SlideShare une entreprise Scribd logo
1  sur  27
Computer Operations
Work with computers
1.1 Start And Shutdown ,[object Object],[object Object],[object Object],[object Object],[object Object]
1.2 Interface ,[object Object],[object Object],[object Object],[object Object]
1.3 System Settings ,[object Object],[object Object],[object Object],[object Object]
1.4 Access The Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1.5 Terminology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information storage and retrieval
2.1 Manage files & folders
2.2 Organize and store Information
2.3 Storage Media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Safety and Security
3.1 Work safely ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3.2 Physical stress ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3.3 Computer Virus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3.4 Information security
Strong Password & Phishing
3.1 Information security ,[object Object],[object Object],[object Object],[object Object]
3.2 Guidelines: Copyright ,[object Object],[object Object],[object Object],[object Object],[object Object]
3.3 Guidelines: Netiquette ,[object Object],[object Object]
3.4 Online Communications ,[object Object],[object Object],[object Object],[object Object]
4.1 Maintenance of Computer  ,[object Object],[object Object],[object Object],[object Object]
4.2 Maintenance of Printer ,[object Object],[object Object],[object Object],[object Object],[object Object]
4.3 Troubleshooting ,[object Object],[object Object],[object Object],[object Object]
4.4 Help ,[object Object],[object Object],[object Object]
5.1 Hardware ,[object Object],[object Object],[object Object]
5.2 Software ,[object Object],[object Object]

Contenu connexe

Tendances

Kara Milligan Device Classification
Kara Milligan Device ClassificationKara Milligan Device Classification
Kara Milligan Device Classification
bugred2
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crime
angbeelee
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
rahul kundu
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
Reddhi Basu
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
Albrecht Jones
 

Tendances (20)

Computer security
Computer securityComputer security
Computer security
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
Kara Milligan Device Classification
Kara Milligan Device ClassificationKara Milligan Device Classification
Kara Milligan Device Classification
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Slideshare is
Slideshare isSlideshare is
Slideshare is
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crime
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Security and protection
Security and protectionSecurity and protection
Security and protection
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
 
185
185185
185
 

Similaire à Computer Operations

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
MISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
MISY
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
IT
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 
Typical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfTypical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdf
aptexx
 
How Hard Is It To Hack A Pc
How Hard Is It To Hack A PcHow Hard Is It To Hack A Pc
How Hard Is It To Hack A Pc
haimkarel
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
paramalways
 

Similaire à Computer Operations (20)

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 
INTRODUCTION TO COMPUTER.pptx
INTRODUCTION TO COMPUTER.pptxINTRODUCTION TO COMPUTER.pptx
INTRODUCTION TO COMPUTER.pptx
 
Computer security
Computer securityComputer security
Computer security
 
discovering computer chapter 1
discovering computer chapter 1discovering computer chapter 1
discovering computer chapter 1
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
 
Windows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITProsWindows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITPros
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
111 01 intro
111 01 intro111 01 intro
111 01 intro
 
Computer ch. no 1.
Computer ch. no 1.Computer ch. no 1.
Computer ch. no 1.
 
Computer Concepts Intro
Computer Concepts IntroComputer Concepts Intro
Computer Concepts Intro
 
Computer Concepts Intro
Computer Concepts IntroComputer Concepts Intro
Computer Concepts Intro
 
Computer Concepts Intro
Computer Concepts IntroComputer Concepts Intro
Computer Concepts Intro
 
Typical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfTypical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdf
 
How Hard Is It To Hack A Pc
How Hard Is It To Hack A PcHow Hard Is It To Hack A Pc
How Hard Is It To Hack A Pc
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Comp2
Comp2Comp2
Comp2
 
Intro Ch 01 B
Intro Ch 01 BIntro Ch 01 B
Intro Ch 01 B
 

Plus de thinkict

Photostory
PhotostoryPhotostory
Photostory
thinkict
 
Open Office Impress : Lesson 08
Open Office Impress : Lesson 08Open Office Impress : Lesson 08
Open Office Impress : Lesson 08
thinkict
 
Open Office Calc : Level1
 Open Office Calc : Level1 Open Office Calc : Level1
Open Office Calc : Level1
thinkict
 
Open Office Calc : Lesson 07
Open Office Calc : Lesson 07Open Office Calc : Lesson 07
Open Office Calc : Lesson 07
thinkict
 
Open Office Calc : Level 1
Open Office Calc : Level 1Open Office Calc : Level 1
Open Office Calc : Level 1
thinkict
 
Open Office Calc : Lesson 06
Open Office Calc : Lesson 06Open Office Calc : Lesson 06
Open Office Calc : Lesson 06
thinkict
 
