Use of ICT – End User Training
Linux Desktop Environment
Parts of Application WindowParts of Application Window
• Scroll Bars: A horizontal or vertical bar that contains a
box that looks like an elevator in a shaft.
• Two types of Scroll Bars:
1. Horizontal Scroll Bar: located at the bottom of a window or
application.
2. Vertical Scroll Bar: located at the right side of a window or
application.
Responsible Use of ICT – End User Training
Linux Desktop Environment
Working with Application WindowsWorking with Application Windows
• Opening a window
Double-click any icon from the Desktop or choose the
application from the Panel.
Responsible Use of ICT – End User Training
Linux Desktop Environment
Working with Application WindowsWorking with Application Windows
Moving a window to a different location
a. Drag the Title bar of the window to the new location. As
you move the mouse pointer, an outline of the window
moves with it.
b. Release the mouse button.
c. To cancel the move, press ESC before releasing the
mouse.
Responsible Use of ICT – End User Training
Linux Desktop Environment
Working with Application WindowsWorking with Application Windows
Resizing a window
Use the Resizing Arrow to resize a window to the desired size.
The minimum size for all windows is about 2 inches by 1 inch.
Some windows, like the dialogue boxes, cannot be resized.
Responsible Use of ICT – End User Training
Linux Desktop Environment
Working with Application WindowsWorking with Application Windows
Switching Between Windows
Using the Taskbar – Click with the left mouse button on
the appropriate taskbar button. This will bring you to the
selected application immediately.
Responsible Use of ICT – End User Training
Linux Desktop Environment
Getting HelpGetting Help
Help is available basically everywhere:
• On the desktop, just use the right mouse button and
choose Help On Desktop.
• On the panel, click the Question Mark button.
• All help is HTML–based, so using the help system is as
easy as using your favorite web browser.
Responsible Use of ICT – End User Training
Linux Desktop Environment
Changing the DesktopChanging the Desktop
BackgroundBackground
GNOME allows you to choose what image or pattern you have as
your desktop's background.
1. From the Panel, choose Preferences.
2. Click on the Desktop Background (the Desktop Background
dialogue box will appear)
3. Check the Fill Screen button to configure the wallpaper on the
desktop.
4. You can also choose the Desktop color by clicking the Desktop
Colors button.
5. Click the Close button if you are done setting up the Desktop
Background.
Responsible Use of ICT – End User Training
Linux Desktop Environment
Setting Up Screen SaverSetting Up Screen Saver
• A screensaver is a moving pattern or bitmap that appears
on your monitor after you have not used your computer
for a specified amount to time. Screensavers can reduce
the wear of your screen and provide security for your
system.
Responsible Use of ICT – End User Training
Configuring Desktop
Setting Up Screen SaverSetting Up Screen Saver
Selecting a Screensaver
1. From the Panel, choose System.
2. Select Preferences and click Screensaver.
3. The Screensaver dialog box will appear.
4. Select a screensaver from the list.
5. To configure the selected Screensaver, click the Settings
button and a Dialog box will appear.
Responsible Use of ICT – End User Training
Configuring Desktop
Setting Up Screen SaverSetting Up Screen Saver
Testing a Screensaver
• From the Screensaver dialog box, choose Preview and
the selected Screensaver will appear.
Stopping a Screensaver
• To return to the application window (i.e. your returning
to your “work”) when the Screensaver is on your screen,
move the mouse or click any key from the keyboard to
reactivate the monitor.
Responsible Use of ICT – End User Training
Linux Desktop Environment
Terminating a Linux SessionTerminating a Linux Session
Logging Out
1. From the Panel, choose System.
2. Click Logout and a dialog box will appear.
3. Choose an option below on how you want your system
to behave:
– Logout
– Shutdown
– Restart the computer
– Hibernate the computer
Responsible Use of ICT – End User Training
FILE MANAGEMENTFILE MANAGEMENT
Responsible Use of ICT – End User Training
File Management
Managing FilesManaging Files
• The File Browser is a powerful tool that can help organize your
files and directories.
• You use File Browser to manage your files and directories like
moving, copying, starting an application, and many others.
• To start the File Browser application, click on Computer from the
Places menu on the Panel.
• A common metaphor for graphical desktops is the use of folders
to represent directories on your hard disk. Folders contain files
and other folders.
Responsible Use of ICT – End User Training
File Management
Managing FilesManaging Files
Responsible Use of ICT – End User Training
File Management
Identifying files and directoriesIdentifying files and directories
• You can use File Browser to work with files and
directories individually or in groups.
• To the left of each filename or directory name in
the Contents list is an icon to help you identify
its type.
• In File Browser, each filename or directory name
has an icon next to it, indicating what kind of file
it is. This is called loon.
Responsible Use of ICT – End User Training
File Management
Creating Files or DirectoriesCreating Files or Directories
To create a directory:
1. From the Panel, click the Places menu.
2. Choose the Computer command from the Menu and the
Computer File Browser dialogue box will appear.
3. Choose the destination of the folder/directory.
4. Right-click on the right pane and choose Create Folder.
5. Type the folder/directory name.
Responsible Use of ICT – End User Training
File Management
Creating Files or DirectoriesCreating Files or Directories
To create an empty file:
1.From the Computer File Browser, choose the
destination of the file.
2.Right-click on the right pane and choose Create
Document > Empty File.
3.Type the filename.
Responsible Use of ICT – End User Training
File Management
Copying Files or DirectoriesCopying Files or Directories
To copy a file:
1. From the File Browser, choose the file you want to copy.
2. Right-click the file and choose the Copy command.
3. Select the destination of the file you want to copy.
4. Right-click the selected destination and choose the Paste
command.
Responsible Use of ICT – End User Training
File Management
Copying Files or DirectoriesCopying Files or Directories
To copy a folder or directory:
1. From the File Browser, right-click the folder or directory
you want to copy and then choose the Copy command.
2. Right-click on the selected destination and then choose
Paste.
Responsible Use of ICT – End User Training
File Management
Moving Files or DirectoriesMoving Files or Directories
To move a file:
1. From the File Browser, choose the file you want to
move.
2. Right-click the file and click the Cut command.
3. Select the destination of the file you want to copy.
4. Right-click the selected destination and choose the Paste
command or Paste in
5. Folder if you want to put the file inside a folder.
Responsible Use of ICT – End User Training
File Management
Moving Files or DirectoriesMoving Files or Directories
To move a folder or directory:
1. From the File Browser, choose the directory you want to
move.
2. Right-click the file and click the Cut command.
3. Select the destination of the file you want to copy.
4. Right-click the selected destination and click the Paste
command.
Responsible Use of ICT – End User Training
File Management
Renaming Files or DirectoriesRenaming Files or Directories
To rename a file:
1. From the File Browser, choose the file you want to
rename.
2. Right-click the file and click the Rename command.
3. Type the new filename and then press the Enter key.
Responsible Use of ICT – End User Training
File Management
Renaming Files or DirectoriesRenaming Files or Directories
To rename a folder or directory:
1. From the File Browser, choose the directory you want to
rename.
2. Right-click the file and click the Rename command.
3. Type the new folder or directory name and then press the
Enter key.
Responsible Use of ICT – End User Training
File Management
Deleting Files or DirectoriesDeleting Files or Directories
• File deletion, or removing a file from a computer's file
system, is done for the following reasons:
– To free up the disk space
– To remove duplicate or unnecessary data to avoid confusion
– To make sensitive information unavailable to others
Responsible Use of ICT – End User Training
File Management
Deleting Files or DirectoriesDeleting Files or Directories
To delete a file:
1. From the File Browser, choose the file you want to
delete.
2. Press the Delete button from the keyboard.
Responsible Use of ICT – End User Training
File Management
Deleting Files or DirectoriesDeleting Files or Directories
To delete a folder or directory:
1. From the File Browser, choose the folder or directory
you want to delete.
2. Press the Delete button from the keyboard.
Responsible Use of ICT – End User Training
File Management
Deleting Files or DirectoriesDeleting Files or Directories
• The common problem with deleting files is accidental
removal of information that later proves to be important.
• Precautionary measures:
– back up your files regularly
– move them the trash, temporary place where they are kept
until one is really low on free space
– mark important files as read-only
Responsible Use of ICT – End User Training
File Management
Deleting Files or DirectoriesDeleting Files or Directories
• The common problem with deleting files is accidental
removal of information that later proves to be important.
• Precautionary measures:
– back up your files regularly
– move them the trash, temporary place where they are kept
until one is really low on free space
– mark important files as read-only
Responsible Use of ICT – End User Training
File Management
Viewing Contents of Drives orViewing Contents of Drives or
DirectoriesDirectories
Changing Folders or Directories:
• You can display the content of a resource available on
your system by clicking the resource from the Side
Pane.
1. Click a resource on the Side Pane and the content of the
resource will be displayed on the right half of the File
Browser.
2. To change the folder or directory being viewed, double-click
on the Folder or Directory you want to view.
Responsible Use of ICT – End User Training
File Management
Displaying Subfolders andDisplaying Subfolders and
subdirectoriessubdirectories
• If the folder or directory you want is not displayed,
expand that particular folder or directory by clicking the
arrow beside the resource.
1. Click the folder or directory whose contents you want to
view.
2. To go back, click the Back button from the Toolbar.
Responsible Use of ICT – End User Training
End of presentation

Contenu connexe

Tendances

Using Information Technology Ch 1
Using Information Technology Ch 1Using Information Technology Ch 1
Using Information Technology Ch 1Mazhar Masood
 
Information Technology
Information TechnologyInformation Technology
Information Technologyshehzadbilal
 
Introduction to Information technology - Course Intro
Introduction to Information technology - Course IntroIntroduction to Information technology - Course Intro
Introduction to Information technology - Course IntroKaushik Panta
 
TID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information TechnologyTID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information TechnologyWanBK Leo
 
Chap1 introducing today's technologies
Chap1 introducing today's technologiesChap1 introducing today's technologies
Chap1 introducing today's technologiesLeslynBonachita1
 
How organizations use ICT
How organizations use ICTHow organizations use ICT
How organizations use ICTmkhisalg
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1MuhammedTalha7
 
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...Sreedevi Santhosh
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentationMihreteab F
 
Information technology
Information technologyInformation technology
Information technologyPrasanth Yadz
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Vatsal Unadkat
 
Chapter03
Chapter03Chapter03
Chapter03Izaham
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer FundamentalsMudit Khetan
 
It in business lect 2
It in business  lect 2It in business  lect 2
It in business lect 2Mahii_Raza
 

Tendances (20)

Using Information Technology Ch 1
Using Information Technology Ch 1Using Information Technology Ch 1
Using Information Technology Ch 1
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Introduction to Information technology - Course Intro
Introduction to Information technology - Course IntroIntroduction to Information technology - Course Intro
Introduction to Information technology - Course Intro
 
TID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information TechnologyTID Chapter 1 Introduction To Information Technology
TID Chapter 1 Introduction To Information Technology
 
La6 is notacd11
La6 is notacd11La6 is notacd11
La6 is notacd11
 
Basic it
Basic itBasic it
Basic it
 
Ict in education fudma 2017
Ict in education fudma 2017Ict in education fudma 2017
Ict in education fudma 2017
 
Chapter 2 : IT Components
Chapter 2 : IT ComponentsChapter 2 : IT Components
Chapter 2 : IT Components
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Chap1 introducing today's technologies
Chap1 introducing today's technologiesChap1 introducing today's technologies
Chap1 introducing today's technologies
 
How organizations use ICT
How organizations use ICTHow organizations use ICT
How organizations use ICT
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1
 
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentation
 
Information technology
Information technologyInformation technology
Information technology
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Chapter03
Chapter03Chapter03
Chapter03
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
It in business lect 2
It in business  lect 2It in business  lect 2
It in business lect 2
 

Similaire à Eskwela ict basics

Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1Mohamed EL Zayat
 
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpTìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpINFOCHIEF institute
 
Information Technology
Information TechnologyInformation Technology
Information TechnologyAman Purohit
 
Information technology and mis
Information technology and misInformation technology and mis
Information technology and misAlsufaacademy
 
The Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related TerminilogiesThe Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related TerminilogiesAdjeiKwadjo
 
Ict g 10 updated
Ict g 10 updatedIct g 10 updated
Ict g 10 updatedFikaduAbera
 
Theory lecture01-prt i
Theory lecture01-prt iTheory lecture01-prt i
Theory lecture01-prt isairasiddiqui
 
whatiscomputer-By Arun kumar
 whatiscomputer-By Arun kumar whatiscomputer-By Arun kumar
whatiscomputer-By Arun kumarArun Kumar
 
What is computer Introduction to Computing
What is computer Introduction  to Computing What is computer Introduction  to Computing
What is computer Introduction to Computing Ahmad Idrees
 
Introduction what is computer
Introduction what is computerIntroduction what is computer
Introduction what is computerUs Man
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computerssharing notes123
 
Computer fundamental introduction_and_types
Computer fundamental introduction_and_typesComputer fundamental introduction_and_types
Computer fundamental introduction_and_typesChittagong University
 

Similaire à Eskwela ict basics (20)

Notes1
Notes1Notes1
Notes1
 
Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1
 
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tậpTìm hiểu về Công nghệ thông tin (IT) toàn tập
Tìm hiểu về Công nghệ thông tin (IT) toàn tập
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Lec1 ict
Lec1 ictLec1 ict
Lec1 ict
 
Unit1_1_IIT_IM.pptx
Unit1_1_IIT_IM.pptxUnit1_1_IIT_IM.pptx
Unit1_1_IIT_IM.pptx
 
Information technology and mis
Information technology and misInformation technology and mis
Information technology and mis
 
The Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related TerminilogiesThe Concept of ICT and its Related Terminilogies
The Concept of ICT and its Related Terminilogies
 
Ict g 10 updated
Ict g 10 updatedIct g 10 updated
Ict g 10 updated
 
Theory lecture01-prt i
Theory lecture01-prt iTheory lecture01-prt i
Theory lecture01-prt i
 
whatiscomputer-By Arun kumar
 whatiscomputer-By Arun kumar whatiscomputer-By Arun kumar
whatiscomputer-By Arun kumar
 
What is computer Introduction to Computing
What is computer Introduction  to Computing What is computer Introduction  to Computing
What is computer Introduction to Computing
 
Introduction what is computer
Introduction what is computerIntroduction what is computer
Introduction what is computer
 
COMP1111.pptx
COMP1111.pptxCOMP1111.pptx
COMP1111.pptx
 
introduction to computer
introduction to computerintroduction to computer
introduction to computer
 
Chapter 01.ppt
Chapter 01.pptChapter 01.ppt
Chapter 01.ppt
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computers
 
It
ItIt
It
 
Computer fundamental introduction_and_types
Computer fundamental introduction_and_typesComputer fundamental introduction_and_types
Computer fundamental introduction_and_types
 

Dernier

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Eskwela ict basics

  • 1. Responsible Use of ICT – End User Training End-User Training for Novice ICT Users eSkwela team APEC Training Program for Preventive Education on ICT Misuse
  • 2. Responsible Use of ICT – End User Training Concepts of ICT Proper Handling of Computers Keyboard and Mouse Operation Linux Desktop Environment File Management
  • 3. Responsible Use of ICT – End User Training CONCEPTS OF INFORMATION ANDCONCEPTS OF INFORMATION AND COMMUNICATION TECHNOLOGYCOMMUNICATION TECHNOLOGY
  • 4. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology 3. Online opinion What is Data?What is Data?  Refers to the facts and figures relating to events that take place  refers to things “known”  a collection of independent raw facts, numbers, letters, symbols
  • 5. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology 3. Online opinion What is Information?What is Information? • Information is data that is made meaningful based on the needs of the user through manipulation. • A computer can only process data and create new data. The data have to be interpreted to yield the information 1+1 = 2
  • 6. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology 3. Online opinion Desirable Qualities of InformationDesirable Qualities of Information  Relevance  Completeness  Timeliness  Accuracy  Cost Effective R ELEV A N C E COMPLETENESS TIMELINESS ACCURACY COST EFFECTIVE
  • 7. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology 3. Online opinion Data Processing ConceptsData Processing Concepts Input-Process-Output Model  Refers to a conceptual framework wherein input in the form of data is processed which would result in the generation of an output in the form of information. PROCESS DATA INFORMATION INPUT OUTPUT
  • 8. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology Data Processing CyclesData Processing Cycles Flow of data from the moment it is recorded until the time it becomes a usable piece of information Origination Input Preparation Processing Output Preparation Storage Feedback
  • 9. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology 3. Online opinion What is Information Technology?What is Information Technology? • Information Technology (IT) is the totality of means employed to systematically collect, process, store, present, and share information, in support of human intellectual activities. • Information Technology is also known as Information and Communications Technology (ICT)
  • 10. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology What is CommunicationWhat is Communication Technology?Technology?  The electronic transfer of information from one location to another • DATA COMMUNICATIONS or DATACOM refers to digital transmission. • TELECOMMUNICATIONS or TELECOM refers to a mix of voice and data, both analog and digital • NETWORKING refers specifically to LANs and WANs. Transmission of information over the network WANWAN
  • 11. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology What is Computer?What is Computer? Computer is an electronic data processing machine capable of performing mathematical and logical operations and processing large volumes of data at high speed
  • 12. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology Capabilities of ComputerCapabilities of Computer • Ability to perform arithmetic and logical operations • Ability to store and retrieve information • Ability to handle large volumes of repetitive tasks accurately • Can communicate with its operators and other machines. • Capable of remote processing
  • 13. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology Limitations of ComputerLimitations of Computer • Information is provided by a human being • Can detect but cannot correct an inaccurate entry by itself • Subject to occasional breakdown
  • 14. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology Computer System ComponentsComputer System Components • Dataware The systematic and organized collection of data and procedures relevant to the organization • Peopleware The personnel who manage the EDP system, who design applications, who write and encode the programs • Hardware The computer and all of its physical components such as disk drives, printer, input terminals • Software The non-physical components such as computer programs, computer language and operating system
  • 15. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology The DatawareThe Dataware  Specifies the manner in which data will be obtained and prepared
  • 16. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology The PeoplewareThe Peopleware  Personnel involved in the design, development, installation and maintenance of computer
  • 17. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology The HardwareThe Hardware  Refers to the equipment/devices that make the computer system perform one or more functions  Computer and all of its other physical components Functional Components  Input Devices  Output Devices  Central Processing Unit  Secondary Storage Unit Data Communication Devices
  • 18. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology Input DevicesInput Devices  Handle the entering in of programs and data through the keyboard or other input devices Keyboard Mouse Joystick and wheel Touch Screen Stylus and Digital Pen Digital Camera and Web Camera Scanner Bar Code Reader Image source: Discovering Computers 2008
  • 19. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology Output DevicesOutput Devices  Translate the result of computer processing into human readable form through the monitor or printer Image source: Discovering Computers 2008
  • 20. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology Central Processing UnitCentral Processing Unit  Heart of the computer which handles the entire operation of the system  Also known as the central processor and sometimes the brain of the computer system
  • 21. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology StorageStorage  Also known as the secondary memory which serves as the storage area of the computer system Image source: Discovering Computers 2008
  • 22. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology The Parts of the ComputerThe Parts of the Computer image from http://www.pcguide.com/intro/over.htm
  • 23. Responsible Use of ICT – End User Training The Parts of the ComputerThe Parts of the Computer Concepts of Information and Communication Technology
  • 24. Responsible Use of ICT – End User Training The Parts of the ComputerThe Parts of the Computer ((Internal Parts of System UnitInternal Parts of System Unit)) Concepts of Information and Communication Technology
  • 25. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology The SoftwareThe Software  Refers to the non-physical components, such as the operating system and the machine coded instructions that direct and control the different hardware facilities Types of Software  System Software  Application Software
  • 26. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology System SoftwareSystem Software • Provides an interface between the programmers and operators and between the hardware system and the application software  Operating Systems Supervises the overall operation of the computer, controls the flow of programs in and out of the system, switches input/output machines and calls program from storage
  • 27. Responsible Use of ICT – End User Training Concepts of Information and Communication Technology Application SoftwareApplication Software  Refers to programs designed to perform specific data processing tasks for a particular application  Usually written by the vendor or user that contains the logic to update and maintain a company’s records or files to ease the burden of day-to-day operation of the company
  • 28. Responsible Use of ICT – End User Training Proper Use of ComputersProper Use of Computers
  • 29. Responsible Use of ICT – End User Training Proper Use of Computers VDT SyndromeVDT Syndrome • VDT Syndrome Is health problem caused by wrong use of the computer and once VDT's (Visual Display Terminals) place a significant level  of strain on our eyes. Anyone who uses one often can  attest to this fact. In some studies, up to 80% of VDT  users report 'Computer Vision Syndrome' symptoms of  eyestrain. The reason for this prevalence comes from  both ergonomic and physiologic factors. -http://www.visionarts.ca/vdtuse.htm
  • 30. Responsible Use of ICT – End User Training Proper Use of Computers VDT SyndromesVDT Syndromes VDT Syndromes are as follows. ① Carpal tunnel syndrome: Pain at the hand and the wrist and fingers become numbed. ② Myofascial pain syndrome: Stiffness or sharp pain at the back of neck, shoulder or waist. ③ Turtle neck syndrome: Forms a bent back pose with head forward. ④ Visual system indisposition syndrome: Loss of sights or develop eye diseases like keratitis or conjunctivitis. .
  • 31. Responsible Use of ICT – End User Training Preventing VDTPreventing VDT • Ergonomics is the science of designing equipment of a safe and comfortable working environment. Computer Ergonomics is about things that you can do to make working on a computer more comfortable and safer for your body. • Ergonomic factors are now fairly well understood by most VDT users: have a comfortable chair, good lighting (free of glare), quality monitor with high refresh rate, etc. Proper Use of Computers http://www.visionarts.ca/vdtuse.htm
  • 32. Responsible Use of ICT – End User Training Proper Use of Computers Preventing VDTPreventing VDT • Lower the monitor and increase room humidity. • Place the computer 10~20 degrees below the eye level. • Wear protective glasses. • Take 15mins break for every hour. • Distance from user to monitor should be more than 50cm, your fingertips touching the monitor when stretched out. • Choose monitor or computer models that produce less electromagnetic waves.
  • 33. Responsible Use of ICT – End User Training Proper Use of Computers Preventing VDTPreventing VDT Preventing VDT • Clean the monitors to prevent reflection from stains or dusts. • Use blinds or curtains to prevent from monitor to reflect lights. • Lower the brightness of the monitor. • Avoid colors that provokes the eyes. • Sit properly at the chair with your back straight and body close to the desk. • Feet should be placed on the floor and relaxed. Do not cross your legs..
  • 34. Responsible Use of ICT – End User Training Proper Use of Computers VDT Prevention Daily ExerciseVDT Prevention Daily Exercise Arm Exercise Wrist Exercise Shoulder Exercise Neck Exercise Whole Body Exercise
  • 35. Responsible Use of ICT – End User Training Proper Use of Computers Proper Workstation DesignProper Workstation Design 1. Position in a well-ventilated room. 2. Use an adjustable workstation: ergonomic computer chairs. 3. Place the monitor 16 to 24 inches away, at eye level or slightly at a lower angle. Tilt the monitor or adjust the light source. Adjust the brightness and contrast settings. 4. Use extendable/retractable legs of the keyboard. 5. Mouse must be easily accessible by your dominant hand. 6. Use a document holder to minimize vertical head movements.
  • 36. Responsible Use of ICT – End User Training Proper Use of Computers Proper Workstation DesignProper Workstation Design http://www.funonthenet.in/images/stories/forwards/correct%20postures/posture1.jpg • Position in a well-ventilated room • Use a document holder to minimize vertical head movements •Use an adjustable workstation: ergonomic computer chairs.
  • 37. Responsible Use of ICT – End User Training Proper Use of Computers Good PostureGood Posture http://www.funonthenet.in/images/stories/forwards/correct%20postures/posture1.jpg
  • 38. Responsible Use of ICT – End User Training Proper Use of Computers Good PostureGood Posture http://www.funonthenet.in/images/stories/forwards/correct%20postures/posture1.jpg
  • 39. Responsible Use of ICT – End User Training Proper Use of Computers Good PostureGood Posture http://www.funonthenet.in/images/stories/forwards/correct%20postures/posture1.jpg
  • 40. Responsible Use of ICT – End User Training Proper Use of Computers Good Working HabitsGood Working Habits • Tap on the keys/mouse buttons gently. • Avoid long, uninterrupted periods of typing. – Take short stretch breaks, ideally every 20 minutes, to prevent fatigue. – Avoid staring at the monitor for long periods. – Take vision breaks: Focus on objects at least 20 feet away. – Do eye exercises.
  • 41. Responsible Use of ICT – End User Training MOUSE AND KEYBOARDMOUSE AND KEYBOARD OPERATIONSOPERATIONS
  • 42. Responsible Use of ICT – End User Training Mouse and Keyboard Operations Mouse OperationsMouse Operations • A mouse is a handheld pointing device for computers. It is fitted with one or more buttons and shaped to fit naturally under the hand, and is used to select and move objects on the screen. • Mouse Pointer: Often in the form of an arrow, represents the movement of the mouse or any pointing device on the screen. Used to point to selected areas, icons, applications, text, objects, etc.
  • 43. Responsible Use of ICT – End User Training Mouse and Keyboard Operations Mouse OperationsMouse Operations • Point. Moving the mouse to the desired location and pointing to the object. • Click. Pressing the left mouse button • Double Click. Pressing the left mouse button twice. Used to start or open an application • Drag. Holding down the left mouse button while moving the mouse • Click and Drag. Action for highlighting a selection. Point the mouse button at the start of the selection, and then click and drag the mouse to the end of the selection. • Drag and Drop. Action for moving an object or selection. Click on the object and hold down the mouse button, drag the object to desired location, and drop to the new destination by releasing the mouse button.
  • 44. Responsible Use of ICT – End User Training Mouse and Keyboard Operations PointersPointers Different pointers you will encounter: • Mouse pointer (Normal Arrow): Appears if you have a mouse installed and it is used to point or to select a command or objects. • Resizing Arrow: Two-headed arrow that appears at the window borders to resize a window. • Insertion Arrow/Cursor: The I-beam that you usually see when you are working on a document, showing the exact location/position where you can type or insert text or graphic.
  • 45. Responsible Use of ICT – End User Training Mouse and Keyboard Operations KeyboardKeyboard
  • 46. Responsible Use of ICT – End User Training LINUX DESKTOP ENVIRONMENTLINUX DESKTOP ENVIRONMENT
  • 47. Responsible Use of ICT – End User Training Linux Desktop Environment Linux Operating SystemLinux Operating System • Linux is an operating system that is used today to run a variety of applications on a variety of different hardware. It is a multitasking and a multi-user operating system that has the ability to manage thousands of tasks at the same time, including allowing several users to access the system simultaneously.
  • 48. Responsible Use of ICT – End User Training Linux Desktop Environment Edubuntu LinuxEdubuntu Linux • Edubuntu is a complete Linux-based operating system, freely available with community- based support. • Some highlights of Edubuntu – most of the KDE Edutainment Suite: a collection of fun educational software (for science, Math, language) – Gcomprise: huge collection of activities for the kindergarten. It gently introduces kids to basic computer use, then it builds on that by expanding to basic maths, reading activities, and more. – Tux4Kids: includes TuxPaint, TuxMaths, and TuxTyping – Schooltool – OpenOffice suite – Scribus desktop publishing: alternative to Pagemaker
  • 49. Responsible Use of ICT – End User Training Linux Desktop Environment Log in to EdubuntuLog in to Edubuntu • Log in to the system to begin a session. To login (also log in, log on, sign on) is the to access a computer system by entering your user name so that you get credentials that will let the system give you access. It is an integral part of computer security procedure. • The use of a computer login procedure provides an audit trail for use of the system. • Username: Used in preference to the full name of the user, although that also is allowed. • Password: Another sequence of characters, kept secret from others, that provides the user with a key to get into the system
  • 50. Responsible Use of ICT – End User Training Linux Operating System Edubuntu Login ScreenEdubuntu Login Screen
  • 51. Responsible Use of ICT – End User Training Linux Desktop Environment Overview of GNOMEOverview of GNOME • GNOME is the GNU graphical desktop, the default desktop environment on Ubuntu, as well as Edubuntu. It provides you with file managers, network browsers, menus, and system tools.
  • 52. Responsible Use of ICT – End User Training Linux Desktop Environment Desktop EnvironmentDesktop Environment
  • 53. Responsible Use of ICT – End User Training Linux Desktop Environment Desktop EnvironmentDesktop Environment • Desktop: Where icons or symbolic representations of frequently used files and folders may be placed. GNOME provides multiple desktops, each of which has its own windows. • Panel: Located at the top of the screen, used to start applications and administer your system; contains the pulldown menus for Applications, Places, System, and other icons which help you start an application when clicked (e.g. Mozilla Firefox, Mail, and Help) • Taskbar: Located at the bottom of the desktop, used to switch between and manage currently running applications.
  • 54. Responsible Use of ICT – End User Training Linux Desktop Environment Parts of Application WindowParts of Application Window
  • 55. Responsible Use of ICT – End User Training Linux Desktop Environment Parts of Application WindowParts of Application Window • Title Bar: Shows the name of the application or document. If more than one window is open, the title bar for the active window has a different color compared to the title bars of inactive windows. • Standard buttons on their title bar – Minimize button: Reduces the window to a button on the task bar. Window is still open, just inactive. – Maximize button: To make your window occupy the entire desktop. – Restore button: To bring back the size of the window to its previous size (click the Restore button if the window is maximized or click the window button from the taskbar if the window is minimized). – Close button: To close the current window or exit the application.
  • 56. Responsible Use of ICT – End User Training Linux Desktop Environment Parts of Application WindowParts of Application Window • Menu Bar: A menu contains a list of commands, or actions you can carry out with windows. Most applications have a File menu, an Edit menu, and a Help menu. • Toolbar : A row, column, or block of onscreen buttons or icons that activate certain functions of the program – serving as shortcuts to commands. • Status Bar: A horizontal line of information displayed at the bottom or top of an application window that reports information about the current state of the program or the data contents in the window.
  • 57. Responsible Use of ICT – End User Training Linux Desktop Environment Parts of Application WindowParts of Application Window • Scroll Bars: A horizontal or vertical bar that contains a box that looks like an elevator in a shaft. • Two types of Scroll Bars: 1. Horizontal Scroll Bar: located at the bottom of a window or application. 2. Vertical Scroll Bar: located at the right side of a window or application.
  • 58. Responsible Use of ICT – End User Training Linux Desktop Environment Working with Application WindowsWorking with Application Windows • Opening a window Double-click any icon from the Desktop or choose the application from the Panel.
  • 59. Responsible Use of ICT – End User Training Linux Desktop Environment Working with Application WindowsWorking with Application Windows Moving a window to a different location a. Drag the Title bar of the window to the new location. As you move the mouse pointer, an outline of the window moves with it. b. Release the mouse button. c. To cancel the move, press ESC before releasing the mouse.
  • 60. Responsible Use of ICT – End User Training Linux Desktop Environment Working with Application WindowsWorking with Application Windows Resizing a window Use the Resizing Arrow to resize a window to the desired size. The minimum size for all windows is about 2 inches by 1 inch. Some windows, like the dialogue boxes, cannot be resized.
  • 61. Responsible Use of ICT – End User Training Linux Desktop Environment Working with Application WindowsWorking with Application Windows Switching Between Windows Using the Taskbar – Click with the left mouse button on the appropriate taskbar button. This will bring you to the selected application immediately.
  • 62. Responsible Use of ICT – End User Training Linux Desktop Environment Getting HelpGetting Help Help is available basically everywhere: • On the desktop, just use the right mouse button and choose Help On Desktop. • On the panel, click the Question Mark button. • All help is HTML–based, so using the help system is as easy as using your favorite web browser.
  • 63. Responsible Use of ICT – End User Training Linux Desktop Environment Changing the DesktopChanging the Desktop BackgroundBackground GNOME allows you to choose what image or pattern you have as your desktop's background. 1. From the Panel, choose Preferences. 2. Click on the Desktop Background (the Desktop Background dialogue box will appear) 3. Check the Fill Screen button to configure the wallpaper on the desktop. 4. You can also choose the Desktop color by clicking the Desktop Colors button. 5. Click the Close button if you are done setting up the Desktop Background.
  • 64. Responsible Use of ICT – End User Training Linux Desktop Environment Setting Up Screen SaverSetting Up Screen Saver • A screensaver is a moving pattern or bitmap that appears on your monitor after you have not used your computer for a specified amount to time. Screensavers can reduce the wear of your screen and provide security for your system.
  • 65. Responsible Use of ICT – End User Training Configuring Desktop Setting Up Screen SaverSetting Up Screen Saver Selecting a Screensaver 1. From the Panel, choose System. 2. Select Preferences and click Screensaver. 3. The Screensaver dialog box will appear. 4. Select a screensaver from the list. 5. To configure the selected Screensaver, click the Settings button and a Dialog box will appear.
  • 66. Responsible Use of ICT – End User Training Configuring Desktop Setting Up Screen SaverSetting Up Screen Saver Testing a Screensaver • From the Screensaver dialog box, choose Preview and the selected Screensaver will appear. Stopping a Screensaver • To return to the application window (i.e. your returning to your “work”) when the Screensaver is on your screen, move the mouse or click any key from the keyboard to reactivate the monitor.
  • 67. Responsible Use of ICT – End User Training Linux Desktop Environment Terminating a Linux SessionTerminating a Linux Session Logging Out 1. From the Panel, choose System. 2. Click Logout and a dialog box will appear. 3. Choose an option below on how you want your system to behave: – Logout – Shutdown – Restart the computer – Hibernate the computer
  • 68. Responsible Use of ICT – End User Training FILE MANAGEMENTFILE MANAGEMENT
  • 69. Responsible Use of ICT – End User Training File Management Managing FilesManaging Files • The File Browser is a powerful tool that can help organize your files and directories. • You use File Browser to manage your files and directories like moving, copying, starting an application, and many others. • To start the File Browser application, click on Computer from the Places menu on the Panel. • A common metaphor for graphical desktops is the use of folders to represent directories on your hard disk. Folders contain files and other folders.
  • 70. Responsible Use of ICT – End User Training File Management Managing FilesManaging Files
  • 71. Responsible Use of ICT – End User Training File Management Identifying files and directoriesIdentifying files and directories • You can use File Browser to work with files and directories individually or in groups. • To the left of each filename or directory name in the Contents list is an icon to help you identify its type. • In File Browser, each filename or directory name has an icon next to it, indicating what kind of file it is. This is called loon.
  • 72. Responsible Use of ICT – End User Training File Management Creating Files or DirectoriesCreating Files or Directories To create a directory: 1. From the Panel, click the Places menu. 2. Choose the Computer command from the Menu and the Computer File Browser dialogue box will appear. 3. Choose the destination of the folder/directory. 4. Right-click on the right pane and choose Create Folder. 5. Type the folder/directory name.
  • 73. Responsible Use of ICT – End User Training File Management Creating Files or DirectoriesCreating Files or Directories To create an empty file: 1.From the Computer File Browser, choose the destination of the file. 2.Right-click on the right pane and choose Create Document > Empty File. 3.Type the filename.
  • 74. Responsible Use of ICT – End User Training File Management Copying Files or DirectoriesCopying Files or Directories To copy a file: 1. From the File Browser, choose the file you want to copy. 2. Right-click the file and choose the Copy command. 3. Select the destination of the file you want to copy. 4. Right-click the selected destination and choose the Paste command.
  • 75. Responsible Use of ICT – End User Training File Management Copying Files or DirectoriesCopying Files or Directories To copy a folder or directory: 1. From the File Browser, right-click the folder or directory you want to copy and then choose the Copy command. 2. Right-click on the selected destination and then choose Paste.
  • 76. Responsible Use of ICT – End User Training File Management Moving Files or DirectoriesMoving Files or Directories To move a file: 1. From the File Browser, choose the file you want to move. 2. Right-click the file and click the Cut command. 3. Select the destination of the file you want to copy. 4. Right-click the selected destination and choose the Paste command or Paste in 5. Folder if you want to put the file inside a folder.
  • 77. Responsible Use of ICT – End User Training File Management Moving Files or DirectoriesMoving Files or Directories To move a folder or directory: 1. From the File Browser, choose the directory you want to move. 2. Right-click the file and click the Cut command. 3. Select the destination of the file you want to copy. 4. Right-click the selected destination and click the Paste command.
  • 78. Responsible Use of ICT – End User Training File Management Renaming Files or DirectoriesRenaming Files or Directories To rename a file: 1. From the File Browser, choose the file you want to rename. 2. Right-click the file and click the Rename command. 3. Type the new filename and then press the Enter key.
  • 79. Responsible Use of ICT – End User Training File Management Renaming Files or DirectoriesRenaming Files or Directories To rename a folder or directory: 1. From the File Browser, choose the directory you want to rename. 2. Right-click the file and click the Rename command. 3. Type the new folder or directory name and then press the Enter key.
  • 80. Responsible Use of ICT – End User Training File Management Deleting Files or DirectoriesDeleting Files or Directories • File deletion, or removing a file from a computer's file system, is done for the following reasons: – To free up the disk space – To remove duplicate or unnecessary data to avoid confusion – To make sensitive information unavailable to others
  • 81. Responsible Use of ICT – End User Training File Management Deleting Files or DirectoriesDeleting Files or Directories To delete a file: 1. From the File Browser, choose the file you want to delete. 2. Press the Delete button from the keyboard.
  • 82. Responsible Use of ICT – End User Training File Management Deleting Files or DirectoriesDeleting Files or Directories To delete a folder or directory: 1. From the File Browser, choose the folder or directory you want to delete. 2. Press the Delete button from the keyboard.
  • 83. Responsible Use of ICT – End User Training File Management Deleting Files or DirectoriesDeleting Files or Directories • The common problem with deleting files is accidental removal of information that later proves to be important. • Precautionary measures: – back up your files regularly – move them the trash, temporary place where they are kept until one is really low on free space – mark important files as read-only
  • 84. Responsible Use of ICT – End User Training File Management Deleting Files or DirectoriesDeleting Files or Directories • The common problem with deleting files is accidental removal of information that later proves to be important. • Precautionary measures: – back up your files regularly – move them the trash, temporary place where they are kept until one is really low on free space – mark important files as read-only
  • 85. Responsible Use of ICT – End User Training File Management Viewing Contents of Drives orViewing Contents of Drives or DirectoriesDirectories Changing Folders or Directories: • You can display the content of a resource available on your system by clicking the resource from the Side Pane. 1. Click a resource on the Side Pane and the content of the resource will be displayed on the right half of the File Browser. 2. To change the folder or directory being viewed, double-click on the Folder or Directory you want to view.
  • 86. Responsible Use of ICT – End User Training File Management Displaying Subfolders andDisplaying Subfolders and subdirectoriessubdirectories • If the folder or directory you want is not displayed, expand that particular folder or directory by clicking the arrow beside the resource. 1. Click the folder or directory whose contents you want to view. 2. To go back, click the Back button from the Toolbar.
  • 87. Responsible Use of ICT – End User Training End of presentation