Open Office Calc : Lesson 05
Open Office Calc : Lesson 05Open Office Calc : Lesson 05
Open Office Calc : Lesson 05
thinkict
 
Text Writer
Text WriterText Writer
Text Writer
thinkict
 
Open Office Writer : Level2
Open Office Writer : Level2 Open Office Writer : Level2
Open Office Writer : Level2
thinkict
 
Open Office Writer : Level1
Open Office Writer : Level1 Open Office Writer : Level1
Open Office Writer : Level1
thinkict
 
Open Office Writer : Lesson 03
Open Office Writer : Lesson 03Open Office Writer : Lesson 03
Open Office Writer : Lesson 03
thinkict
 
Open office Writer : Lesson 02
Open office Writer : Lesson 02Open office Writer : Lesson 02
Open office Writer : Lesson 02
thinkict
 
Marking Grid_Web Communications
Marking Grid_Web CommunicationsMarking Grid_Web Communications
Marking Grid_Web Communications
thinkict
 
Marking Grid_Computer Operations
Marking Grid_Computer OperationsMarking Grid_Computer Operations
Marking Grid_Computer Operations
thinkict
 
Marking Grid_AlphaTech
Marking Grid_AlphaTechMarking Grid_AlphaTech
Marking Grid_AlphaTech
thinkict
 
Web Communications Brochure
Web Communications BrochureWeb Communications Brochure
Web Communications Brochure
thinkict
 
Internet Operations Brochure
Internet Operations BrochureInternet Operations Brochure
Internet Operations Brochure
thinkict
 
Computer Operations Brochure
Computer Operations BrochureComputer Operations Brochure
Computer Operations Brochure
thinkict
 
AlphaTech Brochure
AlphaTech BrochureAlphaTech Brochure
AlphaTech Brochure
thinkict
 
Internet Operations
Internet OperationsInternet Operations
Internet Operations
thinkict
 

Plus de thinkict (20)

Photostory
PhotostoryPhotostory
Photostory
 
Open Office Impress : Lesson 08
Open Office Impress : Lesson 08Open Office Impress : Lesson 08
Open Office Impress : Lesson 08
 
Open Office Calc : Level1
 Open Office Calc : Level1 Open Office Calc : Level1
Open Office Calc : Level1
 
Open Office Calc : Lesson 07
Open Office Calc : Lesson 07Open Office Calc : Lesson 07
Open Office Calc : Lesson 07
 
Open Office Calc : Level 1
Open Office Calc : Level 1Open Office Calc : Level 1
Open Office Calc : Level 1
 
Open Office Calc : Lesson 06
Open Office Calc : Lesson 06Open Office Calc : Lesson 06
Open Office Calc : Lesson 06
 
Open Office Calc : Lesson 05
Open Office Calc : Lesson 05Open Office Calc : Lesson 05
Open Office Calc : Lesson 05
 
Text Writer
Text WriterText Writer
Text Writer
 
Open Office Writer : Level2
Open Office Writer : Level2 Open Office Writer : Level2
Open Office Writer : Level2
 
Open Office Writer : Level1
Open Office Writer : Level1 Open Office Writer : Level1
Open Office Writer : Level1
 
Open Office Writer : Lesson 03
Open Office Writer : Lesson 03Open Office Writer : Lesson 03
Open Office Writer : Lesson 03
 
Open office Writer : Lesson 02
Open office Writer : Lesson 02Open office Writer : Lesson 02
Open office Writer : Lesson 02
 
Marking Grid_Web Communications
Marking Grid_Web CommunicationsMarking Grid_Web Communications
Marking Grid_Web Communications
 
Marking Grid_Computer Operations
Marking Grid_Computer OperationsMarking Grid_Computer Operations
Marking Grid_Computer Operations
 
Marking Grid_AlphaTech
Marking Grid_AlphaTechMarking Grid_AlphaTech
Marking Grid_AlphaTech
 
Web Communications Brochure
Web Communications BrochureWeb Communications Brochure
Web Communications Brochure
 
Internet Operations Brochure
Internet Operations BrochureInternet Operations Brochure
Internet Operations Brochure
 
Computer Operations Brochure
Computer Operations BrochureComputer Operations Brochure
Computer Operations Brochure
 
AlphaTech Brochure
AlphaTech BrochureAlphaTech Brochure
AlphaTech Brochure
 
Internet Operations
Internet OperationsInternet Operations
Internet Operations
 

Dernier

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Computer Operations

Notes de l'éditeur

  1. Course Overview Intro:Livebinder,Multiurl
  2. First Demo one item then learner hands on, then demo next Also explain Log Out Shut Down Menu Non-routine Start-up Standby Quick quiz of terminology
  3. First Demo one item then learner hands on, then demo next: (may be done simultaneously) Also explain: Dialog Box Submenu Icon & Buttons Scrollbar Drag And Drop Zoom, Minimize & Maximize Wizards Shortcuts Help Quick raise-your-hand quiz of features
  4. First Demo one item then learner hands on, then demo next: Also explain: Multiple Monitors Accessibility Settings Shortcuts
  5. Explain features and requirements: Pros / cons Cost, Speed, Connectivity: always on / connect, Stability, Cable/ wireless
  6. Explain IT System Computer (PC Or Laptop) Input Device (Keyboard, Mouse Or Other Pointing Device) Processor Output Device (Screen, Printer) Storage Media (Memory, Disk, CD, DVD, Data/Memory Stick, Hard Drive, Network Drive) Distribute “ Cool PC Lingo” page-2 “PC Just the steps for Dummies” Cheatsheet_Laptop
  7. First Demo one item then learner hands on, then demo next: Use the windows explorer and explain: 1. create, name, open, save, save as, print , close 2. move, copy, rename, share, delete, compress, extract files 3. display file lists, sort, search 4. properties, access control, size, file types First Demo one item then learner hands on, then demo next: create and name folders and subfolders: ICT Training - > PC Operations - > Material change default settings Quick recap
  8. First Demo one item then learner hands on, then demo next: Insert, remove, name, label, archive, share, permissions
  9. Explain features and requirements: (show physical demo if possible) Data storage Data recovery Quick quiz of terms and features randomly
  10. Discuss and explain: Extreme temperatures, Voltage problems, Hackers, Physical Theft, Virtual Theft Viruses, Worms, and Trojan Horses, Spyware, Internet Scams, Online Predators Human Error Hardware damage Health and safety issues: fire, voltage, overheating risks from hardware: shock, power leakage, manufacturer guidelines electrical connection risks and guidelines: shock, leakage, voltage fluctuation use and disposal of cleaning materials: what to use, what not, how to use, how not handling equipment: damage, temperatures, manufacturer guidelines Risks to self and others from using hardware: signals, radioactive, overexposure to light, sound risk assessment safe disposal of IT equipment and consumables: manufacturer guidelines
  11. Discuss and explain: adjust seating and lighting (give live demo personally) avoid hazards: standby, voltage, ups take breaks: after every 20mins – look 20feet away – 20eyeblinks (20-20-20) arrangement of hardware and cables: untangled, tagged, labeled wrist rests workspace working conditions Quiz: yes / no questions
  12. Virus has received fame after 3 Idiots Viru Shahastrabuddhe Discuss and explain: What are the d angers involved and How to minimize risk Explain: Virus-checking software (give examples) Treat files, software and attachments from unknown sources with caution anti-spam software (give examples) Firewall
  13. Discuss and explain: avoid inappropriate disclosure of information: logout, shared computers, online forms Tips: Installing computers in secure locations, Controlling operating environment Surge protection and line conditioning, Uninterruptible Power Supply (UPS) Data Storage in Safe Locations, Virus and Spyware Protection
  14. Discuss and explain: Plagiarism Inappropriate-use and piracy: Music, Software, Logo Unauthorized access Legal use Using copyrighted material for educational purposes Sharing links instead of downloaded material Using copyrighted material with the copyright owner's permission
  15. Discuss and explain: Do's and Don’ts Email and Instant messaging: include a descriptive subject line, Keep it short spelling and grammar mistakes excessive formatting excessive punctuation CAPITAL LETTERS emoticons like: :-) = happy :-( = sad ;-) = wink :-o = shocked
  16. Discuss and explain: Protect personal information avoid misuse of images use appropriate language respect confidentiality
  17. Discuss and explain: Manufacturer’s guidelines what maintenance can be done safely; what should be left to experts what problems may happen if maintenance is not done what non-routine maintenance may be needed what maintenance should be carried out by specialist technicians First Demo one item then learner hands on, then demo next: disk cleanup wizard, scheduled tasks, temporary files, cache Cleaning – different components to maintain functionality and appearance.
  18. First Demo one item then learner hands on, then demo next: replace printer consumables (paper, toner, cartridge) print test page align cartridge Distribute “WindowsGuidePrint”
  19. First Demo one item then learner hands on, then demo next: (Inquiry, need-based) Task manager Trouble shooter tool Device manager Discuss and explain: Inquire and identify needs and solve them along with these: Program not responding error dialogue storage full paper jam virus threat lost network connections memory low driver missing Plug-in not installed monitor does not display correct colors mouse does not respond to movement keyboard error
  20. Discuss and explain: help menus manufacturer’s guidelines how to follow advice where to get advice to deal with different hardware and software problems
  21. Discuss and explain: Demo how to install: (physical connection and software) keyboard, mouse, speaker, printer, pen-drive, camera
  22. First Demo one item then learner hands on, then demo next: